Next Article in Journal
The Power Sums Involving Fibonacci Polynomials and Their Applications
Next Article in Special Issue
Improved Sparse Coding Algorithm with Device-Free Localization Technique for Intrusion Detection and Monitoring
Previous Article in Journal
London Penetration Depth as a Test of Order Parameter Symmetry in Sodium Cobaltate Superconductors
Previous Article in Special Issue
An Efficient Source Location Privacy Protection Algorithm Based on Circular Trap for Wireless Sensor Networks
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 5 May 2019 15:51 CEST Original file -
article pdf uploaded. 5 May 2019 15:51 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2073-8994/11/5/634/pdf-vor
article xml file uploaded 20 May 2019 11:16 CEST Update -
article xml uploaded. 20 May 2019 11:16 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2073-8994/11/5/634/xml
article pdf uploaded. 20 May 2019 11:16 CEST Updated version of record https://0-www-mdpi-com.brum.beds.ac.uk/2073-8994/11/5/634/pdf
article html file updated 20 May 2019 11:17 CEST Original file -
article html file updated 5 June 2019 00:10 CEST Update -
article html file updated 19 October 2019 13:41 CEST Update -
article html file updated 12 February 2020 10:01 CET Update https://0-www-mdpi-com.brum.beds.ac.uk/2073-8994/11/5/634/html
Back to TopTop