Algebra and Its Applications

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Algebra, Geometry and Topology".

Deadline for manuscript submissions: closed (31 October 2020) | Viewed by 32466

Special Issue Editor


E-Mail Website
Guest Editor
Department of Mathematics, Sogang University, Seoul, Korea
Interests: applied algebra; coding theory; cryptography; discrete math; finite fields; machine learning; artificial intelligence; bioinformatics

Special Issue Information

Dear Colleagues,

Algebra has become one of the core areas in Mathematics. In addition to its fundamentals, Algebra has wide applications to several areas. In particular, post quantum cryptography is based on lattices, codes, or polynomials. In coding theory, there are many algebraic codes such as cyclic codes, quadratic residue codes, Goppa codes, and algebraic geometry codes. Algebraic graph theory involves the study of graphs in connection with linear algebra and the spectrum of the adjacency matrix. Cayley graphs are based on groups as well.

DNA codes are based on four alphabets A, C, G, and T so that rings with four elements are used for the construction of DNA codes. Algebraic Machine Learning is a recently developed machine learning technique based on algebraic representations of data.

We invited our colleagues to submit papers related to both aspects of Algebra and its Applications. Algebra includes (but not limited to) number theory, linear algebra, finite fields, group theory, and ring theory. Its applications include topics applying algebra to discrete math, graph theory, coding theory, cryptography, algebraic aspects of machine learning and bioinformatics. Contributions involving novel applications of algebra are also encouraged.

Prof. Jon-Lark Kim
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Algebra
  • Applied algebra
  • Groups
  • Rings
  • Fields
  • Graph theory
  • Coding theory
  • Cryptography
  • Algebraic machine learning
  • Algebraic bioinformatics

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (13 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

14 pages, 288 KiB  
Article
Twisted Hermitian Codes
by Austin Allen, Keller Blackwell, Olivia Fiol, Rutuja Kshirsagar, Bethany Matsick, Gretchen L. Matthews and Zoe Nelson
Mathematics 2021, 9(1), 40; https://doi.org/10.3390/math9010040 - 26 Dec 2020
Cited by 2 | Viewed by 2620
Abstract
We define a family of codes called twisted Hermitian codes, which are based on Hermitian codes and inspired by the twisted Reed–Solomon codes described by Beelen, Puchinger, and Nielsen. We demonstrate that these new codes can have high-dimensional Schur squares, and we identify [...] Read more.
We define a family of codes called twisted Hermitian codes, which are based on Hermitian codes and inspired by the twisted Reed–Solomon codes described by Beelen, Puchinger, and Nielsen. We demonstrate that these new codes can have high-dimensional Schur squares, and we identify a subfamily of twisted Hermitian codes that achieves a Schur square dimension close to that of a random linear code. Twisted Hermitian codes allow one to work over smaller alphabets than those based on Reed–Solomon codes of similar lengths. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
19 pages, 315 KiB  
Article
Consistent Flag Codes
by Clementa Alonso-González and Miguel Ángel Navarro-Pérez
Mathematics 2020, 8(12), 2234; https://doi.org/10.3390/math8122234 - 17 Dec 2020
Cited by 3 | Viewed by 2131
Abstract
In this paper we study flag codes on Fqn, being Fq the finite field with q elements. Special attention is given to the connection between the parameters and properties of a flag code and the ones of a family [...] Read more.
In this paper we study flag codes on Fqn, being Fq the finite field with q elements. Special attention is given to the connection between the parameters and properties of a flag code and the ones of a family of constant dimension codes naturally associated to it (the projected codes). More precisely, we focus on consistent flag codes, that is, flag codes whose distance and size are completely determined by their projected codes. We explore some aspects of this family of codes and present examples of them by generalizing the concepts of equidistant and sunflower subspace code to the flag codes setting. Finally, we present a decoding algorithm for consistent flag codes that fully exploits the consistency condition. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
24 pages, 356 KiB  
Article
New DNA Codes from Cyclic Codes over Mixed Alphabets
by Hai Q. Dinh, Sachin Pathak, Ashish Kumar Upadhyay and Woraphon Yamaka
Mathematics 2020, 8(11), 1977; https://doi.org/10.3390/math8111977 - 6 Nov 2020
Cited by 9 | Viewed by 2340
Abstract
Let R=F4+uF4,withu2=u and [...] Read more.
Let R=F4+uF4,withu2=u and S=F4+uF4+vF4,withu2=u,v2=v,uv=vu=0. In this paper, we study F4RS-cyclic codes of block length (α,β,γ) and construct cyclic DNA codes from them. F4RS-cyclic codes can be viewed as S[x]-submodules of Fq[x]xα1×R[x]xβ1×S[x]xγ1. We discuss their generator polynomials as well as the structure of separable codes. Using the structure of separable codes, we study cyclic DNA codes. By using Gray maps ψ1 from R to F42 and ψ2 from S to F43, we give a one-to-one correspondence between DNA codons of the alphabets {A,T,G,C}2,{A,T,G,C}3 and the elements of R,S, respectively. Then we discuss necessary and sufficient conditions of cyclic codes over F4, R, S and F4RS to be reversible and reverse-complement. As applications, we provide examples of new cyclic DNA codes constructed by our results. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
8 pages, 298 KiB  
Article
Union of Sets of Lengths of Numerical Semigroups
by J. I. García-García, D. Marín-Aragón and A. Vigneron-Tenorio
Mathematics 2020, 8(10), 1789; https://doi.org/10.3390/math8101789 - 15 Oct 2020
Viewed by 1486
Abstract
Let S=a1,,ap be a numerical semigroup, let sS and let Z(s) be its set of factorizations. The set of lengths is denoted by [...] Read more.
Let S=a1,,ap be a numerical semigroup, let sS and let Z(s) be its set of factorizations. The set of lengths is denoted by L(s)={L(x1,,xp)(x1,,xp)Z(s)}, where L(x1,,xp)=x1++xp. The following sets can then be defined: W(n)={sSxZ(s)suchthatL(x)=n}, ν(n)=sW(n)L(s)={l1<l2<<lr} and Δν(n)={l2l1,,lrlr1}. In this paper, we prove that the function Δν:NP(N) is almost periodic with period lcm(a1,ap). Full article
(This article belongs to the Special Issue Algebra and Its Applications)
24 pages, 325 KiB  
Article
Ore Extensions for the Sweedler’s Hopf Algebra H4
by Shilin Yang and Yongfeng Zhang
Mathematics 2020, 8(8), 1293; https://doi.org/10.3390/math8081293 - 5 Aug 2020
Cited by 6 | Viewed by 1872
Abstract
The aim of this paper is to classify all Hopf algebra structures on the quotient of Ore extensions H4[z;σ] of automorphism type for the Sweedlers 4-dimensional Hopf algebra H4. Firstly, we calculate all [...] Read more.
The aim of this paper is to classify all Hopf algebra structures on the quotient of Ore extensions H4[z;σ] of automorphism type for the Sweedlers 4-dimensional Hopf algebra H4. Firstly, we calculate all equivalent classes of twisted homomorphisms (σ,J) for H4. Then we give the classification of all bialgebra (Hopf algebra) structures on the quotients of H4[z;σ] up to isomorphism. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
5 pages, 183 KiB  
Article
A New Secret Sharing Scheme Based on Polynomials over Finite Fields
by Selda Çalkavur, Patrick Solé and Alexis Bonnecaze
Mathematics 2020, 8(8), 1200; https://doi.org/10.3390/math8081200 - 22 Jul 2020
Cited by 6 | Viewed by 2964
Abstract
In this paper, we examine a secret sharing scheme based on polynomials over finite fields. In the presented scheme, the shares can be used for the reconstruction of the secret using polynomial multiplication. This scheme is both ideal and perfect. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
8 pages, 256 KiB  
Article
Estrada Index and Laplacian Estrada Index of Random Interdependent Graphs
by Yilun Shang
Mathematics 2020, 8(7), 1063; https://doi.org/10.3390/math8071063 - 1 Jul 2020
Cited by 9 | Viewed by 2709
Abstract
Let G be a simple graph of order n. The Estrada index and Laplacian Estrada index of G are defined by E E ( G ) = i = 1 n e λ i ( A ( G ) ) and [...] Read more.
Let G be a simple graph of order n. The Estrada index and Laplacian Estrada index of G are defined by E E ( G ) = i = 1 n e λ i ( A ( G ) ) and L E E ( G ) = i = 1 n e λ i ( L ( G ) ) , where { λ i ( A ( G ) ) } i = 1 n and { λ i ( L ( G ) ) } i = 1 n are the eigenvalues of its adjacency and Laplacian matrices, respectively. In this paper, we establish almost sure upper bounds and lower bounds for random interdependent graph model, which is fairly general encompassing Erdös-Rényi random graph, random multipartite graph, and even stochastic block model. Our results unravel the non-triviality of interdependent edges between different constituting subgraphs in spectral property of interdependent graphs. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
9 pages, 275 KiB  
Article
The Square-Zero Basis of Matrix Lie Algebras
by Raúl Durán Díaz, Víctor Gayoso Martínez, Luis Hernández Encinas and Jaime Muñoz Masqué
Mathematics 2020, 8(6), 1032; https://doi.org/10.3390/math8061032 - 24 Jun 2020
Viewed by 2378
Abstract
A method is presented that allows one to compute the maximum number of functionally-independent invariant functions under the action of a linear algebraic group as long as its Lie algebra admits a basis of square-zero matrices even on a field of positive characteristic. [...] Read more.
A method is presented that allows one to compute the maximum number of functionally-independent invariant functions under the action of a linear algebraic group as long as its Lie algebra admits a basis of square-zero matrices even on a field of positive characteristic. The class of such Lie algebras is studied in the framework of the classical Lie algebras of arbitrary characteristic. Some examples and applications are also given. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
14 pages, 272 KiB  
Article
On Distance Signless Laplacian Spectral Radius and Distance Signless Laplacian Energy
by Luis Medina, Hans Nina and Macarena Trigo
Mathematics 2020, 8(5), 792; https://doi.org/10.3390/math8050792 - 14 May 2020
Cited by 8 | Viewed by 2353
Abstract
In this article, we find sharp lower bounds for the spectral radius of the distance signless Laplacian matrix of a simple undirected connected graph and we apply these results to obtain sharp upper bounds for the distance signless Laplacian energy graph. The graphs [...] Read more.
In this article, we find sharp lower bounds for the spectral radius of the distance signless Laplacian matrix of a simple undirected connected graph and we apply these results to obtain sharp upper bounds for the distance signless Laplacian energy graph. The graphs for which those bounds are attained are characterized. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
Show Figures

Figure 1

10 pages, 253 KiB  
Article
On the Covering Radius of Codes over Z p k
by Mohan Cruz, Chinnapillai Durairajan and Patrick Solé
Mathematics 2020, 8(3), 328; https://doi.org/10.3390/math8030328 - 3 Mar 2020
Cited by 1 | Viewed by 1915
Abstract
In this correspondence, we investigate the covering radius of various types of repetition codes over Z p k ( k 2 ) with respect to the Lee distance. We determine the exact covering radius of the various repetition codes, which have been [...] Read more.
In this correspondence, we investigate the covering radius of various types of repetition codes over Z p k ( k 2 ) with respect to the Lee distance. We determine the exact covering radius of the various repetition codes, which have been constructed using the zero divisors and units in Z p k . We also derive the lower and upper bounds on the covering radius of block repetition codes over Z p k . Full article
(This article belongs to the Special Issue Algebra and Its Applications)
16 pages, 371 KiB  
Article
On the (29, 5)-Arcs in PG(2, 7) and Some Generalized Arcs in PG(2, q)
by Iliya Bouyukliev, Eun Ju Cheon, Tatsuya Maruta and Tsukasa Okazaki
Mathematics 2020, 8(3), 320; https://doi.org/10.3390/math8030320 - 2 Mar 2020
Cited by 3 | Viewed by 2391
Abstract
Using an exhaustive computer search, we prove that the number of inequivalent ( 29 , 5 ) -arcs in PG ( 2 , 7 ) is exactly 22. This generalizes a result of Barlotti (see Barlotti, A. Some Topics in Finite Geometrical Structures, [...] Read more.
Using an exhaustive computer search, we prove that the number of inequivalent ( 29 , 5 ) -arcs in PG ( 2 , 7 ) is exactly 22. This generalizes a result of Barlotti (see Barlotti, A. Some Topics in Finite Geometrical Structures, 1965), who constructed the first such arc from a conic. Our classification result is based on the fact that arcs and linear codes are related, which enables us to apply an algorithm for classifying the associated linear codes instead. Related to this result, several infinite families of arcs and multiple blocking sets are constructed. Lastly, the relationship between these arcs and the Barlotti arc is explored using a construction that we call transitioning. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
Show Figures

Figure 1

10 pages, 233 KiB  
Article
A Multisecret-Sharing Scheme Based on LCD Codes
by Adel Alahmadi, Alaa Altassan, Ahmad AlKenani, Selda Çalkavur, Hatoon Shoaib and Patrick Solé
Mathematics 2020, 8(2), 272; https://doi.org/10.3390/math8020272 - 18 Feb 2020
Cited by 21 | Viewed by 2803
Abstract
Secret sharing is one of the most important cryptographic protocols. Secret sharing schemes (SSS) have been created to that end. This protocol requires a dealer and several participants. The dealer divides the secret into several pieces ( the shares), and one share is [...] Read more.
Secret sharing is one of the most important cryptographic protocols. Secret sharing schemes (SSS) have been created to that end. This protocol requires a dealer and several participants. The dealer divides the secret into several pieces ( the shares), and one share is given to each participant. The secret can be recovered once a subset of the participants (a coalition) shares their information. In this paper, we present a new multisecret-sharing scheme inspired by Blakley’s method based on hyperplanes intersection but adapted to a coding theoretic situation. Unique recovery requires the use of linear complementary (LCD) codes, that is, codes in which intersection with their duals is trivial. For a given code length and dimension, our system allows dealing with larger secrets and more users than other code-based schemes. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
13 pages, 263 KiB  
Article
Projection Decoding of Some Binary Optimal Linear Codes of Lengths 36 and 40
by Lucky Galvez and Jon-Lark Kim
Mathematics 2020, 8(1), 15; https://doi.org/10.3390/math8010015 - 19 Dec 2019
Cited by 1 | Viewed by 2436
Abstract
Practically good error-correcting codes should have good parameters and efficient decoding algorithms. Some algebraically defined good codes, such as cyclic codes, Reed–Solomon codes, and Reed–Muller codes, have nice decoding algorithms. However, many optimal linear codes do not have an efficient decoding algorithm except [...] Read more.
Practically good error-correcting codes should have good parameters and efficient decoding algorithms. Some algebraically defined good codes, such as cyclic codes, Reed–Solomon codes, and Reed–Muller codes, have nice decoding algorithms. However, many optimal linear codes do not have an efficient decoding algorithm except for the general syndrome decoding which requires a lot of memory. Therefore, a natural question to ask is which optimal linear codes have an efficient decoding. We show that two binary optimal [ 36 , 19 , 8 ] linear codes and two binary optimal [ 40 , 22 , 8 ] codes have an efficient decoding algorithm. There was no known efficient decoding algorithm for the binary optimal [ 36 , 19 , 8 ] and [ 40 , 22 , 8 ] codes. We project them onto the much shorter length linear [ 9 , 5 , 4 ] and [ 10 , 6 , 4 ] codes over G F ( 4 ) , respectively. This decoding algorithm, called projection decoding, can correct errors of weight up to 3. These [ 36 , 19 , 8 ] and [ 40 , 22 , 8 ] codes respectively have more codewords than any optimal self-dual [ 36 , 18 , 8 ] and [ 40 , 20 , 8 ] codes for given length and minimum weight, implying that these codes are more practical. Full article
(This article belongs to the Special Issue Algebra and Its Applications)
Back to TopTop