{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:45:59Z","timestamp":1751521559174,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T00:00:00Z","timestamp":1562630400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T00:00:00Z","timestamp":1562630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Polish Ministry of Science and Higher Education"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1500-7","type":"journal-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T13:04:36Z","timestamp":1562677476000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Labeling-Based Recipient Identification for 16-QAM BICM-ID"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7726-3114","authenticated-orcid":false,"given":"Maciej","family":"Krasicki","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,9]]},"reference":[{"key":"1500_CR1","unstructured":"IETF: RFC1180: A TCP\/IP Tutorial (IETF, 1991). \n                    https:\/\/tools.ietf.org\/html\/rfc1180\n                    \n                  ."},{"issue":"6","key":"1500_CR2","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/4234.649929","volume":"1","author":"Xiaodong Li","year":"1997","unstructured":"X. Li, J. A. Ritcey, Bit-interleaved coded modulation with iterative decoding. 1(6), 169\u2013171 (1997). \n                    https:\/\/doi.org\/10.1109\/4234.649929\n                    \n                  .","journal-title":"IEEE Communications Letters"},{"key":"1500_CR3","doi-asserted-by":"publisher","unstructured":"X. Li, J. A. Ritcey, in IEEE International Conference on Communications (ICC \u201999), 2. Bit-interleaved coded modulation with iterative decoding, (1999), pp. 858\u2013863. \n                    https:\/\/doi.org\/10.1109\/ICC.1999.765396\n                    \n                  .","DOI":"10.1109\/ICC.1999.765396"},{"issue":"2","key":"1500_CR4","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TWC.2004.842966","volume":"4","author":"Jun Tan","year":"2005","unstructured":"J. Tan, G. L. Stuber, Analysis and design of symbol mappers for iteratively decoded BICM. 4(2), 662\u2013672 (2005). \n                    https:\/\/doi.org\/10.1109\/TWC.2004.842966\n                    \n                  .","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"1500_CR5","doi-asserted-by":"publisher","unstructured":"N. H. Tran, H. H. Nguyen, in Canadian Conference on Electrical and Computer Engineering, 3. Signal mappings of 8-ary constellations for BICM-ID systems over a Rayleigh fading channel, (2004), pp. 1809\u20131813. \n                    https:\/\/doi.org\/10.1109\/CCECE.2004.1349768\n                    \n                  .","DOI":"10.1109\/CCECE.2004.1349768"},{"issue":"13","key":"1500_CR6","doi-asserted-by":"publisher","first-page":"1186","DOI":"10.1049\/el:19960793","volume":"32","author":"S. Benedetto","year":"1996","unstructured":"S. Benedetto, G. Montorsi, Iterative decoding of serially concatenated convolutional codes. Electron. Lett.32(13), 1186\u20131188 (1996). \n                    https:\/\/doi.org\/10.1049\/el:19960793\n                    \n                  .","journal-title":"Electron. Lett."},{"issue":"1","key":"1500_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/4234.552145","volume":"1","author":"S. Benedetto","year":"1997","unstructured":"S. Benedetto, D. Divsalar, G. Montorsi, F. Pollara, A soft-input soft-output APP module for iterative decoding of concatenated codes. 1(1), 22\u201324 (1997). \n                    https:\/\/doi.org\/10.1109\/4234.552145\n                    \n                  .","journal-title":"IEEE Communications Letters"},{"issue":"5","key":"1500_CR8","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1109\/TIT.2005.846409","volume":"51","author":"Y. Huang","year":"2005","unstructured":"Y. Huang, J. A. Ritcey, Optimal constellation labeling for iteratively decoded bit-interleaved space-time coded modulation. 51(5), 1865\u20131871 (2005). \n                    https:\/\/doi.org\/10.1109\/TIT.2005.846409\n                    \n                  .","journal-title":"IEEE Transactions on Information Theory"},{"key":"1500_CR9","doi-asserted-by":"publisher","unstructured":"Q. Xie, K. Peng, F. Yang, Z. Wang, in 2010 IEEE Global Telecommunications Conference GLOBECOM 2010. BICM-ID systems with signal space diversity over Rayleigh fading channels, (2010), pp. 1\u20135. \n                    https:\/\/doi.org\/10.1109\/GLOCOM.2010.5683457\n                    \n                  .","DOI":"10.1109\/GLOCOM.2010.5683457"},{"key":"1500_CR10","doi-asserted-by":"publisher","unstructured":"S. Saha, M. Tschauner, M. Adrat, T. Schmitz, P. Jax, P. Vary, in 2018 International Conference on Military Communications and Information Systems (ICMCIS). Bit-interleaved polar coded modulation with iterative decoding, (2018), pp. 1\u20138. \n                    https:\/\/doi.org\/10.1109\/ICMCIS.2018.8398698\n                    \n                  .","DOI":"10.1109\/ICMCIS.2018.8398698"},{"key":"1500_CR11","doi-asserted-by":"publisher","first-page":"8067","DOI":"10.1109\/TWC.2017.2756837","volume":"16","author":"H. M. Navazi","year":"2017","unstructured":"H. M. Navazi, M. J. Hossain, Efficient multi-dimensional mapping using QAM constellations for BICM-ID. IEEE Transactions on Wireless Communications. 16:, 8067\u20138076 (2017). \n                    https:\/\/doi.org\/10.1109\/twc.2017.2756837\n                    \n                  .","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"1500_CR12","doi-asserted-by":"publisher","first-page":"1142","DOI":"10.1109\/TWC.2018.2890061","volume":"18","author":"Hassan M. Navazi","year":"2019","unstructured":"H. M. Navazi, M. J. Hossain, Novel method for multi-dimensional mapping of higher order modulations for BICM-ID over Rayleigh fading channels. IEEE Transactions on Wireless Communications. 