Next Article in Journal
Low Computational Coding-Efficient Distributed Video Coding: Adding a Decision Mode to Limit Channel Coding Load
Next Article in Special Issue
A Well-Posed Fractional Order Cholera Model with Saturated Incidence Rate
Previous Article in Journal
Two-Sample Tests Based on Data Depth
Previous Article in Special Issue
VeVaPy, a Python Platform for Efficient Verification and Validation of Systems Biology Models with Demonstrations Using Hypothalamic-Pituitary-Adrenal Axis Models
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

DNA Code from Cyclic and Skew Cyclic Codes over F4[v]/v3

1
Department of Mathematics, Indian Institute of Technology Patna, Bihar 801106, India
2
Department of Mathematics, SRM Institute of Science and Technology, Delhi-NCR Campus, Ghaziabad 201204, India
3
I2M, (CNRS, Aix-Marseille University, Centrale Marseille), 13009 Marseilles, France
4
LTCI, Télécom Paris (IP Paris), 19 Place Marguerite Perey, 91120 Palaiseau, France
5
Secure-IC S.A.S., 104 Boulevard du Montparnasse, 75014 Paris, France
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(2), 239; https://doi.org/10.3390/e25020239
Submission received: 31 December 2022 / Revised: 16 January 2023 / Accepted: 19 January 2023 / Published: 28 January 2023
(This article belongs to the Special Issue Mathematical Modeling in Systems Biology)

Abstract

:
The main motivation of this work is to study and obtain some reversible and DNA codes of length n with better parameters. Here, we first investigate the structure of cyclic and skew cyclic codes over the chain ring R : = F 4 [ v ] / v 3 . We show an association between the codons and the elements of R using a Gray map. Under this Gray map, we study reversible and DNA codes of length n. Finally, several new DNA codes are obtained that have improved parameters than previously known codes. We also determine the Hamming and the Edit distances of these codes.

1. Introduction

DNA is a nucleic acid used for carrying genetic information in living organisms. It is a double-strand molecule formed from two possible nitrogenous bases—Purines (Adenine and Guanine) and Pyrimidines (Cytosine—and Thymine) and two chemically polar ends, namely, 5 and 3 . The Watson–Crick complementary (WCC) relation, which is characterized as A c = T , G c = C , and vice versa, is used to bind the bases of DNA. In 1994, Adleman [1] discussed the Hamiltonian path problem using DNA molecules. This (NP-complete) problem is solved by encoding a small graph in DNA molecules where all the operations were carried out using standard protocols such as the WCC relation. Due to massive parallelism, DNA computing emerged as a powerful tool among researchers to solve computationally difficult problems. Further, the experiments are performed on synthesized DNA and RNA molecules to control their combinatorial constraints such as constant G C -content and Hamming distance.
Linear codes over finite fields have been explored for almost three decades, but this research area experienced an astonishing rate after the remarkable work of Hammons et al. [2] when they established a relation between linear codes over Z 4 with other non-linear binary codes. Afterward, many authors [3,4,5,6] considered alphabets endowed with a ring structure and found many good linear codes over finite fields via specific Gray maps. Within the class of linear codes, cyclic codes are the pivotal and the most studied codes due to their theoretical richness and practical implementation. Recently, many authors [7,8,9,10,11,12,13] constructed DNA codes using cyclic codes over rings. For instance, Bayram et al. [7] and Yildiz and Siap [13] explored DNA codes over the rings F 4 + v F 4 , v 2 = v and F 2 [ v ] / v 4 1 , respectively. In 2019, Mostafanasab and Darani [12] discussed the structure of cyclic DNA codes over the chain ring F 2 + u F 2 + u 2 F 2 . Liu et al. [14] worked on cyclic DNA codes of an odd length over F 4 [ u ] / u 3 . On the other hand, Boucher et al. [15] introduced skew cyclic codes and discovered many new linear codes. Further, in [16,17], more properties of these codes over chain rings have been established. Recently, Gursoy et al. [18] studied reversible DNA codes by using skew cyclic codes. Later on, Cengellenmis et al. [19] studied DNA codes from skew cyclic codes over the rings F 2 [ u , v , w ] , where u 2 = v 2 + v = w 2 + w = u v + v u = u w + w u = v w + w v = 0 . Motivated by the above works, we consider cyclic as well as skew cyclic codes over the finite chain ring R = F 4 [ v ] / v 3 to construct DNA codes of arbitrary lengths. Hamming and edit distances are also calculated for the obtained codes. Interestingly, we obtain several new codes with better parameters than known codes [14].
The article is structured as follows: The Gray map, together with the correspondence of the codons and the other basic results of cyclic codes, are in Section 2. Reversible cyclic codes over the ring R are covered in Section 3, whereas the reversible skew cyclic codes are studied in Section 4. Some results related to the complement and reverse complement of obtained codes are presented in Section 5. Based on our established results from the previous Sections and magma computer algebra system [20], we provide a few examples of DNA codes of arbitrary lengths in Section 6. In the end, we conclude our work in Section 7.

