Next Article in Journal
Remarks on Some Growth Functions
Next Article in Special Issue
Graded Rings Associated with Factorizable Finite Groups
Previous Article in Journal
Multi-Method Diagnosis of Histopathological Images for Early Detection of Breast Cancer Based on Hybrid and Deep Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Construction of Quantum Codes over the Class of Commutative Rings and Their Applications to DNA Codes

1
Department of Mathematics, Faculty of Science, Aligarh Muslim University, Aligarh 202002, India
2
Department of Mathematical Sciences, College of Science, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
3
Department of Mathematics, Kamil Ozdag Science Faculty, Karamanoglu Mehmetbey University, Karaman 70100, Türkiye
*
Author to whom correspondence should be addressed.
Submission received: 16 February 2023 / Revised: 8 March 2023 / Accepted: 9 March 2023 / Published: 15 March 2023
(This article belongs to the Special Issue Combinatorial Algebra, Computation, and Logic, 2nd Edition)

Abstract

:
Let k , m be positive integers and F 2 m be a finite field of order 2 m of characteristic 2. The primary goal of this paper is to study the structural properties of cyclic codes over the ring S k = F 2 m [ v 1 , v 2 , , v k ] v i 2 α i v i , v i v j v j v i , for i , j = 1 , 2 , 3 , , k , where α i is the non-zero element of F 2 m . As an application, we obtain better quantum error correcting codes over the ring S 1 (for k = 1 ). Moreover, we acquire optimal linear codes with the help of the Gray image of cyclic codes. Finally, we present methods for reversible DNA codes.
MSC:
94B05; 94B15; 94B60; 92D20; 17D92

1. Introduction

Quantum codes are used in both quantum computing and quantum communication in order to protect the information from channel noise that may occur during transmission. From that point, the development of classical cyclic codes into quantum error-correcting codes and their generalizations began to accelerate. Shor [1] initially developed quantum-error-correcting codes in 1995. Steane [2] developed the structural features of straightforward quantum-error-correcting codes a year later, in 1996. After two years, Calderbank et al. [3] developed a revolutionary method for constructing quantum-error-correcting codes from classical-error-correcting codes. Many effective quantum errors correcting codes with dual or self-orthogonal contained properties have been constructed using classical cyclic codes over the finite field F q . Using cyclic codes of odd length, Qian [4] constructed quantum error correcting codes for the first time on the finite non-chain ring F 2 + u F 2 with u 2 = 0 . Later, a great deal of study was conducted on quantum codes that were constructed from cyclic codes, constacyclic codes, and skew constacyclic codes over a non-chain ring with odd characteristics (see for references [5,6,7,8]). In 2014, Cengellenmis et al. [9] provided the structure of codes over the ring F 2 [ v 1 , v 2 , , v k ] v i 2 = v i , v i v j = v j v i by using a Gray map. After that in 2018, Zheng et al. [10] gave the generator polynomial of constacyclic codes over the ring F p m [ u 1 , u 2 , , u k ] u i 2 = u i , u i u j = u j u i and also provided the structural properties of linear codes over this ring. Additionally, several quantum codes with even characteristics were constructed over the finite ring (see for references [11,12,13]). Over a finite non-chain ring F 2 m + u F 2 m with u 2 = u , Islam and Prakash [14] recently obtained some new quantum and LCD codes. This inspires us to explore the properties of cyclic codes over a ring S k = F 2 m [ v 1 , v 2 , , v k ] v i 2 α i v i , v i v j v j v i , for i , j = 1 , 2 , 3 , , k , where α i is the non-zero elements of F 2 m . In [15], Adleman calculated the NP-complete problem in the test tube in the 1990s. This experiment encouraged me to start heavily the studies that are the union of mathematics and DNA strings. DNA strings had to have a proper distance (difference) between them to prevent wrong connections in Aldeman’s experiment. Then researchers found a proper connection to solve this problem by using error correction codes. The main idea for the solution is generating reversible complement DNA codes with proper distance. Firstly, methods of generating reversible DNA codes were given by [16,17,18]. Because the side of complement is easier than creating the reversible DNA codes. In [19], double DNA bases are used, but they delete half of the DNA double base of each element in the code. Thus, they do not use double DNA bases in DNA codes. If the algebraic structure has four elements then reversible codes can map to DNA codes directly. Because, the number of DNA bases is four which are (A) adenine, (G) guanine, (T) thymine, and (C) cytosine. However, if an algebraic structure has more than four elements, the reversibility problem arises. The first use of double DNA bases in DNA codes was presented by [20]. Moreover, the reversibility problem was presented and solved in [20]. The reversibility problem can be explained in algebraic structures that have more than four elements. In the algebraic structure, each element corresponds to DNA multiple bases. For example, Let us consider a ring R and | R | = 16 . Each element corresponds to DNA double bases (or 2 bases). Let ( a , b , c ) i n R 3 correspond to ( A T , G T , C A ) ( A T G T C A ) . Reverse of ( a , b , c ) is ( a , b , c ) r = ( c , b , a ) . Furthermore, ( c , b , a ) corresponds ( C A , G T , A T ) . However, the reverse of ( A T , G T , C A ) cannot correspond to the ( C A , G T , A T ) . Reverse of ( A T , G T , C A ) is ( A C , T G , T A ) . In short, the reversibility problem is that we can not obtain the reverse of DNA correspondence by using the reverse of a vector.
In this work, we explore the structural properties of cyclic codes over the ring S k = F 2 m [ v 1 , v 2 , , v k ] v i 2 α i v i , v i v j v j v i and introduce methods to solve the reversibility problem over S k t = F 4 2 t [ v 1 , v 2 , , v k ] v i 2 v i , v i v j v j v i . First, we create a technique to create the idempotents of S k t by using a binary numeral system. Thus, we can arrange the idempotents to solve the reversibility problem with DNA correspondence tables over F 4 2 t . After that, we present the methods to generate reversible and reversible DNA codes. The methods enable us to create DNA codes that do not need to be cyclic codes or skew cyclic codes over S k t . This design satisfies to generate more DNA codes by using one source polynomial. This is important for real DNA strings to correspond to the codes. In [21], They found some codewords corresponding to a real DNA string with an error over Z 4 . They used long computational processes to find codewords that correspond to real DNA strings with an error. We can create codes and codewords that correspond to real DNA strings by the presented methods in this paper with proper computational processes.
The structure of this paper is as follows. In Section 2, we give some fundamental definitions, define a Gray map over the ring S k , and explore the structure of linear codes and their dual over the ring S k . In Section 3, we look into the cyclic codes decomposition, their dual on the ring S k , and their corresponding generators. We also provide the necessary and sufficient conditions for cyclic codes to contain their duals. In Section 4, we provide some examples of better quantum codes and with the help of the Gray image of cyclic code, we also obtain optimal codes over S 1 ( k = 1 ) . Moreover, in Section 5, we present methods to generate DNA codes with flexible designs as applications for DNA codes.

