Next Article in Journal
Convergence and Almost Sure Polynomial Stability of Partially Truncated Split-Step Theta Method for Stochastic Pantograph Models with Lévy Jumps
Previous Article in Journal
Alternative View of Inextensible Flows of Curves and Ruled Surfaces via Alternative Frame
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cyclic Codes over a Non-Commutative Non-Unital Ring

by
Adel Alahmadi
1,*,
Malak Altaiary
1,2 and
Patrick Solé
3
1
Research Group of Algebraic Structures and Applications, Mathematics Department, Faculty of Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia
2
Mathematics Department, Shaqra University, Shaqra 11961, Saudi Arabia
3
I2M Lab, CNRS, Centrale Marseille, Aix Marseille University, 13009 Marseilles, France
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(13), 2014; https://doi.org/10.3390/math12132014
Submission received: 13 May 2024 / Revised: 9 June 2024 / Accepted: 17 June 2024 / Published: 28 June 2024

Abstract

:
In this paper, we investigate cyclic codes over the ring E of order 4 and characteristic 2 defined by generators and relations as E = a , b 2 a = 2 b = 0 , a 2 = a , b 2 = b , a b = a , b a = b . This is the first time that cyclic codes over the ring E are studied. Each cyclic code of length n over E is identified uniquely by the data of an ordered pair of binary cyclic codes of length n . We characterize self-dual, left self-dual, right self-dual, and linear complementary dual (LCD) cyclic codes over E . We classify cyclic codes of length at most 7 up to equivalence. A Gray map between cyclic codes of length n over E and quasi-cyclic codes of length 2 n over F 2 is studied. Motivated by DNA computing, conditions for reversibility and invariance under complementation are derived.

1. Introduction

Cyclic codes over finite fields [1] and finite rings [2], form the most popular class of algebraic codes for both theoreticians and engineers. The well-known reason is their representation as ideals over the polynomial ring B ( A , n ) = A [ x ] / ( x n 1 ) , where x is a formal variable and A the code alphabet (a finite ring or a finite field in the above references). The ring B ( A , n ) being principal, each ideal in that ring is uniquely characterized by a polynomial g , say, called the generator polynomial. However, if the alphabet ring is non-unitary (without a unit element for multiplication) this approach does not function since the ring B ( A , n ) cannot be defined for lack of the element X n 1 in A [ x ] .
In this paper, we study cyclic codes over the nonunitary ring E defined by generators and relations E = a , b 2 a = 2 b = 0 , a 2 = a , b 2 = b , a b = a , b a = b , from the standpoints of duality, classification, and Gray map. This is the first time that cyclic codes over the ring E are studied. In a companion paper [3], cyclic codes over the ring H in the classification of [4] were considered. Since E is a local ring, and H is only semilocal with two maximal ideals, the difference in the algebraic structure of the codes over these rings is such that different algebraic techniques are required. Specifically, we characterize the cyclicity of an E-code in terms of the cyclicity of its residue and torsion codes. The theory of duality of cyclic E-codes is studied. Both the quasi self-dual codes (QSD) of [5] and the self-dual codes in the sense of [6] are considered. The notion of Type IV codes of [5] (i.e., both QSD and with codewords of even Hamming weight) also enters the discussion. The concept of Linear Complementary Dual codes (shortly LCD codes) introduced by Massey [7] for codes over finite fields, and revisited over E in [6] is also considered here. A duality-preserving Gray map, that associates with cyclic codes over E a quasi-cyclic code of double the length over the binary field is introduced and studied. Motivated by DNA computing a different notion of complementation was introduced in [8]. We derive necessary and sufficient conditions for a cyclic E-code to be invariant under that permutation of E . With the same motivation, necessary and sufficient conditions for reversibility of cyclic codes over E are derived here. All the above notions are illustrated by a complete classification in length at most 7 .
The material is arranged as follows. Section 2 collects basic notions and notations needed for the other sections. Section 3 studies the structure of cyclic codes over E .  Section 4 introduces the Gray map. Section 5 contains the numerical classification results. Section 6 is the Conclusion.

2. Preliminaries

2.1. Binary Codes

The Hamming weight of x F 2 n is denoted by w t ( x ) is the number of nonzero coordinates in x. The dual of a binary linear code C is signified by C and defined as:
C = y F 2 n | x C , ( x , y ) = 0 ,
where ( x , y ) = i = 1 n x i y i , denotes the standard inner product. If the code C appears in its duality, C C , then the code C is self-orthogonal. A code is even if all its codewords have even weight. All binary self-orthogonal codes are even, but not all binary codes are self-orthogonal. Two binary codes are equivalent if there is a permutation of coordinates that maps one to the other.
A linear code C of length n over F 2 is cyclic provided that for each vector c = c 0 c n 2 c n 1 in C the vector c = c n 1 c 0 c n 2 , obtained from c by the cyclic shift of coordinates i i + 1 ( m o d n ) , is also in C. We refer to c as the cyclic shift of c .

2.2. Rings and Modules

Following [4], we define a ring on two generators a , b by their relations
E = a , b 2 a = 2 b = 0 , a 2 = a , b 2 = b , a b = a , b a = b .
A model for that ring can be obtained by taking a , b to be matrices over F 2 defined by
a = 0 0 0 1 , b = 0 1 0 1 .
Thus, E has characteristic two and consists of four elements E = 0 , a , b , c , with c = a + b . From these definitions, the addition table is given below
+0abc
00abc
aa0cb
bbc0a
ccba0
The multiplication table is as below.
×0abc
00000
a0aa0
b0bb0
c0cc0
From this table, we conclude that this ring is non-commutative, and does not contain a multiplicative identity element. It is local with maximal ideal J = 0 , c , and residue field E / J F 2 = 0 , 1 , the finite field of order 2.
Thus we have a c-adic decomposition as follows. Every element e E can be written
e = a s + c t ,
where s , t F 2 and where we have defined a natural action of F 2 on E by the rule r 0 = 0 r = 0 and r 1 = 1 r = r for all r E . Thus a = 1 a , c = 1 c and b = a 1 + c 1 . Note, that for all r E , this action is “distributive” in the sense that r ( s 2 t ) = r s + r t , where 2 denotes the addition in F 2 .
Denote by α : E E / J F 2 the map of reduction modulo J. Thus α ( 0 ) = α ( c ) = 0 , and α ( a ) = α ( b ) = 1 . This map is extended in a natural way in a map from E n to F 2 .
A linear E-code C of length n is an E-submodule of E n . An additive code of length n over F 4 is an additive subgroup of F 4 n . It is a free F 2 module with 4 k elements for some k n . Using a generator matrix G , such a code can be cast as the F 2 -span of its rows. To every linear E-code C is attached an additive F 4 -code ϕ ( C ) by the alphabet substitution
0 0 , a ω , b ω 2 , c 1 ,
where F 4 = F 2 [ ω ] . Note, that the reverse substitution attaches to every additive F 4 code an additive subgroup of E n , which may or may not be linear. Two E-codes are permutation equivalent if there is a permutation of coordinates that maps one to the other.