2. Preliminaries

Let F 4 = { 0 , 1 , t , t 2 } , where t 2 = t + 1 be a finite field. Then R : = F 4 [ v ] / v 3 is a finite chain ring with characteristic 2 and every element r of R can be represented as r = b 1 + b 2 v + b 3 v 2 where b i F 4 , for i = 0 , 1 , 2 and v 3 = 0 . It is easy to show that R is a principal ideal ring with unique maximal ideal v s . and R / v s . is isomorphic to F 4 . Recall that the ring R has 48 invertible elements of the form r = b 1 + b 2 v + b 3 v 2 , where b 1 is invertible in F 4 .
A linear code C of length n and alphabets from R is a submodule of an R -module R n . The elements of C are called the codewords. The Hamming weight of an element b = ( b 0 , b 1 , , b n ) C is defined as w H ( b ) = | { i b i 0 } | and Hamming distance d H ( b , k ) between any two elements b = ( b 0 , b 1 , , b n ) and k = ( k 0 , k 1 , , k n ) in C is defined as d H ( b , k ) = w H ( b k ) . Additionally, the lowest value in the set { d H ( b , k ) b k , b , k C } is considered as the the Hamming distance d H ( C ) of the code C .
Now, we describe a Gray map Φ : R F 4 3 as:
Φ ( b 0 + b 1 v + b 2 v 2 ) = ( b 0 + b 1 + b 2 , b 1 + b 2 , b 2 ) ,
where b i F 4 for i = 0 , 1 , 2 . It is easy to see that the function Φ is a distance-preserving map and is extendable to R n component-wise. In Table 1, we establish the connection between the ring elements and the codons by using the Gray map (1).
Definition 1.
For a given polynomial g ( z ) = g 0 + g 1 z + + g m z m F 4 [ z ] , the reciprocal polynomial is denoted by g * ( z ) and defined as g * ( z ) = i = 0 m g m i z i . A polynomial g ( z ) is said to be self-reciprocal if and only if g * ( z ) = b g ( z ) for some non-zero element b in F 4 .
Now, we present some useful lemmas that appeared in [8,14].
Lemma 1.
Let g ( z ) and h ( z ) be polynomials over R of degrees r and s, respectively, with r s . Then:
1
[ g ( z ) h ( z ) ] * = g * ( z ) h * ( z )
2
[ g ( z ) + h ( z ) ] * = g * ( z ) + z ( r s ) h * ( z ) .
Lemma 2.
Let f ( z ) , g ( z ) , and h ( z ) be polynomials over R of degrees r, s, and t, respectively, where r s , t . Then:
1
[ f ( z ) g ( z ) h ( z ) ] * = f * ( z ) g * ( z ) h * ( z )
2
[ f ( z ) + g ( z ) + h ( z ) ] * = f * ( z ) + z ( r s ) g * ( z ) + z ( r t ) h * ( z ) .
Using the Watson–Crick complementary relation, we define the reverse (R) and the reverse complement (RC) of a DNA codeword b = ( b 0 , b 1 , , b n 1 ) by b r = ( b n 1 , , b 1 , b 0 ) and b r c = ( b n 1 c , , b 1 c , b 0 c ) , respectively. For example, given b = A T C C G T , we obtain b r = T G C C T A and b r c = A C G G A T .
We have the following observations based on the Gray map provided in Equation (1).
Lemma 3.
1
For any a = ( b 0 + b 1 v + b 2 v 2 ) R , we have
Φ ( b 0 + b 1 v + b 2 v 2 ) r = b 1 + b 0 v + ( b 0 + b 1 + b 2 ) v 2 , where b 0 , b 1 , b 2 F 4 .
2
Φ ( b 0 + b 1 ) r = Φ ( b 0 ) r + Φ ( b 1 ) r , where b 0 , b 1 F 4 .

