Next Article in Journal
Attack Algorithm for a Keystore-Based Secret Key Generation Method
Next Article in Special Issue
Composite Interpolation-Based Multiscale Fuzzy Entropy and Its Application to Fault Diagnosis of Rolling Bearing
Previous Article in Journal
An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
Previous Article in Special Issue
Improving the Performance of Storage Tank Fault Diagnosis by Removing Unwanted Components and Utilizing Wavelet-Based Features
 
 
Article

Article Versions Notes

Entropy 2019, 21(2), 211; https://doi.org/10.3390/e21020211
Action Date Notes Link
article xml file uploaded 22 February 2019 16:05 CET Original file -
article pdf uploaded. 22 February 2019 16:05 CET Version of Record https://www.mdpi.com/1099-4300/21/2/211/pdf-vor
article xml file uploaded 25 February 2019 14:05 CET Update -
article xml uploaded. 25 February 2019 14:05 CET Update https://www.mdpi.com/1099-4300/21/2/211/xml
article pdf uploaded. 25 February 2019 14:05 CET Updated version of record https://www.mdpi.com/1099-4300/21/2/211/pdf
article html file updated 25 February 2019 14:06 CET Original file -
article html file updated 1 March 2019 10:42 CET Update -
article html file updated 4 March 2019 04:23 CET Update -
article html file updated 5 March 2019 08:15 CET Update -
article html file updated 4 April 2019 02:05 CEST Update -
article html file updated 12 April 2019 07:56 CEST Update -
article html file updated 26 April 2019 12:27 CEST Update -
article html file updated 15 October 2019 12:27 CEST Update -
article html file updated 11 February 2020 18:04 CET Update https://www.mdpi.com/1099-4300/21/2/211/html
Back to TopTop