Next Article in Journal
An Empirical Comparison of Pen-Testing Tools for Detecting Web App Vulnerabilities
Next Article in Special Issue
Context-Based, Predictive Access Control to Electronic Health Records
Previous Article in Journal
Extended State Observer Based-Backstepping Control for Virtual Synchronous Generator
Previous Article in Special Issue
A Multi-Objective Approach for Optimizing Edge-Based Resource Allocation Using TOPSIS
 
 
Article

Article Versions Notes

Electronics 2022, 11(19), 2990; https://doi.org/10.3390/electronics11192990
Action Date Notes Link
article xml file uploaded 21 September 2022 12:58 CEST Original file -
article xml uploaded. 21 September 2022 12:58 CEST Update -
article pdf uploaded. 21 September 2022 12:58 CEST Version of Record https://www.mdpi.com/2079-9292/11/19/2990/pdf-vor
article html file updated 21 September 2022 12:59 CEST Original file -
article xml file uploaded 28 September 2022 15:50 CEST Update -
article xml uploaded. 28 September 2022 15:50 CEST Update -
article pdf uploaded. 28 September 2022 15:50 CEST Updated version of record https://www.mdpi.com/2079-9292/11/19/2990/pdf-vor
article html file updated 28 September 2022 15:51 CEST Update -
article xml file uploaded 8 October 2022 18:25 CEST Update -
article xml uploaded. 8 October 2022 18:25 CEST Update https://www.mdpi.com/2079-9292/11/19/2990/xml
article pdf uploaded. 8 October 2022 18:25 CEST Updated version of record https://www.mdpi.com/2079-9292/11/19/2990/pdf
article html file updated 8 October 2022 18:26 CEST Update -
article html file updated 28 February 2023 14:35 CET Update https://www.mdpi.com/2079-9292/11/19/2990/html
Back to TopTop