2. Preliminaries

First, we consider that F 2 m is a Galois field of order 2 m of a characteristic 2, and m is a positive integer. For a positive integer k, let us consider that S k = F 2 m [ v 1 , v 2 , , v k ] v i 2 α i v i , v i v j v j v i , for i , j = 1 , 2 , 3 , , k , where α i is the non-zero element of F 2 m . We begin our discussion with some basic definitions:
(i)
The Hamming distance between two vectors x = x 1 x n and y = y 1 y n is the number of places where they differ, and is denoted by d ( x , y ) .
(ii)
The Hamming weight of a vector x = x 1 x 2 x n is the number of nonzero x i and is denoted by w t ( x ) .
(iii)
Let x , y F q n , the Euclidean inner product of x and y is defined as x · y = x 0 y 0 + x 1 y 1 + + x n 1 y n 1 .
(iv)
Each element of code C is referred to as a codeword and a code of length n over R is said to be linear if it is an R-submodule of R n .
(v)
A code C is said to be self-dual if C = C , self-orthogonal if C C and dual containing if C C .
(vi)
A linear code C is said to be linear complementary dual or in short LCD if C C = { 0 } , where C is the dual code of C.
(vii)
A linear code C of length n over R is said to be a cyclic code if every cyclic shift of a codeword c in C is again a codeword in C , i.e., if c = ( c 0 , c 1 , c 2 , , c n 1 ) C , then its cyclic shift δ ( c ) = ( c n 1 , c 0 , , c n 2 ) C , where the operator δ is known as cyclic shift.
(viii)
A linear code C is said to be reversible if c r = ( c n 1 , c n 2 , , c 0 ) C whenever c = ( c 0 , c 1 , c 2 , , c n 1 ) C .
(ix)
Let C be a linear code of length n over R. Then C is called complement if for any z = ( z 0 , z 1 , , z n 1 ) C , z c = ( z 0 ¯ , z 1 ¯ , , z n 1 ¯ ) C , reversible-complement if for any z C , z r c C .
(x)
Let C be a code of length n over R. Then C (or the DNA correspondence of C) is called a reversible (reversible complement) DNA code if the DNA correspondence of C satisfies the properties of being reversible (reversible compliment).
(xi)
It is important to note that the set of n-fold tensor product ( H q ) n = H q H q H q (n- times) is the Hilbert space with dimension q n and that H q is the Hilbert space with dimension q, where H is the complex field. A quantum code of length n over the field F q (q is a power of prime.) is denoted by [ [ n , k , d ] ] q , where k is the dimension and d is the minimum distance. We know that each quantum code satisfies the singleton bound, i.e., n k + 2 2 d . A quantum code is said to be MDS (maximum distance separable) if n k + 2 = 2 d . A quantum code [ [ n , k , d ] ] q is better than the other quantum code [ [ n , k , d ] ] q if any one or both the following conditions hold:
(a)
k n > k n , where d = d (larger code rate with same distance).
(b)
d > d where k n = k n (larger distance with the same code rate).
Lemma 1
(CSS Construction [22]). If C is an [ n , k , d ] linear code of length n with C C over F q , then there exists a quantum error correcting code with parameters [ [ n , 2 k n , d ] ] q over F q .
Lemma 2
([3]). A cyclic code C of length n with generator polynomial g ( x ) over F q that contains its dual if and only if
x n 1 0 ( m o d g ( x ) g * ( x ) ) ,
where g * ( x ) is the reciprocal polynomial of g ( x ) .
Further, with the help of the Kronecker product, we define the Gray map over S k . Kronecker product has the following properties:
(i)
( P Q ) 1 = P 1 Q 1 for matrices P = ( p i j ) m × m and Q = ( q i j ) n × n .
(ii)
( P Q ) C = P ( Q C ) for arbitrary matrices P , Q and C.
(iii)
( P Q ) T = P T Q T , where P T and Q T represent the transpose of matrices P and Q, respectively.
The Kronecker product of matrices P and Q is the p m × q n block matrix
P Q = p 11 Q p 12 Q p 1 n Q p 21 Q p 22 Q p 2 n Q p m 1 Q p m 2 Q p m n Q
where P = ( p i j ) is an m × n matrix and Q = ( q i j ) is a p × q matrix. More specifically,
P Q = p 11 q 11 p 11 q 12 p 11 q 1 q p 1 n q 11 p 1 n q 12 p 1 n q 1 q p 11 q 21 p 11 q 22 p 11 q 2 q p 1 n q 21 p 1 n q 22 p 1 n q 2 q p 11 q p 1 p 11 q p 2 p 11 q p q p 1 n q p 1 p 1 n q p 2 p 1 n q p q         p m 1 q 11 p m 1 q 12 p m 1 q 1 q p m n q 11 p m n q 12 p m n q 1 q p m 1 q 21 p m 1 q 22 p m 1 q 2 q p m n q 21 p m n q 22 p m n q 2 q p m 1 q p 1 p m 1 q p 2 p m 1 q p q p m n q p 1 p m n q p 2 p m n q p q
for 1 ≤ im, 1 ≤ jn, 1 ≤ i′ ≤ p, 1 ≤ j′ ≤ q.
The ring S k = F 2 m [ v 1 , v 2 , , v k ] v i 2 α i v i , v i v j v j v i and the ring S k can also be expressed as F 2 m + F 2 m v 1 + F 2 m v 2 + F 2 m v 1 v 2 + + F 2 m v 1 v 2 v k such that v i 2 = α i v i , v i v j = v j v i for i , j = 1 , 2 , 3 , , k . S k is a finite commutative ring. Next, let us consider that T be the power set of { 1 , 2 , 3 , . . , k } . Henceforth, every element s S k can be uniquely expressed as s = T T β T v T for some β T F q , T T , v T = i T v i and v ϕ = 1 . Let e i k { v T T , v ϕ = 1 } and also e i k e j k , where i j and i , j = 1 , 2 , 3 , , 2 k .
We take k = 1 , then S 1 = F 2 m v 1 2 α 1 v 1 . The ring S 1 can be expressed as S 1 = F 2 m + v 1 F 2 m such that v 1 2 = α 1 v 1 . Henceforth, the basis of S 1 is the { 1 , v 1 } . Let e 1 1 = 1 , e 2 1 = v 1 . For the ring S k , using Kronecker Product, the bases of S k can be written as
( e 1 k , e 2 k , , e 2 k k ) = ( 1 , v k ) ( e 1 k 1 , e 2 k 1 , , e 2 k 1 k 1 ) ,
where ( e 1 1 , e 2 1 ) = ( 1 , v 1 ) . Further, we obtain the set of an orthogonal set of idempotents of the ring S k such that ζ i k = j = 1 k Δ j , where Δ j { v j α j , α j v j α j } and ζ i k ζ j k for i , j = 1 , 2 , 3 , , 2 k . It is easily to see that
i = 1 2 k ζ i k = 1 , ( ζ i k ) 2 = ζ i k , ζ i k ζ j k = 0 ( f o r   i j ) ,
where i , j = 1 , 2 , 3 , , 2 k . Therefore, the set { ζ i k | i = 1 , 2 , , 2 k } is also a basis of the ring S k . Again, we take k = 1 , then ζ 1 1 = v 1 α 1 , ζ 2 1 = α 1 v 1 α 1 . Similarly as in (1), we have
( ζ 1 k , ζ 2 k , , ζ 2 k k ) = ( v k α k , α k v k α k ) ( ζ 1 k 1 , ζ 2 k 1 , , ζ 2 k 1 k 1 ) ,
where ( ζ 1 1 , ζ 2 1 ) = ( v 1 α 1 , α 1 v 1 α 1 ) .
With the help of Chinese Remainder Theorem, we write
S k = S k ζ 1 k S k ζ 2 k S k ζ 2 k k = F 2 m ζ 1 k F 2 m ζ 2 k F 2 m ζ 2 k k .
Every element s in S k has the unique representation s = i = 1 2 k β i e i k = i = 1 2 k γ i k ζ i k , where β i , γ i k F 2 m and i = 1 , 2 , , 2 k . Now, we define a Gray map:
Θ k : S k F 2 m 2 k
is defined by
Θ k ( s ) = Θ k ( i = 1 2 k β i e i k ) = ( β 1 , β 2 , , β 2 k ) A 2 k .
In above described Gray map, A 2 k G L 2 k ( F 2 m ) is a matrix and G L 2 k ( F 2 m ) is the linear group of all 2 k × 2 k invertible matrices over the field F 2 m such that A 2 k A 2 k T = ϵ I 2 k × 2 k , where A 2 k T is the transpose of A 2 k , I 2 k × 2 k is an identity matrix of order 2 k and ϵ F 2 m \ { 0 } . In order to make our representation easier, we write ( β 1 , β 2 , , β 2 k ) ( A 2 k ) = ( γ 1 k , γ 2 k , , γ 2 k k ) . Above described Gray map can easily be extended to S k n as
Θ k : S k n F 2 m 2 k n
and is defined as
Θ k ( s 0 , s 1 , , s n 1 ) = ( γ i , j k ) 1 i 2 k , 1 j n 1 .
We denote each s j = i = 1 2 k β i , j e i k . Henceforth
Θ k ( s j ) = ( β 1 , j , β 2 , j , . . , β 2 k , j ) ( A 2 k ) = ( γ 1 , j k , γ 2 , j k , , γ 2 k , j k ) ,
where β i , j F 2 m , i = 1 , 2 , 3 , , 2 k and j = 1 , 2 , , n 1 .
When we take k = 1 , we can define the Gray map in a similar way as (2)
Θ 1 ( S 1 ) F 2 m 2
defined map Θ 1 ( β 1 e 1 1 + β 2 e 2 1 ) = Θ 1 ( β 1 + β 2 v 1 ) = ( β 1 , β 2 ) A 2 , A 2 G L 2 ( F 2 m ) is a matrix and G L 2 ( F 2 m ) is the linear group of all 2 × 2 invertible matrices over the field F 2 m such that A 2 A 2 T = ϵ I 2 × 2 , where A 2 T is the transpose of A 2 , I 2 × 2 is an identity matrix of order 2 and ϵ F 2 m \ { 0 } .
The Lee weight of every element s = i = 1 2 k β i e i k of the ring S k is defined as w L ( s ) = w H ( Θ k ( s ) ) = w H ( γ 1 k , γ 2 k , , γ 2 k k ) . Let C be a linear code of length n over S k . It can be easily seen that Θ k ( C ) is a linear code of length 2 k n over F 2 m . Any linear code C of length n over S k , we state
C j = { x j F 2 m n | i = 1 2 k ζ i k x i C , x i F 2 m n , i j   a n d   1 i 2 k } ,
where j = 1 , 2 , , 2 k . Then C j is a linear code of length n over F 2 m , for j = 1 , 2 , 3 , , 2 k . Next, let us consider that B i is the linear code over F 2 m , where i = 1 , 2 , , 2 k . We denote B 1 B 2 B 2 k = { b 1 + b 2 + + b 2 k | b i B i , 1 i 2 k } and similarly we define the product as B 1 B 2 B 2 k = { ( b 1 , b 2 , , b 2 k ) | b i B i , 1 i 2 k } . Hence, a linear code C of length n over S k can be easily seen that C = i = 1 2 k ζ i k C i = ζ 1 k C 1 ζ 2 k ζ 2 k k C 2 k . A matrix is called generator matrix of C if the rows of the matrix generates C. Let G i be the generator matrix for the code C i , for i = 1 , 2 , 3 , , 2 k . Then a generator matrix for the code C is
G = ζ 1 k G 1 ζ 2 k G 2 . . . ζ 2 k k G 2 k
and a generator matrix of Θ k ( C ) is
Θ k ( G ) = Θ k ( ζ 1 k G 1 ) Θ k ( ζ 2 k G 2 ) . . . Θ k ( ζ 2 k k G 2 k ) .

