{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:57:04Z","timestamp":1768341424181,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T00:00:00Z","timestamp":1709683200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T00:00:00Z","timestamp":1709683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Theory Comput Syst"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s00224-024-10166-y","type":"journal-article","created":{"date-parts":[[2024,3,6]],"date-time":"2024-03-06T09:02:28Z","timestamp":1709715748000},"page":"512-528","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Linear Codes Correcting Repeated Bursts Equipped with Homogeneous Distance"],"prefix":"10.1007","volume":"68","author":[{"given":"Pankaj Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Subodh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,6]]},"reference":[{"key":"10166_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/BF01390768","volume":"6","author":"AR Calderbank","year":"1995","unstructured":"Calderbank, A.R., Sloane, N.J.A.: Modular and p-adic cyclic codes. Des. Codes Cryptogr. 6, 21\u201335 (1995)","journal-title":"Des. Codes Cryptogr."},{"issue":"3","key":"10166_CR2","first-page":"22","volume":"33","author":"I Constantinescu","year":"1997","unstructured":"Constantinescu, I., Heise, W.: A metric for codes over residue class rings of integers. Problemy Peredachi Informatsii 33(3), 22\u201328 (1997)","journal-title":"Problemy Peredachi Informatsii"},{"issue":"2","key":"10166_CR3","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1080\/15598608.2009.10411931","volume":"3","author":"L Berardi","year":"2009","unstructured":"Berardi, L., Dass, B.K., Verma, R.: On 2-repeated burst error detecting codes. J. Stat. Theory Pract. 3(2), 381\u2013391 (2009)","journal-title":"J. Stat. Theory Pract."},{"issue":"4","key":"10166_CR4","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1142\/S1793557108000278","volume":"1","author":"BK Dass","year":"2008","unstructured":"Dass, B.K., Verma, R.: Repeated burst error correcting linear codes. Asian-Eur. J. Math. 1(4), 303\u2013335 (2008)","journal-title":"Asian-Eur. J. Math."},{"key":"10166_CR5","volume-title":"A class of multiple-error-correcting binary codes for non-independent errors, Sylvania Report, RSL-E-2, Sylvania Reconnaissance Systems Laboratory","author":"P Fire","year":"1959","unstructured":"Fire, P.: A class of multiple-error-correcting binary codes for non-independent errors, Sylvania Report, RSL-E-2, Sylvania Reconnaissance Systems Laboratory. Calif, Mountain View (1959)"},{"key":"10166_CR6","doi-asserted-by":"crossref","unstructured":"Greferath, M., Schmidt, S.E.: Gray isometries for finite chain rings and a nonlinear ternary (36,312,15) code. IEEE Trans. Inf. Theory 45, 2522\u20132524 (1999)","DOI":"10.1109\/18.796395"},{"key":"10166_CR7","doi-asserted-by":"crossref","unstructured":"Greferath, M., Schmidt, S.E.: Finite-ring combinatorics and MacWilliams equivalence theorem. J. Comb. Theory(A) 92(1), 17\u201328 (2000)","DOI":"10.1006\/jcta.1999.3033"},{"issue":"3","key":"10166_CR8","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1142\/S0219498804000873","volume":"3","author":"M Greferath","year":"2004","unstructured":"Greferath, M., Nechaev, A., Wisbauer, R.: Finite quasi-Frobenius modules and linear codes. J. Algebra its Appl. 3(3), 247\u2013272 (2004)","journal-title":"J. Algebra its Appl."},{"issue":"2","key":"10166_CR9","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming, R.W.: Error-detecting and error-correcting codes. Bell Syst. Tech. J. 29(2), 147\u2013160 (1950)","journal-title":"Bell Syst. Tech. J."},{"key":"10166_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/TIT.1958.1057446","volume":"IT\u20134","author":"CY Lee","year":"1958","unstructured":"Lee, C.Y.: Some properties of non-binary error correcting codes. IEEE Trans. Inf. Theory IT\u20134, 77\u201382 (1958)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10166_CR11","doi-asserted-by":"crossref","unstructured":"Li, W.S., Wan, L.Y., Yue, M.T., Chen, W., Zhang, X.D.: Linear codes over the finite ring $$Z_{15}$$. Adv. Linear Algebra Matrix Theory 10, 1\u20135 (2020)","DOI":"10.4236\/alamt.2020.101001"},{"issue":"5","key":"10166_CR12","first-page":"1163","volume":"58","author":"M Moeini","year":"2021","unstructured":"Moeini, M., Rezaei, R., Samei, K.: MacWilliams identity for linear codes over finite chain rings with respect to homogeneous weight. J. Korean Math. Soc. 58(5), 1163\u20131173 (2021)","journal-title":"J. Korean Math. Soc."},{"key":"10166_CR13","unstructured":"Peterson, W.W., Weldon, E.J.: Error correcting codes, 2nd edn. MIT Press, Cambridge, Massachusetts (1972)"},{"issue":"12","key":"10166_CR14","first-page":"1519","volume":"8","author":"BD Sharma","year":"1977","unstructured":"Sharma, B.D., Dass, B.K.: On weight of burst, Indian Journal of. Pure Appl. Math. 8(12), 1519\u20131524 (1977)","journal-title":"Pure Appl. Math."},{"issue":"3","key":"10166_CR15","first-page":"3","volume":"11","author":"BD Sharma","year":"2011","unstructured":"Sharma, B.D., Rohtagi, B.: Some results on weights of vectors having $$m$$-repeated bursts. Cybern. Inf. Technol. 11(3), 3\u201311 (2011)","journal-title":"Cybern. Inf. Technol."},{"key":"10166_CR16","doi-asserted-by":"publisher","first-page":"3276","DOI":"10.1111\/j.1460-9568.2007.05559.x","volume":"25","author":"KV Srinivas","year":"2007","unstructured":"Srinivas, K.V., Jain, R., Saurav, S., Sikdar, S.K.: Small-world network topology of hippocampal neuronal network is lost, in an in vitro glutamate injury modelof epilepsy. Eur. J. Neurosci. 25, 3276\u20133286 (2007)","journal-title":"Eur. J. Neurosci."},{"issue":"2","key":"10166_CR17","doi-asserted-by":"publisher","first-page":"77","DOI":"10.51286\/albjm\/1379271230","volume":"7","author":"F Temiz","year":"2013","unstructured":"Temiz, F., Siap, V.: Linear block and array codes correcting repeated CT-burst errors. Albanian J. Math. 7(2), 77\u201392 (2013)","journal-title":"Albanian J. Math."},{"issue":"6","key":"10166_CR18","doi-asserted-by":"publisher","first-page":"2109","DOI":"10.18576\/amis\/100614","volume":"10","author":"B Yildiz","year":"2016","unstructured":"Yildiz, B., Abdljabbar, M.A.: On $$p$$-ary local Frobenius rings and their homogeneous weights. Appl. Math. Inf. Sci. 10(6), 2109\u20132116 (2016)","journal-title":"Appl. Math. Inf. Sci."},{"issue":"2","key":"10166_CR19","first-page":"145","volume":"2","author":"B Yildiz","year":"2012","unstructured":"Yildiz, B., Ozger, Z.O.: A generalization of the Lee weight $$\\mathbb{Z} _{p^k}$$. TWMS J. Appl. Eng. Math. 2(2), 145\u2013153 (2012)","journal-title":"TWMS J. Appl. Eng. Math."},{"key":"10166_CR20","unstructured":"Yildiz, B., Tufekci, N.: Optimal divisible binary codes from Gray-Homogeneous images of codes over $$R_{k, m}$$. Eur. J. Pure Appl. Math. 10(5), 1112\u20131123 (2017)"}],"container-title":["Theory of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-024-10166-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00224-024-10166-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00224-024-10166-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,21]],"date-time":"2024-06-21T02:03:25Z","timestamp":1718935405000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00224-024-10166-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,6]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["10166"],"URL":"https:\/\/doi.org\/10.1007\/s00224-024-10166-y","relation":{},"ISSN":["1432-4350","1433-0490"],"issn-type":[{"value":"1432-4350","type":"print"},{"value":"1433-0490","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,6]]},"assertion":[{"value":"6 February 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}