Research article Special Issues

Cyclic codes over non-chain ring R(α1,α2,,αs) and their applications to quantum and DNA codes

  • Received: 13 December 2023 Revised: 26 January 2024 Accepted: 04 February 2024 Published: 21 February 2024
  • MSC : 94B15, 94B60, 94B65, 94B05

  • Let s1 be a fixed integer. In this paper, we focus on generating cyclic codes over the ring R(α1,α2,,αs), where αiFq{0}, 1is, by using the Gray map that is defined by the idempotents. Moreover, we describe the process to generate an idempotent by using the formula (2.1). As applications, we obtain both optimal and new quantum codes. Additionally, we solve the DNA reversibility problem by introducing Fq reversibility. The aim to introduce the Fq reversibility is to describe IUPAC nucleotide codes, and consequently, 5 IUPAC DNA bases are considered instead of 4 DNA bases (A,T,G,C).

    Citation: Shakir Ali, Amal S. Alali, Kok Bin Wong, Elif Segah Oztas, Pushpendra Sharma. Cyclic codes over non-chain ring R(α1,α2,,αs) and their applications to quantum and DNA codes[J]. AIMS Mathematics, 2024, 9(3): 7396-7413. doi: 10.3934/math.2024358

    Related Papers:

    [1] Turki Alsuraiheed, Elif Segah Oztas, Shakir Ali, Merve Bulut Yilgor . Reversible codes and applications to DNA codes over $ F_{4^{2t}}[u]/(u^2-1) $. AIMS Mathematics, 2023, 8(11): 27762-27774. doi: 10.3934/math.20231421
    [2] Fatma Zehra Uzekmek, Elif Segah Oztas, Mehmet Ozen . $ (\theta_i, \lambda) $-constacyclic codes and DNA codes over $ \mathbb{Z}_{4}+u\mathbb{Z}_{4}+u^{2}\mathbb{Z}_{4} $. AIMS Mathematics, 2024, 9(10): 27908-27929. doi: 10.3934/math.20241355
    [3] Ismail Aydogdu . On double cyclic codes over $ \mathbb{Z}_2+u\mathbb{Z}_2 $. AIMS Mathematics, 2024, 9(5): 11076-11091. doi: 10.3934/math.2024543
    [4] Chaofeng Guan, Ruihu Li, Hao Song, Liangdong Lu, Husheng Li . Ternary quantum codes constructed from extremal self-dual codes and self-orthogonal codes. AIMS Mathematics, 2022, 7(4): 6516-6534. doi: 10.3934/math.2022363
    [5] Adel Alahmadi, Tamador Alihia, Patrick Solé . The build up construction for codes over a non-commutative non-unitary ring of order $ 9 $. AIMS Mathematics, 2024, 9(7): 18278-18307. doi: 10.3934/math.2024892
    [6] Xiying Zheng, Bo Kong, Yao Yu . Quantum codes from $ \sigma $-dual-containing constacyclic codes over $ \mathfrak{R}_{l, k} $. AIMS Mathematics, 2023, 8(10): 24075-24086. doi: 10.3934/math.20231227
    [7] Xuesong Si, Chuanze Niu . On skew cyclic codes over $ M_{2}(\mathbb{F}_{2}) $. AIMS Mathematics, 2023, 8(10): 24434-24445. doi: 10.3934/math.20231246
    [8] Irwansyah, Intan Muchtadi-Alamsyah, Fajar Yuliawan, Muhammad Irfan Hidayat . Generalized Reed-Solomon codes over number fields and exact gradient coding. AIMS Mathematics, 2024, 9(4): 9508-9518. doi: 10.3934/math.2024464
    [9] Adel Alahmadi, Altaf Alshuhail, Patrick Solé . The mass formula for self-orthogonal and self-dual codes over a non-unitary commutative ring. AIMS Mathematics, 2023, 8(10): 24367-24378. doi: 10.3934/math.20231242
    [10] Wei Qi . The polycyclic codes over the finite field $ \mathbb{F}_q $. AIMS Mathematics, 2024, 9(11): 29707-29717. doi: 10.3934/math.20241439
  • Let s1 be a fixed integer. In this paper, we focus on generating cyclic codes over the ring R(α1,α2,,αs), where αiFq{0}, 1is, by using the Gray map that is defined by the idempotents. Moreover, we describe the process to generate an idempotent by using the formula (2.1). As applications, we obtain both optimal and new quantum codes. Additionally, we solve the DNA reversibility problem by introducing Fq reversibility. The aim to introduce the Fq reversibility is to describe IUPAC nucleotide codes, and consequently, 5 IUPAC DNA bases are considered instead of 4 DNA bases (A,T,G,C).



    Throughout the manuscript, we denote by Fq a field of order q, where q is an odd prime power, i.e., q=pm and m1 is a fixed integer. Moreover, we consider non-zero elements αi belonging to the field Fq, where 1is and s1 is a fixed integer. We study over the ring

    R(α1,α2,,αs)=Fq[u1,u2,,us]/u2i(αi)2,uiujujui,

    where s1 and 1i,js. It can be readily verified that R is a non-chain semi-local ring of order q2s. Linear codes over finite rings have garnered significant attention since the seminal work of Hammons et al. [1]. The advantages of linearity, such as facilitating encoding and decoding algorithms [2,3], along with the ease of determining parameters like minimum distance, have made linear codes a focal point of research. A linear code of length n over a finite ring (resp. field) R is an R-submodule (resp. subspace) of Rn. The representation [n,k,d], where n is the code's length, k is its dimension (number of information bits), and d is the minimum distance. Coding theory aims to explore codes with large code rates and minimum distances. That being said, this raises the following queries: What is a code's maximum rate for the specified length and distance? How far can a code go at a given length and rate? Numerous theoretical constraints on [n,k,d] have been established [3] in order to address these issues. These include the Singleton bound, Plotkin bound, Hamming bound, Griesmer bound, and others. An optimal code under a certain bound is defined as a code [n,k,d] that achieves that bound. There are a few online databases that catalog the parameters of optimal and best-known codes. The database [4] is one of the popular platforms that contains the parameters of various types of linear codes over finite fields of size up to 9. In 2010, Zhu et al. [5] conducted a study on cyclic codes over a finite non-chain ring, specifically F2+uF2, where u2=u. They demonstrated that these codes are principally generated.

