{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:45:52Z","timestamp":1743018352420,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819604364"},{"type":"electronic","value":"9789819604371"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-96-0437-1_10","type":"book-chapter","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T16:54:42Z","timestamp":1732640082000},"page":"132-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Two-Dimensional Parity-Check Method"],"prefix":"10.1007","author":[{"given":"H. K.","family":"Dai","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S0019-9958(60)90287-4","volume":"3","author":"R Bose","year":"1960","unstructured":"Bose, R., Ray-Chaudhuri, D.: A class of error-correcting binary group codes. Inf. Control 3, 68\u201379 (1960)","journal-title":"Inf. Control"},{"key":"10_CR2","unstructured":"Dai, H.K., Flannery, K.E.: On the reliability of the vertical and longitudinal redundancy check. In: 27th Small College Computing Symposium, pp. 455\u2013461 (1994)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Dud\u00e1\u010dek, L.,\u00a0Ve\u0159t\u00e1t, I.: Multidimensional parity check codes with short block lengths. In: 2016 24th Telecommunications Forum (TELFOR), pp. 1\u20134 (2016)","DOI":"10.1109\/TELFOR.2016.7818772"},{"key":"10_CR4","volume-title":"Modern Algebra with Applications","author":"WJ Gilbert","year":"1976","unstructured":"Gilbert, W.J.: Modern Algebra with Applications. John Wiley and Sons, New York, NY (1976)"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming, R.W.: Error detecting and error correcting codes. Bell Syst. Techn. J. 29, 147\u2013160 (1950)","journal-title":"Bell Syst. Techn. J."},{"key":"10_CR6","first-page":"147","volume":"2","author":"A Hocquenghem","year":"1959","unstructured":"Hocquenghem, A.: Codes correcteurs d\u2019erreurs. Chiffres (Paris) 2, 147\u2013156 (1959)","journal-title":"Chiffres (Paris)"},{"key":"10_CR7","unstructured":"H\u00f8holdt, T.,\u00a0Lint, J.,\u00a0Pellikaan, R.: Algebraic geometry of codes. In: Pless, V.S.,\u00a0Huffman, W.C.,\u00a0Brualdi, R.A. (eds.) Handbook of Coding Theory, vol. I, pp. 871\u2013961. Elsevier, Amsterdam (1998)"},{"key":"10_CR8","unstructured":"Kurose, J.,\u00a0Ross, K.: Computer Networking: A Top-Down Approach, 7th ed. Pearson (2016)"},{"key":"10_CR9","unstructured":"Lint, J.H.: Introduction to Coding Theory, Graduate Texts in Mathematics (GTM, volume 86). Springer-Verlag, Berlin, Heidelberg (1999)"},{"key":"10_CR10","volume-title":"Teleprocessing Network Organization","author":"J Martin","year":"1988","unstructured":"Martin, J.: Teleprocessing Network Organization. Prentice-Hall, Englewood Cliffs, NJ (1988)"},{"key":"10_CR11","volume-title":"Technical Aspects of Data Communication","author":"J McNamara","year":"1978","unstructured":"McNamara, J.: Technical Aspects of Data Communication. Digital Equipment Corporation (Digital Press), Bedford, MA (1978)"},{"key":"10_CR12","unstructured":"OEIS Foundation Inc.: The on-line encyclopedia of integer sequences (2024). http:\/\/oeis.org"},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"IS Reed","year":"1960","unstructured":"Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. J. Soc. Ind. Appl. Math. 8(2), 300\u2013304 (1960)","journal-title":"J. Soc. Ind. Appl. Math."},{"issue":"1","key":"10_CR14","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1002\/j.1538-7305.1956.tb02379.x","volume":"35","author":"D Slepian","year":"1956","unstructured":"Slepian, D.: A class of binary signaling alphabets. Bell Syst. Tech. J. 35(1), 203\u2013234 (1956)","journal-title":"Bell Syst. Tech. J."},{"key":"10_CR15","unstructured":"van Tilborg, H.C.A.: Uniformly packed codes. [Phd Thesis 1 (Research TU\/e\/Graduation TU\/e), Mathematics and Computer Science]. Ph. D thesis, Technische Hogeschool Eindhoven (1976)"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1002\/mana.19821090103","volume":"109","author":"MA Tsfasman","year":"1982","unstructured":"Tsfasman, M.A., Vl\u0103dutx, S.G., Zink, T.: Modular curves, shimura curves, and goppa codes, better than varshamov-gilbert bound. Math. Nachr. 109(1), 21\u201328 (1982)","journal-title":"Math. Nachr."},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Van\u00a0Lint, J.H.: Algebraic geometric codes. In: Coding Theory and Design Theory, pp. 137\u2013162. Springer, New York (1990)","DOI":"10.1007\/978-1-4613-8994-1_12"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Ve\u0159t\u00e1t, I.,\u00a0Dud\u00e1\u010dek, L.: Multidimensional cross parity check codes as a promising solution to CubeSat low data rate downlinks. In: 2019 International Conference on Applied Electronics (AE), pp. 1\u20135 (2019)","DOI":"10.23919\/AE.2019.8867037"}],"container-title":["Communications in Computer and Information Science","Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0437-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T17:03:18Z","timestamp":1732640598000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0437-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819604364","9789819604371"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0437-1_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Binh Duong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/thefdse.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}