{"id":"https://openalex.org/W4406015635","doi":"https://doi.org/10.1002/itl2.634","title":"Enhanced Reed\u2013Solomon Error Correction Framework for Reliable Data Transmission in Noisy Communication Systems","display_name":"Enhanced Reed\u2013Solomon Error Correction Framework for Reliable Data Transmission in Noisy Communication Systems","publication_year":2025,"publication_date":"2025-01-02","ids":{"openalex":"https://openalex.org/W4406015635","doi":"https://doi.org/10.1002/itl2.634"},"language":"en","primary_location":{"id":"doi:10.1002/itl2.634","is_oa":true,"landing_page_url":"https://doi.org/10.1002/itl2.634","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.634","source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.634","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084719333","display_name":"Najah Kalifah Almazmomi","orcid":"https://orcid.org/0000-0002-6701-0778"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Najah Kalifah Almazmomi","raw_affiliation_strings":["Department of Management Information Systems (MIS) College of Business, University of Jeddah  Jeddah Saudi Arabia","Department of Management Information Systems (MIS), College of Business, University of Jeddah, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems (MIS) College of Business, University of Jeddah  Jeddah Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]},{"raw_affiliation_string":"Department of Management Information Systems (MIS), College of Business, University of Jeddah, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5084719333"],"corresponding_institution_ids":["https://openalex.org/I4210099699"],"apc_list":{"value":2630,"currency":"USD","value_usd":2630},"apc_paid":null,"fwci":8.1489,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96392428,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reed\u2013solomon-error-correction","display_name":"Reed\u2013Solomon error correction","score":0.6915514469146729},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6695743799209595},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.6337893009185791},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5603170394897461},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.5309193730354309},{"id":"https://openalex.org/keywords/forward-error-correction","display_name":"Forward error correction","score":0.4888107478618622},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.31439679861068726},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3140068054199219},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1745821237564087},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.16757047176361084},{"id":"https://openalex.org/keywords/concatenated-error-correction-code","display_name":"Concatenated error correction code","score":0.07231020927429199}],"concepts":[{"id":"https://openalex.org/C78065487","wikidata":"https://www.wikidata.org/wiki/Q1061598","display_name":"Reed\u2013Solomon error correction","level":5,"score":0.6915514469146729},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6695743799209595},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.6337893009185791},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5603170394897461},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.5309193730354309},{"id":"https://openalex.org/C202932441","wikidata":"https://www.wikidata.org/wiki/Q55611017","display_name":"Forward error correction","level":3,"score":0.4888107478618622},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.31439679861068726},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3140068054199219},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1745821237564087},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.16757047176361084},{"id":"https://openalex.org/C78944582","wikidata":"https://www.wikidata.org/wiki/Q5158264","display_name":"Concatenated error correction code","level":4,"score":0.07231020927429199},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/itl2.634","is_oa":true,"landing_page_url":"https://doi.org/10.1002/itl2.634","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.634","source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1002/itl2.634","is_oa":true,"landing_page_url":"https://doi.org/10.1002/itl2.634","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.634","source":{"id":"https://openalex.org/S4210238311","display_name":"Internet