3. Main Results

In this section, we discuss some results on the Gray map, and structural properties of cyclic codes over S k and with the help of CSS-construction, we prove some results on quantum error correcting codes.

3.1. Results on the Gray Map

In this section, we describe some results on the Gray map.
Proposition 1.
The Gray map Θ k is a linear, bijective and distance-preserving map from ( R k n , d L ) to ( F 2 m 2 k n , d H ) , where d L = d H .
Proof. 
Suppose c 1 , c 2 S k . It can be easily seen that
Θ k ( c 1 + c 2 ) = Θ k ( c 1 ) + Θ k ( c 2 ) .
Now, we take δ F 2 m , then
Θ k ( δ c 1 ) = δ Θ k ( c 1 ) .
So, Θ k is a map linear-preserving. Now, we will prove that Θ k is a bijection.
Then, we have
Θ k ( c 1 ) = Θ k ( c 2 ) Θ k ( i = 1 2 k β i e i k ) = Θ k ( i = 1 2 k δ i e i k ) ( β 1 , β 2 , , β 2 k ) A 2 k = ( δ 1 , δ 2 , , δ 2 k ) A 2 k
where β i , δ i F 2 m for 1 i 2 k . This implies that
β 1 = δ 1 , , β 2 k = δ 2 k .
Then c 1 = c 2 . Henceforth, Θ k is one-one. Take any ( β 1 , β 2 , , β 2 k ) A 2 k F 2 m 2 k , then there exists a corresponding element c 1 S k such that Θ k ( c 1 ) = ( β 1 , , β 2 k ) . Therefore, Θ k is onto. Hence, Θ k is a bijective map.
Furthermore, we have
d L ( c 1 , c 2 ) = w L ( c 1 c 2 ) = w H ( Θ k ( c 1 c 2 ) ) = w H ( Θ k ( c 1 ) Θ k ( c 2 ) ) = d H ( Θ k ( c 1 ) , Θ k ( c 2 ) ) .
Hence, Θ k is a distance-preserving map. □
Proposition 2.
Let C be a linear code of length n over S k . Then | Θ k ( C ) | = | Θ k ( C ) | and Θ k ( C ) is self-orthogonal if and only if C is self-orthogonal. Furthermore, Θ k ( C ) is self-dual if and only if C is self-dual.
Proof. 
Suppose two elements s , t in S k such that
s = ( s 0 , s 1 , , s n 1 )
t = ( t 0 , t 1 , , t n 1 ) ,
where s j = i = 1 2 k p i , j ζ i k , t j = i = 1 2 k r i , j ζ i k for i = 1 , 2 , 3 , , 2 k , j = 1 , 2 , , n 1 and p i , j , r i , j F 2 m . Next, let us consider that s · t = 0 . Then, we obtain
i = 1 n 1 s j t j = 0 j = 0 n 1 ( i = 0 2 k p i , j ζ i k ) ( i = 0 2 k r i , j ζ i k ) = 0 .
Since ( ζ i k ) 2 = ζ i k , we have
j = 0 n 1 i = 0 2 k p i , j r i , j ζ i k = i = 0 2 k j = 0 n 1 p i , j r i , j ζ i k = 0 .
Therefore,
j = 0 n 1 p i , j r i , j = 0 ,
where i = 1 , 2 , , 2 k . Furthermore,
Θ k ( s ) Θ k ( t ) = j = 0 n 1 i = 0 2 k p i , j r i , j = i = 0 2 k j = 0 n 1 p i , j r i , j = 0 .
This implies that,
Θ k ( C ) Θ k ( C ) .
Since Θ k is a bijection, then | Θ k ( C ) | = | Θ k ( C ) | . Hence, Θ k ( C ) = Θ k ( C ) . Now, C is self-orthogonal if and only if C C . Henceforth, Θ k ( C ) Θ k ( C ) = Θ k ( C ) if and only if Θ k ( C ) is self-orthogonal. In the same way, C is self-dual if and only if Θ k ( C ) is self-dual. □
Proposition 3.
Let C = i = 1 2 k ζ i k C i be a linear code of length n over S k . Then,
(i) 
Θ k ( C ) = C 1 C 2 C 2 k as well as | C | = | C 1 | | C 2 | | C 2 k | .
(ii) 
C = i = 1 2 k ζ i k C i , Moreover, each C i is self-orthogonal if and only if C is self-orthogonal as well as each C i is self-dual if and only if C is self-dual.
Proof. 
(i)
Let us suppose that w = ( γ 1 , 0 k , γ 1 , 1 k , , γ 1 , n 1 k , γ 2 , 0 k , γ 2 , 1 k , , γ 2 , n 1 k , , γ 2 k , 0 k , γ 2 k , 1 k , , γ 2 k , n 1 k ) Θ k ( C ) and s j = i = 1 2 k γ i , j k ζ i k , where j = 0 , 1 , 2 , , n 1 . Hence, s = ( s 0 , s 1 , , s n 1 ) C , but Θ k is bijective map, ( γ i , 0 k , γ i , 1 k , , γ i , n 1 k ) C i , where i = 1 , 2 , , 2 k . With the help of definition of C i , w C 1 C 2 C 2 k . Hence, Θ k ( C ) C 1 C 2 C 2 k .
On the other hand, let w = ( γ 1 , 0 k , γ 1 , 1 k , , γ 1 , n 1 k , γ 2 , 0 k , γ 2 , 1 k , , γ 2 , n 1 k , , γ 2 k , 0 k , γ 2 k , 1 k , , γ 2 k , n 1 k ) C 1 C 2 C 2 k , then ( γ i , 0 k , γ i , 1 k , , γ i , n 1 k ) C i , where i = 1 , 2 , , 2 k . We select s j = i = 1 2 k γ i , j k ζ i k , where j = 0 , 1 , , n 1 . Then, s = ( s 0 , s 1 , , s n 1 ) C and Θ k ( s ) = w . Therefore, w Θ k ( C ) . Hence, C 1 C 2 C 2 k Θ k ( C ) . Furthermore, the map Θ k is bijective, then | C | = | Θ k ( C ) | . Consequently, | C | = | C 1 C 2 C 2 k | = | C 1 | | C 2 | | C 2 k | .
(ii)