3. Reversible Cyclic Codes over R

In the present section, we investigate the structure of cyclic codes and prove reversible conditions on these codes. The cyclic codes of odd lengths are provided in [14] and a detailed discussion on cyclic codes of arbitrary length with alphabets from Z 2 [ u ] / v 3 is explored in [6]. Now, in the subsequent theorems, we describe the structure of the cyclic code. We omit the proof due to its similarity to the proof provided in [6].
Theorem 1.
Let C be a cyclic code of length n over R . Then the code C is provided by:
C = g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) , v a 1 ( z ) + v 2 p ( z ) , v 2 a 2 ( z )
where a 2 ( z ) | a 1 ( z ) | g 0 ( z ) | ( z n 1 ) over F 4 , a 1 ( z ) | g 1 ( z ) ( z n 1 g 0 ( z ) ) , a 2 ( z ) | p ( z ) ( z n 1 a 1 ( z ) ) , and a 2 ( z ) | g 2 ( z ) ( z n 1 g 0 ( z ) ) ( z n 1 a 1 ( z ) ) over F 4 . Moreover, d e g ( g 2 ( z ) ) < d e g ( a 2 ( z ) ) , d e g ( p ( z ) ) < d e g ( a 2 ( z ) ) , and d e g ( g 1 ( z ) ) < d e g ( a 1 ( z ) ) .
Corollary 1.
If the length of a cyclic code C is odd and g 1 ( z ) = g 2 ( z ) = p ( z ) = 0 , then C = g 0 ( z ) , v a 1 ( z ) , v 2 a 2 ( z ) = g 0 ( z ) + v a 1 ( z ) + v 2 a 2 ( z ) .
A similar result is also possible when n is not odd. In this case, we assume that gcd ( z n 1 a 2 ( z ) , g 0 ( z ) ) = 1 and consequently obtain the following result.
Corollary 2.
If a cyclic code C is of even length n and gcd ( z n 1 a 2 ( z ) , g 0 ( z ) ) = 1 , then g 1 ( z ) = g 2 ( z ) = p ( z ) = 0 .
When a 2 ( z ) = g 0 ( z ) , then a 2 ( z ) = a 1 ( z ) = g 0 ( z ) and C as a subset of g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) . Since the other containment is true by the definition of C , we, therefore, obtain the following corollary.
Corollary 3.
For a cyclic code C = g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) , v a 1 + v 2 p ( z ) , v 2 a 2 ( z ) , if a 2 ( z ) = g 0 ( z ) , then C = g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) .
Definition 2.
Given a code C = g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) , v a 1 ( z ) + v 2 p ( z ) , v 2 a 2 ( z ) over R , we define C v 2 by { q ( z ) F 4 [ z ] | v 2 q ( z ) C } . Particularly, since a 2 ( z ) | a 1 ( z ) | g 0 ( z ) , C v 2 = a 2 ( z ) .
In the next result, we determine the Hamming distance of the code C by using the above definition in terms of the Hamming distance of C v 2 .
Theorem 2.
Let C be a code provided by C = g ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) , v a 1 ( z ) + v 2 p ( z ) , v 2 a 2 ( z ) . Then Hamming distance of C and C v 2 are equal, i.e., d H ( C ) = d H ( C v 2 ) .
Proof. 
It can be obtained from [4]. □
Remark 1.
For the sake of brevity, we use b for polynomial b ( z ) whenever b ( z ) belongs to the field F 4 .
Lemma 4.
Let g 0 ( z ) , g 1 ( z ) and g 2 ( z ) F 4 [ z ] of degrees r , s and t , respectively. Then ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) * = g 0 * ( z ) + v z r s g 2 * ( z ) + v 2 z r t g 2 * ( z ) .
Theorem 3.
Let C = g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) be a cyclic code of even length over R with monic polynomials g 0 ( z ) , g 1 ( z ) and g 2 ( z ) of degrees r , s and t, respectively. Then the code C is reversible if and only if:
(1) 
g 0 ( z ) is a self-reciprocal polynomial;
(2) 
z r s g 1 * ( z ) = b 0 g 1 ( z ) + b 1 g 0 ( z ) and z r s g 2 * ( z ) = b 0 g 2 ( z ) + b 1 g 1 ( z ) + b 2 g 0 ( z ) , where b 0 F 4 \ { 0 } and b 1 , b 2 F 4 .
Proof. 
Let C be a reversible cyclic code. Then
( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) * = g 0 * ( z ) + v z r s g 2 * ( z ) + v 2 z r t g 2 * ( z ) and ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) * = b ( z ) ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) C = ( b 0 ( z ) + v b 1 ( z ) + v 2 b 2 ( z ) ) ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) = b 0 ( z ) g 0 ( z ) + v ( b 0 ( z ) g 1 ( z ) + b 1 ( z ) g 0 ( z ) ) + v 2 ( b 0 ( z ) g 2 ( z ) + b 1 ( z ) g 1 ( z ) + b 2 ( z ) g 0 ( z ) ) .
Comparing right side of the two equations, we obtain g 0 * ( z ) = b 0 ( z ) g 0 ( z ) , z r s g 1 * ( z ) = b 0 ( z ) g 1 ( z ) + b 1 ( z ) g 0 ( z ) and z r t g 2 * ( z ) = b 0 ( z ) g 2 ( z ) + b 1 ( z ) g 1 ( z ) + b 2 ( z ) g 0 ( z ) . Now, using deg f * ( z ) deg f ( z ) , we obtain b 0 ( z ) 0 in F 4 and this implies that the polynomial g 0 ( z ) is self-reciprocal. Therefore, z r s g 1 * ( z ) = b 0 g 1 ( z ) + b 1 ( z ) g 0 ( z ) where b 0 = b 0 ( z ) is a non-zero element in F 4 . Now comparing the degrees of both sides, we obtain a constant polynomial b 1 ( z ) F 4 , say, b 1 . We have z r t g 2 * ( z ) = b 0 g 2 ( z ) + b 1 g 1 ( z ) + b 2 ( z ) g 0 ( z ) . Again, comparing the degrees of both sides, we obtain b 2 ( z ) in F 4 , say b 2 . Thus, z r s g 1 * ( z ) = b 0 g 1 ( z ) + b 1 g 0 ( z ) and z r t g 2 * ( z ) = b 0 g 2 + b 1 g 1 ( z ) + b 2 g 0 ( z ) where b 0 F 4 \ { 0 } and b 1 , b 2 F 4 .