2.3. Duality

Define an inner product on E n as ( x , y ) = i = 1 n x i y i .
The right dual  C R of C is the right module defined by
C R = y E n | x C , ( x , y ) = 0 .
The left dual  C L of C is the left module defined by
C L = y E n | x C , ( y , x ) = 0 .
Thus the left (resp. right) dual of a left (resp. right) module is a left (resp. right) module. A code is left self-dual (resp. right self-dual) if it is equal to its left (resp. right) dual. A left self-dual code C satisfies C L = C . Likewise a right self-dual code C satisfies C R = C .
There are two binary linear codes of length n associated canonically with every linear code C of length n over E:
  • the residue code  r e s ( C ) defined by r e s ( C ) = α ( y ) | y C ,
  • the torsion code  t o r ( C ) defined by t o r ( C ) = x F 2 n | c x C .
The inclusion r e s ( C ) t o r ( C ) is satisfied by the two binary codes, and the relationship between their sizes and C’s size is | C | = | r e s ( C ) | | t o r ( C ) | . Let k 1 = dim ( r e s ( C ) ) and k 2 = dim ( t o r ( C ) ) k 1 . The linear code C is said to be of type ( k 1 , k 2 ) . We say that a linear code is free if and only if k 2 = 0 . Equivalently, C is free if and only if r e s ( C ) = t o r ( C ) .

3. The Structure of Cyclic Codes over E

Definition 1.
A cyclic code C of length n over E is a linear code with the property that if c = ( c 0 , c 1 , , c n 1 ) ∈C then c = ( c n 1 , c 0 , , c n 2 ) ∈C.
Example 1.
The repetition code of length 2, defined by R 2 = 00 , a a , b b , c c is a cyclic code over E.
To prepare for the study of cyclic codes over E, we need the following two results.
Lemma 1
(Lemma 1 in [6]). If C is a linear code of length n over E, then a r e s ( C ) C .
Theorem 1
(Theorem 7 in [6]). If C is a linear code of length n over E, then C = a r e s ( C ) c t o r ( C ) .
The following result can be deduced from the previous theory.
Corollary 1.
If C is a linear binary cyclic code of length n over E and let r e s ( C ) and t o r ( C ) are two binary cyclic codes of length n over E with generators g 1 ( x ) and g 2 ( x ) , respectively, then a generator matrix G of C is of the form
G = a G 1 c G 2 .
where G 1 and G 2 are generators matries of r e s ( C ) and t o r ( C ) , respectively.
Proof. 
The proof is direct from Theorem 4.2.1 in [9] and Theorem 1. □
The following result is of crucial importance to our study.
Theorem 2.
A linear code C over E is a cyclic code if and only if r e s ( C ) and t o r ( C ) are cyclic codes over F 2 .
Proof. 
If C is a cyclic code over E , we want to show that r e s ( C ) and t o r ( C ) are both cyclic. Let x r e s ( C ) then a x C and since C is cyclic this implies that a x C then we obtain x r e s ( C ) and this means r e s ( C ) is cyclic. Let y t o r ( C ) then c y C and as C is cyclic this implies that c y C then we have y t o r ( C ) and we conclude t o r ( C ) is cyclic. Conversely, If r e s ( C ) and t o r ( C ) are cyclic then a r e s ( C ) and c t o r ( C ) are cyclic. We need to prove that C = a r e s ( C ) c t o r ( C ) is cyclic. Let u = a x + c y a r e s ( C ) c t o r ( C ) then u = a x + c y a r e s ( C ) c t o r ( C ) . Hence, C is cyclic. □
In the following two examples, we make it clear that in the case of only one of r e s ( C ) or t o r ( C ) is cyclic, it does not necessarily follow that C is cyclic.
Example 2.
Let r e s ( C ) = 00 , 01 and t o r ( C ) = 00 , 01 , 10 , 11 be linear codes over F 2 . We note that r e s ( C ) t o r ( C ) and is not cyclic, but t o r ( C ) is cyclic. Indeed it can be seen by inspection that C is not cyclic since C = 00 , 0 a , 0 c , c 0 , c c , 0 b , c a , c b .
Example 3.
Let r e s ( C ) = < 1 0 1 0 0 1 0 1 > and t o r ( C ) = < 1 0 1 0 0 1 0 1 0 1 0 0 > be linear codes over F 2 . Here r e s ( C ) is cyclic, but t o r ( C ) is not cyclic. This implies that C is not cyclic.
To prepare for the study of left self-dual, right self-dual and self-dual cyclic codes over E, we need the following two lemmas on the duality of E-codes.
Lemma 2
(Corollary 4 in [6]). If C is a linear code of length n over E, then the following holds:
1.
C L = a r e s ( C ) c r e s ( C ) .
2.
C R = a t o r ( C ) c F 2 n .
Lemma 3
(Corollary 5 in [6]). If C is a linear code over E, then C = a t o r ( C ) c r e s ( C ) .
The consequence for cyclic codes is the following.
Corollary 2.
If C is a cyclic code over E, then the left dual code C L of C is also cyclic.
Proof. 
By Lemma 2, we obtain C L = a r e s ( C ) c r e s ( C ) . Since the dual code of binary cyclic code is also cyclic. So by Theorem 2, we obtain the result. □
Corollary 3.
If C is a cyclic code over E, then the right dual code C R of C is also cyclic.
Proof. 
By Lemma 2, we obtain C R = a t o r ( C ) c F 2 n . Since the dual code of binary cyclic code is also cyclic. So by Theorem 2 and the fact that F 2 n is a cyclic code, we obtain the result. □
Corollary 4.
If C is a cyclic code over E, then the dual code C of C is also cyclic.
Proof. 
By Lemma 3, we obtain C = a t o r ( C ) c r e s ( C ) . Since the dual code of binary cyclic code is also cyclic. So by Theorem 2, we obtain the result. □
To prepare for the study of the existence of cyclic self-dual codes over E we need the following two results.
Theorem 3
(Theorem 14 in [6]). If C is a linear code of length n over E, then the following holds:
  • C is the left self-dual if and only if C is free and r e s ( C ) is self-dual.
  • C is the right self-dual if and only if C is of type ( 0 , n ) .
Corollary 5
(Corollary 11 in [6]). Let C be a linear code of length n over E. If C is either left self-dual or right self-dual, then C is self-dual.
From the previous two results we conclude the following,
Proposition 1.
Cyclic self-dual codes of all lengths exist over E.
Proof. 
For any length n , F 2 n is a binary cyclic code. By Theorems 2 and 3, C = c F 2 n is a cyclic right self-dual code over E . By Corollary 4, C is a cyclic self-dual code. □
Some scholars would consider C = c F 2 n to be a trivial example of a cyclic code. An answer to that remark might be the following
Proposition 2.
Nontrivial cyclic self-dual codes of all even lengths exist over E.
Proof. 
If n is even, binary self-dual cyclic codes exist. We can construct a free code C over E with r e s ( C ) that is self-dual. Self-duality follows then by combining Theorem 3 and Corollary 4. Nontriviality follows because the residue code is not the zero code. □
We require the following general result.
Theorem 4
(Theorem 15 in [6]). A linear code C over E is self-dual if and only if r e s ( C ) = t o r ( C ) .
The next result is known as the multilevel construction.
Theorem 5.
Let B be a binary cyclic self-dual code of length n over E. The code C as defined by the relationship C = a B + c B is a cyclic self-dual code. Its residue code is B and its torsion code is B .
Proof. 
First, we want to show that C is a linear code over E. Let x C then x = a u + c v where u B and v B .   c x = c a u + c 2 v = c u + 0 = c u c B c B C .   b x = b a u + b c v = b u + 0 = b u b B a B + c B a B + c B C .   a x = a 2 u + a c v = a u + 0 = a u a B C .
Hence, C is closed under addition, by linearity of B .
Second, we want to prove that C is self-dual. Since r e s ( C ) = B and t o r ( C ) = B i.e., r e s ( C ) = t o r ( C ) then by Theorem 4 C is self-dual.
Finally, based on Theorem 2 and Corollary 3, and given that both B and B are cyclic then we conclude that C is also cyclic code over E .
LCD codes over E are characterized as follows.
Theorem 6
(Theorem 17 in [6]). Let C be a linear code of length n over E. The following hold:
  • If C is LCD, then r e s ( C ) and t o r ( C ) are binary LCD codes.
  • If C is free and r e s ( C ) is a binary LCD code, then C is LCD.
The following results follow immediately by Theorems 2 and 6.
Corollary 6.
Let C be a cyclic code over E, then C is an LCD cyclic code if r e s ( C ) and t o r ( C ) are LCD cyclic codes.
Corollary 7.
Let C be a cyclic code over E, then C is the LCD cyclic code if C is free and r e s ( C ) is the LCD cyclic code.