Let us consider U j = { r j F 2 m n | i = 1 2 k ζ i k r i C , f o r s o m e r i F 2 m n , i j & 1 i , j 2 k } . Then C can be uniquely expressed as C = ζ 1 k U 1 ζ 2 k U 2 C 2 k k . Since, U 1 = { r 1 F 2 m n | i = 1 2 k ζ i k r i C , f o r s o m e r i F 2 m n , i 1 & 1 i 2 k } . Evidently, C 1 U 1 = 0 , hence U 1 C 1 . Next, let us consider that c 1 C 1 , then c 1 x 1 = 0 for any c = ζ i k x i C . Therefore, ζ 1 k c 1 c = ζ 1 k c 1 x 1 = 0 and this implies that ζ 1 k c 1 C . We have c 1 U 1 , with the help of unique representation of C , so C 1 U 1 . In this similar way, we can show that C j = U j , where j = 2 , 3 , , 2 k . Thus, we arrive at C = i = 1 2 k ζ i k C i . Furthermore, C C if and only if C is self-orthogonal. Then, we have,
ζ 1 k C 1 ζ 2 k k C 2 k ζ 1 k C 1 ζ 2 k k C 2 k C i C i ,
where i = 1 , 2 , , 2 k . In a similar way, we can easily see that C is self-dual if and only if each C i is self-dual.
Proposition 4.
Let C = i = 1 2 k ζ i k C i be a linear code having the parameters [ n , k , d L ] over S k . Then Θ k ( C ) is a linear code with parameters [ 2 k n , i = 1 2 k k i , d H ] over F 2 m , where i = 1 , 2 , 3 , , 2 k and d L = d H .

3.2. Cyclic Codes over S k

We begin this section with some important results on cyclic codes over S k .
Theorem 1.
Let C = i = 1 2 k ζ i k C i be a linear code of length n over S k . Then C is a cyclic code of length n over S k if and only if each C i is a cyclic code over F 2 m , where i = 1 , 2 , , 2 k .
Proof. 
Let C be a linear code of length n over S k . Take any codeword c = ( c 0 , c 1 , , c n 1 ) C , here c j = i = 1 2 k ζ i k c i , j , i = 1 , 2 , , 2 k and j = 1 , 2 , , n 1 . Next, let us consider that y 1 , y 2 , , y 2 k are in C 1 , C 2 , , C 2 k , respectively, where y i = ( c i , 0 , c i , 1 , , c i , n 1 ) C i . Since C is a cyclic code over S k , we have δ ( c ) = ( c n 1 , c 0 , c 1 , , c n 2 ) C , where δ ( c ) is the cyclic shift of c . Henceforth, δ ( c ) is in C if and only if δ ( y i ) = ( c i , n 1 , c i , 0 , , c i , n 2 ) C i , where i = 1 , 2 , 3 , , 2 k . Thus, C is a cyclic code of length n over S k if and only if each C i is a cyclic code over F 2 m .
Theorem 2.
Let C = i = 1 2 k ζ i k C i be a cyclic code of length n over S k and g i ( x ) be the monic generator polynomial of C i , where each g i ( x ) divides x n 1 . Then,
(i) 
C = g 1 ( x ) ζ 1 k , g 2 ( x ) ζ 2 k , , g 2 k ( x ) ζ 2 k k as well as | C | = 2 m 2 k n i = 1 2 k d e g ( g i ( x ) ) .
(ii) 
C = g ( x ) , where g ( x ) = i = 1 2 k g i ( x ) ζ i k divides ( x n 1 ) .
Proof. 
(i)
In view of Theorem 1, each C i is a cyclic code of length n over F 2 m , where i = 1 , 2 , , 2 k . However, C is a cyclic code over S k and it is given that g i ( x ) is the monic generator polynomial of C i , i.e., C i = g i ( x ) F 2 m [ x ] x n 1 . Hence, C = g 1 ( x ) ζ 1 k , g 2 ( x ) ζ 2 k , , g 2 k ( x ) ζ 2 k k and also the map Θ is bijective, then | Θ ( C ) | = | C | . By Proposition 3, we conclude that
| C | = | C 1 | | C 2 | | C 2 k | = ( 2 m ) n d e g ( g 1 ( x ) ) ( 2 m ) n d e g ( g 2 k ( x ) ) = ( 2 m ) 2 k n i = 1 2 k d e g ( g i ( x ) ) .
(ii)
By part (i), C = g 1 ( x ) ζ 1 k , g 2 ( x ) ζ 2 k , , g 2 k ( x ) ζ 2 k k . Next, we consider that D = g 1 ( x ) ζ 1 k + g 2 ( x ) ζ 2 k + + g 2 k ( x ) ζ 2 k k . It is clearly that D C . However, ( ζ i k ) 2 = ζ i k and ζ i k ζ j k = 0 , where i , j = 1 , 2 , , 2 k and i j . Hence g i ( x ) ζ i k = ( g 1 ( x ) ζ 1 k + + g 2 k ( x ) ζ 2 k k ) ζ i k . This shows that C D . Now, from the above discussion, we conclude that C = D , where f ( x ) = i = 1 2 k g i ( x ) ζ i k . It is given that monic generator polynomial of C i is g i ( x ) , where i = 1 , 2 , , 2 k . Henceforth, g i ( x ) divides x n 1 such that x n 1 = h i ( x ) g i ( x ) this implies that ( x n 1 ) ζ i k = h i ( x ) g i ( x ) ζ i k , where i = 1 , 2 , , 2 k .
x n 1 = x n ( i = 1 2 k ζ i k ) ( i = 1 2 k ζ i k ) = i = 1 2 k ( x n 1 ) ζ i k = i = 1 2 k h i ( x ) g i ( x ) ζ i k = ( i = 1 2 k h i ( x ) ζ i k ) ( i = 1 2 k g i ( x ) ζ i k ) = ( i = 1 2 k h i ( x ) ζ i k ) g ( x ) .
Hence, g ( x ) divides x n 1 . This completes the proof.
Corollary 1.
Let C = i = 1 2 k ζ i k C i be a cyclic code of length n over S k . Then C = i = 1 2 k ζ i k C i is also a cyclic code of length n over S k .

