1.
Introduction
Throughout the manuscript, we denote by Fq a field of order q, where q is an odd prime power, i.e., q=pm and m≥1 is a fixed integer. Moreover, we consider non-zero elements αi belonging to the field Fq, where 1≤i≤s and s≥1 is a fixed integer. We study over the ring
where s≥1 and 1≤i,j≤s. It can be readily verified that R is a non-chain semi-local ring of order q2s. Linear codes over finite rings have garnered significant attention since the seminal work of Hammons et al. [1]. The advantages of linearity, such as facilitating encoding and decoding algorithms [2,3], along with the ease of determining parameters like minimum distance, have made linear codes a focal point of research. A linear code of length n over a finite ring (resp. field) R is an R-submodule (resp. subspace) of Rn. The representation [n,k,d], where n is the code's length, k is its dimension (number of information bits), and d is the minimum distance. Coding theory aims to explore codes with large code rates and minimum distances. That being said, this raises the following queries: What is a code's maximum rate for the specified length and distance? How far can a code go at a given length and rate? Numerous theoretical constraints on [n,k,d] have been established [3] in order to address these issues. These include the Singleton bound, Plotkin bound, Hamming bound, Griesmer bound, and others. An optimal code under a certain bound is defined as a code [n,k,d] that achieves that bound. There are a few online databases that catalog the parameters of optimal and best-known codes. The database [4] is one of the popular platforms that contains the parameters of various types of linear codes over finite fields of size up to 9. In 2010, Zhu et al. [5] conducted a study on cyclic codes over a finite non-chain ring, specifically F2+uF2, where u2=u. They demonstrated that these codes are principally generated.
Cyclic codes have demonstrated their significant utility in the field of quantum-error-correcting (QEC) codes, which differ notably from classical-error-correcting (CEC) codes. Shor [6] invented the first quantum code in 1995. These codes are employed to regulate the errors that occur when sending quantum data via a quantum channel. In 1998, Calderbank et al. [7] addressed the challenge of creating QEC codes by utilizing CEC codes over the finite field GF(4). They also introduced a method for constructing QEC codes based on CEC codes. In 2009, Qian et al. [8] investigated binary quantum codes derived from odd-length cyclic codes over a finite ring F2+uF2 with u2=0. In 2011, to obtain quantum codes over F4, Kai and Zhu [9] employed dual containing cyclic codes over a finite chain ring F4+uF4,u2=0. In 2015, Gao [10] developed innovative quantum codes over the field Fq+vFq+v2Fq+v3Fq, where q=pm, p is a prime with 3|(p−1), v4=v, and m is a positive integer. Subsequently, Ozen et al. [11] derived ternary quantum codes from cyclic codes over F3+uF3+vF3+uvF3 with u2=1,v2=1, and uv=vu. In 2021, Ashraf et al. [12] discovered enhanced quantum and LCD codes over the ring Fpm+vFpm, where v2=1. Recently, researchers have focused on cyclic and constacyclic codes over finite non-chain rings to get good quantum codes over Fq [13,14,15,16,17,18,19]. In 2023, Ali et al. [13] obtained cyclic codes and new quantum codes over finite commutative ring. In [14], the structural properties of cyclic codes were explored over the ring F2m[v1,v2,…,vk]⟨v2i−αivi,vivj−vjvi⟩, for i,j=1,2,3,…,k. Further, they obtained optimal linear codes and quantum codes over the same ring.