4. Gray Map

Any codeword of E can be expressed as e = a x + c y , where a , c are generators for the ring E and x , y are arbitrary elements in F 2 . The Lee weights of 0 , a , b , c E are 0, 1, 1, 2, respectively. The Gray map from E to F 2 × F 2 is given by λ ( e ) = ( x , x + y ) . The Gray map is a bijection. This map can be extended to E n in a natural way. For any r = ( r 0 , r 1 , , r n 1 ) E n , where r i = a u i + c v i , 0 i n 1 , we define λ ( r ) = ( u ( r ) , u ( r ) + v ( r ) ) , where u ( r ) = ( u 0 , u 1 , , u n 1 ) , v ( r ) = ( v 0 , v 1 , , v n 1 ) . Then, λ is a weight-preserving map from ( E n , Lee weight) to ( F 2 2 n , Hamming weight), that is w L ( r ) = w H ( λ ( r ) ) .
Example 4.
Let C = a   r e s ( C ) c t o r ( C ) where r e s ( C ) and t o r ( C ) are binary codes generated by r e s ( C ) = ( 000 ) and t o r ( C ) = 1 1 0 0 1 1 then t o r ( C ) = 000 , 110 , 011 , 101 . Therefore, C = 000 , c c 0 , 0 c c , c 0 c and we can write the code C like this C = a ( 000 ) + c ( 000 ) , a ( 000 ) + c ( 110 ) ,   a ( 000 ) + c ( 011 ) , a ( 000 ) + c ( 101 ) . Hence, λ ( C ) = 000000 , 000110 , 000011 , 000101 .
Example 5.
Let C = a   r e s ( C ) c t o r ( C ) where r e s ( C ) and t o r ( C ) are binary codes generated by r e s ( C ) = ( 1111 ) and t o r ( C ) is Reed-muller code generated by G ( 1 , 2 ) = 1 0 1 0 0 1 0 1 0 0 1 1 then C = 0000 , a a a a , c 0 c 0 , 0 c 0 c , 00 c c , c 00 c , 0 c c 0 , c c 00 , c c c c , b a b a , a b a b , a a b b , b a a b , a b b a , b b a a , b b b b .
Hence
λ ( C ) = { 00000000 , 11111111 , 00001010 , 00000101 , 00000011 , 00001001 , 00000110 , 00001100 , 00001111 , 11110101 , 11111010 , 11111100 , 11110110 , 11111001 , 11110011 , 11110000 } .
We characterize the Gray image of a linear E-code as the Plotkin sum (a.k.a. ( u , u + v ) construction [1]) of its residue and torsion codes.
Theorem 7.
Let C be a linear code of length n over E. Then, λ ( C ) = { ( u , u + v ) | u r e s ( C ) and v t o r ( C ) } .
Proof. 
Let λ ( c ) λ ( C ) . Then, using Theorem 1, we have c = a u + c v where u r e s ( C ) and v t o r ( C ) . By definition of λ we have λ ( c ) = ( u , u + v ) { ( u , u + v ) | u r e s ( C ) and v t o r ( C ) } . Therefore, λ ( c ) { ( u , u + v ) | u r e s ( C ) and v t o r ( C ) } .
On the other hand, for any { ( u , u + v ) | u r e s ( C ) and v t o r ( C ) } , we have a u a r e s ( C ) C and c v t o r ( C ) C . By lineartiy of C, c u C and thus a u + c u + c v C . Hence, a u + c ( u + v ) C and ( u , u + v ) = λ ( a u + c ( u + v ) ) λ ( C ) . Therefore, { ( u , u + v ) | u r e s ( C ) and v t o r ( C ) } λ ( C ) . Hence, λ ( C ) = { ( u , u + v ) | u r e s ( C ) and v t o r ( C ) } .
Corollary 8.
Let C be a linear code of length n over E and λ ( C ) = { ( u , u + v ) | u r e s ( C ) and v t o r ( C ) } . Then, λ ( C ) = { ( u , u + v ) | u t o r ( C ) and v r e s ( C ) } .
Proof. 
Follows directly from Lemma 3 and Theorem 7. □
We need to prove the following proposition using Theorem 3 in order to be ready to explore the relationship between duality and the Gray map.
Proposition 3.
Let C be the dual code of C over E. If C is a left self-dual code over E then λ ( C ) = λ ( C ) .
Proof. 
For any c 1 = a u 1 + c v 1 C , c 2 = a u 2 + c v 2 C where u 1 , u 2 , v 1 , v 2 F 2 n , we can obtain that λ ( c 1 ) · λ ( c 2 ) = ( u 1 , u 1 + v 1 ) · ( u 2 , u 2 + v 2 ) = 2 u 1 · u 2 + u 1 · v 2 + v 1 · u 2 + v 1 · v 2 = 0 which means λ ( C ) λ ( C ) .
On the other hand, let λ ( c 1 ) = λ ( a u 1 + c v 1 ) = ( u 1 , u 1 + v 1 ) λ ( C ) and λ ( c 2 ) = λ ( a u 2 + c v 2 ) = ( u 2 , u 2 + v 2 ) λ ( C ) where u 1 , u 2 , v 1 , v 2 F 2 n , we can obtain that c 1 · c 2 = a 2 u 1 · u 2 + a c u 1 · v 2 + c a u 2 · v 1 + c 2 v 1 · v 2 = 0 which means λ ( C ) λ ( C ) . Hence, λ ( C ) = λ ( C ) . □
From the previous proposition, we can conclude the following directly.
Corollary 9.
If C is left self-dual over E then λ ( C ) is self-dual.
As for the previous proposition, the following example shows that it does not apply to self-dual and to right self-dual in this case.
Example 6.
The code C = { 00 , 0 c , c 0 , c c } is self-dual and right self-dual, then λ ( C ) = { a ( 00 ) + c ( 00 ) , a ( 00 ) + c ( 01 ) , a ( 00 ) + c ( 10 ) , a ( 00 ) + c ( 11 ) } . As C is self-dual λ ( C ) = λ ( C ) = { 0000 , 0001 , 0010 , 0011 } . Since ( 0001 ) · ( 0001 ) = 1 0 . 0001 λ ( C ) . Therefore, λ ( C ) λ ( C ) .
We may create a new code C 3 = λ ( C ) from a ( n , | C 1 | , d 1 ) code C 1 = r e s ( C ) and a ( n , | C 2 | , d 2 ) code C 2 = t o r ( C ) , both with the same lengths. This new code is composed of all vectors ( u , u + v ) , where u C 1 and v C 2 .
From Theorem 33 in [1], we can infer the following conclusion.
Corollary 10.
If C is a linear E-code with residue and torsion codes as said above then λ ( C ) is a ( 2 n , | C | , d = min { 2 d 1 , d 2 } ) code.