3.3. Quantum Codes

In quantum computing and communication, quantum codes are employed to shield quantum information from noise into the channel during transmission. One of the noteworthy developments in code construction is the construction of quantum error-correcting codes from classical error-correcting codes. The construction of quantum error-correcting codes from classical error-correcting codes was done by Calderbank et al. [3]. In this section, using the CSS(Calderbank-Shor-Steane) construction [22], we obtain quantum codes from dual-containing cyclic codes. In comparison to already existing quantum codes, we are able to construct superior quantum codes. Moreover, using a necessary and sufficient condition over the finite fields in [3], we are able to determine the necessity for cyclic codes to contain their duals over S k . Our first result gives the necessary and sufficient conditions for cyclic codes to contain their duals.
Theorem 3.
Let C = i = 1 2 k ζ i k C i be a cyclic code of length n over S k , where g i ( x ) is the generator polynomial of C i and i = 1 , 2 , , 2 k . Then,
(i) 
C C if and only if C i C i , where i = 1 , 2 , , 2 k .
(ii) 
C C if and only if x n 1 0 ( m o d g i ( x ) g i * ( x ) ) , where  g i * ( x ) is the reciprocal polynomial of g i ( x ) .
Proof. 
(i)
First, let us consider that C C . This implies that i = 1 2 k ζ i k C i i = 1 2 k ζ i k C i . However, C i is a linear code such that ζ i k C i C ( m o d ζ i k ) , we get C i C i , where i = 1 , 2 , , 2 k . Conversely, let us consider that C i C i , where i = 1 , 2 , , 2 k . This shows that C = i = 1 2 k ζ i k C i i = 1 2 k ζ i k C i = C .
(ii)
Let C C , by using part (i), C i C i , where i = 1 , 2 , , 2 k . Now, by Lemma 2, x n 1 ( m o d g i ( x ) g i * ( x ) ) , where g i * ( x ) denotes the reciprocal of g i ( x ) . Conversely, let us consider that x n 1 ( m o d g i ( x ) g i * ( x ) ) , where g i * ( x ) denotes the reciprocal of g i ( x ) and i = 1 , 2 , , 2 k . Hence, by Lemma 2, we have C i C i , where i = 1 , 2 , , 2 k . Application of part (i) yields that C C .
Theorem 4.
Let C = i = 1 2 k ζ i k C i be a cyclic code of length n over S k and its Gray image having the parameters [ 2 k n , i = 1 2 k k i , d H ] , where i = 1 , 2 , , 2 k . Then,
(i) 
If C C , then there exists a quantum code [ [ 2 k n , i = 1 2 k k i 2 k n , d H ] ] 2 m over F 2 m .
(ii) 
If x n 1 0 ( m o d g i ( x ) g i * ( x ) ) , w h e r e   g i * ( x ) is the reciprocal polynomial of g i ( x ) , and i = 1 , 2 , 3 , , 2 k , then there exists a quantum code [ [ 2 k n , 2 i = 1 2 k k i 2 k n , d H ] ] 2 m over F 2 m .
Proof. 
(i)
First, let us consider that C C . By Proposition 2, Θ k ( C ) = Θ k ( C ) , Θ k ( C ) Θ k ( C ) . Hence, Θ k ( C ) is a dual containing linear code over F 2 m . By Lemma 1, there exists a quantum code [ [ 2 k n , 2 i = 1 2 k k i 2 k n , d H ] ] 2 m over F 2 m .
(ii)
Let us consider that x n 1 0 ( m o d g i ( x ) g i * ( x ) for i = 1 , 2 , 3 , , 2 k , where g i * denotes the reciprocal polynomial of g i ( x ) . By Theorem 3 part (ii), C C , by using part (i), there exists a quantum code [ [ 2 k n , 2 i = 1 2 k k i 2 k n , d H ] ] 2 m over F 2 m .

4. Applications

In this section, we obtain a number of optimal linear codes from the Gray images of cyclic codes over S 1 (for k = 1 ). Additionally, we obtain quantum codes over S 1 that are better than the ones found in some recent references [23,24] by using dual-containing cyclic codes. The Magma computation system is used to complete all of the computations in these examples [25].
Example 1.
Let n = 8 , m = 1 and S 1 = F 2 [ u 1 ] / u 1 2 u 1 . Then, we have,
x 8 1 = ( x + 1 ) 8 F 2 [ x ] .
Take
g 1 ( x ) = ( x + 1 ) g 2 ( x ) = ( x + 1 ) 5 .
Hence, C is a cyclic code of length 8 over S 1 . By Proposition 4, the Gray image Θ 1 ( C ) has parameters [ 16 , 10 , 4 ] over F 2 . This code is optimal according to the database [26].
Example 2.
Let n = 28 , m = 2 , α 1 = 1 and S 1 = F 2 2 [ u 1 ] / u 1 2 u 1 . Then, we have,
x 28 1 = ( x + 1 ) 4 ( x 3 + x + 1 ) 4 ( x 3 + x 2 + 1 ) 4 F 4 [ x ] .
Take
g 1 ( x ) = ( x + 1 ) ( x 3 + x + 1 ) 3 g 2 ( x ) = ( x + 1 ) 2 .
Hence, C is a cyclic code of length 28 over S 1 . Then, by the Proposition 4, the Gray image Θ 1 ( C ) has parameters [ 56 , 44 , 4 ] over F 4 . However, x 28 1 0 ( m o d g i ( x ) g i * ( x ) ) , where i = 1 , 2 . With the help of Theorem 3, C C . Hence, by Theorem 4, there exists a quantum code with parameters [ [ 56 , 32 , 4 ] ] 4 . The code has the same minimum distance but a larger code rate than the previous known quantum code [ [ 56 , 16 , 4 ] ] 4 existing in [23].
In Table 1 and Table 2, we write the coefficients of generator polynomials in decreasing order, for example, we write 1021 to represent the polynomial x 3 + 2 x + 1 . In Table 1, we obtain optimal linear codes with the help of the Gray image of cyclic codes and also in Table 2, we obtain quantum codes. In Table 2, it is noted that our obtained codes [ [ n , k , d ] ] 2 m are better than the existing quantum codes [ [ n , k , d ] ] 2 m collected from different references mentioned there.

