{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:34:32Z","timestamp":1759332872287,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,4,1]],"date-time":"2017-04-01T00:00:00Z","timestamp":1491004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100006115","name":"Institute for Research in Fundamental Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006115","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006115","name":"Institute for Research in Fundamental Sciences","doi-asserted-by":"publisher","award":["95050116"],"award-info":[{"award-number":["95050116"]}],"id":[{"id":"10.13039\/501100006115","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/tit.2017.2655029","type":"journal-article","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T19:45:05Z","timestamp":1484768705000},"page":"2039-2060","source":"Crossref","is-referenced-by-count":14,"title":["Construction and Encoding of QC-LDPC Codes Using Group Rings"],"prefix":"10.1109","volume":"63","author":[{"given":"Hassan","family":"Khodaiemehr","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4574-4380","authenticated-orcid":false,"given":"Dariush","family":"Kiani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","volume":"20","author":"lidl","year":"1997","journal-title":"Finite Fields"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-00-01235-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/18.59932"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnt.2006.06.007"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(03)00273-7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(78)90031-6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.091710.090721"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2251395"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/0601045"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056141"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.091112.110806"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1201\/9781003040897","author":"colbourn","year":"2010","journal-title":"Handbook of Combinatorial Designs"},{"journal-title":"Abstract Algebra Theory and Applications","year":"2009","author":"judson","key":"ref29"},{"journal-title":"Error-Correcting Codes","year":"1972","author":"peterson","key":"ref2"},{"article-title":"Cyclic error-correcting codes in two symbols","year":"1957","author":"prange","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.060911.100208"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/18.825841"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.895188"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1978.1675158"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1504\/IJICOT.2009.024047"},{"key":"ref26","first-page":"319","article-title":"Group rings and rings of matrices","volume":"31","author":"hurley","year":"2006","journal-title":"Int J Pure Appl Math"},{"journal-title":"The Algebraic Structure of Group Rings","year":"1977","author":"passman","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/18.748992"},{"journal-title":"Software for Low Density Parity Check Codes","year":"2017","author":"neal","key":"ref51"},{"journal-title":"An Introduction to the Theory of Numbers","year":"1979","author":"hardy","key":"ref55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1504\/IJICOT.2010.032544"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803253"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.831841"},{"key":"ref10","first-page":"2","article-title":"Array codes as low-density parity-check codes","author":"fan","year":"2000","journal-title":"Proc Int Symp Turbo Codes"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2005.1506715"},{"journal-title":"Algorithmic Number Theory Efficient Algorithms","year":"1996","author":"bach","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(00)00350-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2002.808375"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMAG.2004.824125"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.899516"},{"key":"ref16","first-page":"1","article-title":"Practical encoder and decoder for power constrained QC LDPC-lattice codes","volume":"pp","author":"khodaiemehr","year":"2016","journal-title":"IEEE Trans Commun"},{"key":"ref17","first-page":"1","article-title":"LDPC lattice codes for full-duplex relay channels","volume":"pp","author":"khodaiemehr","year":"2016","journal-title":"IEEE Trans Commun"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2005.858628"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2009.0901.060129"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(60)90287-4"},{"key":"ref3","first-page":"147","article-title":"Codes correcteurs d&#x2019;erreurs","volume":"2","author":"hocquenghem","year":"1959","journal-title":"Chiffres (Paris)"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low-Density Parity-Check Codes"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.913180"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/el:19970362"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.05.090211"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2006.881361"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2316174"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2184834"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2339329"},{"journal-title":"Theory and Practice of Error Control Codes","year":"1983","author":"blahut","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9647-9"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/BF01178683"},{"journal-title":"Finite Rings with Identity","year":"1974","author":"mcdonald","key":"ref43"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/7879182\/07822940.pdf?arnumber=7822940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T01:08:09Z","timestamp":1658452089000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7822940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":55,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tit.2017.2655029","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"type":"print","value":"0018-9448"},{"type":"electronic","value":"1557-9654"}],"subject":[],"published":{"date-parts":[[2017,4]]}}}