    Cyclic codes have demonstrated their significant utility in the field of quantum-error-correcting (QEC) codes, which differ notably from classical-error-correcting (CEC) codes. Shor [6] invented the first quantum code in 1995. These codes are employed to regulate the errors that occur when sending quantum data via a quantum channel. In 1998, Calderbank et al. [7] addressed the challenge of creating QEC codes by utilizing CEC codes over the finite field GF(4). They also introduced a method for constructing QEC codes based on CEC codes. In 2009, Qian et al. [8] investigated binary quantum codes derived from odd-length cyclic codes over a finite ring F2+uF2 with u2=0. In 2011, to obtain quantum codes over F4, Kai and Zhu [9] employed dual containing cyclic codes over a finite chain ring F4+uF4,u2=0. In 2015, Gao [10] developed innovative quantum codes over the field Fq+vFq+v2Fq+v3Fq, where q=pm, p is a prime with 3|(p1), v4=v, and m is a positive integer. Subsequently, Ozen et al. [11] derived ternary quantum codes from cyclic codes over F3+uF3+vF3+uvF3 with u2=1,v2=1, and uv=vu. In 2021, Ashraf et al. [12] discovered enhanced quantum and LCD codes over the ring Fpm+vFpm, where v2=1. Recently, researchers have focused on cyclic and constacyclic codes over finite non-chain rings to get good quantum codes over Fq [13,14,15,16,17,18,19]. In 2023, Ali et al. [13] obtained cyclic codes and new quantum codes over finite commutative ring. In [14], the structural properties of cyclic codes were explored over the ring F2m[v1,v2,,vk]v2iαivi,vivjvjvi, for i,j=1,2,3,,k. Further, they obtained optimal linear codes and quantum codes over the same ring.

    Adleman [20] initially showcased the successful utilization of the DNA structure in tackling a combinatorial issue. In this instance, he employed DNA molecules to effectively address a directed salesman problem with seven nodes. The methodology, he employed hinged on the inherent Watson Crick Complement property of DNA strands. Researchers have long explored the correlation between DNA and error-correcting codes. Liebovitch et al. [21] conducted studies in this realm, focusing on the quest for error-correcting codes within actual DNA sequences. Additionally, Brandao et al. [22] delved into this connection in their recent work. Common constraints employed in DNA codes include the Hamming distance constraint, the reverse-complement constraint, the reverse constraint, and the fixed GC-content constraint. These constraints are frequently referenced in works such as [23,24,25,26]. A DNA code is defined when the DNA correspondence of the code C satisfies the criteria of reversibility or a reversible complementarity. In such cases, the code C, or its DNA correspondence, is termed a DNA code. The purpose of obtaining reversible DNA codes is to find the optimal solution in Adleman's experiment so that the DNA sequences are as different as possible from their reversible and reversible complements. Since the aim of algebraic codes is to ensure that the codes are different from each other, studies on the relationship between these two structures have begun. The number of elements of algebraic structures used in studies on DNA codes in the literature is 4 and the power of 4. Because there are 4 bases in DNA: adenine (A), guanine (G), cytosine (C) and thymine (T). The first study in which reversible DNA codes with more than 4 elements were produced without deleting elements is due to Oztas and Siap [27]. In 2013, Oztas and Siap [27] introduced and studied the reversibility problem with more than four elements. Consequently, this issue arises in algebraic structures with more than four elements, where each element corresponds to DNA multiple bases. The reversibility problem shows us, that if we have reversible codes over the algebraic structures with more than four elements, then we cannot obtain reversible DNA codes only with a map. For instance, consider a ring R with |R|=16, where each element corresponds to DNA double bases (or 2 bases), and let's consider a,b,cR and let DNA 2-bases.

    Let τ(a)TG,τ(b)AC,andτ(c)GA with a map τ. Let (a,b,c)R3 be a vector, it corresponds to (TG,AC,GA) (or (TGACGA)). The reverse of (a,b,c) is given as (a,b,c)r=(c,b,a). Moreover, (c,b,a) corresponds to (GA,AC,TG) (or (GAACTG)). (AG,CA,GT)(GA,AC,TG), despite of (a,b,c)r=(c,b,a). Consequently, when we obtain the reverse of the vector (as (a,b,c)r=(c,b,a), we can not obtain the reverse of DNA correspondences (i.e., (TGACGA)r(GAACTG)). The reversibility problem is given by (a,b,c)r=(c,b,a), but (τ(a),τ(b),τ(c))r(τ(c),τ(b),τ(a)). That means, if we have a reverse of a codeword, we cannot obtain the exact DNA reverse of the codeword. Therefore, we must generate special designs and maps to obtain the reversible DNA codes. The reversible codes are not enough to generate reversible DNA codes. In this paper, Fq reversibility means that the code is reversible over Fq. DNA reversibility means that the code is a reversible DNA code. The general version of this method is presented in [28]. Some studies that solve the DNA reversibility problem for rings with 4 elements and more than 4 elements were discussed in [29,30,31,32,33,34,35,36,37,38]. As of the current research, attempts have been made to obtain reversible DNA codes over 4 bases. However, when DNA sequencing is performed, the letter N is sometimes used in DNA strings. This letter N indicates that its location can contain any base. Therefore, by trying to generate DNA codes with the letters A, T, G, C and N, codes that can be directly matched with DNA sequences in the NCBI (The National Center for Biotechnology Information) system or other open sources can be produced. By generating reversible DNA codes, different DNA string structures can be created for the Adleman experiment. Finding the optimal distance for the diversity between strings within the generated DNA code is an open problem.

    The main objectives of this article is to develop QEC codes over the ring R(α1,α2,,αs) and investigate the structural characteristics of cyclic codes over this finite ring. When q=5, we introduce a reversibility problem over the ring for correspondence over Fq. The main contributions of this paper are the following:

    (i) To investigate some optimal codes over R(1,1), see Table 1;

    Table 1.  Gray images of cyclic codes over R(1,1).
    n g0(x) g1(x) g2(x) g3(x) ϱ(C) Remarks
    3 (x+2)2 x+2 x+2 1 [12,8,3]3 optimal
    4 (x2+1) x+1 x+1 x+1 [16,11,4]3 optimal
    5 (x4+x3+x2+x+1) x+2 x+2 1 [20,14,4]3 optimal
    6 (x+1)2(x+2) x+2 x+2 1 [24,19,3]3 optimal
    7 (x+2)(x6+x5+x4 (x+2)(x6+x5+x4 (x+2)(x6+x5+x4 (x6+x5+x4 [28,1,28]3 optimal
    +x3+x2+x+1) +x3+x2+x+1) +x3+x2+x+1)
    8 (x2+1)(x2+2x+2) x+2 x+2 1 [32,26,4]3 optimal
    11 (x5+x4+2x3+x2+2) x+2 x+2 x+2 [44,36,4]3 optimal

     | Show Table
    DownLoad: CSV

    (ii) To provide new quantum codes over R(1,1,1), see Table 2;