Example 7.
If C is such that its residue and torsion codes are the Simplex and Hamming codes of respective parameters [ 2 m 1 , m , 2 m 1 ] and [ 2 m 1 , 2 m 1 m , 3 ] for some integer m 2 , then λ ( C ) is a [ 2 m + 1 2 , 2 m 1 , 3 ] code.
Theorem 8.
Let C and D be two linear codes over E . The codes λ ( C ) and λ ( D ) are permutation equivalent if and only if C and D are permutation equivalent.
Proof. 
⇔ Since λ ( C ) and λ ( D ) are permutation equivalent then there exists a permutation matrix P such that r e s ( D ) = r e s ( C ) P and t o r ( D ) = t o r ( C ) P . Since C and D are two linear codes over E , by Theorem 1. We have C = a r e s ( C ) c t o r ( C ) and D = a r e s ( D ) c t o r ( D ) . This implies that D = a r e s ( C ) P c t o r ( C ) P . Hence, C and D are permutation equivalent. □
Proposition 4.
If C and D are two linear codes over E, such that λ ( C ) = λ ( D ) then C = D .
Proof. 
Since λ ( C ) = λ ( D ) , we know that r e s ( C ) = r e s ( D ) and t o r ( C ) = t o r ( D ) . Hence, we have C = D .
To prepare for the study of the symmetry of Gray images, we need the following Definition.
Definition 2.
Let φ s be the  quasi-cyclic shift  on ( F 2 n ) s given by: φ s ( x ( 1 ) | x ( 2 ) | | x ( s ) ) = ( σ ( x ( 1 ) ) | σ ( x ( 2 ) ) | | σ ( x ( s ) ) ) . A quasi-cyclic  code C of index s and length n s over F 2 is a subset of ( F 2 n ) s such that φ s ( C ) = C .
Proposition 5.
Let λ be the Gray map defined above, σ is the cyclic shift and φ 2 is the quasi-cyclic shift on ( F 2 n ) 2 . Then, we have λ ( σ ( C ) ) = φ 2 ( λ ( C ) ) .
Proof. 
Let c = ( c 0 , c 1 , , c n 1 ) E n where c i = a x i + c y i E and x i , y i F 2 n for i = 0 , 1 , , n 1 . Therefore, we have
λ ( σ ( c ) ) = λ ( c n 1 , c 0 , c 1 , , c n 2 ) = ( x n 1 , x 0 , x 1 , , x n 2 , x n 1 + y n 1 , x 0 + y 0 , x 1 + y 1 , , x n 2 + y n 2 ) ,
and
φ 2 ( λ ( c ) ) = φ 2 ( x 0 , x 1 , , x n 1 , x 0 + y 0 , x 1 + y 1 , , x n 1 + y n 1 ) = ( x n 1 , x 0 , x 1 , , x n 2 , x n 1 + y n 1 , x 0 + y 0 , x 1 + y 1 , , x n 2 + y n 2 ) .
Hence, λ ( σ ( C ) ) = φ 2 ( λ ( C ) ) .
Theorem 9.
If C is a cyclic code of length n over E, then λ ( C ) is a binary quasi-cyclic code of index 2 and length 2 n .
Proof. 
As C is a cyclic code of length n over E , then σ ( C ) = C . By taking λ for both sides and using Proposition 5, we obtain: φ 2 ( λ ( C ) ) = λ ( C ) . This implies that λ ( C ) is a binary quasi-cyclic code of index 2 and length 2 n . □
Considering Λ as the permuted version of the above Gray map λ , we define Λ as follows:
Λ ( c 0 , c 1 , , c n 1 ) = ( λ ( c 0 ) , λ ( c 1 ) , , λ ( c n 1 ) ) = ( x 0 , x 0 + y 0 , x 1 , x 1 + y 1 , , x n 1 , x n 1 + y n 1 )
where c j = a x j + c y j E and x j , y j F 2 for j = 0 , 1 , , n 1 .
In the next results, we extend a few results from [10]
Proposition 6.
For any c E n , we have Λ ( σ ( c ) ) = σ 2 ( Λ ( c ) ) , where Λ is the map defined in Equation (1) and σ is the cyclic shift.
Proof. 
Let c = ( c 0 , c 1 , , c n 1 ) E n where c j = a x j + c y j E and x j , y j F 2 n for j = 0 , 1 , , n 1 . Then
Λ ( σ ( c ) ) = Λ ( c n 1 , c 0 , c 1 , , c n 2 ) = ( x n 1 , x n 1 + y n 1 , x 0 , x 0 + y 0 , x 1 , x 1 + y 1 , , x n 2 , x + n 2 + y n 2 ) ,
and
σ 2 ( Λ ( c ) ) = σ 2 ( x 0 , x 0 + y 0 , x 1 , x 1 + y 1 , , x n 1 , x n 1 + y n 1 ) = ( x n 1 , x n 1 + y n 1 , x 0 , x 0 + y 0 , x 1 , x 1 + y 1 , , x n 2 , x n 2 + y n 2 ) .
Hence, Λ ( σ ( C ) ) = σ 2 ( Λ ( C ) ) .
Theorem 10.
Let C be a cyclic code of length n over E. Then, Λ ( C ) is equivalent to a 2-quasicyclic code of length 2 n over F 2 .
Proof. 
As C is a cyclic code of length n over E ,   σ ( C ) = C . By taking Λ for both sides and using Proposition 6, we obtain: σ 2 ( Λ ( C ) ) = Λ ( C ) . This implies that Λ ( C ) is equivalent to a 2-quasicyclic code of length 2 n over F 2 . □
The following proposition discusses the special case if n is an odd. We applied Theorem 1 from [11] in the next proposition.
Proposition 7.
Let r e s ( C ) be a binary cyclic code of length n (odd) with generator g 1 ( x ) and let t o r ( C ) be a binary cyclic code of length n with generator g 2 ( x ) and g 2 ( x ) | g 1 ( x ) . Then, the Gray image is a binary cyclic code of length 2 n with generator g 1 ( x ) g 2 ( x ) is equivalent to the ( u , u + v ) sum of r e s ( C ) and t o r ( C ) .
The following simple example illustrates the previous proposition.
Example 8.
Let C be a linear cyclic code of length 3 over E with a generator matrix
G = a a a c 0 0 0 c 0 0 0 c ,
where r s e ( C ) is a binary cyclic code of length 3 generated by ( 111 ) and t o r ( C ) is a binary cyclic code of length 3 generated by I 3 . Then,
λ ( C ) = { 000000 , 111111 , 000100 , 000010 , 000001 , 000110 , 000101 , 000011 , 000111 , 111011 , 111101 , 111110 , 111001 , 111010 , 111100 , 111000 } .
is binary cyclic code of length 6.

