{"id":"https://openalex.org/W2083290755","doi":"https://doi.org/10.1109/aict-iciw.2006.80","title":"Designing Tornado Codes as Hyper Codes for Improved Error Correcting Performance","display_name":"Designing Tornado Codes as Hyper Codes for Improved Error Correcting Performance","publication_year":2006,"publication_date":"2006-01-01","ids":{"openalex":"https://openalex.org/W2083290755","doi":"https://doi.org/10.1109/aict-iciw.2006.80","mag":"2083290755"},"language":"en","primary_location":{"id":"doi:10.1109/aict-iciw.2006.80","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aict-iciw.2006.80","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014159990","display_name":"Kristian Nybom","orcid":null},"institutions":[{"id":"https://openalex.org/I130217899","display_name":"\u00c5bo Akademi University","ror":"https://ror.org/029pk6x14","country_code":"FI","type":"education","lineage":["https://openalex.org/I130217899"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"K. Nybom","raw_affiliation_strings":["Department of Computer Science, \u00c5bo Akademi University, Finland","Abo Akademi University, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, \u00c5bo Akademi University, Finland","institution_ids":["https://openalex.org/I130217899"]},{"raw_affiliation_string":"Abo Akademi University, Finland","institution_ids":["https://openalex.org/I130217899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048377910","display_name":"Jerker Bj\u00f6rkqvist","orcid":"https://orcid.org/0000-0002-8631-4849"},"institutions":[{"id":"https://openalex.org/I130217899","display_name":"\u00c5bo Akademi University","ror":"https://ror.org/029pk6x14","country_code":"FI","type":"education","lineage":["https://openalex.org/I130217899"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"J. Bjorkqvist","raw_affiliation_strings":["Department of Computer Science, \u00c5bo Akademi University, Finland","Abo Akademi University, Finland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, \u00c5bo Akademi University, Finland","institution_ids":["https://openalex.org/I130217899"]},{"raw_affiliation_string":"Abo Akademi University, Finland","institution_ids":["https://openalex.org/I130217899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014159990"],"corresponding_institution_ids":["https://openalex.org/I130217899"],"apc_list":null,"apc_paid":null,"fwci":0.315,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65149409,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"41","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/tornado","display_name":"Tornado","score":0.8323491811752319},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8205918073654175},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.5345097780227661},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5209314227104187},{"id":"https://openalex.org/keywords/forward-error-correction","display_name":"Forward error correction","score":0.50126051902771},{"id":"https://openalex.org/keywords/concatenated-error-correction-code","display_name":"Concatenated error correction code","score":0.4507763087749481},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4419670104980469},{"id":"https://openalex.org/keywords/low-density-parity-check-code","display_name":"Low-density parity-check code","score":0.43844494223594666},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4308134913444519},{"id":"https://openalex.org/keywords/linear-code","display_name":"Linear code","score":0.4217848777770996},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.42021292448043823},{"id":"https://openalex.org/keywords/turbo-code","display_name":"Turbo code","score":0.4183107316493988},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.39308011531829834},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3709014058113098},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.3235138952732086}],"concepts":[{"id":"https://openalex.org/C190930322","wikidata":"https://www.wikidata.org/wiki/Q8081","display_name":"Tornado","level":2,"score":0.8323491811752319},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8205918073654175},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.5345097780227661},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5209314227104187},{"id":"https://openalex.org/C202932441","wikidata":"https://www.wikidata.org/wiki/Q55611017","display_name":"Forward error