Movatterモバイル変換


[0]ホーム

URL:


Next Article in Journal
Multi-Strategy-Improved Growth Optimizer and Its Applications
Previous Article in Journal
Generalized Bounded Turning Functions Connected with Gregory Coefficients
 
 
Search for Articles:
Title / Keyword
Author / Affiliation / Email
Journal
Article Type
 
 
Section
Special Issue
Volume
Issue
Number
Page
 
Logical OperatorOperator
Search Text
Search Type
 
add_circle_outline
remove_circle_outline
 
 
Journals
Axioms
Volume 13
Issue 6
10.3390/axioms13060360
Font Type:
ArialGeorgiaVerdana
Font Size:
AaAaAa
Line Spacing:
Column Width:
Background:
Article

Skew Cyclic and Skew Constacyclic Codes over a Mixed Alphabet

1
Department of Mathematics, Presidency University, Bengaluru 560064, Karnataka, India
2
Department of Mathematics, Bishop Heber College, Bharathidasan University, Tiruchirapalli 620017, Tamil Nadu, India
3
Department of Mathematics, Bharathidasan University, Tiruchirapalli 620024, Tamil Nadu, India
4
Department of Mathematics, Faculty of Arts and Science, Kocaeli University, Kocaeli 41001, Turkey
5
I2M, Aix Marseille University, CNRS, 13009 Marseille, France
*
Author to whom correspondence should be addressed.
Submission received: 3 March 2024 /Revised: 20 April 2024 /Accepted: 22 May 2024 /Published: 28 May 2024

Abstract

:
In this note, we study skew cyclic and skew constacyclic codes over the mixed alphabetR=FqR1R2, whereq=pm, p is an odd prime withm odd andR1=Fq+uFq withu2=u, andR2=Fq+uFq+vFq withu2=u,v2=v,uv=vu=0. Such codes consist of the juxtaposition of three codes of the same size overFq,R1, andR2, respectively. We investigate the generator polynomial for skew cyclic codes overR. Furthermore, we discuss the structural properties of the skew cyclic and skew constacyclic codes overR. We also study theirq-ary images under suitable Gray maps.
MSC:
94B05; 94B15; 94B35; 94B60

    1. Introduction

    The most widely used family of linear codes consists of cyclic codes. Inspired by codes for the Lee metric [1], Berlekamp adapted them to constacyclic codes. Since then, as the following paragraphs demonstrate, they have happened in a number of circumstances.
    Skew cyclic codes were first introduced as ideals in the skew polynomial ringF[x;θ] in 2007 by Boucher et al. [2], whereθ represents an automorphism of the finite fieldF. The tables of the most well-known codes were enhanced by the numerous numerical samples that this technique created. The fact that the factorization of the polynomialxn1 is not unique gives skew polynomial rings an advantage over commutative polynomial rings. For a given length, these numerous factorizations produce a large number of additional codes. Boucher et al. further extended this technique to skew constacyclic codes in [3]. Siap et al. [4] investigated skew cyclic codes of any length in 2011 and produced maps using both classical and quasi-cyclic codes.
    In 2012, Jitman et al. [5] studied skew constacyclic codes over finite chain rings and described the algebraic structure of Euclidean and Hermitian dual codes. Abualrub et al. [6] studiedθ-cyclic codes over the semilocal ringF2+uF2,v2=v with respect to Euclidean and Hermitian inner products.
    These codes over semilocal rings were further studied in many contexts. The ringsF3+vF3 in [7],Fq+vFq,v2=v in [8], andFq+uFq+vFq,u2=u,v2=v,uv=vu=0 in [9] were utilized as alphabets for skew cyclic codes, for example. Dertli and Cengellenmis [10] and Yao et al. [11] also examined these codes overFq+uFq+vFq+uvFq,u2=u,v2=v,uv=vu. Skewed(1+2v)-constacyclic codes were developed in 2017 by Gao et al. [12] after deriving the structure of skew constacyclic codes over the semilocal ringFq+vFq,v2=v. In [13] and [14], respectively, Islam and Prakash established the algebraic structure of skew constacyclic codes overFq+uFq+vFq+uvFq,u2=u,v2=v, uv=vu.
    Using two non-trivial automorphisms, Bhardwaj and Raka [15] investigated the skew constacyclic codes over the ringFq[u,v]f(u),g(v),uvvu in 2019. Alternatively,Z2Z4-linear codes, or codes over the mixed alphabetZ2Z4, where a subset of coordinates is binary and the complement is quaternary, were introduced by Borges et al. [16]. They have calculated their generator matrices and described their dual codes. Fernandez-Cordoba et al. [17] obtained the rank and kernel ofZ2Z4-linear codes in a follow-up experiment. Steganography is one field in which these codes have found industrial use [18].
    In [19], additive codes over the mixed alphabetZ2Z2s were examined. Next, Refs. [20,21,22,23] examined the mixed alphabetZpZps and, more broadly,ZprZps. Conversely, Abualrub et al. [24] definedZ2Z4 in 2014, in line with the advancement of cyclic codes on mixed alphabets. The code for -additive cyclics isZ4[x].-submodule ofZ2[x]/xr1×Z4[x]/xs1, from which the smallest spanning set and unique set of generators for these codes, wheres is an odd integer, were obtained.
    Furthermore, generator polynomials and duals forZ2Z4-additive cyclic codes were discovered by Borges et al. [25]. In [26], Aydogdu et al. [27] introduced the novel mixed alphabetsZ2Z2[u]-additive codes, whereu2=0. They also studied constacyclic codes over mixed alphabets by defining them asZ2[u][x].×Z2[u][x]/xβ(1+u), -submodules ofZ2[x]/xα1.
    As the Gray images ofZ2Z2[u]-cyclic codes, they were able to derive several optimum binary linear codes. In the meanwhile,Z2Z2[u]-additive cyclic and constacyclic codes with the unit1+u, respectively, were explored algebraically by [28]. Consequently, the predicted generalization in the continuation of these research should beZ2rZ2s[u].-additive cyclic codes,u2=0, and constacyclic codes.
    In this article, we examine a mixed alphabetR=FqR1R2, whereR1=Fq+uFq withu2=u andR2=Fq+uFq+vFq withu2=u,v2=v,uv=vu=0. Moreover, we examine the cyclic codesθt and(θt,α) overR. The algebraic structure of these codes is fully determined. We examine theirq-ary representations under Gray maps and provide a few brief numerical instances.
    The contents are arranged as follows. The next section gathers some background information. Gray maps are examined inSection 3. Skewed cyclic codes are covered inSection 4, and skew constacyclic codes are covered inSection 5. The essay is concluded atSection 6.