5. Cyclic DNA Codes over E

The goal of DNA coding theory is to provide error-correcting codes for nucleic acid systems. Deoxyribonucleic acid, or DNA, is a molecule made up of four units termed nucleotides: adenine, thymine, guanine, and cystosine, represented by the letters A, T, G, and C, respectively. These four units are combined to form double strands. Chains of these nucleotides are connected by hydrogen bonds, holding them together. G and C have three hydrogen bonds, whereas A and T have two. As a result, these joints form the complementary base pairings { G , C } and { A , T } . The Watson–Crick complement is what it is known as. We express it as T c = A and C c = G , or alternatively as A c = T and G c = C . Therefore, the set { A , T , G , C } is a bijection of this complement map.
Definition 3
([8]). Let x = ( x 1 x 2 x n ) be given (i.e., x i { A , T , G , C } ) .
  • The r e v e r s e of x, denoted by x R , is the codeword ( x n x n 1 x 1 ) .
  • The c o m p l e m e n t of x, denoted by x C , is the codeword ( x 1 C x 2 C x n C ) .
  • The r e v e r s e   c o m p l e m e n t of x is x R C = ( x R ) C = ( x C ) R .
Theorem 11.
Let C be a linear code over E then C is reversible code over E if and only if r e s ( C ) and t o r ( C ) are reversible codes over F 2 .
Proof. 
If C is a reversible code over E , we want to prove that r e s ( C ) and t o r ( C ) are both reversible. Let x r e s ( C ) then a x C and since C is reversible this implies that a ( x n x n 1 x 1 ) C then we obtain ( x n x n 1 x 1 ) r e s ( C ) and this means r e s ( C ) is reversible. Let y t o r ( C ) then c y C and as C is reversible this implies that c ( y n y n 1 y 1 ) C then we have ( y n y n 1 y 1 ) t o r ( C ) and we conclude t o r ( C ) is reversible. Conversely, If r e s ( C ) and t o r ( C ) are reversible then a r e s ( C ) and c t o r ( C ) are reversible. We need to show that C = a r e s ( C ) c t o r ( C ) is reversible. Let u = a x + c y a r e s ( C ) c t o r ( C ) then u = a ( x n x n 1 x 1 ) + c ( y n y n 1 y 1 ) a r e s ( C ) c t o r ( C ) . Hence, C is reversible. □
In the following remark, we recall the conditions for binary cyclic codes to be reversible.
Remark 1.
Let f ˜ ( x ) denote the reciprocal of a polynomial f ( x ) of F 2 [ x ] . If r e s ( C ) and t o r ( C ) are [ n , k ] cyclic codes over F 2 with generators polynomials g 1 ( x ) and g 2 ( x ) , respectively, then they are LCD codes if and only if g 1 ( x ) = g ˜ 1 ( x ) and g 2 ( x ) = g ˜ 2 ( x ) and all the monic irreducible factors of g 1 ( x ) and g 2 ( x ) have same multiplicity in x n 1 [12]. In particular, for n odd, r e s ( C ) and t o r ( C ) are LCD codes if and only if they are reversible codes [13].
Lemma 4.
Let C be a cyclic code over E then C is a reversible code over E if and only if r e s ( C ) and t o r ( C ) are cyclic reversible codes over F 2 .
Proof. 
By combining Theorem 11 and Remark 1 we obtain the result. □
Maps that make it simple to compute the complement must be defined before building DNA codes over rings. This implies that the definition of the complement map must be over finite rings.
Definition 4
([8]). Let R be a ring of order 4 and f : { A , T , C , G } R be a proper representation map. It means f is bijective. A complement map ϕ over R is a bijection defined by ϕ ( f ( x ) ) = f ( x C ) .
Since x C x and ( x C ) C = x , we can verify that ϕ ( x ) x and ϕ 2 ( x ) = x . ϕ is indicated by ϕ ( x ) = x C . Since this ϕ is a bijection on R, defining this map ϕ is simple. Whether there is a straightforward definition of ϕ is the question. In particular, we wish to define an element α R such that x C = x + α .
Denote by r : E E / J = F 2 , the map of reduction modulo J. Thus, r ( 0 ) = r ( c ) = 0 and r ( a ) = r ( b ) = 1 . Let define f : { A , T , G , C } E by f ( A ) = 0 , f ( T ) = c , f ( G ) = a and f ( C ) = b . Then, r ( f ( C ) ) = r ( f ( G ) ) = 1 , and the others go to 0.
In the following theorem, we will define the basic condition for the code to be equal to its complement.
Theorem 12.
Let C be a linear code over E . This code is invariant under complementation ( C C = C ) iff the code t o r ( C ) contains the all-one codeword.
Proof. 
The condition is necessary since 0 C = c j where j denotes the all-one vector. We prove the sufficient condition. Since C = a r e s ( C ) c t o r ( C ) we want to prove that C C = C . Note, first that if t o r ( C ) contains j then t o r ( C ) ¯ = t o r ( C ) , and, therefore, ( c t o r ( C ) ) C = c t o r ( C ) .
We compute
C C = ( a r e s ( C ) ) C ( c t o r ( C ) ) C = ( a r e s ( C ) + c j ) c t o r ( C ) C .
Since the map x x C is one-to-one we see that | C | = | C C | . Hence, C C = C .

6. Numerical Results

In the following, we classify, up to equivalence, Cyclic codes up to length 7. All the computations needed for this section were performed in Magma [14].
The generator matrices of the classified cyclic codes n = 6 and n = 7 can be found at: https://www.kau.edu.sa/GetFile.aspx?id=317363&fn=Gen (accessed on 29 April 2024).
We use the following steps to classify cyclic codes up to length 7 over the ring E:
  • The binary cyclic codes with lengths ranging from n = 2 to n = 7 were initially identified.
  • Second, all pairs C 1 C 2 of cyclic codes were considered. The choice r e s ( C ) = C 1 and t o r ( C ) = C 2 was made to construct a cyclic code C over E .
  • Third, we may build the generator matrices for the cyclic codes on the ring E after determining r e s ( C ) and t o r ( C ) .
  • Finally, we will just include the non-equivalent codes in the tables that follow.

6.1. Length 2 (5 Codes)

In Table 1 the main properties of length 2 are summarized.

6.2. Length 3 (8 Codes)

In this length codes neither left self-dual nor Type IV. And In Table 2 the main properties of length 3 are summarized.

6.3. Length 4 (14 Codes)

In this length codes are not left self-dual except for the sixth, codes are not Type IV except for the sixth and seventh and codes are not LCD except for the fourteenth. Also, in Table 3 and Table 4 the main properties of length 4 are summarized.