Adleman [20] initially showcased the successful utilization of the DNA structure in tackling a combinatorial issue. In this instance, he employed DNA molecules to effectively address a directed salesman problem with seven nodes. The methodology, he employed hinged on the inherent Watson Crick Complement property of DNA strands. Researchers have long explored the correlation between DNA and error-correcting codes. Liebovitch et al. [21] conducted studies in this realm, focusing on the quest for error-correcting codes within actual DNA sequences. Additionally, Brandao et al. [22] delved into this connection in their recent work. Common constraints employed in DNA codes include the Hamming distance constraint, the reverse-complement constraint, the reverse constraint, and the fixed GC-content constraint. These constraints are frequently referenced in works such as [23,24,25,26]. A DNA code is defined when the DNA correspondence of the code C satisfies the criteria of reversibility or a reversible complementarity. In such cases, the code C, or its DNA correspondence, is termed a DNA code. The purpose of obtaining reversible DNA codes is to find the optimal solution in Adleman's experiment so that the DNA sequences are as different as possible from their reversible and reversible complements. Since the aim of algebraic codes is to ensure that the codes are different from each other, studies on the relationship between these two structures have begun. The number of elements of algebraic structures used in studies on DNA codes in the literature is 4 and the power of 4. Because there are 4 bases in DNA: adenine (A), guanine (G), cytosine (C) and thymine (T). The first study in which reversible DNA codes with more than 4 elements were produced without deleting elements is due to Oztas and Siap [27]. In 2013, Oztas and Siap [27] introduced and studied the reversibility problem with more than four elements. Consequently, this issue arises in algebraic structures with more than four elements, where each element corresponds to DNA multiple bases. The reversibility problem shows us, that if we have reversible codes over the algebraic structures with more than four elements, then we cannot obtain reversible DNA codes only with a map. For instance, consider a ring R with |R|=16, where each element corresponds to DNA double bases (or 2 bases), and let's consider a,b,c∈R and let DNA 2-bases.
Let τ(a)→TG,τ(b)→AC,andτ(c)→GA with a map τ. Let (a,b,c)∈R3 be a vector, it corresponds to (TG,AC,GA) (or (TGACGA)). The reverse of (a,b,c) is given as (a,b,c)r=(c,b,a). Moreover, (c,b,a) corresponds to (GA,AC,TG) (or (GAACTG)). (AG,CA,GT)≠(GA,AC,TG), despite of (a,b,c)r=(c,b,a). Consequently, when we obtain the reverse of the vector (as (a,b,c)r=(c,b,a), we can not obtain the reverse of DNA correspondences (i.e., (TGACGA)r≠(GAACTG)). The reversibility problem is given by (a,b,c)r=(c,b,a), but (τ(a),τ(b),τ(c))r≠(τ(c),τ(b),τ(a)). That means, if we have a reverse of a codeword, we cannot obtain the exact DNA reverse of the codeword. Therefore, we must generate special designs and maps to obtain the reversible DNA codes. The reversible codes are not enough to generate reversible DNA codes. In this paper, Fq reversibility means that the code is reversible over Fq. DNA reversibility means that the code is a reversible DNA code. The general version of this method is presented in [28]. Some studies that solve the DNA reversibility problem for rings with 4 elements and more than 4 elements were discussed in [29,30,31,32,33,34,35,36,37,38]. As of the current research, attempts have been made to obtain reversible DNA codes over 4 bases. However, when DNA sequencing is performed, the letter N is sometimes used in DNA strings. This letter N indicates that its location can contain any base. Therefore, by trying to generate DNA codes with the letters A, T, G, C and N, codes that can be directly matched with DNA sequences in the NCBI (The National Center for Biotechnology Information) system or other open sources can be produced. By generating reversible DNA codes, different DNA string structures can be created for the Adleman experiment. Finding the optimal distance for the diversity between strings within the generated DNA code is an open problem.
The main objectives of this article is to develop QEC codes over the ring R(α1,α2,…,αs) and investigate the structural characteristics of cyclic codes over this finite ring. When q=5, we introduce a reversibility problem over the ring for correspondence over Fq. The main contributions of this paper are the following:
(i) To investigate some optimal codes over R(1,1), see Table 1;
(ii) To provide new quantum codes over R(1,1,1), see Table 2;
(iii) to introduce a method for solving the Fq reversibility problem to DNA codes;
(iv) To solve the DNA reversibility problem over the ring Rq(α1,α2,…,αs), where αi=αs−i with 0≤i≤⌊s/2⌋ and s is an even integer which is a special case of the ring R(α1,α2,…,αs);
(v) To solve the DNA reversibility problem, by using 5 IUPAC DNA bases (A,T,G,C,N) in [39].
The rest of the paper is organized as follows. In Section 2, we introduce a formula to obtain orthogonal idempotents over the defined ring. In Section 3, we give the main theorems that provide the relations between cyclic codes, linear codes, and their Gray images. Moreover, we discuss some examples that give new quantum codes as applications. In Section 4, we introduce the Fq reversibility problem and give the method to solve it. Finally as an application, we solve the DNA reversibility problem over the ring Rq(α1,α2,…,αs).
2.