    2. Preliminaries

    Letp be an odd prime, and letq=pm withm being odd. Denote byFq the finite field of sizeq. The setFqn of all orderedn-tuples overFq is equipped with the structure of anFq vector space by the usual addition and scalar multiplication of vectors.
    A code of lengthn overFq is just any non-empty subsetCofFqn. It is said to be linear ifC is anFq subspace ofFqn. From now on, we writeR1=Fq+uFq, withu2=u andR2=Fq+uFq+vFq, withu2=u,v2=v,uv=vu=0.
    Note thatR1 andR2 are finite non-chain rings. Leta+ub+vc be an element ofR2. Then, we define two mapsη andδ as follows:
    η:R2Fq,δ:R2R1,η(a+ub+vc)=a,δ(a+ub+vc)=a+ub,
    It is clear thatηandδ are ring homomorphisms. We consider the ringR:
    R=FqR1R2={(x,y,z)xFq,yR1andzR2}
    We define aR2-multiplication in this ring as follows:
    :R2×RRr(x,y,z)=(η(r)x,δ(r)y,rz)
    This is a well defined multiplication and it can be extended componentwise toR=Fqn1×R1n2×R2n3 by:
    :R2×RRr(x1,,xn1,y1,,yn2,z1,,zn3)=(η(r)x1,,η(r)xn1,δ(r)y1,,δ(r)yn2,rz1,,rzn3)
    where(x1,,xn1,y1,,yn2,z1,,zn3)Rγ. Equipped with this multiplication,R becomes anR2module. A non-empty subsetCofR is said to be aR-linear code of length(n1,n2,n3) ifCisanR2-submoduleofR. Now we define the inner product by the formula:
    c,c=1n1xixi+1n2yjyj+1n3zkzk,
    wherec=(x1,,xn1,y1,,yn2,z1,,zn3),c=(x1,,xn1,y1,,yn2,z1,,zn3) are inRγ. LetC be anR-linear code of length(n1,n2,n3). Then, the dual code ofC is defined as:
    C={cRγc,c=0cC}