5. DNA Codes over S k t

In this section, S k t = F 4 2 t [ v 1 , v 2 , , v k ] v i 2 v i , v i v j v j v i that a special case of S k is considered. We use S k t to obtain reversible DNA codes because the number of DNA bases is 4. Here, we present methods to generate reversible DNA codes and reversible complement DNA codes. In [27,28,29,30], there are more computational or limited operations to generate the DNA codes. Furthermore, ref. [27] applies a method that is more similar to the generator method of the coterm polynomials as in [31]. Here, the presented methods satisfy the more flexibility and variety to obtain the DNA codes rather than the method of [27,28,29,30]. In this section, we present a method that is more efficient than [29] for obtaining the idempotents. We define the structure of idempotents as follows.
We define κ to determine idempotent structure according to indices of related idempotents. κ gives the set of places of non-zero digits in a binary number that is a correspondence to an integer.
κ ( r ) = κ ( r = ( b n b 2 b 1 ) 2 ) = { i | b i 0 } ,
where r Z + { 0 } . For example, κ ( 19 ) = κ ( 19 = ( 10011 ) 2 ) = { 1 , 2 , 5 } .
Definition 1.
The idempotent form of S k t :
I j = v i + 1 , if i κ ( j ) v i , if i κ ( j )
Example 3.
Let us create the set of idempotents over S 3 t . According to Definition 1, idempotents are:
I 0 = v 1 v 2 v 3 , I 1 = ( v 1 + 1 ) v 2 v 3 , I 2 = v 1 ( v 2 + 1 ) v 3 , I 3 = ( v 1 + 1 ) ( v 2 + 1 ) v 3 , I 4 = v 1 v 2 ( v 3 + 1 ) , I 5 = ( v 1 + 1 ) v 2 ( v 3 + 1 ) , I 6 = v 1 ( v 2 + 1 ) ( v 3 + 1 ) , I 7 = ( v 1 + 1 ) ( v 2 + 1 ) ( v 3 + 1 ) .
Each elements r S k t is expressed by r = a 0 I 0 + a 1 I 1 + + a 2 k 1 I 2 k 1 where a 1 , , a 2 k 1 F 4 2 k . Because of S k t = I 0 F 4 2 t I 1 F 4 2 t I 2 k 1 F 4 2 t . By using the structure S k t = I 0 F 4 2 t I 1 F 4 2 t I 2 k 1 F 4 2 t for element of S k t , we use the Gray map as follows:
φ : S k t F 4 2 t 2 k α ( α 0 , α 1 , , α 2 k 1 ) .
This Gray map is a one-to-one and onto map. It can be extended to n-tuples coordinate-wise.
We use the following automorphism to satisfy the DNA reversibility over S k t .
θ : S k t S k t a a 4 t a F 4 2 t , v i v i + 1 i { 1 , , k } .
We use DNA correspondences for each element of F 4 2 t that are given in [20,32].
Lemma 3.
θ ( I j ) = I 2 k 1 j j { 0 , 1 , , 2 k 1 } where I j are idempotents of S k t , ( j { 0 , 1 , , 2 k 1 } ) .
Theorem 5.
DNA reverse of φ ( β ) is φ ( θ ( β ) ) where β S k t .
Proof of Lemma 3 and Theorem 5 is similar to Lemma 1 and Theorem 3 in [29].
The following example shows that θ reverses an element’s DNA correspondence.
Example 4.
DNA 2-bases correspondence for elements of F 16 is given by Table-1 in [20]. An algorithm to generate the general form of Table-1 is given by [32]. A special property of Table-1 is the fourth power of each element in F 16 maps to the DNA 2-bases that are reverses of each other. The general form of this property satisfies by 4 t th power of elements in F 4 2 t .
Let us consider the ring S 2 1 . Let α be a primitive element of F 16 and β = α 3 I 0 + α 7 I 1 + α I 2 + α 6 I 3 S 2 1 . Then, φ ( β ) = ( α 3 , α 7 , α , α 6 ) . Let τ maps each element of the field to DNA correspondence and it can be extended n-tuple structures. By using Table-1 ([20]), the corresponding DNA 2-bases is
τ ( α 3 , α 7 , α , α 6 ) = ( τ ( α 3 ) , τ ( α 7 ) , τ ( α ) , τ ( α 6 ) ) = ( A G , G T , A T , A C ) .
Also,
θ ( β ) = α 9 I 0 + α 4 I 1 + α 13 I 2 + α 12 I 3 φ ( θ ( β ) ) = ( α 9 , α 4 , α 13 , α 12 ) τ ( θ ( β ) ) = ( α 9 , α 4 , α 13 , α 12 ) = ( C A , T A , T G , G A ) .
Thus, φ ( β ) and φ ( θ ( β ) ) are DNA reverses of each other.
We can consider the φ for n-coordinates, also. For c = ( c 0 , , c n 2 , c n 1 ) S k t we have DNA correspondence of c as φ ( c ) = ( φ ( c 0 ) , , φ ( c n 2 ) , φ ( c n 1 ) ) . Then, the DNA reverse of φ ( c ) is φ ( θ ( c ) r ) = ( φ ( θ ( c n 1 ) ) , φ ( θ ( c n 2 ) ) , , φ ( θ ( c 0 ) ) ) where θ ( c ) = ( θ ( c 0 ) , , θ ( c n 2 ) , θ ( c n 1 ) ) . We will define a θ -lifted and ρ -lifted which are special forms of General lifted [33] polynomials that are generated by using a polynomial over a base field of the rings. These polynomials will be used to generate reversible DNA codes.
Let h ( x ) = b 0 + b 1 x + + b s x s be a polynomial over S k t . h ( x ) is called as palindromic polynomial if b i = b s i i { 0 , 1 , , s } .
Definition 2.
Let g ( x ) = b 0 + b 1 x + + b s x s be a palindromic polynomial over F (finite field) and g ( x ) | ( x n 1 ) over F . A θ-lifted polynomial of g ( x ) is denoted by g θ ( x ) R and the ring R that is an extended from F .
g θ ( x ) = i = 0 s 2 β i x i + θ ( β i ) x s i , β U ( R ) , b i 0 β i x i + θ ( β i ) x s i , β Z ( R ) , b i = 0
and a ρ-lifted polynomial of g ( x ) is denoted by g ρ ( x ) R
g ρ ( x ) = i = 0 s 2 β i x i + β i x s i , β U ( R ) , b i 0 β i x i + β i x s i , β Z ( R ) , b i = 0
where Z ( R ) is a set of zero and zero divisors, and U ( R ) is a set of units of R.
We define the following definition of the generator set to generate the reversible DNA codes.
Definition 3.
Let h ( x ) = b 0 + b 1 x + + b s x s be a polynomial over S k t . θ-generator set for h ( x ) for a code length of n is
S θ ( h ( x ) ) = t ( x ) | t ( x ) = x i h ( x ) , i mod 2 = 0 t ( x ) = x i θ ( h ( x ) ) , i mod 2 = 1 where i { 0 , 1 , , n 1 s } and θ ( h ( x ) ) = θ ( b 0 ) + θ ( b 1 ) x + + θ ( b s ) x s .
In short, S θ ( h ( x ) ) = { h ( x ) , x θ ( h ( x ) ) , x 2 h ( x ) , x 3 θ ( h ( x ) ) , x 4 h ( x ) , } .
Theorem 6.
Let g ( x ) be a palindromic polynomials dividing x n 1 (n is even) over F 4 2 t with degree s.
(i) 
If s is even, C is generated by S θ ( g ρ ( x ) )
(ii) 
If s is odd, C is generated by S θ ( g θ ( x ) )
and φ ( C ) is a reversible DNA code and C is a linear free code over S k t .
Proof. 
Order of θ is 2 then θ 2 ( β ) = β or θ 2 ( g ( x ) ) = g ( x ) . φ ( β i x i θ i ( g ( x ) ) ) determines the DNA correspondence of the codewords that are called DNA codewords. Reverses of DNA codewords are denoted as follows
φ ( β i x i θ i ( g ( x ) ) ) r = φ ( θ ( β ) i x n s 1 i θ n s 1 i ( g ( x ) ) ) ,
where i { 0 , 1 , , n s 1 } and g ( x ) = g θ ( x ) (or g ( x ) = g ρ ( x ) ). This show that each DNA codewords have its reverse in the code C. Then φ ( C ) is a reversible DNA code. Each lifting operator protects the being the unit element of S k t . Thus, C is a linear free code, and each generator set is linearly independent. □
Corollary 2.
Let C be a linear free code and φ ( C ) be a DNA code. If C has the codeword ( I , I , , I ) where I = I 0 + I 1 + + I 2 k 1 then φ ( C ) is a reversible complement DNA code.
Corollary 3.
Let g ( x ) be a palindromic polynomials dividing x n 1 (n is even) over F 4 2 t and C = < S θ ( g ( x ) ) > . If I = I + I x + + I x n is added to the generator set as C = < S θ ( g ( x ) ) I > then φ ( C ) is a reversible complement DNA code.

6. Conclusions

In this study, we generated the optimal linear codes over S 1 utilizing the algebraic structural properties of cyclic codes over S 1 . In addition, we have provided a number of quantum codes [ [ n , k , d ] ] q are better than the existing quantum codes [ [ n , k , d ] ] q collected from difference references mentioned there. Skew cyclic codes can be used to extend this work. We also find the quantum codes over S 2 , S 3 and so on with the same method on taking k = 2 , 3 , . Moreover, the method of generating the reversible and the reversible complement DNA codes is presented as applications of DNA codes. It satisfies an advantage which is the variety of DNA codes. Then, the determination of the distance between codes and DNA correspondence is an open problem.

Author Contributions

All authors made equal contributions. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Princess Nourah bint Abdulrahman University grant number-PNURSP2023R231.

Data Availability Statement

Data sharing is not applicable as no datasets were generated or analyzed during the current study.

Acknowledgments

The authors extend their appreciation to Princess Nourah bint Abdulrahman University (PNU), Riyadh, Saudi Arabia for funding this research under Researchers Supporting Project Number (PNURSP2023R231).

Conflicts of Interest

The authors declare that they have no conflict of interest.

References

  1. Shor, P.W. Scheme for reducing decoherence in quantum memory. Phys. Rev. A 1995, 52, 2493–2496. [Google Scholar] [CrossRef]
  2. Steane, A.M. Simple quantum error correcting codes. Phys. Rev. A 1996, 54, 4741–4751. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Calderbank, A.R.; Rains, E.M.; Shor, P.M.; Sloane, N.J.A. Quantum error-correction via codes over GF(4). IEEE Trans. Inf. Theory 1998, 44, 1369–1387. [Google Scholar] [CrossRef] [Green Version]
  4. Qian, J.; Ma, W.; Gou, W. Quantum codes from cyclic codes over finite ring. Int. J. Quantum Inf. 2009, 7, 1277–1283. [Google Scholar] [CrossRef]
  5. Bag, T.; Upadhyay, A.K.; Ashraf, M.; Mohammad, G. Quantum code from cyclic code over the ring Fp/〈u3-u〉. Asian-Eur. J. Math. 2020, 13, 2050008. [Google Scholar] [CrossRef]
  6. Ashraf, M.; Mohammad, G. Quantum codes over Fp from cyclic codes over Fp[u,v]/〈u2-1,v3-v,uv-vu〉. Cryptogr. Commun. 2019, 11, 325–335. [Google Scholar] [CrossRef]
  7. Gao, Y.; Gao, J.; Fu, F.W. Quantum codes from cyclic codes over the ring Fq+v1Fq++vrFq. Appl. Algebra Eng. Commun. Comput. 2019, 30, 161–174. [Google Scholar] [CrossRef]
  8. Islam, H.; Prakash, O.; Verma, R.K. Quantum codes from the cyclic codes over FP[v,w]/〈v2-1,w2-1,vw-wv〉. Springer Proc. Math. Stat. 2019, 307, 67–74. [Google Scholar] [CrossRef]
  9. Cengellenmis, Y.; Dertli, A.; Dougherty, S.T. Codes over an infinite family of rings with a Gray map. Des. Codes Cryptogr. 2014, 72, 559–580. [Google Scholar] [CrossRef]
  10. Zheng, X.; Kong, B. Constacyclic codes over Fpm[u1,u2,,uk]∖〈ui2=ui,uiuj=ujui〉. Open Math. 2018, 16, 490–497. [Google Scholar] [CrossRef]
  11. Dertli, A.; Cengellenmis, Y.; Eren, S. On quantum codes obtained from cyclic codes over A2. Int. J. Quantum Inf. 2015, 13, 1550031. [Google Scholar] [CrossRef]
  12. Kai, X.; Zhu, S. Quaternary construction of quantum codes from cyclic codes over F4+uF4. Int. J. Quantum Inf. 2011, 9, 689–700. [Google Scholar] [CrossRef]
  13. Qian, J. Quantum codes from cyclic codes over F2+vF2. J. Inf. Compt. Sci. 2013, 10, 1715–1722. [Google Scholar] [CrossRef]
  14. Islam, H.; Prakash, O. New Quantum and LCD Codes over Finite Fields of Even Characteristic. Def. Sci. J. 2021, 71, 656–661. [Google Scholar] [CrossRef]
  15. Adleman, L. Molecular computation of solutions to combinatorial problems. Science 1994, 266, 1021–1024. [Google Scholar] [CrossRef] [Green Version]
  16. Abulraub, T.; Ghrayeb, A.; Nian Zeng, X. Construction of cyclic codes over GF(4) for DNA computing. J. Frankl. Inst. 2006, 343, 448–457. [Google Scholar] [CrossRef]
  17. Siap, I.; Abulraub, T.; Ghrayeb, A. Similarity cyclic DNA codes over rings. In Proceedings of the International Conference on Bioinformatics and Biomedical Engineering, Shanghai, China, 16–18 May 2008. [Google Scholar]
  18. Siap, I.; Abulraub, T.; Ghrayeb, A. Cyclic DNA codes over the ring F2[u]/(u2-1) based on the deletion distance. J. Franklin Inst. 2009, 346, 731–740. [Google Scholar] [CrossRef]
  19. Yildiz, B.; Siap, I. Cyclic codes over F2[u]/(u4-1) and applications to DNA codes. Comput. Math. Appl. 2012, 63, 1169–1176. [Google Scholar] [CrossRef] [Green Version]
  20. Oztas, E.S.; Siap, I. Lifted polynomials over F16 and their applications to DNA Codes. Filomat 2013, 27, 459–466. [Google Scholar] [CrossRef] [Green Version]
  21. Faria, L.C.B.; Rocha, A.S.L.; Kleinschmidt, J.H.; Silva-Filho, M.C.; Bim, E.; Herai, R.H.; Yam-agishi, M.E.B.; Palazzo, R., Jr. Is a genome a codeword of an error-correcting code? PLoS ONE 2012, 7, e36644. [Google Scholar] [CrossRef] [Green Version]
  22. Grassl, M.; Beth, T. On optimal quantum codes. Int. J. Quantum Inf. 2004, 2, 55–64. [Google Scholar] [CrossRef] [Green Version]
  23. Ozen, M.; Cem, E.F.; Ince, H. Quantum codes from cyclic codes over F4+vF4. J. Appl. Math. Inform. 2016, 34, 397–404. [Google Scholar] [CrossRef] [Green Version]
  24. Grassl, M.; Beth, T. Quantum BCH codes. In Proceedings of the Proceedings X. International Symposium on Theoretical Electrical Engineering, Magdeburg, Germany, 6–9 September 1999; pp. 207–212, arXiv:quant-ph/9910060. [Google Scholar]
  25. Bosma, W.; Cannon, J. Handbook of Magma Functions; University of Sydney: Sydney, Australia, 1995. [Google Scholar]
  26. Grassl, M. Code Tables: Bounds on the Parameters of Various Types of Codes. Available online: http://www.codetables.de/ (accessed on 20 April 2021).
  27. Cengellenmis, Y.; Dertli, A.; Dougherty, S.T.; Korban, A.; Sahinkaya, S.; Ustun, D. Reversible G-codes over the ring Fj,k with applications to DNA codes. Adv. Math. Commun. 2021; Early access. [Google Scholar] [CrossRef]
  28. Cengellenmis, Y.; Aydin, N.; Dertli, A. Reversible DNA codes from skew cyclic codes over a ring of order 256. J. Algebra Comb. Discret. Struct. Appl. 2021, 8, 1–8. [Google Scholar]
  29. Gursoy, F.; Oztas, E.S.; Yildiz, B. Reversible DNA codes over a family of non-chain rings Rk,s. arXiv 2017, arXiv:1711.02385. [Google Scholar]
  30. Cengellenmis, Y.; Dertli, A. On the skew cyclic codes and the reversibility problem for DNA 4-Bases. Math. Comput. Sci. 2020, 14, 431–435. [Google Scholar] [CrossRef]
  31. Oztas, E.S.; Yildiz, B.; Siap, I. A novel approach for constructing reversible codes and applications to DNA codes over the ring F2[u]/(u2k-1). Finite Fields Appl. 2017, 46, 217–234. [Google Scholar] [CrossRef]
  32. Oztas, E.S.; Siap, I. On a generalization of lifted polynomials over finite fields and their applications to DNA codes. Int. J. Comput. Math. Vol. 2015, 92, 1976–1988. [Google Scholar] [CrossRef]
  33. Oztas, E.S. Glift codes over chain ring and non-chain ring Re,s. Bull. Korean Math. Soc. 2022, 59, 1557–1565. [Google Scholar] [CrossRef]
Table 1. Gray images of cyclic codes of length n over S 1 .
Table 1. Gray images of cyclic codes of length n over S 1 .
mn g 1 ( x ) g 2 ( x ) Θ 1 ( C ) Remarks
141111 [ 8 , 6 , 2 ] 2 optimal
121111 [ 4 , 2 , 2 ] 2 optimal
18101110011 [ 16 , 9 , 4 ] 2 optimal
11211101101 [ 24 , 18 , 4 ] 2 optimal
114101111001 [ 28 , 21 , 4 ] 2 optimal
1151111100111001 [ 30 , 19 , 6 ] 2 optimal
2811110011 [ 16 , 10 , 4 ] 4
2911 110 w w [ 18 , 13 , 3 ] 4
Table 2. Quantum codes from cyclic codes over S 1 .
Table 2. Quantum codes from cyclic codes over S 1 .
mn g 1 ( x ) g 2 ( x ) Θ 1 ( C ) [ [ n , k , d ] ] 2 m [ [ n , k , d ] ] 2 m
2710111101 [ 14 , 8 , 3 ] [ [ 14 , 2 , 3 ] ] 2 2
2111 1 w 2 11 w 1 [ 22 , 17 , 5 ] [ [ 22 , 12 , 5 ] ] 2 2
22811100101001101 [ 56 , 44 , 4 ] [ [ 56 , 32 , 4 ] ] 2 2 [ [ 56 , 16 , 4 ] ] 2 2 [23]
3121111 [ 24 , 22 , 2 ] [ [ 24 , 20 , 2 ] ] 2 3 [ [ 21 , 15 , 2 ] ] 2 3 [24]
4141111110011 [ 28 , 20 , 4 ] [ [ 28 , 12 , 4 ] ] 2 4 [ [ 28 , 4 , 3 ] ] 2 4 [24]
419 1 w 5 0 w 5 w 5 w 10 w 10 0 w 10 1 1 w 5 0 w 5 w 5 w 10 w 10 0 w 10 1 [ 38 , 20 , 7 ] [ [ 38 , 2 , 7 ] ] 2 4
42211 11 w 10 w 10 1111 w 9 w 9 11 [ 44 , 33 , 6 ] [ [ 44 , 22 , 6 ] ] 2 4 [ [ 35 , 5 , 3 ] ] 2 4 [24]
429 1 w 7 w 6 w 3 w 12 w 9 w 13 1 1 w 7 w 6 w 3 w 12 w 9 w 13 1 [ 58 , 44 , 6 ] [ [ 58 , 30 , 6 ] ] 2 4
441 1 w 10 w 2 w 8 w 10 1 1 w 10 w 2 w 8 w 10 1 [ 82 , 72 , 4 ] [ [ 82 , 62 , 4 ] ] 2 4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ali, S.; Alali, A.S.; Oztas, E.S.; Sharma, P. Construction of Quantum Codes over the Class of Commutative Rings and Their Applications to DNA Codes. Mathematics 2023, 11, 1430. https://0-doi-org.brum.beds.ac.uk/10.3390/math11061430

AMA Style

Ali S, Alali AS, Oztas ES, Sharma P. Construction of Quantum Codes over the Class of Commutative Rings and Their Applications to DNA Codes. Mathematics. 2023; 11(6):1430. https://0-doi-org.brum.beds.ac.uk/10.3390/math11061430

Chicago/Turabian Style

Ali, Shakir, Amal S. Alali, Elif Segah Oztas, and Pushpendra Sharma. 2023. "Construction of Quantum Codes over the Class of Commutative Rings and Their Applications to DNA Codes" Mathematics 11, no. 6: 1430. https://0-doi-org.brum.beds.ac.uk/10.3390/math11061430

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop