Next Article in Journal
Securing Critical Infrastructure with Blockchain Technology: An Approach to Cyber-Resilience
Next Article in Special Issue
Two-Phase Fuzzy Real-Time Approach for Fuzzy Demand Electric Vehicle Routing Problem with Soft Time Windows
Previous Article in Journal
Enhancing Workplace Safety through Personalized Environmental Risk Assessment: An AI-Driven Approach in Industry 5.0
Previous Article in Special Issue
Pedestrian Collision Avoidance in Autonomous Vehicles: A Review
 
 
Article

Article Versions Notes

Computers 2024, 13(5), 121; https://doi.org/10.3390/computers13050121
Action Date Notes Link
article xml file uploaded 14 May 2024 09:54 CEST Original file -
article xml uploaded. 14 May 2024 09:54 CEST Update https://www.mdpi.com/2073-431X/13/5/121/xml
article pdf uploaded. 14 May 2024 09:54 CEST Version of Record https://www.mdpi.com/2073-431X/13/5/121/pdf
article html file updated 14 May 2024 09:56 CEST Original file https://www.mdpi.com/2073-431X/13/5/121/html
Back to TopTop