    3. Decomposition and Properties of Gray Maps

    Recall that,R1=Fq+uFq,withu2=u. Consider the idempotent orthogonal elementse1=u ande2=1u. Then, we have the decomposition:
    R1=e1R1e2R1e1Fqe2Fq,
    wheree1e2=0,e12=e1,e1+e2=1. Hence,R1={ae1+be2a,binFq}. We now define the Gray map:
    φ1:R1Fq2φ1(ae1+be2)=(a,b)
    It can be extended to the lengthn by:
    φ1:R1nFq2nφ1((a1,,an)e1+(b1,,bn)e2)=(a1,,an,b1,,bn)
    Note that it is a linear map. We define the Gray weight of a codeword inR1 as:
    wtG(ae1+be2)=wtH(a,b)
    wherewtH denotes the Hamming weight. Ifx,ylieinR1n, then their mutual distance is given by:
    dG(x,y)=1nwtG(xiyi)=12nwtH(φ1(x)φ1(y))=dH(φ1(x),φ1(y)).
    Hence,φ1 is a weight preserving map. A non-empty subsetCofRin is said to be a linear code of lengthn ifC isRi-submoduleofRin.
    Fori{1,2},AiR1:
    A1A2={a1+a2aiAi}andA1A2={(a1,a2)aiAi}.
    LetCe be a linear code of lengthn overR1. Then, we define:
    Ce1={y1Fqne1y1+e2y2Ce,forsomey2Fqn}
    Ce2={y2Fqne1y1+e2y2Ce,forsomey1Fqn}
    Therefore, any linear codeCe overR1 can be represented asCe=e1Ce1e2Ce2 andφ1(Ce)=Ce1Ce2. Hence,Ce1 andCe2 areFq-linear codes. Also note thatφ1(Ce)=φ1(Ce).
    Recall thatR2=Fq+uFq+vFq, withu2=u,v2=v,uv=vu=0. Leto1=(1uv),o2=u,o3=v be idempotent orthogonal elements inR2, then:
    R2=o1R2o2R2o3R2o1Fqo2Fqo2Fq,
    whereoioj=0(ij),oi2=oi,o1+o2+o3=1. Hence, any element inR2 can be written asao1+bo2+o3c3. We now define a weight preserving linear Gray mapφ2,:
    φ2:R2Fq3φ2(ao1+bo2+co3)=(a,b,c)
    It can be extended to lengthn by the formula:
    φ2((a1,,an)o1+(b1,,bn)o2+(c1,,cn)o2)=(a1,,an,b1,,bn,c1,,cn).
    We define the Gray weight of a codeword inR2 as:
    wtG(ao1+bo2+co3)=wtH(a,b,c)
    wherewtH denotes the Hamming weight. Ifx,yareinR2n, then their Gray distance is given by:
    dG(x,y)=1nwtG(xiyi)=13nwtH(φ2(x)φ2(y))=dH(φ2(x),φ2(y)).
    Fori{1,2,3},AiR2:
    A1A2A3={a1+a2+a3aiAi}andA1A2A3={(a1,a2,a3)aiAi}.
    LetCo be a linear code of lengthn overR2. We define the three codes:
    Co1={z1Fqno1z1+o2z2+o3z3Co,forsomez2,z3Fqn},Co2={z2Fqno1z1+o2z2+o3z3Co,forsomez1,z3Fqn},Co3={z3Fqno1z1+o2z2+o3z3Co,forsomez1,z2Fqn}.
    Then, any linear codeCo overR2 can be represented asCo=o1Co1o2Co2o3Co3 andφ2(Co)=Co1Co2Co3,whereCo1,Co2, andCo3 areFq-linear codes. Also note thatφ2(Co)=φ2(Co).
    Henceforth, we define the Gray mapφonR using the maps defined previously:
    φ:RFq6φ(x,y,z)=(x,φ1(y),φ2(z))
    now we can extend this map toRγ:
    φ(x1,,xn1,y1,,yn2,z1,,zn3)=(x1,,xn1,φ1(y1),,φ1(yn2),φ2(z1),,φ2(zn3))
    then, the Gray weight of an element inRγ can be denoted bywtG(α)=wtH(φ(α)). Any linear codeC ofRγ can be represented byC=C1CeCo, whereC1,Ce,andCo are linear code overFq,R1,andR2. LetGFq be the generator matrix for linear code overFq. The generator matrixGR1 for a linear code overR1 is denoted by:
    GR1=e1Ge1e2Ge2
    whereGei is the generator matrix for the linear codeCei,fori={1,2}. The generator matrixGR2 for the linear code overR2 is:
    GR2=o1Go1o2Go2o3Go3
    whereGoi is the generator matrix for the linear codeCoi,fori={1,2,3}. Using the generator matrices above, we can say that the generator matrixG for the linear code overR is:
    G=GFq000GR1000GR2.
    Note that the minimum distance ofC is min{dH(C1),dH(φ1(Ce)),dH(φ2(Co))}. The following theorem provides the weight preserving nature of the Gray map.
    Theorem 1.
    The Gray map φ defined above is linear and weight preserving.
    Proof. 
    Letx=(x1,x2,x3),x=(x1,x2,x3)beinRγ wherex1,x1Fqn1,x2,x2R1n2,x3,x3R2n3. We have:
    φ(x+x)=φ(x1+x1,x2+x2,x3+x3)=(x1+x1,φ1(x2+x2),φ2(x3+x3))=(x1,φ1(x2),φ2(x3))+(x1,φ1(x2),φ2(x3))(φ1andφ2arelinear)=φ(x)+φ(x)
    Using the linear mapφ,
    dG(x,x)=wtG(xx)=wtH(φ(x)φ(x))=dH(φ(x),φ(x))
    Hence,φ is a weight preserving linear map. □
    The following theorem gives the parameters of the Gray image of a linear code.
    Theorem 2.
    IfCRγ is an(n1+n2+n3,dG) linear code thenφ(C) is an(n1+2(n2)+3(n3),dH) linear code overFq, wheredG=dH.
    Proof. 
    The proof can extended from the proof of Theorem 1. □
    The following Theorem characterizesφ(C):
    Theorem 3.
    IfCRγ is linear, thenφ(C)=C1i=1i=2Ceij=1j=3Coj,C=C1i=1i=2Ceij=1j=3Coj.
    Proof. 
    Let:
    φ(x,y,z)=(x,φ1(y),φ3(z))=(a1,,a6)φ(C)Fq6.
    Note thatφ is bijective andC=C1CeCo is linear. Thus,a1=xC1.Alsonotethatφ1(y)=(a2,a3),φ2(z)=(a4,a5,a6).Sinceφis are bijective,a2e1+a3e2e1Ce1e2Ce2=Ce. Hence,(a2,a3)Ce1Ce2 and similarly(a4,a5,a6)Co1Co2Co2. The converse holds in a similar way. The second part of the statement follows from the fact thatφ is bijective. □
    The following Theorem furnishes the decompostion of the dual of the linear codeC.
    Theorem 4.
    IfC=C1CeCo is a linear code overRthenC=C1CeCo,whereC1,Ce andCo are duals for the respective linear codes.
    Proof. 
    LetC={cRγ|c,c=0forallcC}={(x,y,z)R|xFqn1,yR1n2,zR2n3}. Letc=(x,y,z)C=C1CeCo. Then:
    c,c=xx+yy+zz=0.
    Thus,xC1,yCe,zCoandsoCC1CeCo.Since|C|=|C1||Ce||Co|, the statement holds.
    The next result shows that the Gray maps is compatible with duality.
    Theorem 5.
    IfCRγ is linear, thenφ(C)=φ(C).
    Proof. 
    Let(x,y,z)C and(x,y,z)C, wherexC1,yCe,zCo andxC1,yCe,zCo, then(x|y|z,x|y|z)=0. Using Theorem 4,C1,CeandCo are duals forC1,Ce,andCo. Now, we haveφ(x,y,z)=(x,φ1(y),φ2(z)),φ(x,y,z)=(x,φ1(y),φ2(z)), then the inner product is given by:
    φ(x,y,z),φ(x,y,z)=(x,φ1(y),φ2(z)),(x,φ1(y),φ2(z))=(x,0,0),(x,0,0)+(0,φ1(y),0),(0,φ1(y),0)+(0,0,φ2(z)),(0,0,φ2(z))=0(φ1(C)=φ1(C),φ2(C)=φ2(C))
    Thus,φ(C)φ(C). Since the cardinality is the same on both sides, the statement holds. □
    The following result provides the self duality nature of the linear code and its Gray image.
    Corollary 1.
    IfC is a linearRγ-code, thenC is self-dual iffφ(C) is self-dual. Moreover,φ(C) is a self-orthogonal code overFq iff C is self-orthogonal.
    Proof. 
    LetC be a self-dual linear code of lengthn overR. Thus,C=C. Then,φ(C)=φ(C), and hence, by Theorem 5, we haveφ(C)=(φ(C)). Thus,φ(C) is a self-dual linear code of lengthn1+2n2+3n3 overFq. Conversely, letφ(C) be a self-dual linear code of lengthn1+2n2+3n3 overFq. Then,φ(C)=(φ(C)), and hence, by Theorem 5, we haveφ(C)=φ(C). Sinceφ is bijection,C=C. Therefore,C is a self-dual linear code overRγ. Similarly, the self orthogonal case holds. □

