Next Article in Journal
Study on Damage Behavior and Its Energy Distribution of Deep Granite at High-Temperature Conditions
Next Article in Special Issue
Cluster-Based Approaches toward Developing a Customer Loyalty Program in a Private Security Company
Previous Article in Journal
Exploring Prior Knowledge from Human Mobility Patterns for POI Recommendation
Previous Article in Special Issue
A Robust and Effective Two-Factor Authentication (2FA) Protocol Based on ECC for Mobile Computing
 
 
Review

Article Versions Notes

Action Date Notes Link
article xml file uploaded 26 May 2023 08:48 CEST Original file -
article xml uploaded. 26 May 2023 08:48 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2076-3417/13/11/6497/xml
article pdf uploaded. 26 May 2023 08:48 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/2076-3417/13/11/6497/pdf
article html file updated 26 May 2023 08:50 CEST Original file -
article html file updated 26 May 2023 08:51 CEST Update -
article html file updated 26 May 2023 08:52 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/2076-3417/13/11/6497/html
Back to TopTop