6.4. Length 5 (Eight Codes)

In this length codes neither left self-dual nor Type IV, codes are not QSD except for the fourth and codes are not Even except for the third. Also, in Table 5 and Table 6 the main properties of length 5 are summarized.

6.5. Length 6 (35 Codes)

In this length codes are not left self-dual except G 20 , codes are not QSD except G 15 , G 16 , G 18 and G 20 , codes are not Type IV except G 16 and G 20 and codes are not LCD except G 10 , G 28 and G 35 . Also, in Table 7 and Table 8 the main properties of length 6 are summarized.

6.6. Length 7 (26 Codes)

In this length, we have 18 equivalent codes, and they are G 3 equivalent to G 4 , G 5 equivalent to G 6 , G 7 equivalent to G 8 , G 10 equivalent to G 11 , G 13 equivalent to G 14 , G 16 equivalent to G 17 , G 18 equivalent to G 19 , G 20 equivalent to G 21 and finally G 22 equivalent to G 23 . In this length codes neither left self-dual nor Type IV, codes are not QSD except G 12 , G 13 and G 14 , codes are not Even except G 3 , G 4 , G 9 , G 10 and G 11 and codes are not LCD except G 2 , G 24 and G 26 . In the Table 9, we will only list the non-eqivalent codes.

7. Conclusions and Open Problems

In this work, we have studied cyclic codes over the non-unital ring E . We have given criteria for a cyclic code over E to be self-dual, left self-dual, or right self-dual. We have derived an algorithm to classify cyclic codes of a given length, based on the classification of cyclic binary codes of that length. A Gray map allows us to construct quasi-cyclic codes of index 2 from cyclic codes over E . In the future, we plan to study the same questions over other non-unitary rings, possibly of characteristics larger than 2 .

Author Contributions

Conceptualization, A.A.; Methodology, M.A.; Investigation, M.A. and P.S.; Supervision, A.A. and P.S.; Funding acquisition, A.A. This article was written in equal co-authorship. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by The Deanship of Scientific Research (DSR) at King Abdulaziz University (KAU), Jeddah, Saudi Arabia OF FUNDER grant number (KEP-PhD: 100-130-1443).

Data Availability Statement

All computations conducted in this paper are available upon request from the authors.

Acknowledgments

The Deanship of Scientific Research (DSR) at King Abdulaziz University (KAU), Jeddah, Saudi Arabia has funded this project, under grant no. (KEP-PhD: 100-130-1443).