    Table 2.  New quantum codes (NQC) from cyclic codes over R(1,1,1).
    n Ring M Factors ϱ(C) [[n,k,d]]q Remark
    9 R(1,1,1) M8 g0(x)=(x+2)4, [72,62,3] [[72,52,3]]3 NQC
    gi=x+2,for
    1i6,g7(x)=1
    13 R(1,1,1) M8 g0(x)=g3(x)= [104,92,4] [[104,80,4]]3 ...
    x3+2x2+2x+2,
    g1(x)=g4(x)=x3+2x+2,
    g2(x)=g5(x)=
    g6(x)=g7(x)=1
    15 R(1,1,1) M8 g0(x)=(x+2)2 [120,108,3] [[120,96,3]]3 ...
    (x4+x3+x2+x+1)
    gi=x+2,for1i6
    g7(x)=1
    18 R(1,1,1) M8 g0(x)=(x+1)4(x+2), [144,133,3] [[144,122,3]]3 NQC
    gi=x+1,for1i6,
    g7(x)=1
    22 R(1,1,1) M8 g0(x)=(x5+2x4+2x3+2x2+1), [176,151,4] [[176,126,4]]3 NQC
    g2(x)=(x5+x4+2x3+x2+2),
    (x5+x4+2x3+x2+2),
    g4(x)=g7(x)=
    (x5+2x4+2x3+2x2+1),
    g1(x)=g3(x)=
    g5(x)=g6(x)=1
    22 R(1,1,1) M8 g0(x)=g1(x)=g7(x) [176,126,5] [[176,76,5]]3 NQC
    =(x5+2x4+2x3+2x2+1)
    (x5+x4+2x3+x2+2),,
    g2(x)=g3(x)=g4(x)=
    (x5+x4+2x3+2x2+2),
    g6(x)=(x5+x4+2x3+x2+2)
    g6(x)=1
    26 R(1,1,1) M8 g0(x)=(x3+2x2+2x+2) [208,193,4] [[208,178,4]]3 NQC
    (x3+2x2+x+1),
    g1(x)=(x3+2x2+2x+2),
    g2(x)=g4(x)=(x3+2x2+x+1)
    g3(x)=g4(x)=g5(x)=g6(x)=1
    45 R(1,1,1) M8 g0(x)=(x+2)4(x4+x3+x2+x+1), [360,346,3] [[360,332,2]]3 NQC
    g1(x)=(x4+x3+x2+x+1),
    g4(x)=g6(x)=(x+2),
    g2(x)=g3(x)=g5(x)=g7(x)=1
    55 R(1,1,1) M8 g0(x)=(x20+x18+2x17 [440,405,4] [[440,370,4]]3 NQC
    +2x16+2x15+x14
    +2x10+x9+2x8+
    2x7+x5+x4+
    2x3+2x2+2x+1),
    g2(x)=g4(x)=g8(x)
    =(x5+x4+2x3+x2+2)
    g1(x)=g3(x)=g5(x)=g7(x)=1

     | Show Table
    DownLoad: CSV

    (iii) to introduce a method for solving the Fq reversibility problem to DNA codes;

    (iv) To solve the DNA reversibility problem over the ring Rq(α1,α2,,αs), where αi=αsi with 0is/2 and s is an even integer which is a special case of the ring R(α1,α2,,αs);

    (v) To solve the DNA reversibility problem, by using 5 IUPAC DNA bases (A,T,G,C,N) in [39].

    The rest of the paper is organized as follows. In Section 2, we introduce a formula to obtain orthogonal idempotents over the defined ring. In Section 3, we give the main theorems that provide the relations between cyclic codes, linear codes, and their Gray images. Moreover, we discuss some examples that give new quantum codes as applications. In Section 4, we introduce the Fq reversibility problem and give the method to solve it. Finally as an application, we solve the DNA reversibility problem over the ring Rq(α1,α2,,αs).

    Let Fq be a finite field of order q, where q be a prime power such that q=pm for a positive integer m. The ring R(α1,α2,,αs)=Fq[u1,u2,,us]/u2i(αi)2,uiujujui where s1, 1i,js and αi is a non-zero element of the finite field Fq. We begin our discussion with some basic definitions:

    (i) The number of positions where two vectors differ, i.e., x=x1xn and y=y1yn, is their Hamming distance and is represented by d(x,y).

    (ii) wt(x) represents the Hamming weight of a vector x=x1x2xn, which is the number of non-zero xi.

    (iii) The Euclidean inner product of x and y is defined as xy=x0y0+x1y1++xn1yn1, given that x,yFnq.

    (iv) When C=C, a code C is considered self-dual; when CC, it is considered self-orthogonal; and when CC, it is considered dual.

    (v) A linear code C is said to be reversible if

    cr=(cn1,cn2,,c0)C

    whenever c=(c0,c1,c2,,cn1)C.

    (vi) [14] Let C be a linear code of length n over R. Then C is called a complement if for any

    z=(z0,z1,,zn1)C,zc=(¯z0,¯z1,,¯zn1)C,

    reversible-complement if for any zC,zrcC.

    (vii) [14] Let C be a linear code of length n over R. Then C (or the DNA correspondence of C) is called a reversible (reversible complement) DNA code if the DNA correspondence of C satisfies the properties of being reversible (reversible compliment).

    κ represents the collection of positions occupied by non-zero digits within a binary number, forming a mapping to an integer ([14]). κ(e)=κ(e=(an...a2a1)2)={j|aj0}, where eZ+{0}. κ(23)=κ(23=(10111)2)={1,2,3,5} is an example for it.

    Definition 2.1. The self orthogonal idempotent form over the ring R(α1,α2,,αs) can be obtained by using the following formula:

    Ij=si=1{αiui, if iκ(j)αi+ui, if iκ(j)2ssi=1αi (2.1)

    where 0j2s1. These idempotents satisfy that (Ij)2=Ij, 2s1j=0Ij=1 and Ij1Ij2=0, where 0j1,j22s1.

    According to the Chinese remainder theorem,

    R(α1,α2,,αs)=2s1j=0IjFq.

    Thus, element of R(α1,α2,,αs) can be expressed as r=2s1j=0Ijrj, where rjFq and 0j2s1.

