Next Article in Journal
An Experimental and Theoretical Comparison of 3D Models for Ultrasonic Non-Destructive Testing of Cracks: Part I, Embedded Cracks
Next Article in Special Issue
ExpGen: A 2-Step Vulnerability Exploitability Evaluation Solution for Binary Programs under ASLR Environment
Previous Article in Journal
A Method Based on Dual Cross-Modal Attention and Parameter Sharing for Polyphonic Sound Event Localization and Detection
Previous Article in Special Issue
Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings
 
 
Article

Article Versions Notes

Appl. Sci. 2022, 12(10), 5076; https://doi.org/10.3390/app12105076
Action Date Notes Link
article xml file uploaded 18 May 2022 11:21 CEST Original file -
article xml uploaded. 18 May 2022 11:21 CEST Update https://www.mdpi.com/2076-3417/12/10/5076/xml
article pdf uploaded. 18 May 2022 11:21 CEST Version of Record https://www.mdpi.com/2076-3417/12/10/5076/pdf
article html file updated 18 May 2022 11:22 CEST Original file -
article html file updated 3 August 2022 00:26 CEST Update https://www.mdpi.com/2076-3417/12/10/5076/html
Back to TopTop