{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T01:42:51Z","timestamp":1768009371155,"version":"3.49.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030175184","type":"print"},{"value":"9783030175191","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-17519-1_8","type":"book-chapter","created":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T18:02:59Z","timestamp":1564682579000},"page":"99-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hadamard Matrices on Error Detection and Correction: Useful Links to BIBD"],"prefix":"10.1007","author":[{"given":"Carla","family":"Francisco","sequence":"first","affiliation":[]},{"given":"Teresa A.","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Am\u00edlcar","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Carvalho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,2]]},"reference":[{"issue":"3","key":"8_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1090\/S0002-9904-1962-10761-7","volume":"68","author":"L D Baumert","year":"1962","unstructured":"Baumert, L. D., Golomb, S. W., & Hall, Jr., M. (1962). Discovery of an Hadamard matrix of order 92. Bulletin of the American Mathematical Society, 68(3), 237\u2013238.","journal-title":"Bulletin of the American Mathematical Society"},{"key":"8_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1192-1","volume-title":"Block designs: A randomization approach","author":"T Cali\u0144ski","year":"2000","unstructured":"Cali\u0144ski, T., & Kageyama, S. (2000). Block designs: A randomization approach. Vol. I: Analysis. Lecture Notes in Statistics (p. 150). Berlin: Springer."},{"key":"8_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9246-8","volume-title":"Block designs: A randomization approach","author":"T Cali\u0144ski","year":"2003","unstructured":"Cali\u0144ski, T., & Kageyama, S. (2003). Block designs: A randomization approach. Vol. II: Design. Lecture Notes in Statistics (p. 170). Berlin: Springer."},{"key":"8_CR4","volume-title":"Hadamard matrices in The Encyclopaedia of Design Theory at","author":"P J Cameron","year":"2006","unstructured":"Cameron, P. J. (2006). Hadamard matrices in The Encyclopaedia of Design Theory at http:\/\/www.maths.qmul.ac.uk\/~leonard\/designtheory.org\/library\/encyc\/ ."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Din S. U., & Mavron V. C. (1984). On designs constructed from Hadamard matrices. Proceedings of the London Mathematical Society, 49, 274\u2013288.","DOI":"10.1112\/plms\/s3-49.2.274"},{"key":"8_CR6","volume-title":"Experimental Design in Incomplete Blocks: Particular Case Studies","author":"C Francisco","year":"2014","unstructured":"Francisco, C. (2014). Experimental Design in Incomplete Blocks: Particular Case Studies. Master Thesis. Open University. Lisbon. Portugal."},{"key":"8_CR7","volume-title":"Handwritten signature authentication using motion detection and QRCodes","author":"R M P Gon\u00e7alves","year":"2015","unstructured":"Gon\u00e7alves, R. M. P. (2015). Handwritten signature authentication using motion detection and QRCodes. Master Thesis on Computers Sciences. Porto University."},{"key":"8_CR8","volume-title":"Combinatorial theory","author":"M Hall Jr","year":"1986","unstructured":"Hall, Jr, M. (1986). Combinatorial theory, 2nd edn. New York: Wiley.","edition":"2"},{"issue":"6","key":"8_CR9","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1214\/aos\/1176344370","volume":"6","author":"A Hedayat","year":"1978","unstructured":"Hedayat, A., & Wallis, W. D. (1978). Hadamard matrices and their applications. Annals of Statistics, 6(6), 1184\u20131238.","journal-title":"Annals of Statistics"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/328236.328110","volume":"43","author":"A Jain","year":"2000","unstructured":"Jain, A., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2), 91\u201398. https:\/\/doi.org\/10.1145\/328236.328110","journal-title":"Communications of the ACM"},{"key":"8_CR11","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/978-3-642-21493-6_14","volume-title":"CAI11 Proceedings of the forth International Conference on Algebraic Informatics","author":"C Koukouvinos","year":"2011","unstructured":"Koukouvinos C., Simos, D. E., & Varbanov, Z. (2011). Hadamard matrices, designs and the secret- sharing schemes. CAI11 Proceedings of the forth International Conference on Algebraic Informatics, 216\u2013229."},{"key":"8_CR12","unstructured":"Lakshmanaswamy, K., Das Gupta, D., Toppo N. S., & Senapati, B. (2014). Multi-layered security by embedding biometrics in quick response (QR) codes. International Journal of Engineering Research & Technology, 3(4). e-ISSN: 2278-0181."