{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T05:56:51Z","timestamp":1723615011432},"reference-count":8,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T00:00:00Z","timestamp":1568246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T00:00:00Z","timestamp":1568246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11432-019-9871-y","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T09:03:17Z","timestamp":1568365397000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On the parity-check matrix of generalized concatenated code"],"prefix":"10.1007","volume":"63","author":[{"given":"Sha","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Junzhi","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Jingliang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yunjiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,12]]},"reference":[{"key":"9871_CR1","volume-title":"Error Control Coding","author":"S Lin","year":"2004","unstructured":"Lin S, Costello D J. Error Control Coding. 2nd ed. Upper Saddle River: Prentice-Hall, 2004","edition":"2nd ed."},{"key":"9871_CR2","first-page":"1911","volume-title":"Handbook of Coding Theory","author":"I Dumer","year":"1998","unstructured":"Dumer I. Concatenated codes and their multilevel generatlizations. In: Handbook of Coding Theory. Amsterdam: Elsevier, 1998. 1911\u20131988"},{"key":"9871_CR3","doi-asserted-by":"publisher","first-page":"5343","DOI":"10.1109\/TIT.2016.2600417","volume":"62","author":"S J Lin","year":"2016","unstructured":"Lin S J, Al-Naffouri T Y, Han Y S. FFT algorithm for binary extension finite fields and its application to reed-solomon codes. IEEE Trans Inform Theory, 2016, 62: 5343\u20135358","journal-title":"IEEE Trans Inform Theory"},{"key":"9871_CR4","first-page":"1329","volume":"46","author":"J Gao","year":"2016","unstructured":"Gao J, Wang X F, Shi M J, et al. Gray maps on linear codes over $${\\mathbb{F}_p}[v]\/({v^m} - v)$$ and their applications. Sci Sin Math, 2016, 46: 1329\u20131336","journal-title":"Sci Sin Math"},{"key":"9871_CR5","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1109\/18.825834","volume":"46","author":"J Maucher","year":"2000","unstructured":"Maucher J, Zyablov V V, Bossert M. On the equivalence of generalized concatenated codes and generalized error location codes. IEEE Trans Inform Theory, 2000, 46: 642\u2013649","journal-title":"IEEE Trans Inform Theory"},{"key":"9871_CR6","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1080\/0025570X.1994.11996233","volume":"67","author":"W P Wardlaw","year":"1994","unstructured":"Wardlaw W P. Matrix representation of finite fields. Math Mag, 1994, 67: 289\u2013293","journal-title":"Math Mag"},{"key":"9871_CR7","doi-asserted-by":"publisher","first-page":"052333","DOI":"10.1103\/PhysRevA.74.052333","volume":"74","author":"D Poulin","year":"2006","unstructured":"Poulin D. Optimal and efficient decoding of concatenated quantum block codes. Phys Rev A, 2006, 74: 052333","journal-title":"Phys Rev A"},{"key":"9871_CR8","doi-asserted-by":"crossref","unstructured":"Wang Y J, Zeng B, Grassl M, et al. Stabilzier formalism for generalized concatenated quantum codes. In: Proceedings of IEEE International Symposium on Information Theory, Istanbul, 2013. 529\u2013533","DOI":"10.1109\/ISIT.2013.6620282"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-9871-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-019-9871-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-019-9871-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T14:42:17Z","timestamp":1681224137000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-019-9871-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,12]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["9871"],"URL":"https:\/\/doi.org\/10.1007\/s11432-019-9871-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,12]]},"assertion":[{"value":"21 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"149301"}}