Technology Letters","issn_l":"2476-1508","issn":["2476-1508"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Technology Letters","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4406015635.pdf"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W2932673397","https://openalex.org/W3012305473","https://openalex.org/W3045086480","https://openalex.org/W3097072888","https://openalex.org/W3160131515","https://openalex.org/W3168088879","https://openalex.org/W4285617425","https://openalex.org/W4293057031","https://openalex.org/W4310007439","https://openalex.org/W4382601832","https://openalex.org/W4389266359","https://openalex.org/W4389510984","https://openalex.org/W4390557333","https://openalex.org/W4393034815","https://openalex.org/W4396869293","https://openalex.org/W4400659901","https://openalex.org/W4400727954","https://openalex.org/W4401247006","https://openalex.org/W4401536655","https://openalex.org/W4403331081"],"related_works":["https://openalex.org/W80619516","https://openalex.org/W4387475406","https://openalex.org/W3211717871","https://openalex.org/W2079574511","https://openalex.org/W2333090794","https://openalex.org/W2385979553","https://openalex.org/W1777478344","https://openalex.org/W1481058185","https://openalex.org/W2610274271","https://openalex.org/W3134957703"],"abstract_inverted_index":{"ABSTRACT":[0],"In":[1,195],"modern":[2,224],"communication":[3,151,225],"systems,":[4],"reliable":[5,219],"data":[6,147],"transmission":[7,156],"in":[8,148,207,223],"noisy,":[9],"and":[10,35,53,75,93,126,132,168,187,202,218,232],"interference":[11],"environments":[12],"is":[13,138,227],"a":[14,45,86,94,149,215],"tough":[15],"problem.":[16],"However,":[17],"conventional":[18,165],"error":[19,55,170,182,205,220],"control":[20],"techniques,":[21,57],"like":[22],"Reed\u2013Solomon":[23],"(RS)":[24],"codes,":[25],"often":[26],"fail":[27],"to":[28,58,78,109,144,163],"achieve":[29],"performance":[30],"under":[31],"high":[32],"dimensional":[33],"noise":[34,212],"burst":[36],"errors.":[37],"To":[38],"overcome":[39],"these":[40],"limitations,":[41],"this":[42],"study":[43],"presents":[44],"new":[46],"framework":[47,160],"that":[48,176],"incorporates":[49],"advanced":[50],"optimization":[51,116],"algorithms":[52],"adaptive":[54,72,98],"correction":[56,171,206,221],"extend":[59],"the":[60,106,111,141,158,177,197,208,235],"RS":[61,65,166,237],"method.":[62],"The":[63,114],"improved":[64,236],"encoding":[66],"scheme":[67],"starts":[68],"with":[69,97,140,234],"multi\u2010layered":[70],"encoding,":[71],"symbol":[73],"interleaving,":[74],"list":[76],"decoding":[77,137,188],"increase":[79],"resilience":[80],"against":[81],"severe":[82],"noise.":[83],"We":[84],"use":[85],"multi\u2010verse":[87],"optimizer":[88],"(MVO)":[89],"for":[90,102,239],"global":[91],"exploration":[92,125],"differential":[95],"evolution":[96],"chaos":[99],"(DEAC)":[100],"algorithm":[101],"local":[103,129],"refinement":[104],"of":[105,210],"system":[107,112,198],"parameters":[108,143],"optimize":[110],"parameters.":[113],"hybrid":[115,169],"approach":[117,179],"proposed":[118,159,178],"here":[119],"achieves":[120],"an":[121],"appropriate":[122],"trade\u2010off":[123],"between":[124],"exploitation,":[127],"avoiding":[128],"optima":[130],"risk":[131],"enhancing":[133],"convergence.":[134],"Turbo\u2010enhanced":[135],"Reed\u2013Soloman":[136],"realized":[139],"optimized":[142],"decode":[145],"corrupted":[146],"challenging":[150],"environment.":[152],"On":[153],"multiple":[154],"noisy":[155],"scenarios,":[157],"was":[161],"found":[162],"outperform":[164],"methods":[167],"schemes.":[172],"Experimental":[173],"results":[174],"show":[175],"reduces":[180],"bit":[181],"rate":[183],"(BER)":[184],"by":[185,190,229],"30%":[186],"latency":[189],"25%":[191],"versus":[192],"baseline":[193],"methods.":[194],"addition,":[196],"demonstrated":[199],"higher":[200],"throughput":[201],"more":[203],"robust":[204],"presence":[209],"varying":[211],"levels.":[213],"Finally,":[214],"highly":[216],"efficient":[217],"solution":[222],"systems":[226],"achieved":[228],"integrating":[230],"MVO":[231],"DEAC":[233],"method":[238],"parameter":[240],"optimization.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-10-10T00:00:00"}