    4. Skew CyclicR-Codes

    Letθt be a non-trivial Frobenius automorphism defined by:
    θt:FqFq,θt(a)=apt,
    wheret dividesm. It can be extended toR1 andR2 by:
    θt(a+ub)=θt(a)+uθt(b),θt(a+ub+vc)=θt(a)+uθt(b)+vθt(b).
    Sincet|m, the order of automorphismθtismt. We define a polynomial ringRi[x,θt](1i2) as follows:
    Ri[x,θt]={a1++anxn|ajRi,1jn}
    Clearly,Ri[x,θt] is a ring with respect to usual addition and the multiplication defined by:
    axmbxn=aθtm(b)xm+n
    Note that it is a non-commutative ring unlessθt is an identity map. A non-empty setC is said to be a linear code of lengthni overRi if it is aRi submodule ofRini. Using the above polynomial rings above, we extend the polynomial ring toR by:
    R[x,θt]={(a(x),b(x),c(x)):a(x)Fq[x],b(x)R1[x],c(x)R2[x]}.
    It can be seen thatR[x,θt] is aR2[x;θt] submodule with respect to usual addition and multiplication defined by:
    :R2[x]×R[x,θt]R[x,θt](axs)(b1xi,b2xj,b3xk)=(η(a)xsb1xi,δ(a)xsb2xj,axsb3xk)=(η(a)θts(b1)xs+i,δ(a)θts(b2)xs+j,aθts(b3)xs+k)
    However, under associative and distributive laws, the multiplication can be extended toRγ[x;θt]=Fq[x;θt]xn11×R1[x;θt]xn21×R2[x;θt]xn31 as follows:
    :R2[x;θt]×Rγ[x;θt]Rγ[x;θt]
    r(x)(f1(x)+xn11,f2(x)+xn21,f3(x)+xn31)=(η(r(x))f1(x)+xn11,δ(r(x))f2(x)+xn21,
    r(x)f3(x)+xn31).
    Definition 1
    ([2]).We say that anR-submoduleC ofRn is aθt-cyclic code if for anyc=(c0,c1,,cn1)C,σ1(c)=(θt(cn1),θt(c0),,θt(cn2))C. The operatorσ1 is then said to be aθt-cyclic shift operator onRn.
    Definition 2.
    A non-trivialR2-submoduleC ofRγ is called aθt-cyclic code if for anyc=(c0,1,c1,1,,cn11,1,c0,e,c1,e,,cn21,e,c0,o,c1,o,,cn31,o)C,σ(c)=(θ(cn11,1),θ(c0,1),,θ(cn12,1),θ(cn21,e),θ(c0,e),,θ(cn22,e),θ(cn31,o),θ(c0,o),,θ(cn32,o))C. The operator σ is called aθt-cyclic shift operator onRn.
    The following result yields the relationship between theθt-cyclic codes overRandFq.
    Theorem 6.
    LetC=C1CeCoRγ be linear. ThenC is aθt-cyclic code if and only ifC1,Ce andCo areθt-cyclic codes of lengthn1,n2 andn3 overFq,R1 andR2 respectively.
    Proof. 
    LetC=C1CeCo be aθt-cyclic code overR. Letz=(z1,ze,zo)C, that is:
    z=(z0,1,z1,1,,zn11,1,z0,e,z1,e,,zn21,e,z0,o,z1,o,,zn31,o)C.
    Then,σ(z)=(θ(zn11,1),θ(z0,1),,θ(zn12,1),θ(zn21,e),θ(z0,e),,θ(zn22,e),θ(zn31,o),θ(z0,o),,θ(zn32,o))=(σ(z1),σ(ze),σ(zo))C. From this, we can conclude that:
    σ(z1)C1,σ(ze)Ceandσ(zo)Co
    Hence,C1,Ce, andCo areθt-cyclic code of lengthni. The converse holds in a similar way.
    We recall the following Theorem from [9].
    Theorem 7.
    ([9]).LetCo=o1Co1o2Co2o3Co3 be a linear code overR2 of lengthn3, thenCo isθt-cyclic code iffCoi(1i3) is aθt-cyclic code of lengthn3 overFq.
    The analogue of this result in our setting is as follows.
    Theorem 8.
    ([8]).LetCe=e1Ce1e2Ce2 be a linear code overR1 of lengthn2 thenCe isθt-cyclic code iffCei(1i2) is aθt-cyclic code of lengthn2 overFq.
    Theorem 9.
    IfC=C1CeCo is a linear code of lengthγ=n1+n2+n3, thenC isθt-cyclic iffC1,Cei,Coj(1i2,1j3) areθt-cyclic code of lengthn1,n2,n3 overFq respecively.
    Proof. 
    We obtain the proof on combining proofs of Theorems 6–8. □
    These notions are well-behaved with respect to duality as the next result shows.
    Theorem 10.
    IfC is aθt-cyclic code of lengthn, then its dualC is also aθt-cyclic code.
    Proof. 
    From Theorem 9,C1,Cei,Coj(1i2,1j3) areθt-cyclic codes overFq. Then,C1,Cei,Coj(1i2,1j3) areθt-cyclic codes overFq from [29] and once again by using Theorem 9,C becomes aθt-cylic code. □
    Recall the following result from [4].
    Lemma 1
    ([4]).Let C be aθt-cyclic code of length n overFq. Then, there exists a polynomialf(x)Fq[x;θt] such thatC=f(x) andxn1=g(x)f(x) inFq[x;θt].
    By assumingo(θt)|n, the counterpart follows.
    Theorem 11.
    LetC=C1CeCo be aθt-cyclic code of length n overR and assume that the order ofθt dividesn. Then,C=B1,Be,Bo, whereB1=(f1(x),0,0),Be=(0,fe(x),0), andBo=(b1(x),be(x),fo(x)), such thatC1=f1(x),Ce=fe(x),Co=fo(x),b1(x)C1and b2(x)Ce.
    Proof. 
    LetC=C1CeCo be aθt-cyclic code of lengthγ=n1+n2+n3 overR. Then, by Thereom 6,C1,Ce,Co areθt-cyclic codes of lengthni overFq,R1 andR2. Define a homomorphism fromC toR as follows:
    ψ:CRψ(c1(x),ce(x),co(x))=(0,0,co(x))
    Define:
    ker(ψ)={(c1(x),ce(x),0):c1(x)C1,ce(x)Ce}
    I={(c1(x),ce(x))Fq[x;θt]×R1[x;θt]:(c1(x),ce(x),0)ker(ψ)}.
    Clearly,I=I1×Ie forms a submodule ofFq[x;θt]×R1[x;θt]. Therefore, there exist a polynomialf1(x) andfe(x) inFq[x;θt] andR1[x;θt], respectively, generatingI1 andIe withf1(x)|xn11 andfe(x)|xne1. Thus,I=(f1(x),0),(0,fe(x)), then for any(c1(x),ce(x),0)ker(ψ),(c1(x),ce(x))=v(x)(f1(x),0),(0,fe(x)) for somev(x)R1[x;θt]. Finally, it leads to ker(ψ)=(f1(x),0,0),(0,fe(x),0). The fact thatC is a submodule implies thatψ(C) is a submodule. By using the first isomorphism theorem:
    C/ker(ψ)ψ(C).
    Let(b1(x),be(x),fo(x))C, thenψ(b1(x),be(x),fo(x))=(0,0,fo(x)). From this, anyθt-cyclic code of lengthn can be represented byC=(f1(x),0,0)(0,fe(x),0),(b1(x),be(x),fo(x)), wheref1(x)|(xn11),fe(x)|(xn21) andfo(x)|(xn31).
    Furthermore, we haveC isθt-cyclic, thenCk, wherek{1,e1,e2,o1,o2,o3} is skewθt-cyclic code overFq with respective lengths. From Theorem 3,|C|=C1i=1i=2Ceij=1j=3Coj, since eachCk isθt-cyclic it is generated by a polynomialfk(x), and thus,|C|=qγi=16ϵk, whereγ=n1+2(n2)+3(n3). The following Theorem provides the generator polynomials forθt-cylic codes overFq.
    Theorem 12.
    LetC=C1CeCo be a skew cyclic code overR of lengthγ=n1+n2+n3. Then, there exists a polynomial:
    (i) 
    f1(x)Fq[x;θt] such thatC1=f1(x) andxn11=g1(x)f1(x).
    (ii) 
    fe(x)R1[x;θt] such thatCe=fe(x) andxn21=ge(x)fe(x)wherefe(x)=i=12eifei(x).
    (iii) 
    fo(x)R2[x;θt] such thatCo=fo(x) andxn31=go(x)fo(x)wherefo(x)=i=13oifoi(x).
    Proof. 
    LetC be aθt-cyclic code of lengthγ=n1+n2+n3. From Theorem 6, we have thatC1,Ce, andCo areθt-cyclic codes. Using Lemma 1,(i) follows.
    Then, the proof of(ii) is as follows. LetCe=e1Ce1e2Ce2 be aθt-cyclic code of lengthn2 overR1. Thereom 7 says that,Ce1 andCe2 areθt-cyclic codes of lengthn2 overFq. Lemma 1 says that we haveCi=fei(x) andxn21=gei(x)fei(x) inFq[x;θt] fori{1,2}. Then,eifei(x)C fori{1,2}. Also, for anyfe(x)C, we havefe(x)=i=12eihei(x)fei(x), wherehei(x)Fq[x;θt] fori{1,2}. Thus,fe(x)e1fe1(x),e2fe2(x). Therefore,C=e1fe1(x),e2fe2(x). Asxn21=gei(x)fei(x) inFq[x;θt] fori{1,2}. Letfe(x)=e1fe1(x)+e2fe2(x)R1[x;θt]. Then,fe(x)C. On the other handeifei(x)=eife(x)fe(x) fori=1,2. Consequently,C=fe(x). Furthermore,[i=12eigei(x)]fe(x)=i=12eigei(x)fei(x)=i=12ei(xn21)=xn21. Then,xn21=ge(x)fe(x) inR1[x;θt], wherege(x)=i=12eigei(x). Thus,(ii) follows.(iii) is similar to the proof of(ii).

    5. Skew Constacyclic Code overR

    In this section, we study skewθt-constacyclic codes overR. We choose a unit elementαR2*suchthatα satisfies the conditionα2=1,(α=1,1,).
    Definition 3.
    LetαiFpt{0}. A linear codeCRγ[x,θ] is called skewα=α1+uα2+vα3-constacyclic code if it is invariant under the cyclic shift operatorλα, which is whenever:
    c=(x0,x1,,xn11,y0,y1,,yn21,z0,z1,,zn31)Cλα(c)=(α1θt(xn11),θt(x0),,θt(xn1),(α1+uα2)θt(yn11),θt(y1),,θt(yn22),(α1+uα2+vα3)θt(zn31),θt(z0),,θt(zn32))C
    The following two results translate symmetry conditions into algebraic constraints. We give the first result without proof.
    Theorem 13.
    LetRn,λ=R[x;θt]/xnλ. A linear code C of length n over R is(θt,λ)-cyclic code if and only if C is a leftR[x;θt]-submodule ofRn,λ.
    The second result is less immediate.
    Theorem 14.
    A codeC is skew α-cyclic code overRγ=Fq[x,θt]xn1α×R1[x,θt]xn2α×R2[x,θt]xn3α iffC is a leftR2[x,θt] module overRγ.
    Proof. 
    LetC be a skewα-cyclic code. Then, by definitionx(f(x)|g(x)|h(x))C:
    x(f(x)|g(x)|h(x))=(θt(f0)x+θt(f1)x2++α1θt(fn11),θt(g0)x+θt(g1)x2++(α1+uα2)θt(gn21),θt(h0)x+θt(h1)x2++(α1+uα2+vα3)θt(hn31))C
    Moreover, by using linearity ofC:
    r(x)(g1(x)|g2(x)|g3(x))C
    for somer(x)R2[x,θt]. Hence,C is an leftR2[x,θt] submodule overRγ. Conversely, assume thatC is an leftR2[x,θt] submodule overRγ, then we havex(f(x)|g(x)|h(x))C impliesC is skewα-cyclic code. □
    Theorem 15.
    The codeCoR2n is skewα=α1+uα2+vα3-cyclic of length n iffCo1,Co2, andCo3 are skewα1,α1+α2,α1+α3-cyclic codes overFq of lengthn.
    Proof. 
    LetCo be a skewα-cyclic code. Leta=xo1+yo2+zo3Co, wherex=(x0,x1,,xn1)Co1,y=(y0,y1,,yn1)Co2 andx=(z0,z1,,zn1)Co3. Then, we have by definiton,λα(x)Co,:
    λα(o1(x0,x1,,xn1)+o2(y0,y1,+yn1)+o3(z0,z1,,zn1))=((α1+uα2+vα3)o1(θt(xn1),θt(x0),,θt(xn2))+(α1+uα2+vα3)o2(θt(yn1),θt(y0),+θt(yn2))+(α1+uα2+vα3)o3(θt(zn1),θt(z0),,θt(zn1)))λα1(x)+λα1+α2(y)+λα1+α3(z)Coλα1(x)Co1,λα1+α2(y)Co2,λα1+α3(z)Co3
    Hence,Co1,Co2,andCo3 are skewα1,α1+α2,α1+α3-cyclic codes overFq of lengthn.
    Conversely, assume thatCo1,Co2andCo3 are skewα1,α1+α2,α1+α3-cyclic codes overFq of lengthn. Letm0,m1,,mn1 be an element inCo, wheremi=o1xi+o2yi+o3zi such thatx=(x0,x2,,xn1)Co1,y=(y0,y2,,yn1)Co2 andz=(z0,z2,,zn1)Co3. Then we haveλα1(x)Co1,λα1+α2(y)Co2andλα1+α3(z)Co3. So we get,
    o1λα1(x)+o2λα1+α2(y)+o3λα1+α3(z)=o1λα1(x0,x1,,xn1)+o2λα1+α2(y0,y1,+yn1)+o3λα1+α3(z0,z1,,zn1)C=λα(m0,m1,,mn1)C
    Hence,C is skewαcyclic code overR2n.
    Theorem 16.
    Ce be a a skewα=α1+uα2-cyclic code overR1 iffCe1 andCe2 are skewα1+α2 andα1-cyclic codes overFq.
    Proof. 
    The proof is similar to Theorem 15 taking modv to the above condition. □
    Theorem 17.
    C be a skewα=α1+uα2+vα3-cyclic code overR of lengthγ=n1+n2+n3 iffC1,CeandCo areα1,α1+uα2, andα1+uα2+vα3-cyclic codes overFq,R1andR2, respectively.
    Proof. 
    C1,CeandCo beα1,α1+uα2, andα1+uα2+vα3-cyclic. Considerx=(x0,x1,,xn11), y=(y0,y1,,yn21) andz=(z0,z1,,zn31). Considerα1+uα2=β. Then, we have:
    (x,y,z)C(λα1(x),λβ(y),λα(y))C
    Hence,C is skewα-cyclic. The converse part holds similarly. □
    Theorem 18.
    C be a skew α-cyclic code of lengthγ=n1+n2+n3 iffC1 is skewα1-cyclic code of lengthn1,Ce1, andCe2 areα1+α2,α1-cyclic codes of lengthn2 andCo1,Co2, andCo3 are skewα1,α1+α2,α1+α3-cyclic codes overFq of lengthn3.
    Proof. 
    Using Theorems 15–17 the result follows. □
    Theorem 19.
    C be a skewα=α1+uα2+vα3-cyclic code overR of lengthγ=n1+n2+n3 iffC1,Ce,andCo are(α1)1,(α1+uα2)1, and(α1+uα2+vα3)1-cyclic.
    Proof. 
    LetC be a skewα-cyclic code, Lemma 3.1 [5] says thatC is skew(α1+uα2+vα3)1-cyclic code. From Theorem 17, we haveC1,CeandCo are skew(α1)1,(α1+uα2)1 and(α1+uα2+vα3)1-cyclic. □
    Corollary 2.
    LetC=C1CeCo. be a skewα=α1+uα2+vα3-cyclic code overR of lengthγ=n1+n2+n3. Then, there exist polynomials:
    (i)
    f1(x)Fq[x;θt] such thatC1=f1(x) andxn1α1=g1(x)f1(x).
    (ii)
    fe(x)R1[x;θt] such thatCe=fe(x) andxn2(α1+uα2)=ge(x)fe(x).
    (iii)
    fo(x)R2[x;θt] such thatCo=fo(x) andxn3(α1+uα2+vα3)=go(x)fo(x).
    Proof. 
    The proof is similar to the proof of Theorem 12. □
    Theorem 20.
    LetC=C1CeCo be aθt-constacyclic code of length γ overR. ThenC=B1,B2,Bo, whereB1=(f1(x),0,0),B1=(0,fe(x),0), andB1=(b1(x),be(x),fo(x)).
    Proof. 
    The proof is similar to the proof of Theorem 11. □
    Example 1.
    Letq=9 andF9=F3[z] withz2+1=0. Consider the ringRγ=F9[x,θ3]x41×R1[x,θ3]x51×R2[x,θ3]x51, whereθ3 is the Frobenius automorphism defined byθ3(a)=a3 for anyaF9. Write:
    x41=(x+1)(x+2)(x+z)(x+2z)F9[x,θ3]
    x51=(x+2)(x4+x3+x2+x+1)F9[x,θ3]
    f1(x)=(x+1),fe(x)=e1(x+2)+e2(x+2),fo(x)=o1(x+2)+o2(x+2)+o3(x+2) By Theorem 12, we have thatfi dividesxni1 for(i=1,e,o), yielding a code with parameter[29,18,2] overF9.
    Example 2.
    Letq=25 andF25=F5[z] withz2+z+1=0. Consider the ringRγ=F25[x,θ5]x41×R1[x,θ5]x61×R2[x,θ5]x41, whereθ5 is the Frobenius automorphism defined byθ5(a)=a5 for anyaF25. Write
    x41=(x+2)(x+3)(x+z)(x+z+1)F25[x,θ5]
    x61=(x21)(x2+x+1)(x2x+1)F25[x,θ5]
    f1(x)=(x+2),fe(x)=e1(x21)+e2(x21),fo(x)=o1(x+z+1)+o2(x+z+1)+o3(x+z+1) By Theorem 12, we have thatfi dividesxni1 for(i=1,e,o) yielding a code with parameter[28,20,2] overF25.

    6. Conclusions and Open Problems

    In this note, we have studied the algebraic and metric structure of skew cyclic and skew constacyclic codes over a special mixed alphabet. Thus, our codes have a structure of module over the largest of the three alphabetsR2. Codes over the product ringFq×R1×R2 would be modules over that larger ring. The two algebraic structures are different and should not be confused.
    The present work leads itself to two paths of generalization: consider different mixed alphabets or replace the concepts of cyclicity by that of quasi-cyclicity. The former path seems easier than the latter, in view of the many examples of rings that have been used as alphabets of cyclic codes in recent years. On the other hand, the structure of quasi-cyclic codes is always more subtle than that of cyclic codes.

    Author Contributions

    Conceptualization, K.G., C.D., S.Ç. and P.S.; Methodology, C.M. All authors have read and agreed to the published version of the manuscript.

    Funding

    This research received no external funding.

    Data Availability Statement

    No new data were created or analyzed in this study. Data sharing is not applicable to this article.

    Conflicts of Interest

    The authors declare no conflicts of interest.

    References

    1. Berlekamp, E.R. Negacyclic codes for the Lee metric. InCombinatorial Mathematics; Bose, R.C., Dowling, T.A., Eds.; University of North Carolian Press: Chapel Hill, NC, USA, 1969; pp. 298–316. [Google Scholar]
    2. Boucher, D.; Geiselmann, W.; Ulmer, F. Skew cyclic codes.Appl. Algebra Eng. Comm.2007,18, 379–389. [Google Scholar] [CrossRef]
    3. Boucher, D.; Sol, P.; Ulmer, F. Skew constacyclic codes over Galois rings.Adv. Math. Commun.2011,2, 273–292. [Google Scholar] [CrossRef]
    4. Siap, I.; Abualrub, T.; Aydin, N.; Seneviratne, P. Skew cyclic codes of arbitrary length.Int. J. Inf. Coding Theory2011,2, 10–20. [Google Scholar] [CrossRef]
    5. Jitman, S.; Ling, S.; Udomkavanich, P. Skew constacyclic codes over finite chain ring.Adv. Math. Commun.2012,6, 39–63. [Google Scholar]
    6. Abualrub, T.; Aydin, N.; Seneviratne, P. Onθ-cyclic codes overF2+vF2.Aust. J. Comb.2012,54, 115–126. [Google Scholar]
    7. Ashraf, M.; Mohammad, G. Skew cyclic codesF3+vF3.Int. J. Inf. Coding Theory2014,24, 218–225. [Google Scholar]
    8. Gursoy, F.; Siap, I.; Yildiz, B. Construction of skew cyclic codes overFq+vFq.Adv. Math. Commun.2014,8, 313–322. [Google Scholar] [CrossRef]
    9. Ashraf, M.; Mohammad, G. Skew cyclic codesFq+uFq+vFq.Asian-Eur. J. Math.2018,115, 1850072. [Google Scholar] [CrossRef]
    10. Dertli, A.; Cengellenmis, Y. Skew cyclic codes overFq+uFq+vFq+uvFq.J. Sci. Arts2017,2, 215–222. [Google Scholar]
    11. Yao, T.; Shi, M.; Sole, P. On Skew cyclic codes overFq+uFq+vFq+uvFq.J. Algebra Comb. Discret. Struct. Appl.2015,2, 163–168. [Google Scholar]
    12. Gao, J.; Ma, F.; Fu, F. Skew constacyclic codes over the ringFq+vFq.Appl. Comput. Math.2017,6, 286–295. [Google Scholar]
    13. Islam, H.; Prakash, O. Skew cyclic and skew (α1+2+3+uvα4)-constacyclic codes overFq+uFq+vFq+uvFq.Int. J. Inf. Coding Theory2018,5, 101–116. [Google Scholar]
    14. Islam, H.; Prakash, O. A note on skew constacyclic codes overFq+uFq+vFq.Discret. Math. Algorithms Appl.2019,11, 1950030. [Google Scholar] [CrossRef]
    15. Bhardwaj, S.; Raka, M. Skew constacyclic codes over a non-chain ringFq[u,v]/〈f(u),g(v),uv-vu〉.arXiv2019, arXiv:1905.12933. [Google Scholar]
    16. Borges, J.; Fernandez-Cordoba, C.; Pujol, J.; Rifa, J.z2z4-linear codes: Generator matrices and duality.Des. Codes Cryptogr.2010,54, 167–179. [Google Scholar] [CrossRef]
    17. Fernandez-Cordoba, C.; Pujol, J.; Villanueva, M.zzz4-linear codes: Rank and kernel.Des. Codes Cryptogr.2010,56, 43–59. [Google Scholar] [CrossRef]
    18. Rifa-Pous, H.; Rifa, J.; Ronquillo, L.zzz4-additive perfect codes in steganography.Adv. Math. Commun.2011,5, 425–433. [Google Scholar]
    19. Aydogdu, I.; Siap, I. The structure ofZ2Z2s-additive codes: Bounds on the minimum distance.Appl. Math. Inf. Sci.2013,7, 2271–2278. [Google Scholar] [CrossRef]
    20. Aydogdu, I.; Siap, I. OnZprZps-additive codes.Linear Multilinear Algebra2015,63, 2089–2102. [Google Scholar] [CrossRef]
    21. Shi, M.; Wu, R.; Krotov, D.S. OnZpZpk-additive codes and their duality.IEEE Trans. Inf. Theory2018,65, 3842–3847. [Google Scholar]
    22. Yao, T.; Zhu, S.ZpZps-additive cyclic codes are asymptotically good.Cryptogr. Commun.2020,12, 253–264. [Google Scholar] [CrossRef]
    23. Yao, T.; Zhu, S.; Kai, X. Asymptotically goodZprZps-additive cyclic codes.Finite Fields Appl.2020,63, 101633. [Google Scholar] [CrossRef]
    24. Abualrub, T.; Siap, I.; Aydin, N.Z2Z4-Additive cyclic codes.IEEE Trans. Inform. Theory2014,60, 1508–1514. [Google Scholar] [CrossRef]
    25. Borges, J.; Fernandez-Cordoba, C.; Ten-Valls, R.Z2Z4-additive cyclic codes, generator polynomials and dual codes.IEEE Trans. Inform. Theory2016,62, 6348–6354. [Google Scholar] [CrossRef]
    26. Aydogdu, I.; Abualrub, T.; Siap, I. OnZ2Z2[u]-additive codes.Int. J. Comput. Math.2015,92, 1806–1814. [Google Scholar] [CrossRef]
    27. Aydogdu, I.; Abualrub, T.; Siap, I. TheZ2Z2[u]-cyclic and constacyclic codes.IEEE Trans. Inform. Theory2016,63, 4883–4893. [Google Scholar] [CrossRef]
    28. Srinivasulu, B.; Maheshanand, B. TheZ2(Z2+uZ2)-additive cyclic codes and their duals.Discret. Math. Algorithms Appl.2016,8, 1793–8317. [Google Scholar] [CrossRef]
    29. Boucher, D.; Ulmer, F. Coding with skew polynomial rings.J. Symb. Comput.2009,44, 1644–1656. [Google Scholar] [CrossRef]
    Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

    © 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).

    Share and Cite

    MDPI and ACS Style

    Gowdhaman, K.; Mohan, C.; Durairajan, C.; Çalkavur, S.; Solé, P. Skew Cyclic and Skew Constacyclic Codes over a Mixed Alphabet.Axioms2024,13, 360. https://doi.org/10.3390/axioms13060360

    AMA Style

    Gowdhaman K, Mohan C, Durairajan C, Çalkavur S, Solé P. Skew Cyclic and Skew Constacyclic Codes over a Mixed Alphabet.Axioms. 2024; 13(6):360. https://doi.org/10.3390/axioms13060360

    Chicago/Turabian Style

    Gowdhaman, Karthick, Cruz Mohan, Chinnapillai Durairajan, Selda Çalkavur, and Patrick Solé. 2024. "Skew Cyclic and Skew Constacyclic Codes over a Mixed Alphabet"Axioms 13, no. 6: 360. https://doi.org/10.3390/axioms13060360

    APA Style

    Gowdhaman, K., Mohan, C., Durairajan, C., Çalkavur, S., & Solé, P. (2024). Skew Cyclic and Skew Constacyclic Codes over a Mixed Alphabet.Axioms,13(6), 360. https://doi.org/10.3390/axioms13060360

    Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further detailshere.

    Article Metrics

    No
    No

    Article Access Statistics

    For more information on the journal statistics, clickhere.
    Multiple requests from the same IP address are counted as one view.
    Axioms, EISSN 2075-1680, Published by MDPI
    RSSContent Alert

    Further Information

    Article Processing Charges Pay an Invoice Open Access Policy Contact MDPI Jobs at MDPI

    Guidelines

    For Authors For Reviewers For Editors For Librarians For Publishers For Societies For Conference Organizers

    MDPI Initiatives

    Sciforum MDPI Books Preprints.org Scilit SciProfiles Encyclopedia JAMS Proceedings Series

    Follow MDPI

    LinkedIn Facebook X
    MDPI

    Subscribe to receive issue release notifications and newsletters from MDPI journals

    © 1996-2025 MDPI (Basel, Switzerland) unless otherwise stated
    Terms and Conditions Privacy Policy
    We use cookies on our website to ensure you get the best experience.
    Read more about our cookieshere.
    Accept
    Back to TopTop
    [8]ページ先頭

    ©2009-2025 Movatter.jp