Next Article in Journal
A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption
Next Article in Special Issue
Application of Artificial Intelligence for Fraudulent Banking Operations Recognition
Previous Article in Journal
Analysis of 2D and 3D Convolution Models for Volumetric Segmentation of the Human Hippocampus
Previous Article in Special Issue
An Approach for Opening Doors with a Mobile Robot Using Machine Learning Methods
 
 
Article

Article Versions Notes

Big Data Cogn. Comput. 2023, 7(2), 83; https://doi.org/10.3390/bdcc7020083
Action Date Notes Link
article xml file uploaded 23 April 2023 11:44 CEST Original file -
article xml uploaded. 23 April 2023 11:44 CEST Update -
article pdf uploaded. 23 April 2023 11:44 CEST Version of Record https://www.mdpi.com/2504-2289/7/2/83/pdf-vor
article html file updated 23 April 2023 11:46 CEST Original file -
article xml file uploaded 23 April 2023 11:57 CEST Update -
article xml uploaded. 23 April 2023 11:57 CEST Update -
article pdf uploaded. 23 April 2023 11:57 CEST Updated version of record https://www.mdpi.com/2504-2289/7/2/83/pdf-vor
article html file updated 23 April 2023 11:59 CEST Update -
article xml file uploaded 24 April 2023 09:56 CEST Update -
article xml uploaded. 24 April 2023 09:56 CEST Update https://www.mdpi.com/2504-2289/7/2/83/xml
article pdf uploaded. 24 April 2023 09:56 CEST Updated version of record https://www.mdpi.com/2504-2289/7/2/83/pdf
article html file updated 24 April 2023 09:58 CEST Update https://www.mdpi.com/2504-2289/7/2/83/html
Back to TopTop