Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Numerical study of non-linear waves for one-dimensional planar, cylindrical and spherical flow using B-spline finite element method

  • In a recent study, an evolution equation is found for waves' behavior at far-field with relaxation mode of molecules. An analytical technique was used to solve this evolution problem, which is a generalized Burger equation. The analytical approach has limitations and requires a very accurate initial guess by a trial method. In this paper, the evolution equation for one-dimensional planar, cylindrical, and spherical flow in the presence of relaxation mode is solved using a collocation approach with a cubic B-spline function. The numerical results are graphed and compared with the exact solution for planar flow. The obtained numerical results match the exact solution quite well and show that the technique is quite reliable and can deal with the nonlinearity involved in the present problem. Results have also been obtained for cylindrical and spherical flow at the far-field. The obtained numerical results show that the present approach with the cubic B-spline function works well and accurately. Fourier stability analysis is used to investigate the stability of the cubic B-spline collocation method.

    Citation: Azhar Iqbal, Abdullah M. Alsharif, Sahar Albosaily. Numerical study of non-linear waves for one-dimensional planar, cylindrical and spherical flow using B-spline finite element method[J]. AIMS Mathematics, 2022, 7(8): 15417-15435. doi: 10.3934/math.2022844

    Related Papers:

    [1] Xuesong Si, Chuanze Niu . On skew cyclic codes over M2(F2). AIMS Mathematics, 2023, 8(10): 24434-24445. doi: 10.3934/math.20231246
    [2] Fatma Zehra Uzekmek, Elif Segah Oztas, Mehmet Ozen . (θi,λ)-constacyclic codes and DNA codes over Z4+uZ4+u2Z4. AIMS Mathematics, 2024, 9(10): 27908-27929. doi: 10.3934/math.20241355
    [3] Naruhiko Aizawa, Ren Ito, Toshiya Tanaka . N=2 double graded supersymmetric quantum mechanics via dimensional reduction. AIMS Mathematics, 2024, 9(5): 10494-10510. doi: 10.3934/math.2024513
    [4] Adel Alahmadi, Altaf Alshuhail, Alaa Altassan, Hatoon Shoaib, Patrick Solé . Double circulant codes for the Lee and Euclidean distance. AIMS Mathematics, 2023, 8(10): 23566-23577. doi: 10.3934/math.20231198
    [5] Hatoon Shoaib . Double circulant complementary dual codes over F4. AIMS Mathematics, 2023, 8(9): 21636-21643. doi: 10.3934/math.20231103
    [6] Wei Qi . The polycyclic codes over the finite field Fq. AIMS Mathematics, 2024, 9(11): 29707-29717. doi: 10.3934/math.20241439
    [7] M. Haris Mateen, Muhammad Khalid Mahmmod, Dilshad Alghazzawi, Jia-Bao Liu . Structures of power digraphs over the congruence equation xpy(modm) and enumerations. AIMS Mathematics, 2021, 6(5): 4581-4596. doi: 10.3934/math.2021270
    [8] Hongfeng Wu, Li Zhu . Repeated-root constacyclic codes of length p1pt2ps and their dual codes. AIMS Mathematics, 2023, 8(6): 12793-12818. doi: 10.3934/math.2023644
    [9] S. Chakravarty, P. Guha . The DH5 system and the Chazy and Ramamani equations. AIMS Mathematics, 2025, 10(3): 6318-6337. doi: 10.3934/math.2025288
    [10] Shakir Ali, Amal S. Alali, Kok Bin Wong, Elif Segah Oztas, Pushpendra Sharma . Cyclic codes over non-chain ring R(α1,α2,,αs) and their applications to quantum and DNA codes. AIMS Mathematics, 2024, 9(3): 7396-7413. doi: 10.3934/math.2024358
  • In a recent study, an evolution equation is found for waves' behavior at far-field with relaxation mode of molecules. An analytical technique was used to solve this evolution problem, which is a generalized Burger equation. The analytical approach has limitations and requires a very accurate initial guess by a trial method. In this paper, the evolution equation for one-dimensional planar, cylindrical, and spherical flow in the presence of relaxation mode is solved using a collocation approach with a cubic B-spline function. The numerical results are graphed and compared with the exact solution for planar flow. The obtained numerical results match the exact solution quite well and show that the technique is quite reliable and can deal with the nonlinearity involved in the present problem. Results have also been obtained for cylindrical and spherical flow at the far-field. The obtained numerical results show that the present approach with the cubic B-spline function works well and accurately. Fourier stability analysis is used to investigate the stability of the cubic B-spline collocation method.



    Let S be a commutative ring. A linear code C of length n over S is a sub-module of Sn. Any linear code C over S, with the property that any right cyclic shift of the coordinates of a codeword is also a codeword, is called a cyclic code. A subfamily of linear codes is known as double cyclic codes and was introduced by Borges et al. in 2018 in [9]. A linear code is said to be a double cyclic code if its coordinates can be partitioned into two subsets, the first r coordinates and the last s coordinates, such that any simultaneous cyclic shift of the coordinates of the subsets leaves the code invariant. In [9], Borges et al. conducted a study on the algebraic structure of Z2-double cyclic codes. The research involved the determination of generator polynomials for both this family of codes and their duals. Additionally, the paper established a connection between Z2-double cyclic codes and Z2Z4-additive cyclic codes, as initially introduced in [8]. Actually, double cyclic codes are generalized quasi-cyclic (GQC) codes with index 2, introduced in [13] by Siap and Kulhan. However, there is a difference between the papers [13] and [9]. Siap and Kulhan studied the structure of GQC codes giving the minimal spanning sets, weight enumerators, and minimum Hamming distance bounds of these codes. In [9], the authors discussed the generators and gave the explicit generator polynomials of Z2-double cyclic codes. Moreover, in [10], Gao et al. introduced the structure of double cyclic codes over the finite ring Z4.

    Now, consider the ring R=Z2+uZ2={0,1,u,1+u} where u2=0. The ring R is an important ring with four elements other than the well-known ring Z4. There are many studies about the cyclic codes over R, such as [2,3,4,6,7,12]. It has been shown that studying linear and cyclic codes over R has advantages compared to the ring Z4. First of all, since the finite field F2 is a subring of the ring R, the factorization of polynomials over F2 is still valid over R. Additionally, the binary images of linear codes over R are always linear codes, which is not always the case for Z4. Moreover, decoding algorithms of cyclic codes over R are easier than that over Z4.

    In this paper, we are interested in studying double cyclic codes over Rr×Rs, where r and s are two odd positive integers. We determine both the generators of R-double cyclic code C and its dual C. We show that C is also an R-double cyclic code. As an application of our study, we give examples of binary linear codes with good parameters according to the database [11], which are binary images of R-double cyclic codes. We also construct an example of a self-dual R-double cyclic code and, furthermore, we show that the binary images of R-double cyclic codes are either binary QC (quasi-cyclic) or GQC codes.

    Let R=Z2+uZ2={0,1,u,1+u}, with u2=0. A nonempty subset C of Rn is called a linear code over R if C is an R-sub-module of Rn. It is well known that a linear code C over R is permutation equivalent to a code with generator matrix

    G=[Ik1AB1+uB20uIk2uD],

    where A,B1,B2, and D are matrices over Z2.

    We can map linear codes over R to linear codes over Z2 by using the following Gray map.

    Let a=(x0+uy0,,xn1+un1yn1)Rn. Define the Gray mapping

    ϕ:RnZ2n2 ϕ(a)=(y0,yn1,x0y0,,xn1yn1) (2.1)

    where xiyi=xi+yimod2,0in1. The map ϕ is an isometry, which transforms the Lee distance in Rn to the Hamming distance in Z2n2. The Hamming weight of any codeword is defined as the number of its nonzero entries. The Hamming distance between two codewords is the Hamming weight of their difference.

    Furthermore, the Gray image ϕ(C) of C is a binary linear code as well. This property is not valid for the codes over Z4 in general. We naturally define the Lee weight of a codeword v=(v0,,vn1)Rn as

    wt(v)=n1i=0wtL(vi)

    where wtL(vi) is the Lee weight of the coordinate of viR, and the Lee weight of a coordinate viR is defined by wtL(vi)=2 if vi=u, wtL(vi)=1 if vi{1,1+u} and zero otherwise. We can also extend the above map to Rr×Rs for a=(x0+uy0,,xr1+uyr1)Rr,b=(p0+uq0,,ps1+uqs1)Rs as follows:

    Φ:Rr×RsZ2n2 (a,b)(y0,yr1,x0y0,,xr1yr1,q0,,qs1,p0q0,,ps1qs1)

    where xiyi=xi+yimod2,0ir1, pjqj=pj+qjmod2,0js1, and n=r+s.

    Now, consider the polynomial ring R[x]/(xn1). A cyclic code of length n over R is an ideal in the ring R[x]/(xn1). Next, we introduce the definition of double cyclic codes over R, which is a natural extension of the classical definition of cyclic codes.

    Definition 2.1. Let C be a linear code over R of length n=r+s. The code C will be called an R-double cyclic if

    c=(u0,u1,,ur2,ur1|v0,v1,,vs2,vs1)C

    implies

    T(c)=(ur1,u0,u1,,ur2|vs1,v0,v1,,vs2)C.

    For any codeword c=(u0,u1,,ur2,ur1|v0,v1,,vs2,vs1)Rn and any iZ, we define the ith shift of the codeword c to be

    Ti(c)=(u(0i)modr,u(1i)modr,,u(r1i)modr|v(0i)mods,,v(s1i)mods).

    In this paper, we always take r and s as odd positive integers. Let us denote the set R[x]/(xr1)×R[x]/(xs1) by Rr,s. If CRr×Rs, then any element

    c=(u0,u1,,ur1|v0,v1,,vs1)C

    can be identified with an element of Rr,s as follows:

    c(x)=(u0+u1x++ur1xr1|v0+v1x++vs1xs1)=(u(x),v(x)).

    This is a one-to-one correspondence between Rr×Rs and Rr,s. Moreover, for any h(x)R[x] and any (f(x),g(x))Rr,s, define the multiplication

    h(x)(f(x),g(x))=(h(x)f(x),h(x)g(x)).

    This multiplication is well-defined and the ring Rr,s is an R[x]-module. Furthermore, any R-double cyclic code C is an R[x]-sub-module of Rr,s.

    The inner product between two elements

    v=(a0,,ar1,b0,,bs1),w=(d0,,dr1,e0,,es1)Rr×Rs,

    is defined by

    v,w=(r1i=0aidi+s1j=0bjej)Z2+uZ2.

    By using this inner product, we can define the dual code of an R-double cyclic code C.

    Definition 2.2. Let C be an R-double cyclic code. The dual of C is defined in the usual way as follows:

    C={wRr×Rs|v,w=0 vC}.

    Using this definition of the dual, we have the following Lemma 2.1. We skip the details for the proof of Lemma 2.1 since we obtain these results with a similar approach to that in [5].

    Lemma 2.1. If C is an R-double cyclic code, then C is also an R-double cyclic code.

    In the sequel, we determine the generator polynomials of an R-double cyclic code C.

    Theorem 2.1. Let C be an R-double cyclic of length n=r+s, then

    C=(g1(x)+ua1(x),0),((x),g2(x)+ua2(x)),

    where a1(x)|g1(x)|(xr1),a2(x)|g2(x)|(xs1) over R and (x) is a polynomial over R.

    Proof. Let C be an R-double cyclic code. Since both C and R[x]/(xs1) are R[x]-modules, we can define the following map:

    χ:CR[x]/(xs1)χ(f1(x),f2(x))=f2(x).

    It is clear that χ is an R-module homomorphism whose image is an R[x]-sub-module (indeed an ideal) of R[x]/(xs1) and ker(χ) is a sub-module of C. Furthermore, we can easily show that Image(χ) is an ideal in R[x]/(xs1). The reader can find more detailed information about the structure of cyclic codes over R[x]/(xs1) in [2]. Since s is an odd integer and Image(χ) is an ideal in R[x]/(xs1), from [2] we have

    χ(C)=g2(x)+ua2(x)

    where g2(x) and a2(x) are polynomials in R[x] satisfying a2(x)|g2(x)|xs1. We also note that

    ker(χ)={(f(x),0)C|f(x)R[x]/(xr1)}.

    Now, let us define the set

    A={f(x)R[x]/(xr1)|(f(x),0)ker(χ)}.

    It is clear that A is an ideal in R[x]/(xr1). So, we can write A=g1(x)+ua1(x) with g1(x),a1(x)R[x]/(xr1) and a1(x)|g1(x)|xr1. It follows from here that for any element (j(x),0)ker(χ), we have j(x)A, then j(x)=m1(x)(g1(x)+ua1(x)) for the polynomial m1(x)R[x]. Hence,

    (f(x),0)=m1(x)(g1(x)+ua1(x))

    which implies that ker(χ) is a sub-module of C generated by the element of the form (g1(x)+ua1(x)). By the first isomorphism theorem, we have

    C/ker(χ)(g2(x)+ua2(x)).

    Finally, we need to prove the uniqueness of the generators. Note that since (g1(x)+ua1(x)) and (g2(x)+ua2(x)) are cyclic codes over R, this proves the uniqueness of the polynomials g1(x),a1(x), and g2(x),a2(x). Now, suppose that

    C=(g1(x)+ua1(x),0),(1(x),g2(x)+ua2(x))=(g1(x)+ua1(x),0),(2(x),g2(x)+ua2(x)).

    Therefore, (1(x)2(x),0)ker(χ)=g1(x)+ua1(x),0. This implies that

    1(x)2(x)=(g1(x)+ua1(x))μ(x)

    for some polynomial μ(x)R[x]. Since deg(1(x)2(x))deg1(x)<deg(g1(x)+ua1(x)), then μ(x)=0, and we have 1(x)=2(x). This completes the proof.

    Lemma 2.2. If C=(g1(x)+ua1(x),0),((x),g2(x)+ua2(x)) is an R-double cyclic code, then we may assume that deg(x)<deg(g1(x)+ua1(x)).

    Proof. See Lemma 9 in [1].

    Lemma 2.3. If C=(g1(x)+ua1(x),0),((x),g2(x)+ua2(x)) is an R-double cyclic code, then (g1(x)+ua1(x))|(xs1a2(x))(x).

    Proof. Consider

    χ(xs1a2(x)((x),g2(x)+ua2(x)))=χ(xs1a2(x)(x),0)=0.

    It means that (xs1a2(x)(x),0)ker(χ), and we have (g1(x)+ua1(x))|(xs1a2(x))(x).

    Remark 1. From the above discussion, if ((x),g2(x)+ua2(x))C for any R-double cyclic code, then (xs1a2(x)(x),0)C. This implies that if R-double cyclic code C is generated by ((x),g2(x)+ua2(x)), then we must have (xr1)|xs1a2(x)(x).

    We summarize all the discussions about the generators of R-double cyclic codes with the following theorem.

    Theorem 2.2. Let C be a double cyclic code in Rr,s, then C can be identified as

    (1) C=(g1(x)+ua1(x),0), where a1(x)|g1(x)|(xr1), or

    (2) C=((x),g2(x)+ua2(x)), where (xr1)|xs1a2(x)(x) and a2(x)|g2(x)|(xs1), or

    (3) C=(g1(x)+ua1(x),0),((x),g2(x)+ua2(x)), where a1(x)|g1(x)|(xr1), a2(x)|g2(x)|(xs1), (g1(x)+ua1(x))|(xs1a2(x))(x), and deg(x)<deg(g1(x)+ua1(x)).

    Definition 2.3. Let M be an R-module. A linearly independent subset N of M that spans M is called a basis of M. If an R-module has a basis, then it is called a free R-module.

    It is important to note that if C is a double cyclic code of the form C=(g1(x)+ua1(x),0),((x),g2(x)+ua2(x)) with (g1(x)+ua1(x))|(xr1) and (g2(x)+ua2(x))|(xs1), then C is a free R-module [2]. If C is not of this form, then it is not a free R -module. Still, one can present a minimal spanning set for the code. In the following theorem, we present a spanning minimal set for double cyclic codes viewed as R-sub-modules.

    Theorem 2.3. Let C=(g1(x)+ua1(x),0),((x),g2(x)+ua2(x)) be an R-double cyclic code in Rr,s with all generator polynomials g1(x),a1(x),g2(x),a2(x), and (x) as in Theorem 2.1 and g1(x)h1(x)=xr1, g2(x)h2(x)=xs1. Furthermore, let deg(g1(x))=t1, deg(a1(x))=t2, deg(g2(x))=k1, and deg(a2(x))=k2. Consider the following sets:

    S1=rt11i=0{xi(g1(x)+ua1(x),0)}S2=t1t21i=0{xi(uh1(x)a1(x),0)}S3=sk11i=0{xi((x),g2(x)+ua2(x))}S4=k1k21i=0{xi(h2(x)(x),uh2(x)a2(x))},

    then

    S=S1S2S3S4

    forms a minimal spanning set for C as an R-module. Moreover, C has 4r+st1k12t1+k1t2k2 codewords.

    Proof. Let

    c(x)=m(x)(g1(x)+ua1(x),0)+n(x)((x),g2(x)+ua2(x))Rr,s

    correspond to a codeword in C, where m(x) and n(x) are polynomials in R[x]. If deg(m(x))rt11, then m(x)(g1(x)+ua1(x),0)Span(S1). Otherwise, by using the division algorithm, we have m(x)=h1(x)q1(x)+r1(x), where q1(x),r1(x)R[x] and 0deg((r1(x)))<rt11. It follows from here that

    m(x)(g1(x)+ua1(x),0)=(h1(x)q1(x)+r1(x))(g1(x)+ua1(x),0)=q1(x)(uh1(x)a1(x),0)+r1(x)(g1(x)+ua1(x),0).

    If deg(q1(x))t1t21, then we get that q1(x)(uh1(x)a1(x),0)Span(S2). Otherwise, by using the division algorithm again, we have

    q1(x)=xr1h1(x)a1(x)q2(x)+r2(x)

    where q2(x) and r2(x) are polynomials in R[x] with 0deg(r2(x))t1t21. Therefore,

    q1(x)(uh1(x)a1(x),0)=(xr1h1(x)a1(x)q2(x)+r2(x))(uh1(x)a1(x),0)=r2(x)(uh1(x)a1(x),0)Span(S2).

    So, we have shown that m(x)(g1(x)+ua1(x),0)Span(S1S2).

    Now, if deg(n(x))sk11, then n(x)((x),g2(x)+ua2(x)Span(S3). Otherwise, by the division algorithm,

    n(x)=q3(x)h2(x)+r3(x)with0deg(r3(x))sk11.

    Hence,

    n(x)((x),g2(x)+ua2(x)=(q3(x)h2(x)+r3(x))((x),g2(x)+ua2(x))=q3(x)(h2(x)(x),uh2(x)a2(x))+r3(x)((x),g2(x)+ua2(x)).

    Since 0deg(r3(x))sk11, then r3(x)((x),g2(x)+ua2(x))Span(S3). So, the only remaining part is to prove that

    q3(x)(h2(x)(x),uh2(x)a2(x))Span(S).

    We know that (g1(x)+ua1(x))|(xs1a2(x))(x). Therefore, we can find a polynomial λ(x)R[x] such that xs1a2(x)(x)=λ(x)(g1(x)+ua1(x)). Again, if deg(q3(x))k1k21, then q3(x)(h2(x)(x),uh2(x)a2(x))Span(S4). Otherwise, we have

    q3(x)=xs1h2(x)a2(x)q4(x)+r4(x)

    for the polynomials q4(x), r4(x) R[x] with 0deg(r4(x))k1k21. Therefore,

    q3(x)(h2(x)(x),uh2(x)a2(x))=q4(x)(xs1a2(x)(x),0)+r4(x)(h2(x)(x),uh2(x)a2(x)).

    Since xs1a2(x)(x)=λ(x)(g1(x)+ua1(x)), then q4(x)(xs1a2(x)(x),0)Span(S1S2). Also, it is clear that r4(x)(h2(x)(x),uh2(x)a2(x))Span(S4). Therefore, S=S1S2S3S4 is a spanning set for C. Finally, it is clear that the set S is a minimal generating set in the sense that there is no element in S linearly dependent with the other elements. So, C has 4r+st1k12t1+k1t2k2 codewords.

    Example 2.1. Consider the double cyclic code C in R[x]/(x151)×R[x]/(x71) generated by ((g1(x)+ua1(x),0),((x),g2(x)+ua2(x))), where

    g1(x)=a1(x)=(1+x)(1+x+x4)(1+x3+x4)=1+x2+x3+x6+x7+x9,g2(x)=(1+x)(1+x+x3)=1+x2+x3+x4,a2(x)=1+x+x3,(x)=(1+u)(1+x+x4)(1+x3+x4)=(1+u)(1+x+x3+x4+x5+x7+x8).

    We note that the polynomials above are obtained from the factorizations of (x151) and (x71) in R[x]. One can make use of the factorization in Z2[x] since this also holds over R. Moreover, we can calculate the following polynomials:

    g1(x)h1(x)=x151h1(x)=1+x2+x3+x4+x6,g2(x)h2(x)=x71h2(x)=1+x2+x3.

    Hence, using the spanning sets in Theorem 2.3, we have the generator matrix for C as

    G=[u+10u+1u+100u+1u+10u+10000000000000u+10u+1u+100u+1u+10u+10000000000000u+10u+1u+100u+1u+10u+10000000000000u+10u+1u+100u+1u+10u+10000000000000u+10u+1u+100u+1u+10u+10000000000000u+10u+1u+100u+1u+10u+10000000u+1u+10u+1u+1u+10u+1u+1000000u+1u1u+11000u+1u+10u+1u+1u+10u+1u+1000000u+1u1u+11000u+1u+10u+1u+1u+10u+1u+1000000u+1u1u+11u+1u+1u+1u+1000u+10u+10u+1000uuuuuuu].

    Furthermore, the Gray image Φ(C) of C is a binary linear code with parameters [44,19,6].

    In this section, we study the structure of the dual of free R-double cyclic codes with using the similar approach given in [5,10]. Let f(x)=a0+a1x++an1xn1 be any element in the ring R[x]/(xn1). Note that in this description, ai might equal 0 for any i=0,1,,n1. From now on, the polynomial f(x) will denote f(x)=xn1f(1/x)=an1+an2x+a0xn1, i.e., if an10, then f(x) is the reciprocal of f(x). By definition, we note that f(x)=f(x).

    Let (a0,a1,,ar1,b0,b1,bs1)Rr×Rs and the cyclic shift of this codeword be T(a,b)=(ar1,a0,,ar2,bs1,b0,,bs2). It is clear that the set {(a,b),T(a,b),T2(a,b),,Tm1(a,b)} produces all the cyclic shifts of (a,b), where m=lcm(r,s).

    We will give the relation between the inner product and the polynomial product, which relies on the cyclic shifts in Rr×Rs. This approach was originally introduced in [5]. Let V=(a0,a1,,ar1,b0,b1,,bs1), W=(d0,d1,,dr1,e0,e1,,es1)Rr×Rs, and, without loss of generality, suppose rs, then

    V,T(W)=a0dr1+a1d0++ar1dr2ω0+b0es1+b1e0++bs1es2σ0=ω0+σ0.

    In general,

    V,Ti(W)=a0dri+a1dri+1++ar1dri1+b0esi++bs1esi1=ω(i1)modr+σ(i1)mods,

    for all i=1,2,,m where m=lcm(r,s). Now, construct the polynomial

    Z(x)=(ω0+σ0)+(ω1+σ1)x++(ω(r1)modr+σ(r1)mods)xr1+(ωrmodr+σrmods)xr++(ω(s1)modr+σ(s1)mods)xr1+(ωsmodr+σsmods)xs++(ω(m1)modr+σ(m1)mods)xm1.

    Simplifying Z(x), we have

    Z(x)=(a(x)d(x)mod(xr1)(xm1xr1)+b(x)e(x)mod(xs1)(xm1xs1)).

    So, we can give the following proved theorem.

    Theorem 3.1. Let V=(a0,a1,,ar1,b0,b1,,bs1), W=(d0,d1,,dr1,e0,e1,,es1)Rr×Rs, then V is orthogonal to W and all its cyclic shifts if, and only if,

    Z(x)=[a(x)d(x)mod(xr1)](xm1xr1)+[b(x)e(x)mod(xs1)](xm1xs1)=0mod(xm1).

    This equation can be written as

    Z(x)=[a(x)d(x)](xm1xr1)+[b(x)e(x)](xm1xs1)=0mod(xm1).

    Let us consider the free double cyclic code C=(g1(x)+ua1(x),0),((x),g2(x)+ua2(x)) in Rr,s. Since C is free, it is clear that a1(x)=a2(x)=0.

    Let d(x)=gcd(g1(x),(x)). Since g1(x)|xs1g2(x)(x), we can write (xs1g2(x)(x))=g1(x)β(x). Since d(x)=gcd(g1(x),(x)), we have α1(x)(x)+α2(x)g1(x)=d(x), g1(x)=d(x)d1(x), (x)=d(x)d2(x),xs1g2(x)(x)=g1(x)β(x)=d(x)d1(x)β(x).

    Now, since C is a free double cyclic code, we have g1(x)|(xr1) and also g1(x)=d(x)d1(x), then xr1=g1(x)h1(x)=d(x)d1(x)h1(x). Therefore,

    xs1g2(x)d(x)=xs1g2(x)[α1(x)(x)+α2(x)g1(x)]=α1(x)g1(x)β(x)+α2(x)xs1g2(x)g1(x)=g1(x)[α1(x)β(x)+α2(x)xs1g2(x)]θ(x).

    So, we have

    xs1g2(x)d(x)=g1(x)θ(x)(xs1)d(x)=g2(x)g1(x)θ(x)=g2(x)d(x)d2(x)θ(x).

    Therefore, xs1=g2(x)d2(x)θ(x) and θ(x) is a factor of xs1.

    Lemma 3.1. Let C=(g1(x),0),((x),g2(x)) be a free double cyclic code in Rr,s, then the code C is orthogonal to the code

    D=((xr1d(x)),0),((α1(x)xr1g1(x)),(θ(x)))

    where d(x),α1(x), and θ(x) are defined above.

    Proof. Let C=(g1(x),0),((x),g2(x)) be a free R-double cyclic code and g1(x)h1(x)=xr1, then by using polynomial multiplication Z(x) defined before, we have

    (g1(x),0)(xr1d(x),0)=(g1(x)xr1d(x)mod(xr1))xm1xr1=(d(x)d1(x)xr1d(x)mod(xr1))xm1xr1=0mod(xm1)((x),g2(x))(xr1d(x),0)=((x)xr1d(x)mod(xr1))xm1xr1=(d(x)d2(x)xr1d(x)mod(xr1))xm1xr1=0mod(xm1)(g1(x),0)(α1(x)xr1g1(x),θ(x))=g1(x)(α1(x)xr1g1(x)mod(xr1))xm1xr1=0mod(xm1).

    Now, we will find the product of the last generator polynomials.

    ((x),g2(x))(α1(x)xr1g1(x),θ(x))=((x)α1(x)xr1g1(x)mod(xr1))(xm1xr1)+(g2(x)θ(x)mod(xs1))(xm1xs1)=(d(x)+α2(x)g1(x))α1(x)(x)xr1g1(x)(xm1xr1)+g2(x)(xs1d2(x)g2(x))(xm1xs1)=d(x)xr1g1(x)(xm1xr1)+xs1d2(x)(xm1xs1)=d(x)xr1g1(x)(xm1xr1)+xs1d2(x)d(x)h1(x)d(x)h1(x)(xm1xs1)=d(x)xr1g1(x)(xm1xr1)+xs1xr1d(x)h1(x)(xm1xs1)=d(x)xr1g1(x)(xm1xr1)+d(x)xr1g1(x)(xm1xr1)=0mod(xm1).

    Hence, we have

    ((x),g2(x))(α1(x)xr1g1(x),θ(x))=0mod(xm1).

    Consequently, the code C is orthogonal to the code D.

    Lemma 3.2. Let C=(g1(x),0),((x),g2(x)) be a free double cyclic code in Rr,s. Let D=((xr1d(x)),0),(M(x),θ(x)) with the generators as above, where M(x)=α1(x)xr1g1(x), then

    (1) (xr1d(x)) is a factor of (xr1),θ(x) is a factor of (xs1).

    (2) (xr1d(x))|((xs1θ(x))M(x)).

    Proof. See the proof of Lemma 5 in [5].

    Lemma 3.3. Let C=(g1(x),0),((x),g2(x)) be a free double cyclic code in Rr,s. Let D=((xr1d(x)),0),(M(x),θ(x)), then D has 4degd4(sdegθ) codewords.

    Proof. Since the generators of D have the same properties as the generators of C in Theorem 2.3, the result follows from Theorem 2.3.

    Lemma 3.4. Let C=(g1(x),0),((x),g2(x)) be a free double cyclic code in Rr,s. Let D=((xr1d(x)),0),(M(x),θ(x)), then |C||D|=4n.

    Proof. We know that |C|=4rdegg14sdegg2 and |D|=4degd4(sdegθ). Since xs1g2(x)d(x)=g1(x)θ(x), we have

    sdegθ=s(s+degddegg2degg1)=degg2+degg1degd.

    Therefore, |C||D|=4q, where

    q=rdegg1+sdegg2+degd+degg2+degg1degd=r+s=n.

    So, |C||D|=4n.

    Finally, we will give the following theorem that determines the generators of a dual of a free double cyclic code C.

    Theorem 3.2. If C=(g1(x),0),((x),g2(x)) is a free double cyclic code in Rr,s, then

    C=((xr1d(x)),0),((α1(x)xr1g1(x)),(θ(x))).

    Example 3.1. Let C be a double cyclic code in R[x]/(x71)×R[x]/(x71) generated by ((g1(x)+ua1(x),0),((x),g2(x)+ua2(x))), where

    g1(x)=(1+x+x3)(1+x2+x3)=1+x+x2+x3+x4+x5+x6,a1(x)=x71,g2(x)=1+x+x3,a2(x)=x71,(x)=1+x+x3.

    Furthermore, we can calculate the following polynomials:

    g1(x)h1(x)=x71h1(x)=1+x,g2(x)h2(x)=x71h2(x)=1+x+x2+x4.

    Hence, using the spanning sets in Theorem 2.3, we have the generator matrix for C as

    G=[1111111000000011010001101000011010001101000011010001101000011010001101].

    Furthermore, the Gray image Φ(C) of C is a binary linear code with parameters [28,10,6].

    Now, let us find the generator matrix of the dual cyclic code C by considering Theorem 3.2 as follows. First, we will determine the generator polynomials of the dual code.

    d(x)=gcd((x),g1(x))=1+x+x3,h2(x)(x)=g1(x)β(x)β(x)=1+x,α1(x)(x)+α2(x)g1(x)=d(x)α1(x)=1,α2(x)=0,θ(x)=α1(x)β(x)+α2(x)h2(x)=1+x,M(x)=α1(x)h1(x)=1+x.

    Therefore, C=((1+x+x2+x4),0),((1+x),(1+x)) and the the parity-check matrix of C is

    H=[001011100000001001011000000011001010000000000001100000111000001100000111000001100000011000001100000011000001100000011000001100].

    Moreover, Φ(C) has the parameters [28,18,4] which are very close to the optimal parameters [28,18,5].

    Let C=(g1(x),0),((x),g2(x)) be a self-dual free double cyclic code in Rr,s, then C=C, so we have the following results.

    (1) (xr1d(x))=g1(x)xr1=g1(x)(d(x)).

    (2) (α1(x)β(x)+α2(x)xs1g2(x))=g2(x)

    α1(x)β(x)+α2(x)xs1g2(x)=(g2(x))

    α2(x)xs1g2(x)=α1(x)β(x)+(g2(x))

    xs1=g2(x)α2(x)(α1(x)β(x)+(g2(x))).

    (3) ((M(x)),(θ(x)))=k1(x)(g1(x),0)+k2(x)((x),g2(x)), then (M(x))=k1(x)g1(x)+k2(x)(x). We also know from Theorem 3.2 that (M(x))=(xr1g1(x)α1(x)) and also from (1) that we have xr1=g1(x)(d(x)), so

    xr1=g1(x)(d(x))(xr1g1(x))=d(x).

    Therefore, d(x)(α(x))=k1(x)g1(x)+k2(x)(x), and we have

    (α(x))=k1(x)g1(x)d(x)+k2(x)(x)d(x).

    Since gcd(g1(x)d(x),(x)d(x))=1, we have (α1(x))=1 and α1(x)=1.

    Example 3.2. Let C be a free R-double cyclic code in R7×R7 with C=((g1(x),0),((x),g2(x))), where

    g1(x)=1+x2+x3+x4,(x)=1+x+x3=g2(x).

    Therefore, C has the following generator matrix

    G=[10111000000000010111000000000010111000000011010001101000011010001101000011010001101000011010001101].

    Furthermore, the dual code is C=(¯g1(x),0),(ˉ(x),¯g2(x)) with

    ¯g1(x)=x2+x4+x5+x6,ˉ(x)=x3+x4+x6=¯g2(x)

    and has the generator matrix of the form

    H=[00101110000000100101100000001100101000000000011010001101100011010001100100011010001110100011010001].

    Since GHT=0 and the dimensions of C and C are the same, C is a self-dual R-double cyclic code with the parameters [28,14,4] of Φ(C).

    In Table 1, we present several examples of optimal binary linear codes, which are actually the Gray images of R-double cyclic codes. We use the table of codes in reference [11] that contains a database of optimal linear codes with respect to the Hamming distance according to their lengths and dimensions. We obtain these optimal codes by direct construction with no puncturing or shortening.

    Table 1.  Table of optimal parameter binary linear codes derived from R-double cyclic codes.
    Generators [r,s]-type Parameter
    g1(x)=1+x,a1(x)=x31
    g2(x)=1=(x),a2(x)=x31
    [3,3] [12,10,2]
    g1(x)=x31=a1(x)
    g2(x)=x71,a2(x)=1+x+x2+x3+x4+x5+x6
    (x)=u(x2+x+1)
    [3,7] [20,1,20]
    g1(x)=1+x+x2,a1(x)=x31
    g2(x)=1,a2(x)=x91
    (x)=1+x
    [3,9] [24,20,2]
    g1(x)=1+x+x2,a1(x)=x31
    g2(x)=1,a2(x)=x151
    (x)=1+x
    [3,15] [36,32,2]
    g1(x)=x71=a1(x)
    g2(x)=x71,a2(x)=1+x2+x3+x4
    (x)=u(1+x2+x3+x4)
    [7,7] [28,3,16]
    g1(x)=x91=a1(x)
    g2(x)=x91,a2(x)=1+x+x3+x4+x6+x7
    (x)=u(1+x2+x3+x5+x6+x8)
    [9,9] [36,2,24]
    g1(x)=x111=a1(x)
    g2(x)=x71,a2(x)=1+x+x2+x3+x4+x5+x6
    (x)=u(x10+x9+x8+x7+x6+x5+x4+x3+x2+x+1)
    [11,7] [36,1,36]
    g1(x)=x111=a1(x)=g2(x)
    a2(x)=x10+x9+x8+x7+x6+x5+x4+x3+x2+x+1
    (x)=u(x10+x9+x8+x7+x6+x5+x4+x3+x2+x+1)
    [11,11] [44,1,44]
    g1(x)=x151=a1(x)
    g2(x)=x151,a2(x)=x11+x10+x9+x8+x6+x4+x3+1
    (x)=u(x11+x10+x9+x8+x6+x4+x3+1)
    [15,15] [60,4,32]
    g1(x)=x151=a1(x)
    g2(x)=x151,a2(x)=x13+x12+x10+x9+x7+x6+x4+x3+x+1
    (x)=u(x13+x12+x10+x9+x7+x6+x4+x3+x+1)
    [15,15] [60,2,40]

     | Show Table
    DownLoad: CSV

    We have defined the below Gray map in the first part of the paper. Now, we will talk about the Gray images of R-double cyclic codes. We know that the Gray map Φ is linear and the images of R-double cyclic codes under this map are binary linear codes. For a=(x0+uy0,,xr1+uyr1)Rr, b=(p0+uq0,,ps1+uqs1)Rs, we have

    Φ:Rr×RsZ2n2 (a,b)(y0,yr1,x0y0,,xr1yr1,q0,,qs1,p0q0,,ps1qs1)

    where xiyi=xi+yimod2,0ir1, pjqj=pj+qjmod2,0js1, and n=r+s.

    Theorem 4.1. Let C be a double cyclic code in Rr,s.

    (1) If r=s, then Φ(C) is a binary QC-code of index 4.

    (2) If rs, then Φ(C) is a binary GQC-code ([13]) of index 4.

    Proof. The proof of this theorem is similar to the proof of Theorem 9 in [5].

    In this paper, we studied the algebraic structure of R-double cyclic codes and their duals where R=Z2+uZ2={0,1,u,1+u} is the ring with four elements and u2=0. We gave the generator polynomials of both the R-double cyclic code C and its dual code C. We also presented examples of optimal parameter binary linear codes that are Gray images of R-double cyclic codes. In the present paper, we have chosen the lengths r and s as odd integers, since R[x]/(xn1) is a principal ideal ring for an odd integer n. In our case, cyclic codes over R can be generated using only one generator. However, when n is not odd, R[x]/(xn1) is not a principal ideal ring, and cyclic codes over R can be generated by two generators [2]. Therefore, exploring double cyclic codes over R with even lengths for future research could be interesting.

    The author declares he has not used Artificial Intelligence (AI) tools in the creation of this article.

    The author declares no conflict of interest.



    [1] L. I. Sedov, Propagation of strong shock waves, J. Appl. Math. Mech., 10 (1946), 241-250.
    [2] G. Q. Chen, J. Glimm, Global solutions to the compressible Euler equations with geometrical structure, Commun. Math. Phys., 180 (1996), 153-193. https://doi.org/10.1007/BF02101185 doi: 10.1007/BF02101185
    [3] K. G. Guderley, Starke kugelige und zylindrische verdichtungsstosse in der nahe des kugelmitterpunktes bnw, der zylinderachse, Luftfahrtforschung, 19 (1942), 302.
    [4] G. B. Whitham, A note on shock dynamics relative to a moving frame, J. Fluid Mech., 31 (1968), 449-453. https://doi.org/10.1017/S002211206800025X doi: 10.1017/S002211206800025X
    [5] M. J. Siddiqui, R. Arora, A. Kumar, Shock waves propagation under the influence of magnetic field, Chaos Solitons Fract., 97 (2017), 66-74. https://doi.org/10.1016/j.chaos.2016.12.020 doi: 10.1016/j.chaos.2016.12.020
    [6] G. A. Zakeri, Similarity solutions for two-dimensional weak shock waves, J. Eng. Math., 67 (2010), 275-288. https://doi.org/10.1007/s10665-009-9337-4 doi: 10.1007/s10665-009-9337-4
    [7] V. D. Sharma, R. Arora, Similarity solutions for strong shocks in an ideal gas, Stud. Appl. Math., 114 (2005), 375-394. https://doi.org/10.1111/j.0022-2526.2005.01557.x doi: 10.1111/j.0022-2526.2005.01557.x
    [8] L. I. Sedov, On the relativistic theory of rocket flight, J. Appl. Math. Mech., 50 (1986), 700-705. https://doi.org/10.1016/0021-8928(86)90076-6 doi: 10.1016/0021-8928(86)90076-6
    [9] G. I. Taylor, The formation of a blast wave by a very intense explosion I. Theoretical discussion, Proc. R. Soc. A: Math. Phys. Eng. Sci., 201 (1950), 159-174. https://doi.org/10.1098/rspa.1950.0049 doi: 10.1098/rspa.1950.0049
    [10] A. Sakurai, On the propagation and structure of a blast wave, Ⅱ, J. Phys. Soc. Jpn., 9 (1954), 256-266. https://doi.org/10.1143/JPSJ.9.256 doi: 10.1143/JPSJ.9.256
    [11] A. Sakurai, On the propagation and structure of the blast wave, I, J. Phys. Soc. Jpn., 8 (1953), 662-669. https://doi.org/10.1143/JPSJ.8.662 doi: 10.1143/JPSJ.8.662
    [12] A. Iqbal, N. N. Abd Hamid, A. I. M. Ismail, Cubic B-spline Galerkin method for numerical solution of the coupled nonlinear Schrödinger equation, Math. Comput. Simul., 174 (2020), 32-44. https://doi.org/10.1016/j.matcom.2020.02.017 doi: 10.1016/j.matcom.2020.02.017
    [13] S. Deniz, A. Konuralp, M. D. la Sen, Optimal perturbation iteration method for solving fractional model of damped Burgers' equation, Symmetry, 12 (2020), 958. https://doi.org/10.3390/sym12060958 doi: 10.3390/sym12060958
    [14] P. Agarwal, J. Merker, G. Schuldt, Singular integral Neumann boundary conditions for semilinear elliptic PDEs, Axioms, 10 (2021), 74. https://doi.org/10.3390/axioms10020074 doi: 10.3390/axioms10020074
    [15] T. Akram, M. Abbas, A.I. Ismail, S. R. M Sabri, N. M. Noor, Numerical solution of the time fractional Black-Scholes equation using B-spline technique, AIP Conf. Proc., 2423 (2021), 020002. https://doi.org/10.1063/5.0075288 doi: 10.1063/5.0075288
    [16] A. Khalid, M. N. Naeem, P. Agarwal, A. Ghaffar, Z. Ullah, S. Jain, Numerical approximation for the solution of linear sixth order boundary value problems by cubic B-spline, Adv. Differ. Equ., 1 (2019), 1-16. https://doi.org/10.1186/s13662-019-2385-9 doi: 10.1186/s13662-019-2385-9
    [17] T. Akram, M. Abbas, A. I. Ismail, Numerical solution of fractional cable equation via extended cubic B-spline, AIP Conf. Proc., 2138 (2019), 030004. https://doi.org/10.1063/1.5121041 doi: 10.1063/1.5121041
    [18] F. S. Al-Duais, S. A. Asiri, A. Saeed, J. Majdoubi, M. M Alam, T. Gul, Electro-magnetohydrodynamic fractional-order fluid flow with new similarity transformations, J. Nanomat., 2022 (2022), 1-9. https://doi.org/10.1155/2022/5198968 doi: 10.1155/2022/5198968
    [19] A. Sunarto, P. Agarwal, J. Sulaiman, J. V. L Chew, E. Aruchunan, Iterative method for solving one-dimensional fractional mathematical physics model via quarter-sweep and PAOR, Adv. Differ. Equ., 2021 (2021), 1-12. https://doi.org/10.1186/s13662-021-03310-2 doi: 10.1186/s13662-021-03310-2
    [20] R. C. Mittal, R. Bhatia, Numerical solution of second order one dimensional hyperbolic telegraph equation by cubic B-spline collocation method, Appl. Math. Comput., 220 (2013), 496-506. https://doi.org/10.1016/j.amc.2013.05.081 doi: 10.1016/j.amc.2013.05.081
    [21] S. S. Zhou, M. Areshi, P. Agarwal, N. A. Shah, J. D. Chung, K. Nonlaopon, Analytical analysis of fractional-order multi-dimensional dispersive partial differential equations, Symmetry, 13 (2021), 939. https://doi.org/10.3390/sym13060939 doi: 10.3390/sym13060939
    [22] A. Kumar, Study for particular solutions of cylindrical shock waves in magnetogasdynamics, Chin. J. Phys., 69 (2021), 285-294. https://doi.org/10.1016/j.cjph.2020.12.016 doi: 10.1016/j.cjph.2020.12.016
    [23] M. J. Siddiqui, R. Arora, V. P. Singh, Propagation of non-linear waves in a non-ideal relaxing gas, Int. J. Comput. Math., 95 (2018), 2330-2342. https://doi.org/10.1080/00207160.2017.1390221 doi: 10.1080/00207160.2017.1390221
    [24] J. Jena, V. D. Sharma, Far-field behavior of waves in a relaxing gas, Acta Astronaut., 40 (1997), 713-718. https://doi.org/10.1016/S0094-5765(97)00134-3 doi: 10.1016/S0094-5765(97)00134-3
    [25] S. A. V. Manickam, C. Radha, V. D. Sharma, Far field behaviour of waves in a vibrationally relaxing gas, Appl. Numer. Math., 45 (2003), 293-307. https://doi.org/10.1016/S0168-9274(02)00214-3 doi: 10.1016/S0168-9274(02)00214-3
    [26] S. J. Liao, The proposed homotopy analysis technique for the solution of nonlinear problems, Doctoral dissertation, PhD. Thesis, Shanghai Jiao Tong University, 1992.
    [27] S. J. Liao, A short review on the homotopy analysis method in fluid mechanics, J. Hydrodyn., 22 (2010), 839-841. https://doi.org/10.1016/S1001-6058(10)60046-7 doi: 10.1016/S1001-6058(10)60046-7
    [28] C. D. Boor, A practical guide to splines, New York: Springer-Verlag, 1978.
    [29] D. U. Von Rosenberg, Methods for the numerical solution of partial differential equations, American Elsevier Publishing Co., New York, 1969.
    [30] A. H. A. Ali, G. A. Gardner, L. R. T. Gardner, A collocation solution for Burgers' equation using cubic B-spline finite elements, Comput. Methods Appl. Mech. Eng., 100 (1992), 325-337. https://doi.org/10.1016/0045-7825(92)90088-2 doi: 10.1016/0045-7825(92)90088-2
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1793) PDF downloads(62) Cited by(1)

Figures and Tables

Figures(7)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog