{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:22:11Z","timestamp":1740169331393,"version":"3.37.3"},"reference-count":369,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Federal Ministry of Education and Research of Germany","award":["Joint project 6G-life, Project id: 16KISK001K","Souver?n. Digital. Vernetzt."]},{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"crossref","award":["EXC 2050\/1--Project ID 390696704--CeTI"],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3243797","type":"journal-article","created":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T18:33:27Z","timestamp":1675967607000},"page":"16411-16465","source":"Crossref","is-referenced-by-count":8,"title":["Coding in Diffusion-Based Molecular Nanonetworks: A Comprehensive Survey"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5933-6017","authenticated-orcid":false,"given":"Pit","family":"Hofmann","sequence":"first","affiliation":[{"name":"Deutsche Telekom Chair of Communication Networks, Faculty of Electrical and Computer Engineering, Institute of Communication Technology, Technische Universität Dresden, Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7525-2670","authenticated-orcid":false,"given":"Juan A.","family":"Cabrera","sequence":"additional","affiliation":[{"name":"Deutsche Telekom Chair of Communication Networks, Faculty of Electrical and Computer Engineering, Institute of Communication Technology, Technische Universität Dresden, Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6132-7985","authenticated-orcid":false,"given":"Riccardo","family":"Bassoli","sequence":"additional","affiliation":[{"name":"Deutsche Telekom Chair of Communication Networks, Faculty of Electrical and Computer Engineering, Institute of Communication Technology, Technische Universität Dresden, Dresden, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1606-233X","authenticated-orcid":false,"given":"Martin","family":"Reisslein","sequence":"additional","affiliation":[{"name":"School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8469-9573","authenticated-orcid":false,"given":"Frank H. P.","family":"Fitzek","sequence":"additional","affiliation":[{"name":"Deutsche Telekom Chair of Communication Networks, Faculty of Electrical and Computer Engineering, Institute of Communication Technology, Technische Universität Dresden, Dresden, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/9780429500459-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/84.128057"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2007.4288669"},{"volume-title":"Nanotechnologies-Vocabulary\u2014Part 2: Nano-Objects","year":"2015","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/9781119644316"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/nano11102492"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100509"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968719"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2882555"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.024"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929873"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045439"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932567"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3152605"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2922294"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2935554"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945070"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3066117"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103117"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2527741"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889031"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953074"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889683"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1149\/10701.9295ecst"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036219"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2020.3004304"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974067"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50688-3_8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139149693"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2012.2191570"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2014.2316674"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2917625"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.5120\/13721-1510"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2912600"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7868158"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.08.001"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2016.2628047"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2013.2271503"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2017.01.003"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807881"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705740"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2015.08.004"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/mi6091213"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.2174\/1389450120666190115152613"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2973314"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2014.6881284"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2219496"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2010.07.002"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2909503"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3048099"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3135335"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3071837"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3017393"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2019.100250"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3005603"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015825"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/nano12040722"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2020.3017146"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000487"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103161"},{"article-title":"Channel coding in molecular communication","year":"2020","author":"Damrath","key":"ref62"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2916081"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2519150"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSPA.2019.8713672"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3008819"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2919455"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000957"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103163"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2915330"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/molecules27103130"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2916055"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2915199"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MICEST54286.2022.9790283"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.52953\/uogh5898"},{"volume-title":"Diffusion","year":"2022","key":"ref76"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2013.04.001"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2022.3220109"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3014094"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.110.2000984"},{"volume-title":"CmpE59G (Fall2013): NanoNetworking (Lecture 4)","year":"2013","author":"Tugcu","key":"ref81"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2800795.2800816"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1049\/el.2014.2943"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2927926"},{"volume-title":"LP\u2014L\u00f6sung der Diffusionsgleichung","year":"2022","key":"ref85"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"issue":"2","key":"ref87","first-page":"13","article-title":"History of source coding","volume":"43","author":"Kieffer","year":"1993","journal-title":"IEEE Inf. Theory Soc. Newslett."},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1952.273898"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055959"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729028"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/18.259634"},{"key":"ref93","first-page":"325","article-title":"Coding theorems for a discrete source with a fidelity criteria","volume":"7","author":"Shannon","year":"1959","journal-title":"IRE Nat. Conv. Rec."},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055037"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-2928-9_2"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1147\/rd.203.0198"},{"article-title":"Source coding algorithms for fast data compression","year":"1976","author":"Pasco","key":"ref97"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC48557.2020.9154303"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2021.3054933"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"volume-title":"Information Theory, Inference and Learning Algorithms","year":"2003","author":"MacKay","key":"ref101"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-30038-4_92"},{"volume-title":"Funktionale Programmierung: Huffman-Kodierung (Lecture)","year":"2013","author":"Esponda","key":"ref103"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3342555"},{"article-title":"Quasi-cyclic low-density parity-check codes: Applications and iterative decoding hardware implementations","year":"2012","author":"Ullah","key":"ref105"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054010"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.8374"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1993.397441"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057683"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1049\/el:19970362"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/18.748992"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"issue":"4","key":"ref114","first-page":"37","article-title":"Coding for noisy channels","volume":"3","author":"Elias","year":"1955","journal-title":"IRE Conv. Rec"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055186"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056454"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.1990.116774"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/18.661517"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1142\/9407"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1969.1054260"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054746"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055821"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/26.705396"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/49.730453"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1002\/0471219282.eot191"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5193(05)80466-7"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381931"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503700"},{"article-title":"NSF workshop on molecular communication\/biological communications technology","year":"2008","author":"Nakano","key":"ref129"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2010.09.002"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP.2014.6923869"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2015.2501745"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2480752"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2016.2640311"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2019.2900466"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970108"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.3390\/s22010041"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1311137"},{"key":"ref139","volume-title":"The Mathematical Writings of \u00c9variste Galois","volume":"6","author":"Galois","year":"2011"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963485"},{"volume-title":"Digital Communications: Fundamentals and Applications","year":"2001","author":"Sklar","key":"ref141"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ICGTSPICC.2016.7955265"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(60)90287-4"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(60)90870-6"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2032-7"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-815405-2.00009-9"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.013013.00104"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884408"},{"volume-title":"Network Coding: Fundamentals and Applications","year":"2012","author":"Medard","key":"ref150"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.3390\/app10072206"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2865137"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.3390\/e24010047"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.3390\/info12050184"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8080827"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3089-0"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.3390\/info9040072"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757241"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703813"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.3390\/s151229830"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.3390\/network2010007"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69033-7_10"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2006.286441"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.211"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.07.011"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/1161039.1161062"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2320917"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2013.6649338"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1561\/1300000013"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.102210.101071"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/3375998.3376030"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.904818"},{"volume-title":"Network Coding for Wireless Applications: A Brief Tutorial","year":"2005","author":"Deb","key":"ref173"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2010.5671808"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111337"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511754623"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/857847"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1561\/0100000007i"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2096170"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E94.B.698"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2015.2465517"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.1975.1141042"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2016.2631240"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2013.07.002"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2003.5341334"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1002\/dac.626"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2892010"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/25.350282"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.12.024"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525578"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892850"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.101813.121884"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900289"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2012.05.002"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2010.2062498"},{"volume-title":"Digital Communications","year":"2008","author":"Proakis","key":"ref196"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP2.1213003"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2003.1203212"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0082935"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/BalkanCom55633.2022.9900720"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120603"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364980"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2012.09.001"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1049\/el.2014.3345"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997032"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9938-5_63"},{"issue":"5","key":"ref207","first-page":"338","article-title":"A study on the decoding of Hamming codes using soft values on the molecular communication channel","volume":"13","author":"Cheong","year":"2020","journal-title":"J. Korea Inst. Inf., Electron., Commun. Technol."},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9938-5_59"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2671858"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8445957"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2897568"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1007\/s12668-013-0086-5"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248461"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2016.09.003"},{"key":"ref215","article-title":"The crossover-distance for ISI-correcting decoding of convolutional codes in diffusion-based molecular communications","author":"Li","year":"2018","journal-title":"arXiv:1812.11273"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2019.2915682"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503781"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP2.12130018"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6339469"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2016.7536830"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2016.7881825"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2018.2797689"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2019.01.001"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248474"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2352613"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/IWCIT.2018.8405050"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2859308"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/IFSA-SCIS.2017.8023282"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2834924"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2017.8278035"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875925"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.022113.2190"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1971.1090720"},{"volume-title":"Error Control Coding","year":"2004","author":"Lin","key":"ref234"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1964.1053699"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1954.1057465"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962989"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2897173"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2193554"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7553035"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.021913.122402"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2015.2501741"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10139-6"},{"issue":"4","key":"ref245","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1023\/A:1026750507663","article-title":"Successful application of genetic algorithms to network design and planning","volume":"18","author":"Poon","year":"2000","journal-title":"BT Technol. J."},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.085"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v16i05.13325"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2003.811564"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom.2014.6848999"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2375214"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2017.2750145"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2662689"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/18.959255"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803253"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179319"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525538"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.853804"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2276893"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/TNANO.2013.2241449"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/TNANO.2014.2343638"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2015.7130055"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3105"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/IWCIT.2016.7491619"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2868079"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2018.8491218"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4775-1_20"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2022.3182578"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2021.3118889"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10111294"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.3390\/s20041138"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.3390\/s22186912"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1021\/ja963572l"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/TMBMC.2016.2577019"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3114831"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3032009"},{"key":"ref276","first-page":"1942","article-title":"Particle swarm optimization","volume-title":"Proc. IEEE Int. Conf. Neural Netw.","volume":"4","author":"Kennedy"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2737623"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3027851"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1016\/j.nancom.2012.09.006"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2015.2436409"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2754492"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1658"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120904"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-665-5.ch002"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2013.2295546"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1049\/el.2016.0411"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2019.2949261"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2021.3136581"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3020912"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2017.2786229"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2018.8613380"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103108"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3083663"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.013.2100642"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/NSW.2011.6004632"},{"issue":"3","key":"ref296","first-page":"230","article-title":"An outline of a theory of semantic information","volume":"19","author":"Carnap","year":"1954","journal-title":"J. Symbolic Log."},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9321980"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2657621"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700378"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989619"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3137209"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3175815"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2965928"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2840139"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.3390\/s17040900"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.3390\/en10122073"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.3390\/su14158980"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.3390\/s20154158"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.3390\/fi11020037"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3115671"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.3390\/s21093205"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993056"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.3390\/s21186208"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.3390\/info13060281"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.3390\/s19051042"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.3390\/e23121679"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2826018"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-29804-5"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051391"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3184068"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1109\/TNB.2017.2692646"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902316"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942312"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012139"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2944257"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994493"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3094892"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3166945"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989804"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892816"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1098\/rsfs.2018.0041"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.3389\/frcmn.2021.724597"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1002\/9781119765554.ch16"},{"key":"ref334","article-title":"Practical implementation of identification codes","author":"Ferrara","year":"2021","journal-title":"arXiv:2107.06801"},{"key":"ref335","first-page":"1","article-title":"Integration of molecular communications into future generation wireless networks","volume-title":"Proc. 1st IEEE 6G Wireless Summit","author":"Haselmayr"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3244071"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3288239"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3122811"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/tmbmc.2023.3324487"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3105583"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2022.3201388"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3136157"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2022.3204738"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.05.003"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1002\/anie.200504313"},{"key":"ref346","doi-asserted-by":"publisher","DOI":"10.3390\/ijms11062453"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.abf1571"},{"key":"ref348","doi-asserted-by":"publisher","DOI":"10.1021\/acs.chemrev.5b00146"},{"key":"ref349","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103186"},{"key":"ref350","doi-asserted-by":"publisher","DOI":"10.1145\/3397022"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2896848"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008250"},{"key":"ref353","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3194913"},{"key":"ref354","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4171"},{"key":"ref355","article-title":"A review on bio-cyber interfaces for intrabody molecular communications systems","author":"Koucheryavy","year":"2021","journal-title":"arXiv:2104.14944"},{"key":"ref356","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09177-6"},{"key":"ref357","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093442"},{"key":"ref358","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-03790-4"},{"key":"ref359","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916701"},{"key":"ref360","doi-asserted-by":"publisher","DOI":"10.3390\/app112110028"},{"key":"ref361","doi-asserted-by":"publisher","DOI":"10.3390\/quantum2010007"},{"key":"ref362","doi-asserted-by":"publisher","DOI":"10.3390\/e22080831"},{"key":"ref363","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3154468"},{"key":"ref364","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3173645"},{"key":"ref365","doi-asserted-by":"publisher","DOI":"10.3390\/quantum2010014"},{"key":"ref366","doi-asserted-by":"publisher","DOI":"10.1002\/ejic.201801050"},{"key":"ref367","doi-asserted-by":"publisher","DOI":"10.1039\/D0DT01414A"},{"key":"ref368","doi-asserted-by":"publisher","DOI":"10.1038\/nphys2431"},{"key":"ref369","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-6018-3_7"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10041114.pdf?arnumber=10041114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:14:04Z","timestamp":1707830044000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10041114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":369,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3243797","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2023]]}}}