{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:01:18Z","timestamp":1764399678269,"version":"3.46.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:00:00Z","timestamp":1750809600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,25]]},"DOI":"10.1109\/snpd65828.2025.11254355","type":"proceedings-article","created":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T18:40:29Z","timestamp":1764355229000},"page":"123-126","source":"Crossref","is-referenced-by-count":0,"title":["Modern Methods for Ensuring Data Integrity in Radio Channels"],"prefix":"10.1109","author":[{"given":"Valery","family":"Zolotarev","sequence":"first","affiliation":[{"name":"Space Research Institute of the Russian, Academy of Sciences,Department of Mathematical Methods for Data Processing,Moscow,Russia"}]},{"given":"Gennady","family":"Ovechkin","sequence":"additional","affiliation":[{"name":"Ryazan State Radio Engineering University,Department of Computational and Applied Mathematics,Ryazan,Russia"}]},{"given":"Dina","family":"Satybaldina","sequence":"additional","affiliation":[{"name":"L.N. Gumilyov Eurasian National University,Research Institute of Information Security and Cryptology,Astana,Kazakhstan"}]},{"given":"Zhuldyz","family":"Sailaukyzy","sequence":"additional","affiliation":[{"name":"Abylkas Saginov Karaganda Technical University,Department of Information Technology and Security,Karaganda,Kazakhstan"}]},{"given":"Murat","family":"Kozhanov","sequence":"additional","affiliation":[{"name":"Abylkas Saginov Karaganda Technical University,Department of Information Technology and Security,Karaganda,Kazakhstan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2862141"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1661047"},{"issue":"5","key":"ref3","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1109\/LCOMM.2019.2909207","article-title":"Multi-threshold bit flipping algorithm for decoding structured LDPC codes","volume":"18","author":"Liu","year":"2014","journal-title":"IEEE Commun. Lett"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2016.414008"},{"volume-title":"Optimization Code Theory and Multithreshold Algorithms","year":"2015","author":"Zolotarev","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v19.i3.pp1287-1296"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s19132884"},{"issue":"10s","key":"ref8","first-page":"4003","article-title":"Specifics of applying multi-threshold decoding methods to correct errors in fading communication channels","volume":"20","author":"Satybaldina","year":"2024","journal-title":"J. Electr. Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISAS64331.2024.10845577"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2862141"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2013.52"}],"event":{"name":"2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)","start":{"date-parts":[[2025,6,25]]},"location":"Busan, Korea, Republic of","end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE\/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11251382\/11252538\/11254355.pdf?arnumber=11254355","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T06:57:10Z","timestamp":1764399430000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11254355\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,25]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/snpd65828.2025.11254355","relation":{},"subject":[],"published":{"date-parts":[[2025,6,25]]}}}