Preliminaries
Let Fq be a finite field of order q, where q be a prime power such that q=pm for a positive integer m. The ring R(α1,α2,…,αs)=Fq[u1,u2,…,us]/⟨u2i−(αi)2,uiuj−ujui⟩ where s≥1, 1≤i,j≤s and αi is a non-zero element of the finite field Fq. We begin our discussion with some basic definitions:
(i) The number of positions where two vectors differ, i.e., x=x1…xn and y=y1…yn, is their Hamming distance and is represented by d(x,y).
(ii) wt(x) represents the Hamming weight of a vector x=x1x2…xn, which is the number of non-zero xi.
(iii) The Euclidean inner product of x and y is defined as x⋅y=x0y0+x1y1+⋯+xn−1yn−1, given that x,y∈Fnq.
(iv) When C=C⊥, a code C is considered self-dual; when C⊆C⊥, it is considered self-orthogonal; and when C⊥⊆C, it is considered dual.
(v) A linear code C is said to be reversible if
whenever c=(c0,c1,c2,…,cn−1)∈C.
(vi) [14] Let C be a linear code of length n over R. Then C is called a complement if for any
reversible-complement if for any z∈C,zrc∈C.
(vii) [14] Let C be a linear code of length n over R. Then C (or the DNA correspondence of C) is called a reversible (reversible complement) DNA code if the DNA correspondence of C satisfies the properties of being reversible (reversible compliment).
κ represents the collection of positions occupied by non-zero digits within a binary number, forming a mapping to an integer ([14]). κ(e)=κ(e=(an...a2a1)2)={j|aj≠0}, where e∈Z+∪{0}. κ(23)=κ(23=(10111)2)={1,2,3,5} is an example for it.
Definition 2.1. The self orthogonal idempotent form over the ring R(α1,α2,…,αs) can be obtained by using the following formula:
where 0≤j≤2s−1. These idempotents satisfy that (Ij)2=Ij, ∑2s−1j=0Ij=1 and Ij1Ij2=0, where 0≤j1,j2≤2s−1.
According to the Chinese remainder theorem,
Thus, element of R(α1,α2,…,αs) can be expressed as r=∑2s−1j=0Ijrj, where rj∈Fq and 0≤j≤2s−1.
Example 2.2. Let us consider the construction of the idempotent set over the ring R(α1,α2,α3,α4)=Fq[u1,u2,u3,u4]/⟨u21−α21,u22−α22,u23−α23,u24−α24,u1u2−u2u1,u1u3−u3u1,u1u4−u4u1,u2u3−u3u2,u2u4−u4u2,u3u4−u4u3⟩ over Fq. As stipulated by the definition outlined above, the idempotents can be characterized as follows:
The Gray map over the ring R(α1,α2,…,αs) is defined as follows:
where rj∈Fq, 0≤j≤2s−1, M∈GL2s(Fq) and MMT=dI(2s)×(2s) (d∈Fq−{0}). The above Gray map can be extended from components of Rn(α1,α2,…,αs) to F2sq. The Lee weight of r∈Rn(α1,α2,…,αs) is defined as wL(r)=wH(ϱ(r)), where wH gives the Hamming weight over Fq. Our next result gives a characterization of the above mentioned Gray map.
Proposition 2.3. The map ϱ is an Fq-linear and distance preserving map from (Rn(α1,α2,…,αs),dL) to (F2snq,dH), where dH=dL.
Proof. Let r,r′∈(Rn(α1,α2,…,αs),dL) such that r=∑2s−1j=0Ijrj and r′=∑2s−1j=0Ijr′j, where rjr′j∈Fq and 0≤j≤2s−1. Then, we have
and for alle∈Fq
Also, we have
Hence, ϱ is an Fq-linear map and it satisfies the condition for being distance-preserving. □
The operations ⊕ and ⊗ are used as Γ1⊗Γ2⊗⋯⊗Γs={(γ1,γ2,…,γs)|γi∈Γi:1≤i≤s} and Γ1⊕Γ2⊕⋯⊕Γs={(γ1+γ2+⋯+γs)|γi∈Γi:1≤i≤s}. The following linear codes of length n are defined by using code C of length n over R(α1,α2,…,αs):
where 0≤i≤2s−1. Therefore, we can represent any linear code of length n as C=⨁2s−1j=0IjCj and |C|=∏2s−1j=0|Cj| over R(α1,α2,…,αs). If Gj is a generator matrix of Cj where 0≤j≤2s−1, then the generator matrix G of C is given by
and the generator matrix of ϱ(C) is given by
Proposition 2.4. Let C=⨁2s−1j=0IjCj be a linear code of length n over R(α1,α2,…,αs). Then, ϱ(C) is a [2sn,2s−1∑j=0kj,d]-linear code over Fq for 0≤j≤2s−1, where each Cj is an [n,kj,d]-code.