correction","level":3,"score":0.50126051902771},{"id":"https://openalex.org/C78944582","wikidata":"https://www.wikidata.org/wiki/Q5158264","display_name":"Concatenated error correction code","level":4,"score":0.4507763087749481},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4419670104980469},{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.43844494223594666},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4308134913444519},{"id":"https://openalex.org/C2400350","wikidata":"https://www.wikidata.org/wiki/Q1752667","display_name":"Linear code","level":4,"score":0.4217848777770996},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.42021292448043823},{"id":"https://openalex.org/C114504821","wikidata":"https://www.wikidata.org/wiki/Q2164281","display_name":"Turbo code","level":3,"score":0.4183107316493988},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.39308011531829834},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3709014058113098},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.3235138952732086},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/aict-iciw.2006.80","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aict-iciw.2006.80","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.594.7461","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.594.7461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://tucs.fi/publications/attachment.php?fname=inpNyBj06a.pdf","raw_type":"text"},{"id":"pmh:oai:pure.atira.dk:publications/6af9a9dd-966b-44fc-95d7-ae3cd241c3a1","is_oa":false,"landing_page_url":"https://research.abo.fi/en/publications/6af9a9dd-966b-44fc-95d7-ae3cd241c3a1","pdf_url":null,"source":{"id":"https://openalex.org/S4406923060","display_name":"\u00c5bo Akademi University Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Nybom, K & Bj\u00f6rkqvist, J 2006, Designing Tornado Codes as Hyper Codes for Improved Error Correcting Performance. in Proceedings of the Advanced International Conference on Telecommunications (AICT'06). IEEE computer society press, pp. \u2013, conference, 01/01/10.","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2115104320","https://openalex.org/W2161342511","https://openalex.org/W2296125569","https://openalex.org/W4242098313","https://openalex.org/W4244625299","https://openalex.org/W6683752993","https://openalex.org/W6824138588"],"related_works":["https://openalex.org/W2127950068","https://openalex.org/W2150212378","https://openalex.org/W2015101254","https://openalex.org/W1851307089","https://openalex.org/W2209506458","https://openalex.org/W1580452828","https://openalex.org/W1996737726","https://openalex.org/W2127824344","https://openalex.org/W2383546851","https://openalex.org/W1917873986"],"abstract_inverted_index":{"Digital":[0],"services":[1],"are":[2,82],"increasingly":[3],"being":[4],"delivered":[5],"to":[6,45,59,111,153],"user":[7],"terminals":[8],"over":[9],"wireless":[10],"multicast":[11,34],"networks.":[12],"When":[13],"the":[14,36,60,66,78,85,89,94,103,106,116,128,135,154],"target":[15],"service":[16],"requires":[17],"uncorrupted":[18],"data":[19,90],"delivery,":[20],"there":[21],"is":[22,44,132],"an":[23],"increasing":[24],"need":[25],"for":[26,29],"developing":[27],"techniques":[28,50],"reliable":[30,41],"content":[31,42],"delivery.":[32],"In":[33,52],"networks,":[35],"typical":[37],"way":[38],"of":[39,68,105,137,146],"providing":[40],"delivery":[43],"apply":[46],"forward":[47],"error":[48,86,113,129],"correcting":[49,130],"(FEC).":[51],"this":[53],"paper,":[54],"we":[55,64,101],"introduce":[56],"a":[57,98,123,144],"modification":[58],"Tornado":[61,69,75,95,107,150,156],"code,":[62,100],"where":[63],"combine":[65],"structures":[67],"codes":[70,76,148],"and":[71,149],"Hyper":[72,99,147],"codes.":[73,157],"Standard":[74],"have":[77],"drawback":[79],"that":[80,127],"they":[81],"dependent":[83],"on":[84,88,122],"distribution":[87,114],"path.":[91],"By":[92],"combining":[93],"code":[96],"with":[97],"decrease":[102],"probability":[104],"decoder":[108],"failing":[109],"due":[110],"inopportune":[112],"in":[115],"source":[117],"data.":[118],"We":[119],"demonstrate,":[120],"based":[121],"simulated":[124],"transmission":[125],"channel,":[126],"performance":[131],"improved,":[133],"at":[134],"cost":[136],"slightly":[138],"longer":[139],"decoding":[140],"times,":[141],"by":[142],"using":[143],"combination":[145],"codes,":[151],"compared":[152],"standard":[155]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