    Example 2.2. Let us consider the construction of the idempotent set over the ring R(α1,α2,α3,α4)=Fq[u1,u2,u3,u4]/u21α21,u22α22,u23α23,u24α24,u1u2u2u1,u1u3u3u1,u1u4u4u1,u2u3u3u2,u2u4u4u2,u3u4u4u3 over Fq. As stipulated by the definition outlined above, the idempotents can be characterized as follows:

    I0=(α1+u1)(α2+u2)(α3+u3)(α4+u4)24α1α2α3α4,I1=(α1u1)(α2+u2)(α3+u3)(α4+u4)24α1α2α3α4,I2=(α1+u1)(α2u2)(α3+u3)(α4+u4)24α1α2α3α4,I3=(α1u1)(α2u2)(α3+u3)(α4+u4)24α1α2α3α4,I4=(α1+u1)(α2+u2)(α3u3)(α4+u4)24α1α2α3α4,I5=(α1u1)(α2+u2)(α3u3)(α4+u4)24α1α2α3α4,I6=(α1+u1)(α2u2)(α3u3)(α4+u4)24α1α2α3α4,I7=(α1u1)(α2u2)(α3u3)(α4+u4)24α1α2α3α4,I8=(α1+u1)(α2+u2)(α3+u3)(α4u4)24α1α2α3α4,I9=(α1u1)(α2+u2)(α3+u3)(α4u4)24α1α2α3α4,I10=(α1+u1)(α2u2)(α3+u3)(α4u4)24α1α2α3α4,I11=(α1u1)(α2u2)(α3+u3)(α4u4)24α1α2α3α4,I12=(α1+u1)(α2+u2)(α3u3)(α4u4)24α1α2α3α4,I13=(α1u1)(α2+u2)(α3u3)(α4u4)24α1α2α3α4,I14=(α1+u1)(α2u2)(α3u3)(α4u4)24α1α2α3α4,I15=(α1u1)(α2u2)(α3u3)(α4u4)24α1α2α3α4.

    The Gray map over the ring R(α1,α2,,αs) is defined as follows:

    ϱ:R(α1,α2,,αs)F2sq,2s1j=0Ijrj(r0,r1,,r2s1)M,

    where rjFq, 0j2s1, MGL2s(Fq) and MMT=dI(2s)×(2s) (dFq{0}). The above Gray map can be extended from components of Rn(α1,α2,,αs) to F2sq. The Lee weight of rRn(α1,α2,,αs) is defined as wL(r)=wH(ϱ(r)), where wH gives the Hamming weight over Fq. Our next result gives a characterization of the above mentioned Gray map.

    Proposition 2.3. The map ϱ is an Fq-linear and distance preserving map from (Rn(α1,α2,,αs),dL) to (F2snq,dH), where dH=dL.

    Proof. Let r,r(Rn(α1,α2,,αs),dL) such that r=2s1j=0Ijrj and r=2s1j=0Ijrj, where rjrjFq and 0j2s1. Then, we have

    ϱ(r+r)=ϱ(2s1j=0Ijrj+2s1j=0Ijrj)=ϱ(2s1j=0Ij(rj+rj))=(r0+r0,r1+r1,,r2s1+r2s1)M=(r0,r1,,r2s1)M+(r0,r1,,r2s1)M=ϱ(r)+ϱ(r) for all r,rRn(α1,α2,,αs)

    and for alleFq

    ϱ(er)=ϱ(2s1j=0eIjrj)=(er0,er1,,er2s1)M=e(r0,r1,,r2s1)M=eϱ(r) for all rRn(α1,α2,,αs).

    Also, we have

    dL(r,r)=wL(rr)=wH(ϱ(rr))=wH(ϱ(r)ϱ(r))=dH(ϱ(r),ϱ(r)).

    Hence, ϱ is an Fq-linear map and it satisfies the condition for being distance-preserving.

    The operations and are used as Γ1Γ2Γs={(γ1,γ2,,γs)|γiΓi:1is} and Γ1Γ2Γs={(γ1+γ2++γs)|γiΓi:1is}. The following linear codes of length n are defined by using code C of length n over R(α1,α2,,αs):

    Ci={ri|2s1j=0Ijrj, where riFq,0i2s1},

    where 0i2s1. Therefore, we can represent any linear code of length n as C=2s1j=0IjCj and |C|=2s1j=0|Cj| over R(α1,α2,,αs). If Gj is a generator matrix of Cj where 0j2s1, then the generator matrix G of C is given by

    G=(I0G0I1G1I2s1G2s1)

    and the generator matrix of ϱ(C) is given by

    ϱ(G)=(ϱ(I0G0)ϱ(I1G1)ϱ(I2s1G2s1)).

    Proposition 2.4. Let C=2s1j=0IjCj be a linear code of length n over R(α1,α2,,αs). Then, ϱ(C) is a [2sn,2s1j=0kj,d]-linear code over Fq for 0j2s1, where each Cj is an [n,kj,d]-code.

    Proof. The proof follows easily with the property of the Gray map.

    Proposition 2.5. If C is a linear code of length n over R(α1,α2,,αs), then

    ϱ(C)=2s1j=0Cj.

    Proof. The result follows by [40, Theorem 4.1].

    Theorem 2.6. Let C be a self-orthogonal linear code of length n over R(α1,α2,,αs) and M be a 2s×2s non-singular matrix over Fq which has the property MMT=ϵI2s, where I2s is the identity matrix, 0ϵFq, and MT is the transpose of matrix M. Then, the Gray image ϱ(C) is a self-orthogonal linear code of length 2sn over Fq.

    Proof. Suppose that C is a self-orthogonal linear code of length n over R(α1,α2,,αs), i.e., CC. Now, let Q,Sϱ(C) such that

    Q=ϱ(q)=(q0M,q1M,,qn1M)

    and

    S=ϱ(s)=(s0M,s1M,,sn1M).

    We have to show that ϱ(C) is self-orthogonal, that is, QS=0. Since C is self-orthogonal, qs=n1j=0qj.sj=0. Therefore,

    QS=QS=n1j=0qjMMTsj=ϵn1j=0qj.sj=0.

    Suppose that Q and S are arbitrary, then ϱ(C)ϱ(C). Thus, ϱ(C) is a self-orthogonal linear code of length 2sn over Fq.

    On the ring R(α1,α2,,αs), as previously outlined, we investigate several structural characteristics of cyclic codes and substantiate certain findings. We use a cyclic operator defined as η((c0,c1,c2,,cn1))=(cn1,c0,c1,c2,,cn2) for codewords.

    Theorem 3.1. Let C=2s1j=0IjCj be a linear code of length n over R(α1,α2,,αs). Then each Cj is a cyclic code over Fq, where 0i2s1 if and only if C is a cyclic code over R(α1,α2,,αs).

    Proof. Let cC be a codeword of length n. Also, let c=2s1j=0Ijtj where tjFq. If ϱ(tj)Cj, then ϱ(c)=2s1j=0Ijϱ(tj) and ϱ(c)ϱ(C). The reverse direction of the proof is also clear.

    Theorem 3.2. Let C=2s1j=0IjCj be a cyclic code of length n over R(α1,α2,,αs) and gj(x) be the generator polynomial of Cj. Then, C=g(x) and |C|=q(2s)n2s1i=0deg(gi(x)), where g(x)=2s1j=0Ijgj(x).

    Proof. Given Cj=gj(x), where 0i2s1 and C=2s1j=0IjCj. Let cC be such that c={c(x)|2s1j=0Ijgj(x) for gj(x)Cj}. Therefore,

    CI0g0(x),I1g1(x),I2g2(x),,I2s1g2s1(x)R(α1,α2,,αs)[x]/xn1.

