{"id":"https://openalex.org/W2015782797","doi":"https://doi.org/10.1155/2008/362897","title":"New Technique for Improving Performance of LDPC Codes in the Presence of Trapping Sets","display_name":"New Technique for Improving Performance of LDPC Codes in the Presence of Trapping Sets","publication_year":2008,"publication_date":"2008-05-05","ids":{"openalex":"https://openalex.org/W2015782797","doi":"https://doi.org/10.1155/2008/362897","mag":"2015782797"},"language":"en","primary_location":{"id":"doi:10.1155/2008/362897","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2008/362897","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1155/2008/362897","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1155/2008/362897","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067454854","display_name":"Esa Alghonaim","orcid":null},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Esa Alghonaim","raw_affiliation_strings":["Computer Engineering Department, King Fahd University of Petroleum & Minerals, Dhahran, 31261, Kingdom of Saudi Arabia","Computer Engineering Department King Fahd University of Petroleum & Minerals  Dhahran Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, King Fahd University of Petroleum & Minerals, Dhahran, 31261, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Computer Engineering Department King Fahd University of Petroleum & Minerals  Dhahran Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086020181","display_name":"Aiman H. El\u2010Maleh","orcid":"https://orcid.org/0000-0002-3247-0598"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Aiman El-Maleh","raw_affiliation_strings":["Computer Engineering Department, King Fahd University of Petroleum & Minerals, Dhahran, 31261, Kingdom of Saudi Arabia","Computer Engineering Department King Fahd University of Petroleum & Minerals  Dhahran Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, King Fahd University of Petroleum & Minerals, Dhahran, 31261, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"Computer Engineering Department King Fahd University of Petroleum & Minerals  Dhahran Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034412644","display_name":"Mohamed Adnan Landolsi","orcid":"https://orcid.org/0000-0003-4996-8592"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohamed Adnan Landolsi","raw_affiliation_strings":["Electrical Engineering Department, King Fahd University of Petroleum & Minerals, Dhahran, 31261, Kingdom of Saudi Arabia","(Electrical Engineering Department, King Fahd University of Petroleum and Minerals, Dhahran, Kingdom of Saudi Arabia)"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, King Fahd University of Petroleum & Minerals, Dhahran, 31261, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"(Electrical Engineering Department, King Fahd University of Petroleum and Minerals, Dhahran, Kingdom of Saudi Arabia)","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5067454854"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":1.5402,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.84425241,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2008","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10125","display_name":"Advanced Wireless Communication Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/low-density-parity-check-code","display_name":"Low-density parity-check code","score":0.9511977434158325},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7876244783401489},{"id":"https://openalex.org/keywords/trapping","display_name":"Trapping","score":0.7759736776351929},{"id":"https://openalex.org/keywords/bipartite-graph","display_name":"Bipartite graph","score":0.6983230113983154},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6028842926025391},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5976539850234985},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5559970140457153},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.49211472272872925},{"id":"https://openalex.org/keywords/belief-propagation","display_name":"Belief propagation","score":0.46752074360847473},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.3808252811431885},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3167722225189209},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08541059494018555},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.08078965544700623}],"concepts":[{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.9511977434158325},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7876244783401489},{"id":"https://openalex.org/C2777924906","wikidata":"https://www.wikidata.org/wiki/Q34168","display_name":"Trapping","level":2,"score":0.7759736776351929},{"id":"https://openalex.org/C197657726","wikidata":"https://www.wikidata.org/wiki/Q174733","display_name":"Bipartite graph","level":3,"score":0.6983230113983154},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6028842926025391},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5976539850234985},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5559970140457153},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.49211472272872925},{"id":"https://openalex.org/C152948882","wikidata":"https://www.wikidata.org/wiki/Q4060686","display_name":"Belief propagation","level":3,"score":0.46752074360847473},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.3808252811431885},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3167722225189209},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08541059494018555},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.08078965544700623},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2008/362897","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2008/362897","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1155/2008/362897","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0db7a449d4ef4a428c957175482597fc","is_oa":true,"landing_page_url":"https://doaj.org/article/0db7a449d4ef4a428c957175482597fc","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking, Vol 2008 (2008)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2008/362897","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2008/362897","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/counter/pdf/10.1155/2008/362897","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2015782797.pdf","grobid_xml":"https://content.openalex.org/works/W2015782797.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1542197380","https://openalex.org/W1577660440","https://openalex.org/W1818146586","https://openalex.org/W1914519415","https://openalex.org/W2100641546","https://openalex.org/W2103353540","https://openalex.org/W2117416813","https://openalex.org/W2128765501","https://openalex.org/W2135764410","https://openalex.org/W2136204051","https://openalex.org/W2534076202","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2155783837","https://openalex.org/W2381954333","https://openalex.org/W2394364986","https://openalex.org/W3015485102","https://openalex.org/W2374503462","https://openalex.org/W2041362683","https://openalex.org/W2350834058","https://openalex.org/W2382848370","https://openalex.org/W3183105322","https://openalex.org/W2164397492"],"abstract_inverted_index":{"Trapping":[0],"sets":[1,24,49,57,90,99],"are":[2],"considered":[3],"the":[4,9,17,26,35,68,73,94,118,121,128],"primary":[5],"factor":[6],"for":[7,107],"degrading":[8],"performance":[10,27],"of":[11,22,28,70,97,120,127],"low-density":[12],"parity-check":[13],"(LDPC)":[14],"codes":[15,116],"in":[16,72],"error-floor":[18],"region.":[19],"The":[20,124],"effect":[21,96],"trapping":[23,48,56,89,98],"on":[25,88],"an":[29],"LDPC":[30,51,75,115],"code":[31,36,52,76],"becomes":[32],"worse":[33],"as":[34],"size":[37],"decreases.":[38],"One":[39],"approach":[40],"to":[41,46,67,92,134],"tackle":[42],"this":[43,80],"problem":[44],"is":[45,64,131],"minimize":[47,93],"during":[50],"design.":[53],"However,":[54],"while":[55],"can":[58],"be":[59,135],"reduced,":[60],"their":[61],"complete":[62],"elimination":[63],"infeasible":[65],"due":[66],"presence":[69],"cycles":[71],"underlying":[74],"bipartite":[77],"graph.":[78],"In":[79],"work,":[81],"we":[82],"introduce":[83],"a":[84],"new":[85],"technique":[86,130],"based":[87],"neutralization":[91],"negative":[95],"under":[100],"belief":[101],"propagation":[102],"(BP)":[103],"decoding.":[104],"Simulation":[105],"results":[106],"random,":[108],"progressive":[109],"edge":[110],"growth":[111],"(PEG)":[112],"and":[113],"MacKay":[114],"demonstrate":[117],"effectiveness":[119],"proposed":[122,129],"technique.":[123],"hardware":[125],"cost":[126],"also":[132],"shown":[133],"minimal.":[136]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