Proof. The proof follows easily with the property of the Gray map. □
Proposition 2.5. If C is a linear code of length n over R(α1,α2,…,αs), then
Proof. The result follows by [40, Theorem 4.1]. □
Theorem 2.6. Let C be a self-orthogonal linear code of length n over R(α1,α2,…,αs) and M be a 2s×2s non-singular matrix over Fq which has the property MMT=ϵI2s, where I2s is the identity matrix, 0≠ϵ∈Fq, and MT is the transpose of matrix M. Then, the Gray image ϱ(C) is a self-orthogonal linear code of length 2sn over Fq.
Proof. Suppose that C is a self-orthogonal linear code of length n over R(α1,α2,…,αs), i.e., C⊆C⊥. Now, let Q,S∈ϱ(C) such that
and
We have to show that ϱ(C) is self-orthogonal, that is, Q⋅S=0. Since C is self-orthogonal, q⋅s=n−1∑j=0qj.sj=0. Therefore,
Suppose that Q and S are arbitrary, then ϱ(C)⊆ϱ(C⊥). Thus, ϱ(C) is a self-orthogonal linear code of length 2sn over Fq. □
3.
Cyclic codes and quantum codes over R(α1,α2,…,αs)
On the ring R(α1,α2,…,αs), as previously outlined, we investigate several structural characteristics of cyclic codes and substantiate certain findings. We use a cyclic operator defined as η((c0,c1,c2,…,cn−1))=(cn−1,c0,c1,c2,…,cn−2) for codewords.
Theorem 3.1. Let C=⨁2s−1j=0IjCj be a linear code of length n over R(α1,α2,…,αs). Then each Cj is a cyclic code over Fq, where 0≤i≤2s−1 if and only if C is a cyclic code over R(α1,α2,…,αs).
Proof. Let c∈C be a codeword of length n. Also, let c=∑2s−1j=0Ijtj where tj∈Fq. If ϱ(tj)∈Cj, then ϱ(c)=∑2s−1j=0Ijϱ(tj) and ϱ(c)∈ϱ(C). The reverse direction of the proof is also clear. □
Theorem 3.2. Let C=⨁2s−1j=0IjCj be a cyclic code of length n over R(α1,α2,…,αs) and gj(x) be the generator polynomial of Cj. Then, C=⟨g(x)⟩ and |C|=q(2s)n−2s−1∑i=0deg(gi(x)), where g(x)=∑2s−1j=0Ijgj(x).
Proof. Given Cj=⟨gj(x)⟩, where 0≤i≤2s−1 and C=⨁2s−1j=0IjCj. Let c∈C be such that c={c(x)|∑2s−1j=0Ijgj(x) for gj(x)∈Cj}. Therefore,
For any
where
Hence,
This implies
Since |C|=∏2s−1j=0|Cj|, we have
□
Theorem 3.3. Let C=⨁2s−1j=0IjCj be a cyclic code of length n over R(α1,α2,…,αs). Then, there exists a unique monic polynomial g(x)∈R(α1,α2,…,αs)[x] such that C=⟨g(x)⟩ and g(x) divides (xn−1). Moreover, if gj(x) is the generator polynomial of Cj, then g(x)=∑2s−1j=0Ijgj(x).
Proof. The proof follows by the reverse direction of the proof of Theorem 3.2. □
Theorem 3.4. Let C=⨁2s−1j=0IjCj be a cyclic code of length n over R(α1,α2,…,αs). Then, C⊥=⨁2s−1j=0IjC⊥j is also a cyclic code of length n over R(α1,α2,…,αs).
Proof. Let C=⨁2s−1j=0IjCj be a cyclic code. By Theorem 3.1, Cj is a cyclic code. Thus, C⊥j is a cyclic code. Hence, by Theorem 3.1, C⊥=⨁2s−1j=0IjC⊥j is a cyclic code. □
Lemma 3.5 ([7]). Let C=⟨g(x)⟩ be a cyclic code of length n over Fq. Then C⊥⊆C if and only if xn−1≡0(modg(x)g∗(x)), where the reciprocal polynomial of g(x) is denoted by g∗(x).
Theorem 3.6. Let C=⨁2s−1j=0IjCj be a cyclic code of length n over R(α1,α2,…,αs) and C=⟨g(x)⟩=⟨2s−1∑j=0Ijgj(x)⟩, where Cj=⟨gj(x)⟩. Then, C⊥⊆C if and only if
Proof. In view of Lemma 3.5 and Theorem 3.1, we conclude the result. □ Now, we give a definition and a lemma about QEC codes. We begin with the following definition:
Definition 3.7 ([19]). A quantum code represented by [[n,k,d]]q is defined as a subspace of H(C)n=H⊗H⊗…⊗H⏟n−times (is also a qn-dimensional Hilbert space) with dimension qk and minimum distance d. Moreover, we consider [[n,k,d]]q to be better than [[n′,k′,d′]]q if either or both of the following conditions hold:
(i) d>d′ whenever the code rate kn=k′n′ (larger distance);
(ii) kn>k′n′ whenever the distance d=d′ (larger code rate).
Lemma 3.8 ([41]). (Theorem 3) (CSS construction) Let C1=[n,k1,d1]q and C2=[n,k2,d2]q be two linear codes over GF(q) with C⊥2⊆C1. Furthermore, let
Then, there exists a QEC code with the parameters [[n,k1+k2−n,d]]q. In particular, if C⊥1⊆C1, then there exists a QEC code with the parameters [[n,2k1−n,d1]]q, where d1=min{wgt(v):v∈(C1∖C⊥1)}.
Theorem 3.9. Let C=⨁2s−1j=0IjCj be a cyclic code of length n over R(α1,α2,…,αs), and next let the parameters of its Gray image be [2sn,∑2s−1j=0kj,dH]. If C⊥⊆C, then there exists a QEC code [[2sn,2∑2s−1j=0kj−2sn,dH]]q over Fq.
In the following examples, we obtain optimal as well as new quantum codes.
Example 3.10. Let R(1,1)=F3[u1,u2]/⟨u21−(1)2,u22−(1)2,u1u2−u2u1⟩ be a finite commutative ring. For n=4, we have that x4−1=(x+1)(x+2)(x2+1)∈F3[x]. Let g0(x)=(x2+1), g1(x)=(x+1), g2(x)=(x+1), g3(x)=(x+1) and
where M4MT4=2I4. Then, cyclic code C is of length 4 over R(1,1) and its Gray image is [16,11,4]3 which is an optimal code as per the database made available by [4].
Example 3.11. Let R(1,1,1)=F3[u1,u2,u3]/⟨u21−(1)2,u22−(1)2,u23−(1)2,u1u2−u2u1,u1u3−u3u1,u3u2−u2u3⟩ be a finite commutative ring. Then, for n=26, we have x26−1=(x+1)(x+2)(x3+2x+1)(x3+2x+2)(x3+x2+2)(x3+x2+x+2)(x3+x2+2x+1)(x3+2x2+1)(x3+2x2+x+1)(x3+2x2+2x+2)∈F3[x]. Let g0(x)=(x3+2x2+2x+2)(x3+2x2+x+1), g1(x)=(x3+2x2+2x+2), g2(x)=(x3+2x2+x+1), g3(x)=1, g4(x)=(x3+2x2+x+1), g5(x)=1, g6(x)=1, g7(x)=1 and
where M5MT5=2I8. Then, cyclic code C is of length 26 over R(1,1,1) and its Gray image is [208,193,4]3. Moreover, x26−1≡0(modgi(x)g∗(x)) for 0≤i≤7. Hence, we obtain [[208,178,4]]3 quantum code, that is, a new quantum code according to the database [42].
In Table 1, we obtain optimal codes over R(1,1) and in Table 2, we obtain new quantum codes (NQC) over R(1,1,1). The Magma computation system [43] is used to complete all of the computations in the above examples and tables.
4.
DNA codes
In the present section, we give a general reversibility problem for Fq reversibility by using the ring Rq(α1,α2,…,αs), where αi=αs−i and 0≤i≤⌊s/2⌋ and s is even positive integer. Moreover, a special case of Fq reversibility corresponds to DNA reversibility over F5.
If the reverse writing of each codeword of a code (or DNA code) is included in the code, then this code is called a reversible code (or reversible DNA code). The reverse of a codeword c is denoted by cr. Moreover, the Fq reversibility problem is similar to the DNA reversibility problem for the rings that its decomposition has more than one field as Rq(α1,α2,…,αs)=⨁2s−1j=0IjFq. Let (a0,a1,a2)∈Rq(α1,α2) and (a0,a1,a2) correspond to (a0,0,a0,1,a0,2,a0,3⏟a0,a1,0,a1,1,a1,2,a1,3⏟a1,a2,0,a2,1,a2,2,a2,3⏟α2)=t1 over F5. Also, (a0,a1,a2)r=(a2,a1,a0) corresponds to (a2,0,a2,1,a2,2,a2,3⏟a2,a1,0,a1,1,a1,2,a1,3⏟a1,a0,0,a0,1,a0,2,a0,3⏟a0)=t2. But, the reverse of t1 is not equal to {t2, then} tr1≠t2. It is called as Fq reversibility problem.
We give a map as follow to define a correspondence between DNA and F5, that is,
Each element α∈Rq(α1,α2,…,αs) is expressed by α=a0I0+a1I1+…+a2s−1I2s−1, where a0,a1,…,a2s−1∈Fq. By using the structure Rq(α1,α2,…,αs)=I0Fq⊕I1Fq⊕…⊕I2s−1Fq for any element of Rq(α1,α2,…,αs), we use the Gray map as follows:
The map can be extended to n-tuples coordinate-wise. We define an automorphism as follows to satisfy the conditions of reversibility for DNA codes:
By using the automorphism φ, we can write the following lemma.
Lemma 4.1. φ(Ii)=I2s−1−i ∀, where Ii are idempotents of Rq(α1,α2,…,αs) and (i∈{0,1,…,2s−1}).
The following theorem gives the rule for obtaining the reverse for the maps of the elements of Rq(α1,α2,…,αs).
Theorem 4.2. Let α∈Rq(α1,α2,…,αs), where αi=αs−i (0≤i≤⌊s/2⌋) and α=a0I0+a1I1+⋯+a2s−1I2s−1. ϕ(α)=(a0,a1,…,a2s−1). (ϕ(α))r=φ(ϕ(α)). Then, φ(ϕ(α)) is a reverse order of ϕ(α) over Fq.
Proof. Proof of the Theorem 4.2 follows directly from the Definition 2.1, and Lemma 4.1. □
Corollary 4.3. Let α∈R5(α1,α2,…,αs), where αi=αs−i (0≤i≤⌊s/2⌋). Then, θ(ϕ(φ(α))) is the DNA reverse of θ(ϕ(α)). Moreover, each element of R5(α1,α2,…,αs) corresponds to 2s-DNA bases (or called DNA 2s bases).
The maps φ, ϕ and θ can be extended for vectors over Rq(α1,α2,…,αs). Let us consider R5(α1,α2,…,αs)=F5[u1,u2,…,us]/⟨u2i−(αi)2,uiuj−ujui⟩, where αi=αs−i (0≤i≤⌊s/2⌋). Each element correspond to a 2s-DNA base (that has a length of 2s) in the ring R5(α1,α2,…,αs). We apply Theorem 4.2 for DNA in the following example.
Example 4.4. Let us consider the ring R5(1,1,1,1). Then, we have
Thus, ϕ(φ(α)) is a reverse of ϕ(α) over F5. This gives
Hence, θ(ϕ(φ(α))) is the DNA reverse of θ(ϕ(α)) and these are DNA 16 bases.
We introduce a method to generate Fq reversible codes and discuss one of the applications to generating the reversible DNA code by using R5(α1,α2,…,αs). Following definition a version of coterm polynomial [35]. The following definition is used for generating Fq reversible and DNA reversible codes over Rq(α1,α2,…,αs) and R5(α1,α2,…,αs), respectively.
Definition 4.5. Let g(x)=β0+β1x+⋯+βn−1xn−1∈R5(α1,α2,…,αs)[x]/(xn−1) be a polynomial, where αi=αs−i (0≤i≤⌊s/2⌋). If for all 1≤i≤⌊n/2⌋ such that βi=βn−i, then g(x) is called a coterm polynomial over Rq(α1,α2,…,αs). Moreover,
Θ(g(x))=(β0,β1,…,βn−1) is called coterm tuple.