},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.2478\/spma-2014-0013","volume":"2","author":"M Mitrouli","year":"2014","unstructured":"Mitrouli, M. (2014). Sylvester Hadamard matrices revisited. Special Matrices, 2, 120\u2013124.","journal-title":"Special Matrices"},{"key":"8_CR14","first-page":"6","volume":"3","author":"D E Muller","year":"1954","unstructured":"Muller, D. E. (1954). Application of boolean algebra to switching circuit design and to error detection. IRE Transactions on Electronic Computers, 3, 6\u201312.","journal-title":"IRE Transactions on Electronic Computers"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/S0012-365X(03)00283-8","volume":"279","author":"W Ogata","year":"2004","unstructured":"Ogata, W., Kurosawa, K., Stinson, D., & Saido H. (2004). New combinatorial designs and their applications to authentication codes and secret sharing schemes. Discrete Mathematics, 279, 383\u2013405","journal-title":"Discrete Mathematics"},{"key":"8_CR16","unstructured":"Oliveira, T. A. (2010). Planos em Blocos Incompletos Equilibrados e Parcialmente Equilibrados (BIB e PBIB Designs): Na fronteira entre a Estat\u00edstica e a Matem\u00e1tica, Actas da ENSPM 2010, 8\u201310 Julho de 2010, Escola Superior de Tecnologia e Gest\u00e3o, Instituto Polit\u00e9cnico de Leiria."},{"key":"8_CR17","unstructured":"Oliveira, T. A. (2011). Exploring the links between the BIBD and PBIBD and mathematics. In D. Hampel, J. Hartmann & J. Mich\u00e1lek (Eds.) Biometric Methods and Models in Current Science and Research. Proceedings of XIXth. Summer School of Biometrics 6-10.9.2010. Faculty of Horticulture of Mendel University, Lednice, Rep\u00fablica Checa (pp. 183\u2013194) Brno: Central Institute of Supervising and Testing in Agriculture."},{"issue":"4","key":"8_CR18","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1093\/biomet\/33.4.305","volume":"33","author":"R L Plackett","year":"1946","unstructured":"Plackett, R. L., & Burman, J. P. (1946). The design of optimum multifactorial experiments. Biometrika, 33(4), 305\u2013325.","journal-title":"Biometrika"},{"key":"8_CR19","volume-title":"Constructions and combinatorial problems in design of experiments","author":"D Raghvarao","year":"1971","unstructured":"Raghvarao, D. (1971). Constructions and combinatorial problems in design of experiments. New York: Wiley."},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/TIT.1954.1057465","volume":"4","author":"I S Reed","year":"1954","unstructured":"Reed, I. S. (1954). A class of multiple-error-correcting codes and the decoding scheme. Transactions of the IRE Professional Group on Information Theory, 4, 38\u201349.","journal-title":"Transactions of the IRE Professional Group on Information Theory"},{"issue":"2","key":"8_CR21","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1137\/0108018","volume":"8","author":"I S Reed","year":"1960","unstructured":"Reed, I. S., & Solomon, G. (1960). Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2), 300\u2013304.","journal-title":"Journal of the Society for Industrial and Applied Mathematics"},{"key":"8_CR22","unstructured":"Salaiwarakul, A. (2010). Verification of secure biometric authentication protocols. Ph.D. thesis. Birmingham: University of Birmingham."},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/BF02582942","volume":"1","author":"K Sawade","year":"1985","unstructured":"Sawade, K. (1985). A Hadamard matrix of order-268. Graphs Combinatorics, 1, 185\u2013187.","journal-title":"Graphs Combinatorics"},{"key":"8_CR24","volume-title":"Hadamard matrices","author":"J Seberry","year":"2012","unstructured":"Seberry, J. (2012). Hadamard matrices. University of Wollongong."},{"key":"8_CR25","volume-title":"Combinatorial designs \u2013 constructions and analysis","author":"D R Stinson","year":"2004","unstructured":"Stinson, D. R. (2004). Combinatorial designs \u2013 constructions and analysis. Berlin: Springer."},{"key":"8_CR26","first-page":"461","volume":"34","author":"J J Sylvester","year":"1867","unstructured":"Sylvester, J. J. (1867). Thoughts on inverse orthogonal matrices, simultaneous sign successions, and tessellated pavements in two or more colours, with applications to Newton\u2019s rule, ornamental tile-work, and the theory of numbers. Philosophical Magazine, 34, 461\u2013475.","journal-title":"Philosophical Magazine"},{"key":"8_CR27","isbn-type":"print","doi-asserted-by":"publisher","DOI":"10.1109\/9780470546345","volume-title":"Reed-Solomon codes and their applications","author":"S B Wicker","year":"1999","unstructured":"Wicker, S. B., Bhargava, V. K. (1999). Reed-Solomon codes and their applications. Hoboken: Wiley-IEEE Press. ISBN: 978-0-7803-5391-6.","ISBN":"https:\/\/id.crossref.org\/isbn\/9780780353916"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1111\/j.1469-1809.1936.tb02134.x","volume":"7","author":"F Yates","year":"1936","unstructured":"Yates, F. (1936). Incomplete randomized blocks. Annals of Eugenics, 7, 121\u2013140.","journal-title":"Annals of Eugenics"}],"container-title":["Contributions to Statistics","Matrices, Statistics and Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17519-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T15:36:12Z","timestamp":1695051372000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17519-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030175184","9783030175191"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17519-1_8","relation":{},"ISSN":["1431-1968"],"issn-type":[{"value":"1431-1968","type":"print"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWMS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Matrices and Statistics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Funchal","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 June 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwms2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iwms.ipt.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}