{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:54:51Z","timestamp":1740142491101,"version":"3.37.3"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100016640","name":"Malayer University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100016640","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comp. Appl. Math."],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s40314-021-01487-6","type":"journal-article","created":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T02:02:35Z","timestamp":1616983355000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Decoding of cyclic codes over the ring $$F_2+uF_2+u^2F_2$$"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5182-6174","authenticated-orcid":false,"given":"Mohammad Reza","family":"Alimoradi","sequence":"first","affiliation":[]},{"given":"Karim","family":"Samei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,29]]},"reference":[{"key":"1487_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10623-012-9632-3","volume":"66","author":"E Byrne","year":"2012","unstructured":"Byrne E, Greferath M, Pernas J, Zumbr\u00e4gel J (2012) Algebraic decoding of negacyclic codes over $$Z_4$$. Des Codes Cryptogr 66:3\u201316","journal-title":"Des Codes Cryptogr"},{"key":"1487_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/BF01390768","volume":"6","author":"AR Calderbank","year":"1995","unstructured":"Calderbank AR, Sloane NJA (1995) Modular and p-adic cyclic codes. Des Codes Cryptogr 6:21\u201335","journal-title":"Des Codes Cryptogr"},{"key":"1487_CR3","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/TIT.2004.831789","volume":"50","author":"HQ Dinh","year":"2004","unstructured":"Dinh HQ, L\u00f3pez-Permouth SR (2004) Cyclic and negacyclic codes over finite chain rings. IEEE Trans Inf Theory 50:1728\u20131744","journal-title":"IEEE Trans Inf Theory"},{"issue":"7","key":"1487_CR4","doi-asserted-by":"publisher","first-page":"2522","DOI":"10.1109\/18.796395","volume":"45","author":"M Greferath","year":"1999","unstructured":"Greferath M, Schmidt ES (1999) Gray isometries for finite chain rings and a nonlinear ternary $$(36, 3^12, 15)$$ code. IEEE Trans Inf Theory 45(7):2522\u20132524","journal-title":"IEEE Trans Inf Theory"},{"key":"1487_CR5","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/18.312154","volume":"40","author":"AR Hammons","year":"1994","unstructured":"Hammons AR, Kumar PV, Calderbank AR, Sloane NJA, Sol\u00e9 P (1994) The $$Z_4$$-linearity of kerdock, preparata, goethals and related codes. IEEE Trans Inf Theory 40:301\u2013319","journal-title":"IEEE Trans Inf Theory"},{"key":"1487_CR6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of error-correcting codes","author":"WC Huffman","year":"2003","unstructured":"Huffman WC, Pless V (2003) Fundamentals of error-correcting codes. Cambridge University Press, Cambridge"},{"key":"1487_CR7","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1109\/18.568713","volume":"43","author":"JC Interlando","year":"1997","unstructured":"Interlando JC, Palazzo R, Elia M (1997) On the decoding of Reed\u2013Solomon and BCH codes over integer residue ring. IEEE Trans Inf Theory 43:1012\u20131021","journal-title":"IEEE Trans Inf Theory"},{"key":"1487_CR8","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1109\/18.841186","volume":"46","author":"GH Norton","year":"2000","unstructured":"Norton GH, Salagean A (2000) On the Hamming distance of linear codes over a finite chain ring. IEEE Trans Inf Theory 46:1060\u20131067","journal-title":"IEEE Trans Inf Theory"},{"key":"1487_CR9","doi-asserted-by":"crossref","unstructured":"Qian J, Zhang L, Yin Z (2006) Type II code over $$F_2+uF_2+u^2F_2$$. In: Proceedings of 2006 IEEE inf theory workshop (ITW\u201906)","DOI":"10.1109\/ITW2.2006.323744"},{"issue":"4","key":"1487_CR10","doi-asserted-by":"publisher","first-page":"1492","DOI":"10.1109\/18.681324","volume":"44","author":"P Udaya","year":"1998","unstructured":"Udaya P, Siddiqi MU (1998) Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings. IEEE Trans Inf Theory 44(4):1492\u20131503","journal-title":"IEEE Trans Inf Theory"},{"key":"1487_CR11","doi-asserted-by":"publisher","first-page":"2148","DOI":"10.1109\/18.782165","volume":"45","author":"P Udaya","year":"1999","unstructured":"Udaya P, Bonnecaze A (1999) Decoding of cyclic codes over $$F_2 + uF_2$$. IEEE Trans Inf Theory 45:2148\u20132157","journal-title":"IEEE Trans Inf Theory"},{"key":"1487_CR12","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1090\/S0002-9947-01-02905-1","volume":"354","author":"JA Wood","year":"2001","unstructured":"Wood JA (2001) The structure of linear codes of constant length. Trans Am Math Soc 354:1007\u20131026","journal-title":"Trans Am Math Soc"},{"key":"1487_CR13","doi-asserted-by":"crossref","unstructured":"Yin X, Ma W (2011) Gray map and quantum codes over the ring $$F_2+uF_2+u^2F_2$$. In: 2011 international joint conference of IEEE","DOI":"10.1109\/TrustCom.2011.122"},{"key":"1487_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/0470035706","volume-title":"The art of error correcting coding","author":"RHM Zaragoza","year":"2006","unstructured":"Zaragoza RHM (2006) The art of error correcting coding, 2nd edn. Wiley, Hoboken","edition":"2"}],"container-title":["Computational and Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-021-01487-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40314-021-01487-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-021-01487-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T22:07:51Z","timestamp":1617919671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40314-021-01487-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,29]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["1487"],"URL":"https:\/\/doi.org\/10.1007\/s40314-021-01487-6","relation":{},"ISSN":["2238-3603","1807-0302"],"issn-type":[{"type":"print","value":"2238-3603"},{"type":"electronic","value":"1807-0302"}],"subject":[],"published":{"date-parts":[[2021,3,29]]},"assertion":[{"value":"13 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"96"}}