    For any

    2s1j=0Ijfj(x)gj(x)2s1j=0Ijgj(x)R(α1,α2,,αs)[x]/xn1,

    where

    fj(x)R(α1,α2,,αs)[x]/xn1.

    Hence,

    I0g0(x),I1g1(x),I2g2(x),,I2s1g2s1(x)C.

    This implies

    I0g0(x),I1g1(x),I2g2(x),,I2s1g2s1(x)=C.

    Since |C|=2s1j=0|Cj|, we have

    |C|=q(2s)n2s1i=0deg(gi(x)).

    Theorem 3.3. Let C=2s1j=0IjCj be a cyclic code of length n over R(α1,α2,,αs). Then, there exists a unique monic polynomial g(x)R(α1,α2,,αs)[x] such that C=g(x) and g(x) divides (xn1). Moreover, if gj(x) is the generator polynomial of Cj, then g(x)=2s1j=0Ijgj(x).

    Proof. The proof follows by the reverse direction of the proof of Theorem 3.2.

    Theorem 3.4. Let C=2s1j=0IjCj be a cyclic code of length n over R(α1,α2,,αs). Then, C=2s1j=0IjCj is also a cyclic code of length n over R(α1,α2,,αs).

    Proof. Let C=2s1j=0IjCj be a cyclic code. By Theorem 3.1, Cj is a cyclic code. Thus, Cj is a cyclic code. Hence, by Theorem 3.1, C=2s1j=0IjCj is a cyclic code.

    Lemma 3.5 ([7]). Let C=g(x) be a cyclic code of length n over Fq. Then CC if and only if xn10(modg(x)g(x)), where the reciprocal polynomial of g(x) is denoted by g(x).

    Theorem 3.6. Let C=2s1j=0IjCj be a cyclic code of length n over R(α1,α2,,αs) and C=g(x)=2s1j=0Ijgj(x), where Cj=gj(x). Then, CC if and only if

    xn10(modgj(x)gj(x)).

    Proof. In view of Lemma 3.5 and Theorem 3.1, we conclude the result. Now, we give a definition and a lemma about QEC codes. We begin with the following definition:

    Definition 3.7 ([19]). A quantum code represented by [[n,k,d]]q is defined as a subspace of H(C)n=HHHntimes (is also a qn-dimensional Hilbert space) with dimension qk and minimum distance d. Moreover, we consider [[n,k,d]]q to be better than [[n,k,d]]q if either or both of the following conditions hold:

    (i) d>d whenever the code rate kn=kn (larger distance);

    (ii) kn>kn whenever the distance d=d (larger code rate).

    Lemma 3.8 ([41]). (Theorem 3) (CSS construction) Let C1=[n,k1,d1]q and C2=[n,k2,d2]q be two linear codes over GF(q) with C2C1. Furthermore, let

    d=min{wgt(v):v(C1C2)(C2C1)}min(d1,d2).

    Then, there exists a QEC code with the parameters [[n,k1+k2n,d]]q. In particular, if C1C1, then there exists a QEC code with the parameters [[n,2k1n,d1]]q, where d1=min{wgt(v):v(C1C1)}.

    Theorem 3.9. Let C=2s1j=0IjCj be a cyclic code of length n over R(α1,α2,,αs), and next let the parameters of its Gray image be [2sn,2s1j=0kj,dH]. If CC, then there exists a QEC code [[2sn,22s1j=0kj2sn,dH]]q over Fq.

    In the following examples, we obtain optimal as well as new quantum codes.

    Example 3.10. Let R(1,1)=F3[u1,u2]/u21(1)2,u22(1)2,u1u2u2u1 be a finite commutative ring. For n=4, we have that x41=(x+1)(x+2)(x2+1)F3[x]. Let g0(x)=(x2+1), g1(x)=(x+1), g2(x)=(x+1), g3(x)=(x+1) and

    M4=[1111111111111111],

    where M4MT4=2I4. Then, cyclic code C is of length 4 over R(1,1) and its Gray image is [16,11,4]3 which is an optimal code as per the database made available by [4].

    Example 3.11. Let R(1,1,1)=F3[u1,u2,u3]/u21(1)2,u22(1)2,u23(1)2,u1u2u2u1,u1u3u3u1,u3u2u2u3 be a finite commutative ring. Then, for n=26, we have x261=(x+1)(x+2)(x3+2x+1)(x3+2x+2)(x3+x2+2)(x3+x2+x+2)(x3+x2+2x+1)(x3+2x2+1)(x3+2x2+x+1)(x3+2x2+2x+2)F3[x]. Let g0(x)=(x3+2x2+2x+2)(x3+2x2+x+1), g1(x)=(x3+2x2+2x+2), g2(x)=(x3+2x2+x+1), g3(x)=1, g4(x)=(x3+2x2+x+1), g5(x)=1, g6(x)=1, g7(x)=1 and

    M8=[1111111111111111111111111111111111111111111111111111111111111111],

    where M5MT5=2I8. Then, cyclic code C is of length 26 over R(1,1,1) and its Gray image is [208,193,4]3. Moreover, x2610(modgi(x)g(x)) for 0i7. Hence, we obtain [[208,178,4]]3 quantum code, that is, a new quantum code according to the database [42].

    In Table 1, we obtain optimal codes over R(1,1) and in Table 2, we obtain new quantum codes (NQC) over R(1,1,1). The Magma computation system [43] is used to complete all of the computations in the above examples and tables.

    In the present section, we give a general reversibility problem for Fq reversibility by using the ring Rq(α1,α2,,αs), where αi=αsi and 0is/2 and s is even positive integer. Moreover, a special case of Fq reversibility corresponds to DNA reversibility over F5.

    If the reverse writing of each codeword of a code (or DNA code) is included in the code, then this code is called a reversible code (or reversible DNA code). The reverse of a codeword c is denoted by cr. Moreover, the Fq reversibility problem is similar to the DNA reversibility problem for the rings that its decomposition has more than one field as Rq(α1,α2,,αs)=2s1j=0IjFq. Let (a0,a1,a2)Rq(α1,α2) and (a0,a1,a2) correspond to (a0,0,a0,1,a0,2,a0,3a0,a1,0,a1,1,a1,2,a1,3a1,a2,0,a2,1,a2,2,a2,3α2)=t1 over F5. Also, (a0,a1,a2)r=(a2,a1,a0) corresponds to (a2,0,a2,1,a2,2,a2,3a2,a1,0,a1,1,a1,2,a1,3a1,a0,0,a0,1,a0,2,a0,3a0)=t2. But, the reverse of t1 is not equal to {t2, then} tr1t2. It is called as Fq reversibility problem.

    We give a map as follow to define a correspondence between DNA and F5, that is,

    θ:F5{A,T,G,C,N},A1,G2,T3,C4,N0.

