Next Article in Journal
A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission
Previous Article in Journal
Complete Blood Cell Detection and Counting Based on Deep Neural Networks
 
 
Article

Article Versions Notes

Appl. Sci. 2022, 12(16), 8141; https://doi.org/10.3390/app12168141
Action Date Notes Link
article xml file uploaded 14 August 2022 14:09 CEST Original file -
article xml uploaded. 14 August 2022 14:09 CEST Update -
article pdf uploaded. 14 August 2022 14:09 CEST Version of Record https://www.mdpi.com/2076-3417/12/16/8141/pdf-vor
article html file updated 14 August 2022 14:10 CEST Original file -
article xml file uploaded 16 August 2022 06:04 CEST Update -
article xml uploaded. 16 August 2022 06:04 CEST Update -
article pdf uploaded. 16 August 2022 06:04 CEST Updated version of record https://www.mdpi.com/2076-3417/12/16/8141/pdf-vor
article html file updated 16 August 2022 06:06 CEST Update -
article xml file uploaded 16 August 2022 06:15 CEST Update -
article xml uploaded. 16 August 2022 06:15 CEST Update https://www.mdpi.com/2076-3417/12/16/8141/xml
article pdf uploaded. 16 August 2022 06:15 CEST Updated version of record https://www.mdpi.com/2076-3417/12/16/8141/pdf
article html file updated 16 August 2022 06:17 CEST Update https://www.mdpi.com/2076-3417/12/16/8141/html
Back to TopTop