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. MacWilliams, F.J.; Sloane, N.J.A. The Theory of Error Correcting Codes; Elsevier: Amsterdam, The Netherlands, 1977; Volume 16. [Google Scholar]
  2. Shi, M.; Alahmadi, A.; Solé, P. Codes and Rings: Theory and Practice; Academic Press: Cambridge, MA, USA, 2017. [Google Scholar]
  3. Alahmadi, A.; Altaiary, M.; Solé, P. Cyclic codes over a non-local non-unital ring. Mathematics 2024, 12, 866. [Google Scholar] [CrossRef]
  4. Fine, B. Classification of finite rings of order p2. Math. Mag. 1993, 66, 248–252. [Google Scholar] [CrossRef]
  5. Alahmadi, A.; Altassan, A.; Basaffar, W.; Shoaib, H.; Bonnecaze, A.; Solé, P. Type IV codes over a non-unital ring. J. Algebra Its Appl. 2022, 1, 2250142. [Google Scholar] [CrossRef]
  6. Alahmadi, A.; Melaibari, A.; Solé, P. Duality of codes over non-unital rings of order four. IEEE Access 2023, 11, 53120–53133. [Google Scholar] [CrossRef]
  7. Massey, J.L. Linear codes with complementary duals. Discret. Math. 1992, 106, 337–342. [Google Scholar] [CrossRef]
  8. Kim, J.L.; Ohk, D.E. DNA codes over two noncommutative rings of order four. J. Appl. Math. Comput. 2022, 68, 2015–2038. [Google Scholar] [CrossRef]
  9. Huffman, W.C.; Pless, V. Fundamentals of Error-Correcting Codes; Cambridge University Press: Cambridge, UK, 2010. [Google Scholar]
  10. Kom, S.T.T.; Ratnabala Dev, O. Identifying cyclic and (1 + 2v)-constacyclic codes over Z 4 [v]/< v3 − 1> with Z 4 -linear codes. TWMS J. App. and Eng. Math. 2023, 13, 951–962. [Google Scholar]
  11. Van Lint, J.H. Repeated-root cyclic codes. IEEE Trans. Inf. Theory 1991, 37, 343–345. [Google Scholar] [CrossRef]
  12. Yang, X.; Massey, J.L. The condition for a cyclic code to have a complementary dual. Discret. Math. 1994, 126, 391–393. [Google Scholar] [CrossRef]
  13. Massey, J.L. Reversible codes. Inf. Control. 1964, 7, 369–380. [Google Scholar] [CrossRef]
  14. Bosma, W.; Cannon, J.; Playoust, C. The Magma algebra system I: The user language. J. Symb. Comput. 1997, 24, 235–265. [Google Scholar] [CrossRef]
Table 1. Cyclic codes of length 2.
Table 1. Cyclic codes of length 2.
Generator Matrix d H LSDSOQSDType IVLCDEvenWeight Distribution
c c 2 [ < 0 , 1 > , < 2 , 1 > ]
c 0 0 c 1    [ < 0 , 1 > , < 1 , 2 > , < 2 , 1 > ]
a a c c 2    [ < 0 , 1 > , < 2 , 3 > ]
a a c 0 0 c 1     [ < 0 , 1 > , < 1 , 2 > , < 2 , 5 > ]
a 0 0 a c 0 0 c 1         [ < 0 , 1 > , < 1 , 6 > , < 2 , 9 > ]
Table 2. Cyclic codes of length 3.
Table 2. Cyclic codes of length 3.
Generator Matrix d H SOQSDLCDEvenWeight Distribution
c c c 3 [ < 0 , 1 > , < 3 , 1 > ]
c c 0 0 c c 2    [ < 0 , 1 > , < 2 , 3 > ]
c 0 0 0 c 0 0 0 c 1          [ < 0 , 1 > , < 1 , 3 > , < 2 , 3 > , < 3 , 1 > ]
a a a c c c 3    [ < 0 , 1 > , < 3 , 3 > ]
a a a c 0 0 0 c 0 0 0 c 1     [ < 0 , 1 > , < 1 , 3 > , < 2 , 3 > , < 3 , 9 > ]
a a 0 0 a a c c 0 0 c c 2         [ < 0 , 1 > , < 2 , 9 > , < 3 , 6 > ]
a a 0 0 a a c 0 0 0 c 0 0 0 c 1      [ < 0 , 1 > , < 1 , 3 > , < 2 , 15 > , < 3 , 13 > ]
a 0 0 0 a 0 0 0 a c 0 0 0 c 0 0 0 c 1            [ < 0 , 1 > , < 1 , 9 > , < 2 , 27 > , < 3 , 27 > ]
Table 3. Cyclic codes of length 4.
Table 3. Cyclic codes of length 4.
Generator Matrix d H SOQSDEvenWeight Distribution
c c c c 4 [ < 0 , 1 > , < 4 , 1 > ]
a a a a c c c c 4      [ < 0 , 1 > , < 4 , 3 > ]
c 0 c 0 0 c 0 c 2      [ < 0 , 1 > , < 2 , 2 > , < 4 , 1 > ]
c c 0 0 0 c c 0 0 0 c c 2        [ < 0 , 1 > , < 2 , 6 > , < 4 , 1 > ]
a a a a c 0 c 0 0 c 0 c 2        [ < 0 , 1 > , < 2 , 2 > , < 4 , 5 > ]
a 0 a 0 0 a 0 a c 0 c 0 0 c 0 c 2             [ < 0 , 1 > , < 2 , 6 > , < 4 , 9 > ]
a a a a c c 0 0 0 c c 0 0 0 c c 2             [ < 0 , 1 > , < 2 , 6 > , < 4 , 9 > ]
a 0 a 0 0 a 0 a c c 0 0 0 c c 0 0 0 c c 2       [ < 0 , 1 > , < 2 , 10 > , < 3 , 8 > , < 4 , 13 > ]
c 0 0 0 0 c 0 0 0 0 c 0 0 0 0 c 1              [ < 0 , 1 > , < 1 , 4 > , < 2 , 6 > , < 3 , 4 > , < 4 , 1 > ]
a a a a c 0 0 0 0 c 0 0 0 0 c 0 0 0 0 c 1       [ < 0 , 1 > , < 1 , 4 > , < 2 , 6 > , < 3 , 4 > , < 4 , 17 > ]
a 0 a 0 0 a 0 a c 0 0 0 0 c 0 0 0 0 c 0 0 0 0 c 1       [ < 0 , 1 > , < 1 , 4 > , < 2 , 14 > , < 3 , 20 > , < 4 , 25 > ]
Table 4. Cyclic codes of length 4.
Table 4. Cyclic codes of length 4.
Generator Matrix d H SOQSDEvenWeight Distribution
a a 0 0 0 a a 0 0 0 a a c c 0 0 0 c c 0 0 0 c c 2       [ < 0 , 1 > , < 2 , 18 > , < 3 , 24 > , < 4 , 21 > ]
a a 0 0 0 a a 0 0 0 a a c 0 0 0 0 c 0 0 0 0 c 0 0 0 0 c 1          [ < 0 , 1 > , < 1 , 4 > , < 2 , 30 > , < 3 , 52 > , < 4 , 41 > ]
a 0 0 0 0 a 0 0 0 0 a 0 0 0 0 a c 0 0 0 0 c 0 0 0 0 c 0 0 0 0 c 1            [ < 0 , 1 > , < 1 , 12 > , < 2 , 54 > , < 3 , 108 > , < 4 , 81 > ]
Table 5. Cyclic codes of length 5.
Table 5. Cyclic codes of length 5.
Generator Matrix d H SOLCDWeight Distribution
c c c c c 5 [ < 0 , 1 > , < 5 , 1 > ]
a a a a a c c c c c 5      [ < 0 , 1 > , < 5 , 3 > ]
c c 0 0 0 0 c c 0 0 0 0 c c 0 0 0 0 c c 2          [ < 0 , 1 > , < 2 , 10 > , < 4 , 5 > ]
c 0 0 0 0 0 c 0 0 0 0 0 c 0 0 0 0 0 c 0 0 0 0 0 c 1              [ < 0 , 1 > , < 1 , 5 > , < 2 , 10 > , < 3 , 10 > , < 4 , 5 > , < 5 , 1 > ]
a a a a a c 0 0 0 0 0 c 0 0 0 0 0 c 0 0 0 0 0 c 0 0 0 0 0 c 1          [ < 0 , 1 > , < 1 , 5 > , < 2 , 10 > , < 3 , 10 > , < 4 , 5 > , < 5 , 33 > ]
a a 0 0 0 0 a a 0 0 0 0 a a 0 0 0 0 a a c c 0 0 0 0 c c 0 0 0 0 c c 0 0 0 0 c c 2                      [ < 0 , 1 > , < 2 , 30 > , < 3 , 60 > , < 4 , 105 > , < 5 , 60 > ]
Table 6. Cyclic codes of length 5.
Table 6. Cyclic codes of length 5.
Generator Matrix d H SOLCDWeight Distribution
a a 0 0 0 0 a a 0 0 0 0 a a 0 0 0 0 a a c 0 0 0 0 0 c 0 0 0 0 0 c 0 0 0 0 0 c 0 0 0 0 0 c 1            [ < 0 , 1 > , < 1 , 5 > , < 2 , 50 > , < 3 , 130 > , < 4 , 205 > , < 5 , 121 > ]
a 0 0 0 0 0 a 0 0 0 0 0 a 0 0 0 0 0 a 0 0 0 0 0 a c 0 0 0 0 0 c 0 0 0 0 0 c 0 0 0 0 0 c 0 0 0 0 0 c 1                            [ < 0 , 1 > , < 1 , 15 > , < 2 , 90 > , < 3 , 270 > , < 4 , 405 > , < 5 , 243 > ]
Table 7. Cyclic codes of length 6.
Table 7. Cyclic codes of length 6.
Generator Matrix d H SOEvenWeight Distribution
G 1 6 [ < 0 , 1 > , < 6 , 1 > ]
G 2 3 [ < 0 , 1 > , < 3 , 2 > , < 6 , 1 > ]
G 3 4 [ < 0 , 1 > , < 4 , 3 > ]
G 4 6 [ < 0 , 1 > , < 6 , 3 > ]
G 5 2 [ < 0 , 1 > , < 2 , 3 > , < 4 , 3 > , < 6 , 1 > ]
G 6 3 [ < 0 , 1 > , < 3 , 2 > , < 6 , 5 > ]
G 7 2 [ < 0 , 1 > , < 2 , 3 > , < 3 , 8 > , < 4 , 3 > , < 6 , 1 > ]
G 8 2 [ < 0 , 1 > , < 2 , 6 > , < 4 , 9 > ]
G 9 2 [ < 0 , 1 > , < 2 , 3 > , < 4 , 3 > , < 6 , 9 > ]
G 10 3 [ < 0 , 1 > , < 3 , 6 > , < 6 , 9 > ]
G 11 4 [ < 0 , 1 > , < 4 , 9 > , < 6 , 6 > ]
G 12 2 [ < 0 , 1 > , < 2 , 15 > , < 4 , 15 > , < 6 , 1 > ]
G 13 2 [ < 0 , 1 > , < 2 , 3 > , < 3 , 8 > , < 4 , 3 > , < 6 , 17 > ]
G 14 2 [ < 0 , 1 > , < 2 , 3 > , < 4 , 15 > , < 6 , 13 > ]
G 15 1 [ < 0 , 1 > , < 1 , 6 > , < 2 , 15 > , < 3 , 20 > ,
< 4 , 15 > , < 5 , 6 > , < 6 , 1 > ]
G 16 2 [ < 0 , 1 > , < 2 , 15 > , < 4 , 15 > , < 6 , 33 > ]
G 17 2 [ < 0 , 1 > , < 2 , 3 > , < 3 , 12 > ,
< 4 , 19 > , < 5 , 20 > , < 6 , 9 > ]
G 18 2 [ < 0 , 1 > , < 2 , 3 > , < 3 , 8 > ,
< 4 , 15 > , < 5 , 24 > , < 6 , 13 > ]
G 19 2 [ < 0 , 1 > , < 2 , 6 > , < 4 , 21 > , < 5 , 24 > , < 6 , 12 > ]
G 20 2 [ < 0 , 1 > , < 2 , 9 > , < 4 , 27 > , < 6 , 27 > ]
G 21 1 [ < 0 , 1 > , < 1 , 6 > , < 2 , 15 > , < 3 , 20 > ,
< 4 , 15 > , < 5 , 6 > , < 6 , 65 > ]
G 22 2 [ < 0 , 1 > , < 2 , 15 > , < 4 , 39 > , < 5 , 48 > , < 6 , 25 > ]
G 23 2 [ < 0 , 1 > , < 2 , 9 > , < 3 , 8 > ,
< 4 , 51 > , < 5 , 24 > , < 6 , 35 > ]
G 24 1 [ < 0 , 1 > , < 1 , 6 > , < 2 , 15 > , < 3 , 36 > ,
< 4 , 63 > , < 5 , 54 > , < 6 , 81 > ]
G 25 1 [ < 0 , 1 > , < 1 , 6 > , < 2 , 15 > , < 3 , 20 > ,
< 4 , 63 > , < 5 , 102 > , < 6 , 49 > ]
G 26 2 [ < 0 , 1 > , < 2 , 21 > , < 3 , 24 > ,
< 4 , 75 > , < 5 , 72 > , < 6 , 63 > ]
G 27 2 [ < 0 , 1 > , < 2 , 9 > , < 3 , 24 > ,
< 4 , 99 > , < 5 , 72 > , < 6 , 51 > ]
G 28 2 [ < 0 , 1 > , < 2 , 18 > , < 3 , 12 > ,
< 4 , 81 > , < 5 , 108 > , < 6 , 36 > ]
G 29 1 [ < 0 , 1 > , < 1 , 6 > , < 2 , 27 > , < 3 , 68 > ,
< 4 , 135 > , < 5 , 150 > , < 6 , 125 > ]
Table 8. Cyclic codes of length 6.
Table 8. Cyclic codes of length 6.
Generator Matrix d H SOEvenWeight Distribution
G 30 2 [ < 0 , 1 > , < 2 , 27 > , < 3 , 48 > ,
< 4 , 159 > , < 5 , 192 > , < 6 , 85 > ]
G 31 1 [ < 0 , 1 > , < 1 , 6 > , < 2 , 27 > , < 3 , 132 > ,
< 4 , 327 > , < 5 , 342 > , < 6 , 189 > ]
G 32 1 [ < 0 , 1 > , < 1 , 6 > , < 2 , 39 > , < 3 , 116 > ,
< 4 , 303 > , < 5 , 390 > , < 6 , 169 > ]
G 33 2 [ < 0 , 1 > , < 2 , 45 > , < 3 , 120 > ,
< 4 , 315 > , < 5 , 360 > , < 6 , 183 > ]
G 34 1 [ < 0 , 1 > , < 1 , 6 > , < 2 , 75 > , < 3 , 260 > ,
< 4 , 615 > , < 5 , 726 > , < 6 , 365 > ]
G 35 1 [ < 0 , 1 > , < 1 , 18 > , < 2 , 135 > , < 3 , 540 > ,
< 4 , 1215 > , < 5 , 1458 > , < 6 , 729 > ]
Table 9. Cyclic codes of length 7.
Table 9. Cyclic codes of length 7.
Generator Matrix d H SOWeight Distribution
G 1 7 [ < 0 , 1 > , < 7 , 1 > ]
G 2 7 [ < 0 , 1 > , < 7 , 3 > ]
G 3 4 [ < 0 , 1 > , < 4 , 7 > ]
G 5 3 [ < 0 , 1 > , < 3 , 7 > , < 4 , 7 > , < 7 , 1 > ]
G 7 3 [ < 0 , 1 > , < 3 , 7 > , < 4 , 7 > , < 7 , 17 > ]
G 9 2 [ < 0 , 1 > , < 2 , 21 > , < 4 , 35 > , < 6 , 7 > ]
G 10 4 [ < 0 , 1 > , < 4 , 21 > , < 6 , 42 > ]
G 12 1 [ < 0 , 1 > , < 1 , 7 > , < 2 , 21 > , < 3 , 35 > ,
< 4 , 35 > , < 5 , 21 > , < 6 , 7 > , < 7 , 1 > ]
G 13 3 [ < 0 , 1 > , < 3 , 7 > , < 4 , 21 > , < 5 , 42 > , < 6 , 42 > , < 7 , 15 > ]
G 15 1 [ < 0 , 1 > , < 1 , 7 > , < 2 , 21 > , < 3 , 35 > ,
< 4 , 35 > , < 5 , 21 > , < 6 , 7 > , < 7 , 129 > ]
G 16 3 [ < 0 , 1 > , < 3 , 21 > , < 4 , 21 > , < 5 , 126 > , < 6 , 42 > , < 7 , 45 > ]
G 18 2 [ < 0 , 1 > , < 2 , 21 > , < 4 , 91 > , < 5 , 168 > , < 6 , 175 > , < 7 , 56 > ]
G 20 1 [ < 0 , 1 > , < 1 , 7 > , < 2 , 21 > , < 3 , 35 > ,
< 4 , 147 > , < 5 , 357 > , < 6 , 343 > , < 7 , 113 > ]
G 22 1 [ < 0 , 1 > , < 1 , 7 > , < 2 , 21 > , < 3 , 91 > ,
< 4 , 371 > , < 5 , 693 > , < 6 , 567 > , < 7 , 297 > ]
G 24 2 [ < 0 , 1 > , < 2 , 63 > , < 3 , 210 > , < 4 , 735 > ,
< 5 , 1260 > , < 6 , 1281 > , < 7 , 546 > ]
G 25 1 [ < 0 , 1 > , < 1 , 7 > , < 2 , 105 > , < 3 , 455 > ,
< 4 , 1435 > , < 5 , 2541 > , < 6 , 2555 > , < 7 , 1093 > ]
G 26 1 [ < 0 , 1 > , < 1 , 21 > , < 2 , 189 > , < 3 , 945 > ,
< 4 , 2835 > , < 5 , 5103 > , < 6 , 5103 > , < 7 , 2187 > ]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alahmadi, A.; Altaiary, M.; Solé, P. Cyclic Codes over a Non-Commutative Non-Unital Ring. Mathematics 2024, 12, 2014. https://doi.org/10.3390/math12132014

AMA Style

Alahmadi A, Altaiary M, Solé P. Cyclic Codes over a Non-Commutative Non-Unital Ring. Mathematics. 2024; 12(13):2014. https://doi.org/10.3390/math12132014

Chicago/Turabian Style

Alahmadi, Adel, Malak Altaiary, and Patrick Solé. 2024. "Cyclic Codes over a Non-Commutative Non-Unital Ring" Mathematics 12, no. 13: 2014. https://doi.org/10.3390/math12132014

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop