Next Article in Journal
Pipeline Leak Detection: A Comprehensive Deep Learning Model Using CWT Image Analysis and an Optimized DBN-GA-LSSVM Framework
Previous Article in Journal
Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices
 
 
Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Article

Article Versions Notes

Sensors 2024, 24(12), 4006; https://doi.org/10.3390/s24124006
Action Date Notes Link
article html file updated 26 June 2025 05:33 CEST Update https://www.mdpi.com/1424-8220/24/12/4006/html
article html file updated 20 June 2024 12:05 CEST Original file -
article pdf uploaded. 20 June 2024 12:03 CEST Version of Record https://www.mdpi.com/1424-8220/24/12/4006/pdf
article xml uploaded. 20 June 2024 12:03 CEST Update https://www.mdpi.com/1424-8220/24/12/4006/xml
article xml file uploaded 20 June 2024 12:03 CEST Original file -
Back to TopTop