Conversely, assume (1) and (2) hold. Then
( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) * = g 0 * ( z ) + v z r s g 1 * ( z ) + v 2 z r t g 2 * ( z ) = b 0 g 0 ( z ) + v b 0 g 1 ( z ) + v b 1 g 0 ( z ) + v 2 b 0 g 2 ( z ) + v 2 b 1 g 1 ( z ) + v 2 b 2 g 0 ( z ) = b 0 ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) + b 1 ( v g 0 + v 2 g 1 ) + b 2 ( v 2 g 0 ( z ) ) C
Thus, the code C is reversible. □
Theorem 4.
Let C = g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) , v 2 a 2 ( z ) be a cyclic code of even length n over R with polynomials g 0 ( z ) , g 1 ( z ) , and g 2 ( z ) of degrees r , s , and t, respectively, and r > max { s , t } . Furthermore, assume that a 2 ( z ) | g 0 ( z ) | ( z n 1 ) . Then the code C is reversible if and only if:
(1) 
g 0 ( z ) and a 2 ( z ) are self-reversible;
(2) 
z r s g 1 * ( z ) = b 0 g 1 ( z ) + b 1 g 0 ( z ) , and a 2 ( z ) | ( z r t g 2 * ( z ) + b 0 g 2 ( z ) + b 1 g 1 ( z ) , where b 0 F 4 \ { 0 } and b 1 F 4 .
Proof. 
Let C be a reversible code. Then
( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) * = g 0 * ( z ) + v z r s g 1 * ( z ) + v 2 z r t g 2 * ( z ) .
Furthermore,
( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) * = b ( z ) ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) + v 2 c ( z ) a 2 ( z ) = ( b 0 ( z ) + v b 1 ( z ) + v 2 b 2 ( z ) ) ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) + v 2 c ( z ) a 2 ( z ) where b i ( z ) , c ( z ) F 4 [ z ] = b 0 ( z ) g 0 ( z ) + v ( b 0 ( z ) g 1 ( z ) + b 1 ( z ) g 0 ( z ) ) + v 2 ( b 0 ( z ) g 2 ( z ) + b 1 ( z ) g 1 ( z ) + b 2 ( z ) g 0 ( z ) + c ( z ) a 2 ( z ) ) .
Comparing both equations, we obtain b 0 ( z ) F 4 \ { 0 } , say b 0 , this implies that g 0 ( z ) is self-reciprocal. Therefore, z r s g 1 * ( z ) = b 0 g 1 ( z ) + b 1 g 0 ( z ) and z r t g 2 * ( z ) = b 0 g 2 ( z ) + b 1 g 1 ( z ) + b 2 ( z ) g 0 ( z ) + c ( z ) a 2 ( z ) ; this implies that a 2 ( z ) divides z r t g 2 * ( z ) + b 0 g 2 ( z ) + b 1 g 1 ( z ) .
Again, v 2 a 2 * ( z ) C and hence a 2 ( z ) | g 0 ( z ) implies that a 2 ( z ) is self-reversible.
Conversely, suppose conditions (1) and (2) hold. Then
( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) * = g 0 * ( z ) + v z r s g 1 * ( z ) + v 2 z r t g 2 * ( z ) = b 0 g 0 ( z ) + v ( b 0 g 1 ( z ) + b 1 g 0 ( z ) ) + v 2 ( b 0 g 2 ( z ) + b 1 g 1 ( z ) + c ( z ) a 2 ( z ) ) f o r s o m e c ( z ) F 4 [ z ] = b 0 ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) + v b 1 ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) + c ( z ) v 2 a 2 ( z ) C .
Therefore, C is reversible. □
The following theorem states the reversible condition of odd length codes or a code satisfying Corollary 2.
Theorem 5.
Let C = g 0 ( z ) , v a 1 ( z ) , v 2 a 2 ( z ) be a cyclic code over R with a 2 ( z ) | a 1 ( z ) | g 0 ( z ) | ( z n 1 ) . Then code C is reversible if and only if polynomials g 0 ( z ) , a 1 ( z ) and a 2 ( z ) are self-reversible.
Proof. 
Let C be a reversible code. Then for some polynomials b 0 ( z ) , b 1 ( z ) and b 2 ( z ) in F 4 [ z ] , we have ( g 0 ( z ) ) * = b 0 ( z ) g 0 ( z ) + v b 1 ( z ) a 1 ( z ) + v 2 b 2 ( z ) a 2 ( z ) .
Comparing both sides, we obtain b 0 ( z ) F 4 \ { 0 } , say b 0 , since d e g f * ( z ) d e g f ( z ) , then g 0 ( z ) is self-reciprocal. Similarly, a 1 ( z ) and a 2 ( z ) are self-reciprocal polynomials.
Conversely, let the polynomials g 0 ( z ) , a 1 ( z ) , and a 2 ( z ) be self-reciprocal. Then, elements of C are provided by the polynomial b 0 ( z ) g 0 ( z ) + v b 1 ( z ) a 1 ( z ) + v 2 b 2 ( z ) a 2 ( z ) , therefore by Lemma 4, we have
( b 0 ( z ) g 0 ( z ) + v b 1 ( z ) a 1 ( z ) + v 2 b 2 ( z ) a 2 ( z ) ) * = ( b 0 ( z ) g 0 ( z ) ) * + v ( b 1 ( z ) a 1 ( z ) ) * z r s + v 2 ( b 2 ( z ) a 2 ( z ) ) * z r t . = b 0 * ( z ) g 0 * ( z ) + v z r s b 1 * ( z ) a 1 * ( z ) + v 2 z r t b 2 * ( z ) a 2 * ( z ) C .
Thus, C is reversible. □
Now, in the following result, we determine the rank of a code C . The proof is followed by similar arguments as in Theorem 3 of [6].
Theorem 6.
Let C be a cyclic code of length n over R such that
C = g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) , v a 1 ( z ) + v p ( z ) , v 2 a 2 ( z ) ,
where g 0 ( z ) , g 1 ( z ) , g 2 ( z ) , and a 2 ( z ) are polynomials in F 4 [ z ] and d e g ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) = r , d e g ( a 1 ( z ) ) = s and d e g ( a 2 ( z ) ) = t . Then C is a free module and r a n k ( C ) = n t . Moreover, the basis of C is provided by the set S, where
S = { ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) , x ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) , , z n r 1 ( g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) ) , ( v a 1 ( z ) + v 2 p ( z ) ) , x ( v a 1 ( z ) + v 2 p ( z ) ) , , z r s 1 ( v a 1 ( z ) + v 2 p ( z ) ) , v 2 a 2 ( z ) , v 2 x a 2 ( z ) , , v 2 z s t 1 a 2 ( z ) ) } .

4. Reversible Skew Cyclic Codes over R

In this part, we focus on the structure of skew cyclic codes over R and establish a necessary and sufficient condition for these codes to be reversible. We first define the skew polynomial ring over R and provide some definitions that will be used in this section.
Let θ A u t ( F 4 ) be defined by θ ( a ) = a 2 . Now, consider a map σ : R R defined by:
σ ( a 0 + a 1 v + a 2 v 2 ) = θ ( a 0 ) + θ ( a 1 ) v + θ ( a 2 ) v 2 ,
where a 0 , a 1 , a 2 F 4 . Since σ is an extension of θ , σ is an automorphism of R . Let us consider the set:
R [ z ; σ ] = { a 0 + a 1 z + + a n z n a i R i , n N } .
Define the addition on R [ z ; σ ] as the usual addition of polynomials and multiplication under the rule ( a i z i ) ( a j z j ) = a i σ i ( a j ) z i + j . Then, it is easy to show that R [ z ; σ ] forms a ring under the above binary operations, known as a skew polynomial ring. Here, ( a i z i ) ( a j z j ) ( a j z j ) ( a i z i ) unless σ is identity automorphism.
Definition 3.
Let τ σ : R n R n be a skew cyclic shift operator defined by:
τ σ ( a 0 , a 1 , , a n 1 ) = ( σ ( a n 1 ) , σ ( a 0 ) , , σ ( a n 2 ) ) , ( a 0 , a 1 , , a n 1 ) R n .
, a linear code C of length n over R is said to be skew cyclic code if for any codeword c C , their skew cyclic shift τ σ ( c ) belongs to C , that is, τ σ ( C ) = C .
Definition 4.
For skew polynomials, a ( z ) a n d b ( z ) 0 , the polynomial b ( z ) is said to be rightly divided by a ( z ) if and only if there exists a skew polynomial q ( z ) such that a ( z ) = q ( z ) b ( z ) and we denote it by b ( z ) | r a ( z ) .
Using similar arguments as in the commutative case, we provide the structure of the skew cyclic codes over R for automorphism σ .
Theorem 7.
Let C be a skew cyclic code in R [ z ; σ ] z n 1 . Then, C = g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) , v a 1 ( z ) + v 2 p ( z ) , v 2 a 2 ( z ) with a 2 ( z ) | r a 1 ( z ) | r g 0 ( z ) | r ( z n 1 ) in F 4 [ z ; θ ] , a 1 ( z ) | r g 1 ( z ) ( z n 1 g 0 ( z ) ) and a 2 ( z ) right divides p ( z ) ( z n 1 a 1 ( z ) ) , and g 2 ( z ) ( z n 1 g 0 ( z ) ) ( z n 1 a 1 ( z ) ) .
Proof. 
Consider the ring R = F 4 [ v ] v 2 and σ A u t ( R ) . For a skew cyclic code C over R , define a map ψ 1 : R R by ψ 1 ( a + b v + c v 2 ) = a + b v where a , b , c F . Then, ψ 1 is a ring homomorphism that can be extended to a homomorphism ϕ : C R [ z ; σ ] z n 1 defined by
ϕ ( c 0 + c 1 z + + c n 1 z n 1 ) = ψ 1 ( c 0 ) + ψ 1 ( c 1 ) z + + ψ 1 ( c n 1 ) z n 1 .
Then k e r ( ϕ ) = { v 2 r ( z ) : r ( z ) F 4 [ z ; θ ] / z n 1 } .
In order to determine the generators of cyclic code in R n = R [ z , σ ] / z n 1 , we need to know the image of ϕ which is a skew cyclic code in R n = R [ z , σ 2 ] / z n 1 .
Let D be a cyclic code in R n . Now, define a map ψ 2 : R F 4 by ψ 2 ( a + u b ) = a 2 . Then ψ 2 is a ring homomorphism. We extend ψ 2 to a ring homomorphism φ : D F 4 [ z ; θ ] / z n 1 defined by
φ ( d 0 + d 1 z + + d n 1 z n 1 ) = ψ 2 ( d 0 ) + ψ 2 ( d 1 ) z + + ψ 2 ( d n 1 ) z n 1 .
Then,
k e r ( φ ) = { v r ( z ) : r ( z ) is a skew polynomial in F 4 [ z ; θ ] / z n 1 } = v a 1 ( z ) w i t h a 1 ( z ) | r ( z n 1 ) .
Since the set image( φ ) is also an ideal and hence a skew cyclic code generated by g 0 ( z ) , where g 0 ( z ) right divides ( z n 1 ) . Therefore, D = g 0 ( z ) + v g 1 ( z ) , v a 1 ( z ) where a 1 ( z ) | r g 0 ( z ) and a 1 ( z ) | r ( g 1 ( z ) z n 1 g 0 ( z ) ) .
Similarly, the set image( ϕ ) is an ideal over R . Therefore, skew cyclic code C over R is provided by C = g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) , v a 1 ( z ) + v 2 p ( z ) , v 2 a 2 ( z ) with a 2 ( z ) | r a 1 ( z ) | r g 0 ( z ) | r ( z n 1 ) and a 1 ( z ) | r ( g 1 ( z ) z n 1 g 0 ( z ) ) , a 2 ( z ) | r ( g 1 ( z ) z n 1 g 0 ( z ) ) .
Definition 5.
Let g ( z ) = g 0 + g 1 z + + g m z m be a polynomial in F 4 [ z , θ ] . Then, g ( z ) is said to be a palindromic polynomial if g i = g m i and θ-palindromic if g i = θ ( g m i ) where i { 1 , 2 , , m } .
Note that if the length of the code C is odd, then the skew cyclic codes and cyclic codes are equivalent (Theorem 8 in [17]). Now, we provide two lemmas to check the reversibility of the even length skew cyclic codes over the field F 4 .
Lemma 5.
Let C be a skew cyclic code of even length generated by a monic polynomial f ( z ) = 1 + f 1 z + + f m 1 z m 1 + z m of even degree, where f ( z ) | r ( z n 1 ) in F 4 [ z , θ ] . Then, the code C is reversible if and only if skew polynomial f ( z ) is θ-palindromic.
Proof. 
Let C be a skew cyclic code of even length generated by the θ -palindromic polynomial f ( z ) of even degree m over the ring F 4 . Then, the elements of the generated code are provided by i = 0 k 1 α i z i f ( z ) . From the repetitive use of Lemma 3, for c = ϕ ( i = 0 k 1 α i z i f ( z ) ) C , we obtain:
( ϕ ( i = 0 k 1 α i z i f ( z ) ) ) r = ϕ ( i = 0 k 1 α i z k i 1 f ( z ) ) C .
where α F 4 and k = n m . Since c r belongs to the code C , C is a reversible code.
Conversely, let C be a reversible code generated by f ( z ) = 1 + f 1 z + + f m 1 z m 1 + z m . Then, because n m 1 is odd:
z n m 1 f ( z ) = z n m 1 + θ ( f 1 ) z n m + + θ ( f m 1 ) z n 2 + z n 1 .
Since C is a skew cyclic and reversible code,
[ z n m 1 f ( z ) ] r = 1 + θ ( f m 1 ) z + θ ( f m 2 ) z 2 + + θ ( f 1 ) z m 1 + z m C .
Further, we obtain d e g ( f ( z ) [ z n m 1 f ( z ) ] r ) < m , which contradicts the fact that f ( z ) is a minimal degree polynomial in C implies f ( z ) [ z n m 1 f ( z ) ] r = 0 . Comparing coefficients, we obtain:
[ f i θ ( f m i ) ] = 0
for i = 1 , , m 1 . Thus, f i = θ ( f m i ) and the polynomial f ( z ) is θ -palindromic. □
Lemma 6.
Let C be a skew cyclic code of even length generated by a monic polynomial f ( z ) = 1 + f 1 z + + f m 1 z m 1 + z m of odd degree, where f ( z ) | r ( z n 1 ) in F 4 [ z , θ ] . Then, the code C is reversible if and only if the skew polynomial f ( z ) is palindromic.
Proof. 
Let C be a skew cyclic code of even length generated by a palindromic polynomial f ( z ) of odd degree m over the ring F 4 . Then, elements of the generated code are provided by j = 0 k 1 α j z j f ( z ) . From the repetitive use of Lemma 3 and using the property of the palindromic polynomial, for C = ϕ ( j = 0 k 1 α j z j f ( z ) ) C , we obtain:
( ϕ ( j = 0 k 1 α j z j f ( z ) ) ) r = ϕ ( j = 0 k 1 α j z k j 1 f ( z ) ) C .
where α F 4 and k = n m . Since the reverse of C belongs to C , the code C is reversible. Conversely, let C be a reversible code generated by f ( z ) = 1 + f 1 z + + f m 1 z m 1 + z m . Since n m 1 is even:
z n m 1 f ( z ) = z n m 1 + f 1 z n m + + f m 1 z n 2 + z n 1 .
Furthermore, the code C is a skew cyclic as well as reversible code; therefore, [ z n m 1 f ( z ) ] r C and:
[ z n m 1 f ( z ) ] r = [ 1 + f m 1 z + f m 2 z 2 + + f 1 z m 1 + z m ] C .
This implies that d e g ( f ( z ) [ z n m 1 f ( z ) ] r ) < m , which contradicts the fact that f ( z ) is a minimal degree polynomial in C . Hence, f ( z ) [ z n m 1 f ( z ) ] r = 0 . By comparing the coefficients, we obtain
[ f i f m i ] = 0 and f i = f m i ,
for i = 1 , , m 1 . Thus, the given polynomial f ( z ) is palindromic. □
Now, in the next theorem, we provide necessary and sufficient conditions for a skew cyclic code C to be reversible in terms of palindromic and θ -palindromic polynomials. These conditions depend on the degree of generator polynomials of C .
Theorem 8.
Let C = g 0 ( z ) , v g 1 ( z ) , v 2 g 2 ( z ) be a skew cyclic code of even length, where g i ( z ) right divides ( z n 1 ) in F 4 [ z , θ ] and d e g ( g i ( z ) ) is even (odd), for i = 0 , 1 , 2 . Then, the code C is reversible if and only if skew polynomials g i ( z ) are θ-palindromic (palindromic) for i = 0 , 1 , 2 .

5. DNA Codes over R

In this section, we discuss the complementary condition of the codes obtained from previous sections to obtain DNA codes. For a DNA code, the reversible and complement conditions are essential [21].
Definition 6.
Let C be a code of length n over R . If Φ ( C ) r c Φ ( C ) for all c C , then C or equivalently Φ ( C ) is called a DNA code.
In the following lemma, we provide some relations on ring elements and their complement using the Gray map provided in Equation (1).
Lemma 7.
For the given cyclic code in Section 3, the following conditions hold:
(1) 
For any r R , r + r c = v 2 .
(2) 
For any r 1 , r 2 R , r 1 c + r 2 c = ( r 1 + r 2 ) c + v 2 .
Proof. 
This lemma can easily be proved by observing Table 1. □
Remark 2.
We identify i ( z ) by the polynomial 1 + z + z 2 + + z n 1 .
Theorem 9.
Given a polynomial a ( z ) in R [ z ] . We have a ( z ) r c = a ( z ) r + v 2 i ( z ) .
Proof. 
Let C be a reversible-complement code. Then, by definition, C is reversible and 0 C implies that ( 0 + 0 z + + 0 z n 1 ) c C . That is, C is reversible and v 2 + v 2 z + + v 2 z n 1 C .
Conversely, let a ( z ) = a 0 + a 1 z + + a n 1 z n 1 + a n z n be a polynomial in R [ z ] . Then:
a ( z ) r c = a n c + a n 1 c z + + a 1 c z n 1 + a 0 c z n = a n + v 2 + ( a n 1 + v 2 ) z + ( a n 2 + v 2 ) z 2 + + ( a 1 + v 2 ) z n 1 + ( a 0 + v 2 ) z n = v 2 i ( z ) + a ( z ) r C .
Thus, cyclic code C is a reversible-complement code. □
Corollary 4.
Let C be a cyclic code of even length over R . Then, C is a DNA code if and only if C is reversible and v 2 i ( z ) is in C .
Proof. 
It is obvious from above theorem. □

6. Computational Results

Now, we provide some examples of DNA codes satisfying the above-mentioned constraints. We consider DNA code of any length (even or odd). All the computational works are performed by using Magma software [20].
Example 1.
In F 4 [ z ] , we have:
z 6 1 = ( z + 1 ) 2 ( z + t ) 2 ( z + t 2 ) 2 .
Let C be a cyclic code of length n = 6 over R provided by:
C = z 4 + z 2 + 1 , v ( z 4 + z 2 + 1 ) , v 2 ( z 4 + z 2 + 1 ) .
Then, using Theorem 2, we obtain d ( C ) = 3 . Furthermore, ( x 1 ) does not divide ( z 4 + z 2 + 1 ) and polynomial ( z 4 + z 2 + 1 ) is self reciprocal. Thus, we obtain a DNA code C of parameters ( 18 , 4 6 , 3 ) .
In the next example, we provide some DNA codes of arbitrary lengths that are generated from cyclic codes over R .
Example 2.
Suppose C is a cyclic code of the form C = g 0 ( z ) + v g 1 ( z ) + v 2 g 2 ( z ) , v a 1 ( z ) + v 2 p ( z ) , v 2 a 2 ( z ) , where gcd ( z n 1 a 2 ( z ) , g 0 ( z ) ) = 1 . If g 0 ( z ) = a 1 ( z ) = a 2 ( z ) , then we list several DNA codes in Table 2 that are obtained from cyclic code C . Since g 0 ( z ) , a 1 ( z ) , and a 2 ( z ) are equal, therefore, in Table 2, we mention only g 0 ( z ) . For brevity, polynomial z 2 + b 1 z + b 0 is represented as b 0 b 1 1 .
Example 3.
Consider a cyclic code C of length n = 9 over ring R . In F 4 [ z ] , we have:
z 9 1 = ( z + 1 ) ( z + t ) ( z + t 2 ) ( z 3 + t ) ( z 3 + t 2 ) .
To write briefly, we identify factors by g 1 , g 2 , g 3 , g 4 , and g 5 , respectively. The codes for n = 9 are provided in Table 3. All the codes are better than the codes that appeared in [14].
Example 4.
Consider a cyclic code C of length n = 15 over ring R . In F 4 [ z ] , we have
z 15 1 = ( z + 1 ) ( z + t ) ( z + t 2 ) ( z 2 + z + t ) ( z 2 + z + t 2 ) ( z 2 + t z + 1 ) ( z 2 + t z + t ) ( z 2 + t 2 z + 1 ) ( z 2 + t 2 z + t 2 ) .
For brevity, we identify the factors by g 1 , g 2 , g 3 , g 5 , g 6 , g 7 , g 8 , and g 9 , respectively. DNA codes for n = 15 are provided in Table 4. All the obtained DNA codes are better than the codes provided in [14].
In particular, if C = g 2 g 3 g 4 g 5 g 6 g 7 g 8 g 9 , v g 2 g 3 g 4 g 5 g 6 g 7 g 8 g 9 , v 2 g 2 g 3 g 4 g 5 g 6 g 7 g 8 g 9 , then we obtain a DNA code with parameters [ 45 , 4 3 , 15 ] . Further, we list all the DNA codewords of the obtained DNA code in Table 5. Furthermore, the edit distance of the obtained DNA code is 2, given by the codewords “TCCTCCTCCTCCTCCTCCTCCTCCTCC" and “CTCCTCCTCCTCCTCCTCCTCCTCCTC".

7. Conclusions

In this paper, we have studied reversible and DNA codes using the chain ring R = F 4 [ v ] / v 3 . We have defined a Gray map on R and found codons corresponding to the elements of R . In this way, we have obtained good DNA and reversible codes with the Hamming distances. In the future, one can work on DNA codes over a generalized structure of R as well as DNA codes by using skew polynomial rings.

Author Contributions

This work is initiated by A.S. and R.K.V. under the supervision of O.P. Then we discussed it with P.S. and W.C. to reach the final version. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding for APC. Financial support for this work is properly acknowledged in the acknowledgement section.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Acknowledgments

The first and second authors are thankful to the DST and the CSIR, Govt. of India, for financial support under CRG/2020/005927, vide Diary No. SERB/F/6780/ 2020-2021 dated 31 December 2020 and under File No. 09/1023(0027)/2019- EMR-1, respectively. Furthermore, we thank the Indian Institute of Technology Patna for providing research facilities.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this manuscript.

References

  1. Adleman, L.M. Molecular computation of solutions to combinatorial problems. Science 1994, 266, 1021–1024. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Hammons, A.R.; Kumar, P.V.; Calderbank, A.R.; Sloane, N.J.; Solé, P. The Z 4 -linearity of Kerdock, Preparata, Goethals, and related codes. IEEE Trans. Inf. Theory 1994, 40, 301–319. [Google Scholar] [CrossRef]
  3. Ling, S.; Xing, C. Coding Theory: A First Course; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  4. Norton, G.H.; Sălăgean, A. On the Hamming distance of linear codes over a finite chain ring. IEEE Trans. Inform. Theory 2000, 46, 1060–1067. [Google Scholar] [CrossRef] [Green Version]
  5. Norton, G.H.; Sălăgean, A. On the structure of linear and cyclic codes over a finite chain ring. Appl. Algebra Engrg. Comm. Comput. 2000, 10, 489–506. [Google Scholar] [CrossRef]
  6. Abualrub, T.; Siap, I. Cyclic codes over the rings Z 2 + u Z 2 and Z 2 + u Z 2 + u 2 Z 2 . Des. Codes Cryptogr. 2007, 42, 273–287. [Google Scholar] [CrossRef]
  7. Bayram, A.; Oztas, E.S.; Siap, I. Codes over F 4 + v F 4 and some DNA applications. Des. Codes Cryptogr. 2016, 80, 379–393. [Google Scholar] [CrossRef]
  8. Guenda, K.; Gulliver, T.A. Construction of cyclic codes over F 2 + u F 2 for DNA computing. Appl. Algebra Engrg. Comm. Comput. 2013, 24, 445–459. [Google Scholar] [CrossRef]
  9. Prakash, O.; Patel, S.; Yadav, S. Reversible cyclic codes over some finite rings and their application to DNA codes. Comput. Appl. Math. 2021, 40, 1–17. [Google Scholar] [CrossRef]
  10. Prakash, O.; Yadav, S.; Sharma, P. Reversible cyclic codes over a class of chain rings and their application to DNA codes. Int. J. Inf. Coding Theory 2022, 6, 52–70. [Google Scholar] [CrossRef]
  11. Bennenni, N.; Guenda, K.; Mesnager, S. DNA cyclic codes over rings. Adv. Math. Commun. 2017, 11, 83. [Google Scholar] [CrossRef]
  12. Mostafanasab, H.; Darani, A.Y. On Cyclic DNA Codes Over F 2 + u F 2 + u 2 F 2 . Commun. Math. Stat. 2021, 9, 39–52. [Google Scholar] [CrossRef]
  13. Yildiz, B.; Siap, I. Cyclic codes over F 2 [ u ] / ( u 4 1 ) and applications to DNA codes. Comput. Math. Appl. 2012, 63, 1169–1176. [Google Scholar] [CrossRef] [Green Version]
  14. Liu, J.; Liu, H. DNA Codes Over the Ring F 4 [ u ] / u 3 . IEEE Access 2020, 8, 77528–77534. [Google Scholar] [CrossRef]
  15. Boucher, D.; Ulmer, F. Coding with skew polynomial rings. J. Symbolic Comput. 2009, 44, 1644–1656. [Google Scholar] [CrossRef]
  16. Jitman, S.; Ling, S.; Udomkavanich, P. Skew constacyclic codes over finite chain rings. Adv. Math. Commun. 2012, 6, 39–62. [Google Scholar]
  17. Siap, I.; Abualrub, T.; Aydin, N.; Seneviratne, P. Skew cyclic codes of arbitrary length. Int. J. Inf. Coding Theory 2011, 2, 10–20. [Google Scholar] [CrossRef]
  18. Gursoy, F.; Oztas, E.S.; Siap, I. Reversible DNA codes using skew polynomial rings. Appl. Algebra Engrg. Comm. Comput. 2017, 28, 311–320. [Google Scholar] [CrossRef] [Green Version]
  19. Cengellenmis, Y.; Aydin, N.; Dertli, A. Reversible DNA codes from skew cyclic codes over a ring of order 256. J. Algebra Comb. Discret. Struct. Appl. 2021, 8, 1–8. [Google Scholar]
  20. Bosma, W.; Cannon, W.J.; Playoust, C. The Magma algebra system I: The user language. J. Symbolic Comput. 1997, 24, 235–265. [Google Scholar] [CrossRef]
  21. Limbachiya, D.; Rao, B.; Gupta, M.K. The art of DNA strings: Sixteen years of DNA coding theory. arXiv 2016, arXiv:1607.00266. [Google Scholar]
Table 1. Codons correspondence with the elements of R .
Table 1. Codons correspondence with the elements of R .
0AAA v 2 TTT t v 2 GGG t 2 v 2 CCC
1TAA v 2 + 1 ATT t v 2 + 1 CGG t 2 v 2 + 1 GCC
tGAA v 2 + t CTT t v 2 + t AGG t 2 v 2 + t TCC
t 2 CAA v 2 + t 2 GTT t v 2 + t 2 TGG t 2 v 2 + t 2 ACC
vTTA v 2 + v AAT t v 2 + v CCG t 2 v 2 + v GGC
v + 1 ATA v 2 + v + 1 TAT t v 2 + v + 1 GCG t 2 v 2 + v + t AGC
v + t CTA v 2 + v + t GAT t v 2 + v + t TCG t 2 v 2 + v + 1 CGC
v + t 2 GTA v 2 + v + t 2 CAT t v 2 + v + t 2 ACG t 2 v 2 + v + t 2 TGC
t v GGA v 2 + t v CCT t v 2 + t v AAG t 2 v 2 + t v TTC
t v + 1 CGA v 2 + t v + 1 GCT t v 2 + t v + 1 TAG t 2 v 2 + t v + 1 ATC
t v + t AGA v 2 + t v + t TCT t v 2 + t v + t GAG t 2 v 2 + t v + t CTC
t v + t 2 TGA v 2 + t v + t 2 ACT t v 2 + t v + t 2 CAG t 2 v 2 + t v + t 2 GTC
t 2 v CCA v 2 + t 2 v GGT t v 2 + t 2 v TTG t 2 v 2 + t 2 v AAC
t 2 v + 1 GCA v 2 + t 2 v + 1 CGT t v 2 + t 2 v + 1 ATG t 2 v 2 + t 2 v + 1 TAC
t 2 v + t TCA v 2 + t 2 v + t AGT t v 2 + t 2 v + t CTG t 2 v 2 + t 2 v + t GAC
t 2 v + t 2 ACA v 2 + t 2 v + t 2 TGT t v 2 + t 2 v + t 2 GTG t 2 v 2 + t 2 v + t 2 CAC
Table 2. DNA codes of different lengths.
Table 2. DNA codes of different lengths.
Length g 0 ( z ) Type of CodeGray Image
5 1 t 1 ( 5 , 3 , 3 ) ( 15 , 4 9 , 3 )
511111 ( 5 , 1 , 5 ) ( 15 , 4 3 , 5 )
610101 ( 6 , 2 , 3 ) ( 18 , 4 6 , 3 )
10101010101 ( 10 , 2 , 5 ) ( 30 , 4 6 , 5 )
13 1 t 0 ( 1 + t ) 0 t 1 ( 13 , 7 , 5 ) ( 39 , 4 21 , 5 )
141010101010101 ( 14 , 2 , 7 ) ( 42 , 4 6 , 7 )
17 11 t 11 ( 17 , 13 , 4 ) ( 51 , 4 39 , 4 )
17 1 ( 1 + t ) 11 t 11 ( 1 + t ) 1 ( 17 , 9 , 7 ) ( 51 , 4 27 , 7 )
29 1 t 0 t ( 1 + t ) 1 ( 1 + t ) t ( 1 + t ) 1 ( 1 + t ) t 0 t 1 ( 10 , 1 , 5 ) ( 30 , 4 3 , 5 )
Table 3. Codes of length 27.
Table 3. Codes of length 27.
Sr NoGenerator of CodeType of CodeGray ImageDNA Code [14]
1 g 2 g 3 , v g 2 g 3 , v 2 g 2 g 3 ( 9 , 7 , 2 ) ( 27 , 4 21 , 2 ) ( 27 , 4 14 , 2 )
2 g 4 g 5 , v g 4 g 5 , v 2 g 4 g 5 ( 9 , 3 , 3 ) ( 27 , 4 9 , 3 ) ( 27 , 4 6 , 3 )
3 g 2 g 3 g 4 g 5 , v g 2 g 3 g 4 g 5 , v 2 g 2 g 3 g 4 g 5 ( 9 , 1 , 9 ) ( 27 , 4 3 , 9 ) ( 27 , 4 2 , 9 )
Table 4. Codes of length 45.
Table 4. Codes of length 45.
CodeType of CodeGray ImageDNA Code [14]
g 2 g 3 , v g 2 g 3 , v 2 g 2 g 3 ( 15 , 13 , 2 ) ( 45 , 4 39 , 2 ) ( 45 , 4 26 , 2 )
g 2 g 3 g 6 , v g 2 g 3 g 6 , v 2 g 2 g 3 g 6 ( 15 , 11 , 4 ) ( 45 , 4 33 , 4 ) ( 45 , 4 24 , 3 )
g 4 g 8 g 9 , v g 4 g 8 g 9 , v 2 g 4 g 8 g 9 ( 15 , 9 , 5 ) ( 45 , 4 27 , 5 ) ( 45 , 4 18 , 5 )
g 2 g 3 g 5 g 6 g 7 , v g 2 g 3 g 5 g 6 g 7 , v 2 g 2 g 3 g 5 g 6 g 7 ( 15 , 7 , 7 ) ( 45 , 4 21 , 7 ) ( 45 , 4 14 , 7 )
g 2 g 3 g 4 g 5 g 6 g 7 g 9 , v g 2 g 3 g 4 g 5 g 6 g 7 g 9 , v 2 g 2 g 3 g 4 g 5 g 6 g 7 g 9 ( 15 , 3 , 9 ) ( 45 , 4 9 , 9 ) ( 45 , 4 6 , 9 )
Table 5. Codewords of length 45 and dimension 3.
Table 5. Codewords of length 45 and dimension 3.
AAAAAAAAAAAAAAAAAAAAAAAAAAATAATAATAATAATAATAATAATAATAA
GAAGAAGAAGAAGAAGAAGAAGAAGAACAACAACAACAACAACAACAACAACAA
TTATTATTATTATTATTATTATTATTAATAATAATAATAATAATAATAATAATA
CTACTACTACTACTACTACTACTACTAGTAGTAGTAGTAGTAGTAGTAGTAGTA
GGAGGAGGAGGAGGAGGAGGAGGAGGACGACGACGACGACGACGACGACGACGA
AGAAGAAGAAGAAGAAGAAGAAGAAGATGATGATGATGATGATGATGATGATGA
CCACCACCACCACCACCACCACCACCAGCAGCAGCAGCAGCAGCAGCAGCAGCA
TCATCATCATCATCATCATCATCATCAACAACAACAACAACAACAACAACAACA
TTTTTTTTTTTTTTTTTTTTTTTTTTTATTATTATTATTATTATTATTATTATT
CTTCTTCTTCTTCTTCTTCTTCTTCTTGTTGTTGTTGTTGTTGTTGTTGTTGTT
AATAATAATAATAATAATAATAATAATTATTATTATTATTATTATTATTATTAT
GATGATGATGATGATGATGATGATGATCATCATCATCATCATCATCATCATCAT
CCTCCTCCTCCTCCTCCTCCTCCTCCTGCTGCTGCTGCTGCTGCTGCTGCTGCT
TCTTCTTCTTCTTCTTCTTCTTCTTCTACTACTACTACTACTACTACTACTACT
GGTGGTGGTGGTGGTGGTGGTGGTGGTCGTCGTCGTCGTCGTCGTCGTCGTCGT
AGTAGTAGTAGTAGTAGTAGTAGTAGTTGTTGTTGTTGTTGTTGTTGTTGTTGT
GGGGGGGGGGGGGGGGGGGGGGGGGGGCGGCGGCGGCGGCGGCGGCGGCGGCGG
AGGAGGAGGAGGAGGAGGAGGAGGAGGTGGTGGTGGTGGTGGTGGTGGTGGTGG
CCGCCGCCGCCGCCGCCGCCGCCGCCGGCGGCGGCGGCGGCGGCGGCGGCGGCG
TCGTCGTCGTCGTCGTCGTCGTCGTCGACGACGACGACGACGACGACGACGACG
AAGAAGAAGAAGAAGAAGAAGAAGAAGTAGTAGTAGTAGTAGTAGTAGTAGTAG
GAGGAGGAGGAGGAGGAGGAGGAGGAGCAGCAGCAGCAGCAGCAGCAGCAGCAG
TTGTTGTTGTTGTTGTTGTTGTTGTTGATGATGATGATGATGATGATGATGATG
CTGCTGCTGCTGCTGCTGCTGCTGCTGGTGGTGGTGGTGGTGGTGGTGGTGGTG
CCCCCCCCCCCCCCCCCCCCCCCCCCCGCCGCCGCCGCCGCCGCCGCCGCCGCC
TCCTCCTCCTCCTCCTCCTCCTCCTCCACCACCACCACCACCACCACCACCACC
GGCGGCGGCGGCGGCGGCGGCGGCGGCAGCAGCAGCAGCAGCAGCAGCAGCAGC
CGCCGCCGCCGCCGCCGCCGCCGCCGCTGCTGCTGCTGCTGCTGCTGCTGCTGC
TTCTTCTTCTTCTTCTTCTTCTTCTTCATCATCATCATCATCATCATCATCATC
CTCCTCCTCCTCCTCCTCCTCCTCCTCGTCGTCGTCGTCGTCGTCGTCGTCGTC
AACAACAACAACAACAACAACAACAACCACCACCACCACCACCACCACCACCAC
TACTACTACTACTACTACTACTACTACGACGACGACGACGACGACGACGACGAC
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Prakash, O.; Singh, A.; Verma, R.K.; Solé, P.; Cheng, W. DNA Code from Cyclic and Skew Cyclic Codes over F4[v]/v3. Entropy 2023, 25, 239. https://doi.org/10.3390/e25020239

AMA Style

Prakash O, Singh A, Verma RK, Solé P, Cheng W. DNA Code from Cyclic and Skew Cyclic Codes over F4[v]/v3. Entropy. 2023; 25(2):239. https://doi.org/10.3390/e25020239

Chicago/Turabian Style

Prakash, Om, Ashutosh Singh, Ram Krishna Verma, Patrick Solé, and Wei Cheng. 2023. "DNA Code from Cyclic and Skew Cyclic Codes over F4[v]/v3" Entropy 25, no. 2: 239. https://doi.org/10.3390/e25020239

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop