Next Article in Journal
Sequential Batch Design for Gaussian Processes Employing Marginalization †
Next Article in Special Issue
An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
Previous Article in Journal
A Risk-Free Protection Index Model for Portfolio Selection with Entropy Constraint under an Uncertainty Framework
Previous Article in Special Issue
An Android Malicious Code Detection Method Based on Improved DCA Algorithm
 
 
Article

Article Versions Notes

Entropy 2017, 19(2), 70; https://doi.org/10.3390/e19020070
Action Date Notes Link
article pdf uploaded. 21 February 2017 14:19 CET Version of Record https://www.mdpi.com/1099-4300/19/2/70/pdf
article xml uploaded. 21 February 2017 14:19 CET Original file https://www.mdpi.com/1099-4300/19/2/70/xml
article html file updated 21 February 2017 14:21 CET Original file -
article html file updated 28 February 2017 10:55 CET Update -
article html file updated 4 May 2019 10:11 CEST Update -
article html file updated 23 September 2019 10:53 CEST Update -
article html file updated 7 February 2020 23:55 CET Update https://www.mdpi.com/1099-4300/19/2/70/html
Back to TopTop