Theorem 4.6. Let c be a coterm tuple of coterm polynomial g(x)=β0+β1x+⋯+βn−1xn−1 over Rq(α1,α2,…,αs)[x]/(xn−1), where αi=αs−i (0≤i≤⌊s/2⌋). Then, the coterm φ-generation set
where t<⌊(n−1)/2⌋. And, the coterm φ-generation matrix:
Thus, C=⟨Ttg⟩ (C=⟨GTtg⟩) generate codes over Rq(α1,α2,…,αs) and ϕ(C) correspond the Fq reversible codes. Next, let code C be over R5(α1,α2,…,αs). Then, θ(ϕ(C)) correspond reversible DNA codes over F5.
Proof. Let g(x) be a coterm polynomial and c be a coterm tuple of g(x). In the coterm φ-generation set (or matrix), each row has its reverse and each codewords has its reverse as follows (ϕ(αc)i)r=(φ(ϕ(αc−i−1)), where 0≤i≤t. Thus, ϕ(C) corresponds to the Fq reversible codes because of the spanning set conditions of ([35], Lemma 3.2.) Moreover, θ(ϕ(C)) correspond reversible DNA codes over F5 when C over R5(α1,α2,…,αs). □
Theorem 4.7. If all letter N is deleted and θ(ϕ(C)) is a reversible DNA set with different length DNA strings, then DNA reversibility is protected.
Proof. Because of the structure, the coterm φ generation matrix (set), zeros (letter N) don't effect the DNA reversibility. Hence, the proof follows. □
Example 4.8. Let g(x)=g(x)=β0+β1x+β2x2+β3x3+β4x4+β5x5+β6x6 over R5(1,1)=F5[u1,u2]/⟨u21−1,u22−1,u1u2−u2u1⟩ where β0=I0+I1+I2+I3, β1=β6=I0+2I1+3I2+I3, β2=β5=2I0+4I1+I2+3I3, β3=β4=I0+2I1+4I2+3I3, and
Let t = 0 be chosen. Then,
[7,2,3]R5(1,1) code is obtained and θ(ϕ(C)) correspond reversible DNA codes over F5, where C=<GT0g>.
5.
Conclusions
In the present paper, we studied the structural properties of cyclic codes over the ring R(α1,α2,…,αs), where αi∈Fq∖{0}, 1≤i≤s. Also, we introduced a method to generate idempotent for the above mentioned ring. Furthermore, we generated new quantum codes according to the database made available by [42] as well as optimal codes according to the database [4]. We also introduced a method to solving the reversibility problem both for Fq and DNA, respectively. The aim to introduce the Fq reversibility is to describe the IUPAC nucleotide codes (see [39] for details). Previous studies examined the DNA reversibility problem for 4 DNA bases (A,T,G,C). In this study, IUPAC nucleotide codes were considered 5 IUPAC DNA bases instead of 4 DNA bases. Here, DNA reversibility is expressed as Fq reversibility by pairing the prime number of bases with Fq and is solved. DNA reversibility solutions, which are special cases of Fq reversibility, are also presented in this study on 5 IUPAC DNA bases (A,T,G,C,N). Moreover, even if all N strands are deleted from a DNA Code, the remaining cluster is a cluster of different lengths that still provides DNA reversibility. This studies of quantum codes construction can be generalized from Hermitian-dual containing cyclic and constacyclic codes over a non-chain ring. Also, finding the proper distance constraint is a open problem for future studies.
Use of AI tools declaration
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
Acknowledgments
The authors are very thankful to the anonymous referees for their valuable comments and suggestions which have improved the manuscript immensely. Moreover, the authors extend their appreciation to Princess Nourah bint Abdulrahman University (PNU), Riyadh, Saudi Arabia for funding this research under Researchers Supporting Project Number (PNURSP2024R231). The research of the first and third authors is supported by the Institute of Mathematical Sciences (IMS), University of Malaya (UM), Malaysia under the following program: Visiting Professors/Scientists 2023-2024 at IMS-UM. The first named author is gratefully acknowledge the technical and financial support that he received during his visits to IMS, University of Malaya, Malaysia.
Conflicts of interest
The authors declare that they have no conflicts of interest.