18(2), 1142\u20131154 (2019). \n                    https:\/\/doi.org\/10.1109\/TWC.2018.2890061\n                    \n                  .","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"1500_CR13","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/49.924878","volume":"19","author":"A. Chindapol","year":"2001","unstructured":"A. Chindapol, J. A. Ritcey, Design, analysis, and performance evaluation for BICM-ID with square QAM constellations in Rayleigh fading channels. 19(5), 944\u2013957 (2001). \n                    https:\/\/doi.org\/10.1109\/49.924878\n                    \n                  .","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"1500_CR14","doi-asserted-by":"publisher","unstructured":"F. Schreckenbach, N. Gortz, J. Hagenauer, G. Bauch, in IEEE Global Telecommunications Conference (GLOBECOM \u201903), 6. Optimized symbol mappings for bit-interleaved coded modulation with iterative decoding, (2003), pp. 3316\u20133320. \n                    https:\/\/doi.org\/10.1109\/GLOCOM.2003.1258849\n                    \n                  .","DOI":"10.1109\/GLOCOM.2003.1258849"},{"key":"1500_CR15","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1007\/s11277-015-2431-1","volume":"83","author":"M. Krasicki","year":"2015","unstructured":"M. Krasicki, Algorithm for generating all optimal 16-QAM BI-STCM-ID labelings. Wirel. Pers. Commun.83:, 873\u2013894 (2015). \n                    https:\/\/doi.org\/10.1007\/s11277-015-2431-1\n                    \n                  .","journal-title":"Wirel. Pers. Commun."},{"issue":"12","key":"1500_CR16","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/LCOMM.2003.821325","volume":"7","author":"F. Schreckenbach","year":"2003","unstructured":"F. Schreckenbach, N. Gortz, J. Hagenauer, G. Bauch, Optimization of symbol mappings for bit-interleaved coded modulation with iterative decoding. 7(12), 593\u2013595 (2003). \n                    https:\/\/doi.org\/10.1109\/LCOMM.2003.821325\n                    \n                  .","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"1500_CR17","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/LCOMM.2006.1576566","volume":"10","author":"T. Clevorn","year":"2006","unstructured":"T. Clevorn, S. Godtmann, P. Vary, BER prediction using EXIT charts for BICM with iterative decoding. 10(1), 49\u201351 (2006). \n                    https:\/\/doi.org\/10.1109\/lcomm.2006.1576566\n                    \n                  .","journal-title":"IEEE Communications Letters"},{"key":"1500_CR18","first-page":"1541","volume-title":"Proc. 12th Europ. Signal Processing Conference (EUSIPCO)","author":"J. Hagenauer","year":"2004","unstructured":"J. Hagenauer, in Proc. 12th Europ. Signal Processing Conference (EUSIPCO). The EXIT chart - introduction to extrinsic information transfer (Institute of Communications and Radio-Frequency EngineeringVienna, 2004), pp. 1541\u20131548."},{"issue":"10","key":"1500_CR19","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/TCOMM.2003.818099","volume":"51","author":"F. Zhai","year":"2003","unstructured":"F. Zhai, I. J. Fair, Techniques for early stopping and error detection in turbo decoding. IEEE Trans. Commun.51(10), 1617\u20131623 (2003). \n                    https:\/\/doi.org\/10.1109\/TCOMM.2003.818099\n                    \n                  .","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"1500_CR20","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1287\/ijoc.6.2.126","volume":"6","author":"R. Battiti","year":"1994","unstructured":"R. Battiti, G. Tecchiolli, The Reactive Tabu Search. ORSA Journal on Computing. 6(2), 126\u2013140 (1994). \n                    https:\/\/doi.org\/10.1287\/ijoc.6.2.126\n                    \n                  . \n                    http:\/\/doi.org\/10.1287\/ijoc.6.2.126\n                    \n                  .","journal-title":"ORSA Journal on Computing"},{"key":"1500_CR21","doi-asserted-by":"publisher","unstructured":"N. H. Tran, H. H. Nguyen, in IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, 2. Improving the performance of QPSK BICM-ID by mapping on the hypercube, (2004), pp. 1299\u201313032. \n                    https:\/\/doi.org\/10.1109\/VETECF.2004.1400233\n                    \n                  .","DOI":"10.1109\/VETECF.2004.1400233"},{"key":"1500_CR22","unstructured":"S. Benedetto, E. Biglieri. Principles of digital transmission with wireless applications (Kluwer Academic PublishersNew York, 1999), pp. 702\u2013708."},{"issue":"3","key":"1500_CR23","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1049\/el:19960148","volume":"32","author":"E. Biglieri","year":"1996","unstructured":"E. Biglieri, G. Caire, G. Taricco, J. Ventura-Traveset, Simple method for evaluating error probabilities. Electron. Lett.32(3), 191\u2013192 (1996). \n                    https:\/\/doi.org\/10.1049\/el:19960148\n                    \n                  .","journal-title":"Electron. Lett."},{"key":"1500_CR24","first-page":"622","volume-title":"Simulation of Communication Systems","author":"M. C. Jeruchim","year":"2002","unstructured":"M. C. Jeruchim, P. Balaban, K. S. Shanmugan, in Simulation of Communication Systems. 2nd edn. Error sources in simulation (Plenum PressNew York, 2002), pp. 622\u2013629."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1500-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1500-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1500-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T23:11:01Z","timestamp":1594163461000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1500-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,9]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1500"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1500-7","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,7,9]]},"assertion":[{"value":"12 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author declares that he has no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"179"}}