{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:04:18Z","timestamp":1730279058808,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/itw.2018.8613426","type":"proceedings-article","created":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:39:34Z","timestamp":1547771974000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Type-II Quasi-Cyclic LDPC Codes with Girth Eight from Sidon Sequence"],"prefix":"10.1109","author":[{"given":"Guohua","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yulin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Qinwei","family":"He","sequence":"additional","affiliation":[]},{"given":"Juhua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/el.2015.2634"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e90-a.5.1055"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"39","DOI":"10.4236\/jcc.2016.412002","article-title":"Half rate quasi cyclic low density parity check codes based on combinatorial designs","volume":"4","author":"vafi","year":"2016","journal-title":"Journal of Computer and Communications"},{"key":"ref13","first-page":"2587","article-title":"Construction of type-II QC-LDPC codes with a large girth based on perfect cyclic difference sets","volume":"39","author":"yuan","year":"2017","journal-title":"Systems Engineering and Electronics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.37236\/32"},{"journal-title":"ITW2018Data","year":"0","key":"ref15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2014.6970869"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ISTC.2012.6325193"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2250574"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173244"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557574"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2005.861667"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2008.080065"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.831841"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2015.01.024"}],"event":{"name":"2018 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2018,11,25]]},"location":"Guangzhou","end":{"date-parts":[[2018,11,29]]}},"container-title":["2018 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8598908\/8613300\/08613426.pdf?arnumber=8613426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:09:11Z","timestamp":1643231351000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8613426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/itw.2018.8613426","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}