    Each element αRq(α1,α2,,αs) is expressed by α=a0I0+a1I1++a2s1I2s1, where a0,a1,,a2s1Fq. By using the structure Rq(α1,α2,,αs)=I0FqI1FqI2s1Fq for any element of Rq(α1,α2,,αs), we use the Gray map as follows:

    ϕ:Rq(α1,α2,,αs)F2sq,α(a0,a1,,a2s1).

    The map can be extended to n-tuples coordinate-wise. We define an automorphism as follows to satisfy the conditions of reversibility for DNA codes:

    φ:Rq(α1,α2,,αs)Rq(α1,α2,,αs),uiuii{0,,s1}.

    By using the automorphism φ, we can write the following lemma.

    Lemma 4.1. φ(Ii)=I2s1i , where Ii are idempotents of Rq(α1,α2,,αs) and (i{0,1,,2s1}).

    The following theorem gives the rule for obtaining the reverse for the maps of the elements of Rq(α1,α2,,αs).

    Theorem 4.2. Let αRq(α1,α2,,αs), where αi=αsi (0is/2) and α=a0I0+a1I1++a2s1I2s1. ϕ(α)=(a0,a1,,a2s1). (ϕ(α))r=φ(ϕ(α)). Then, φ(ϕ(α)) is a reverse order of ϕ(α) over Fq.

    Proof. Proof of the Theorem 4.2 follows directly from the Definition 2.1, and Lemma 4.1.

    Corollary 4.3. Let αR5(α1,α2,,αs), where αi=αsi (0is/2). Then, θ(ϕ(φ(α))) is the DNA reverse of θ(ϕ(α)). Moreover, each element of R5(α1,α2,,αs) corresponds to 2s-DNA bases (or called DNA 2s bases).

    The maps φ, ϕ and θ can be extended for vectors over Rq(α1,α2,,αs). Let us consider R5(α1,α2,,αs)=F5[u1,u2,,us]/u2i(αi)2,uiujujui, where αi=αsi (0is/2). Each element correspond to a 2s-DNA base (that has a length of 2s) in the ring R5(α1,α2,,αs). We apply Theorem 4.2 for DNA in the following example.

    Example 4.4. Let us consider the ring R5(1,1,1,1). Then, we have

    α=2I0+3I1+4I2+I3+2I4+2I5+4I6+3I7+2I8+I9+0I10+2I11+I12+3I13+0I14+3I15R5(1,1,1,1);
    ϕ(α)=(2,3,4,1,2,2,4,3,2,1,0,2,1,3,0,3);
    θ(ϕ(α))=(GTCAGGCTGANGATNT);
    φ(α)=2I15+3I14+4I13+I12+2I11+2I10+4I9+3I8+2I7+I6+0I5+2I4+I3+3I2+0I1+3I0;
    ϕ(φ(α))=(3,0,3,1,2,0,1,2,3,4,2,2,1,4,3,2).

    Thus, ϕ(φ(α)) is a reverse of ϕ(α) over F5. This gives

    θ(ϕ(φ(α)))=(TNTAGNAGTCGGACTG).

    Hence, θ(ϕ(φ(α))) is the DNA reverse of θ(ϕ(α)) and these are DNA 16 bases.

    We introduce a method to generate Fq reversible codes and discuss one of the applications to generating the reversible DNA code by using R5(α1,α2,,αs). Following definition a version of coterm polynomial [35]. The following definition is used for generating Fq reversible and DNA reversible codes over Rq(α1,α2,,αs) and R5(α1,α2,,αs), respectively.

    Definition 4.5. Let g(x)=β0+β1x++βn1xn1R5(α1,α2,,αs)[x]/(xn1) be a polynomial, where αi=αsi (0is/2). If for all 1in/2 such that βi=βni, then g(x) is called a coterm polynomial over Rq(α1,α2,,αs). Moreover,

    Θ:Rq(α1,α2,,αs)[x]Rnq(α1,α2,,αs),g(x)(β0,β1,,βn1).

    Θ(g(x))=(β0,β1,,βn1) is called coterm tuple.

    Theorem 4.6. Let c be a coterm tuple of coterm polynomial g(x)=β0+β1x++βn1xn1 over Rq(α1,α2,,αs)[x]/(xn1), where αi=αsi (0is/2). Then, the coterm φ-generation set

    Ttg={φ(ct1),,φ(c2),φ(c1),c0,c1,,ct},

    where t<(n1)/2. And, the coterm φ-generation matrix:

    GTtg=[φ(ct1)φ(c1)c0c1ct]=[φ(βt+1)φ(βt+2)φ(βt)φ(β1)φ(βn1)φ(β0)β0β1βn1βn1β0βn2βntβnt1βn(t+1)].

    Thus, C=Ttg (C=GTtg) generate codes over Rq(α1,α2,,αs) and ϕ(C) correspond the Fq reversible codes. Next, let code C be over R5(α1,α2,,αs). Then, θ(ϕ(C)) correspond reversible DNA codes over F5.

    Proof. Let g(x) be a coterm polynomial and c be a coterm tuple of g(x). In the coterm φ-generation set (or matrix), each row has its reverse and each codewords has its reverse as follows (ϕ(αc)i)r=(φ(ϕ(αci1)), where 0it. Thus, ϕ(C) corresponds to the Fq reversible codes because of the spanning set conditions of ([35], Lemma 3.2.) Moreover, θ(ϕ(C)) correspond reversible DNA codes over F5 when C over R5(α1,α2,,αs).

    Theorem 4.7. If all letter N is deleted and θ(ϕ(C)) is a reversible DNA set with different length DNA strings, then DNA reversibility is protected.

    Proof. Because of the structure, the coterm φ generation matrix (set), zeros (letter N) don't effect the DNA reversibility. Hence, the proof follows.

    Example 4.8. Let g(x)=g(x)=β0+β1x+β2x2+β3x3+β4x4+β5x5+β6x6 over R5(1,1)=F5[u1,u2]/u211,u221,u1u2u2u1 where β0=I0+I1+I2+I3, β1=β6=I0+2I1+3I2+I3, β2=β5=2I0+4I1+I2+3I3, β3=β4=I0+2I1+4I2+3I3, and

    I0=(1+u1)(1+u2)22,I1=(1u1)(1+u2)22,I2=(1+u1)(1u2)22,I3=(1u1)(1u2)22.

    Let t = 0 be chosen. Then,

    GT0g=[φ(c1)c0]=[φ(β1)φ(β2)φ(β3)φ(β4)φ(β5)φ(β6)φ(β0)β0β1β2β3β4β5β6].

    [7,2,3]R5(1,1) code is obtained and θ(ϕ(C)) correspond reversible DNA codes over F5, where C=<GT0g>.

    In the present paper, we studied the structural properties of cyclic codes over the ring R(α1,α2,,αs), where αiFq{0}, 1is. Also, we introduced a method to generate idempotent for the above mentioned ring. Furthermore, we generated new quantum codes according to the database made available by [42] as well as optimal codes according to the database [4]. We also introduced a method to solving the reversibility problem both for Fq and DNA, respectively. The aim to introduce the Fq reversibility is to describe the IUPAC nucleotide codes (see [39] for details). Previous studies examined the DNA reversibility problem for 4 DNA bases (A,T,G,C). In this study, IUPAC nucleotide codes were considered 5 IUPAC DNA bases instead of 4 DNA bases. Here, DNA reversibility is expressed as Fq reversibility by pairing the prime number of bases with Fq and is solved. DNA reversibility solutions, which are special cases of Fq reversibility, are also presented in this study on 5 IUPAC DNA bases (A,T,G,C,N). Moreover, even if all N strands are deleted from a DNA Code, the remaining cluster is a cluster of different lengths that still provides DNA reversibility. This studies of quantum codes construction can be generalized from Hermitian-dual containing cyclic and constacyclic codes over a non-chain ring. Also, finding the proper distance constraint is a open problem for future studies.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    The authors are very thankful to the anonymous referees for their valuable comments and suggestions which have improved the manuscript immensely. Moreover, the authors extend their appreciation to Princess Nourah bint Abdulrahman University (PNU), Riyadh, Saudi Arabia for funding this research under Researchers Supporting Project Number (PNURSP2024R231). The research of the first and third authors is supported by the Institute of Mathematical Sciences (IMS), University of Malaya (UM), Malaysia under the following program: Visiting Professors/Scientists 2023-2024 at IMS-UM. The first named author is gratefully acknowledge the technical and financial support that he received during his visits to IMS, University of Malaya, Malaysia.

    The authors declare that they have no conflicts of interest.



    [1] A. Hammons, P. V. Kumar, A. R. Calderbank, N. J. A. Sloane, P. Solé, The Z4-linearity of Kerdock, Preparata, Goethals, and related codes, IEEE Trans. Inform. Theory, 40 (1994), 301–319. https://doi.org/10.1109/18.312154 doi: 10.1109/18.312154
    [2] S. Ling, C. Xing, Coding theory: a first course, Cambridge University Press, 2004.
    [3] F. J. MacWilliams, N. J. A. Sloane, The theory of error-correcting codes, North-Holland Mathematical Library, Elsevier, 1977.
    [4] M. Grassl, Code tables: bounds on the parameters of various types of codes. Available from: http://www.codetables.de/.
    [5] S. Zhu, Y. Wang, M. Shi, Some results on cyclic codes over F2+uF2, IEEE Trans. Inform. Theory, 56 (2010), 1680–1684. https://doi.org/10.1109/TIT.2010.2040896 doi: 10.1109/TIT.2010.2040896
    [6] P. W. Shor, Scheme for reducing decoherence in quantum computer memory, Phys. Rev. A., 52 (1995), 2493–2496. https://doi.org/10.1103/PhysRevA.52.R2493 doi: 10.1103/PhysRevA.52.R2493
    [7] A. R. Calderbank, E. M. Rains, P. M. Shor, N. J. A. Sloane, Quantum error-correction via codes over GF(4), IEEE Trans. Inf. Theory, 44 (1998), 1369–1387. https://doi.org/10.1109/18.681315
    [8] J. Qian, W. Ma, W. Gou, Quantum codes from cyclic codes over finite ring, Int. J. Quantum Inf., 50 (2009), 1277–1283. https://doi.org/10.1142/S0219749909005560 doi: 10.1142/S0219749909005560
    [9] X. Kai, S. Zhu, Quaternary construction of quantum codes from cyclic codes over F4+uF4, Int. J. Quantum Inf., 9 (2011), 689–700. https://doi.org/10.1142/S0219749911007757 doi: 10.1142/S0219749911007757
    [10] J. Gao, Quantum codes from cyclic codes over Fq+vFq+v2Fq+v3Fq, Int. J. Quantum Inf., 13 (2015), 1550063. https://doi.org/10.1142/S021974991550063X doi: 10.1142/S021974991550063X
    [11] M. Özen, N. T. Özzaim, H. Ince, Quantum codes from cyclic codes over F3+uF3+vF3+uvF3, J. Phys., 766 (2016), 012020. https://doi.org/10.1088/1742-6596/766/1/012020
    [12] M. Ashraf, N. Khan, G. Mohammad, New quantum and LCD codes over the finite field of odd characteristic, Int. J. Theor. Phys., 60 (2021), 2322–2332. https://doi.org/10.1007/s10773-021-04849-2 doi: 10.1007/s10773-021-04849-2
    [13] S. Ali, A. S. Alali, M. Jeelani, M. Kurulay, E. S. Oztas, P. Sharma, On the construction of quantum and LCD codes from cyclic codes over the finite commutative rings, Axioms, 12 (2023), 367. https://doi.org/10.3390/axioms12040367 doi: 10.3390/axioms12040367
    [14] S. Ali, S. A. Alali, E. S. Oztas, P. Sharma, Construction of quantum codes over the class of commutative rings and their applications to DNA codes, Mathematics, 11 (2023), 1430. https://doi.org/10.3390/math11061430 doi: 10.3390/math11061430
    [15] M. Ashraf, G. Mohammad, Quantum codes from cyclic codes over Fq+uFq+vFq+uvFq, Quantum Inf. Process., 15 (2016), 4089. https://doi.org/10.1007/s11128-016-1379-8 doi: 10.1007/s11128-016-1379-8
    [16] M. Ashraf, G. Mohammad, Quantum codes over Fp from cyclic codes over Fp[u,v]/u21,v3v,uvvu, Cryptogr. Commun., 11 (2019), 325–335. https://doi.org/10.1007/s12095-018-0299-0
    [17] S. Bhardwaj, M. Goyal, M. Raka, New quantum codes from constacyclic codes over a general non-chain ring, arXiv, 2022. https://doi.org/10.48550/arXiv.2212.02821
    [18] H. Islam, O. Prakash, Construction of LCD and new quantum codes from cyclic codes over a finite non-chain ring, Cryptogr. Commun., 14 (2022), 59–73. https://doi.org/10.1007/s12095-021-00516-9 doi: 10.1007/s12095-021-00516-9
    [19] H. Islam, O. Prakash, New quantum and LCD codes over the finite field of even characteristic, Def. Sci. J., 71 (2020), 656–661. https://doi.org/10.14429/dsj.71.16641 doi: 10.14429/dsj.71.16641
    [20] L. Adleman, Molecular computation of solutions to combinatorial problems, Science, 266 (1994), 1021–1024. https://doi.org/10.1126/science.7973651 doi: 10.1126/science.7973651
    [21] L. S. Liebovitch, Y. Tao, A. T. Todorov, L. Levine, Is there an error correcting code in the base sequence in DNA, Biophys. J., 71 (1996), 1539–1544. https://doi.org/10.1016/S0006-3495(96)79356-6 doi: 10.1016/S0006-3495(96)79356-6
    [22] M. M. Brandao, L. Spoladore, L. C. B. Faria, A. S. L. Rocha, M. C. Silva-Filho, R. Palazzo, Ancient DNA sequence revealed by error-correcting codes, Sci. Rep., 5 (2015), 12051. https://doi.org/10.1038/srep12051 doi: 10.1038/srep12051
    [23] A. G. Frutos, Q. Liu, A. J. Thiel, A. M. W. Sanner, A. E. Condon, L. M. Smith, et al., Demon-stration of a word design strategy for DNA computing on surfaces, Nucleic Acids Res., 25 (1997), 4748–4757. https://doi.org/10.1093/nar/25.23.4748 doi: 10.1093/nar/25.23.4748
    [24] O. D. King, Bounds for DNA codes with constant GC-content, Electron. J. Comb., 10 (2003), R33. https://doi.org/10.37236/1726 doi: 10.37236/1726
    [25] M. Li, H. J. Lee, A. E. Condon, R. M. Corn, DNA word design strategy for creating sets of non-interacting oligonucleotides for DNA microarrays, Langmuir, 18 (2002), 805–812. https://doi.org/10.1021/la0112209 doi: 10.1021/la0112209
    [26] A. Marathe, A. E. Condon, R. M. Corn, On combinatorial DNA word design, J. Comput. Biol., 8 (2001), 201–220. https://doi.org/10.1089/10665270152530818 doi: 10.1089/10665270152530818
    [27] E. S. Oztas, I. Siap, Lifted polynomials over F16 and their applications to DNA codes, Filomat, 27 (2013), 459–466. https://doi.org/10.2298/FIL1303459O doi: 10.2298/FIL1303459O
    [28] E. S. Oztas, I. Siap, On a generalization of lifted polynomials over finite fields and their applications to DNA codes, Int. J. Comput. Math., 92 (2015), 1976–1988. https://doi.org/10.1080/00207160.2014.930449 doi: 10.1080/00207160.2014.930449
    [29] T. Abualrub, A. Ghrayeb, X. Zeng, Construction of cyclic codes over GF(4) for DNA computing, J. Franklin Inst., 343 (2006), 448–457. https://doi.org/10.1016/j.jfranklin.2006.02.009
    [30] H. Q. Dinh, S. Pathak, A. K. Upadhyay, W. Yamaka, New DNA codes from cyclic codes over mixed alphabets, Mathematics, 8 (2020), 1977. https://doi.org/10.3390/math8111977 doi: 10.3390/math8111977
    [31] H. Q. Dinh, A. K. Singh, S. Pattanayak, S. Sriboonchitta, Construction of cyclic DNA codes over the ring Z4[u]/u21 based on the deletion distance, Theor. Comput. Sci., 773 (2019), 27–42. https://doi.org/10.1016/j.tcs.2018.06.002 doi: 10.1016/j.tcs.2018.06.002
    [32] H. Q. Dinh, A. K. Singh, S. Pattanayak, S. Sriboonchitta, Cyclic DNA codes over the ring F2+uF2+vF2+uvF2+v2F2+uv2F2, Des. Codes Cryptogr., 86 (2018), 1451–1467. https://doi.org/10.1007/s10623-017-0405-x doi: 10.1007/s10623-017-0405-x
    [33] K. Gowdhaman, S. Gupta, C. Mohan, K. Guenda, D. Chinnapillai, Cyclic DNA codes over the ring Z4+uZ4+u2Z4, J. Algebra Comb. Discrete Appl., 8 (2021), 219–231.
    [34] F. Gursoy, E. S. Oztas, B. Yildiz, Reversible DNA codes over a family of non-chain rings Rk,s, arXiv, 2017. https://doi.org/10.48550/arXiv.1711.02385
    [35] E. S. Oztas, B. Yildiz, I. Siap, A novel approach for constructing reversible codes and applications to DNA codes over the ring F2[u]/(u2k1), Finite Fields Appl., 46 (2017), 217–234. https://doi.org/10.1016/j.ffa.2017.04.001 doi: 10.1016/j.ffa.2017.04.001
    [36] I. Siap, T. Abulraub, A. Ghrayeb, Similarity cyclic DNA codes over rings, 2008 2nd International Conference on Bioinformatics and Biomedical Engineering, IEEE, 2008. https://doi.org/10.1109/ICBBE.2008.149
    [37] I. Siap, T. Abulraub, A. Ghrayeb, Cyclic DNA codes over the ring F2[u]/(u21) based on the deletion distance, J. Franklin Inst., 346 (2009), 731–740. https://doi.org/10.1016/j.jfranklin.2009.07.002 doi: 10.1016/j.jfranklin.2009.07.002
    [38] B. Yildiz, I. Siap, Cyclic codes over F2[u]/(u41) and applications to DNA codes, Comput. Math. Appl., 63 (2012), 1169–1176. https://doi.org/10.1016/j.camwa.2011.12.029 doi: 10.1016/j.camwa.2011.12.029
    [39] A. D. Johnson, An extended IUPAC nomenclature code for polymorphic nucleic acids, Bioinformatics, 26 (2010), 1386–1389. https://doi.org/10.1093/bioinformatics/btq098 doi: 10.1093/bioinformatics/btq098
    [40] T. Bag, A. K. Upadhyay, Study on negacyclic codes over the ring Zp[u]/uk+1u, J. Appl. Math. Comput., 59 (2019), 693–700. https://doi.org/10.1007/s12190-018-1197-5
    [41] M. Grassl, T. Beth, M. Röetteler, On optimal quantum codes, Int. J. Quantum Inf., 2 (2004), 55–64. https://doi.org/10.1142/S0219749904000079
    [42] N. Aydin, P. Liu, B. Yoshino, A database of quantum codes, arXiv, 2021. https://doi.org/10.48550/arXiv.2108.03567
    [43] W. Bosma, J. Cannon, Handbook of magma functions, University of Sydney, 1995.
  • This article has been cited by:

    1. Maryam Bajalan, Edgar Martínez-Moro, Polycyclic codes over serial rings and their annihilator CSS construction, 2024, 1936-2447, 10.1007/s12095-024-00757-4
    2. Divya Acharya, Prasanna Poojary, Vadiraja G. R. Bhatta, Hamming and Symbol-Pair Distances of Constacyclic Codes of Length 2ps over Fpm[u,v]⟨u2,v2,uv−vu⟩, 2025, 17, 2073-8994, 428, 10.3390/sym17030428
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1001) PDF downloads(90) Cited by(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog