Home Constacyclic codes over 𝔽pm[u1, u2,⋯,uk]/〈 ui2 = ui, uiuj = ujui〉
Article Open Access

Constacyclic codes over 𝔽pm[u1, u2,⋯,uk]/〈 ui2 = ui, uiuj = ujui

  • Xiying Zheng EMAIL logo and Bo Kong
Published/Copyright: May 10, 2018

Abstract

In this paper, we study linear codes over ring Rk = 𝔽pm[u1, u2,⋯,uk]/〈ui2 = ui, uiuj = ujui〉 where k ≥ 1 and 1 ≤ i, jk. We define a Gray map from RkntoFpm2kn and give the generator polynomials of constacyclic codes over Rk. We also study the MacWilliams identities of linear codes over Rk.

MSC 2010: 94B15

1 Introduction

Constacyclic codes are an important class of linear codes and have good error-correcting properties as well as have practical applications since they can be encoded with shift registers. have practical applications as they can be encoded with shift registers. Constacyclic codes over finite rings are well-known as they have rich algebraic structures for efficient error detection and correction, which explain their preferred role in engineering. In recent years, due to their rich algebraic structure, constacyclic codes have been studied over finite fields [1, 2, 3, 4]. The class of finite chain rings has been studied, by many authors, [5, 6, 7, 8]. There is a lot of work on constacyclic codes over finite rings of the form 𝔽pm + u 𝔽pm + ⋯ + ue−1𝔽pm by many authors, where ue = 0. For example, Chen et al. in [9] gave the structures of all (a + bu)-constacyclic codes of length 2ps over ring 𝔽pm + u 𝔽pm. Sobhani in [10] completely determined the structure of (δ + αu2)-constacyclic codes of length pk over 𝔽pm + u 𝔽pm + u2𝔽pm. Liu and Xu in [11] gave the structure of cyclic and negacyclic codes of length 2ps over 𝔽pm + u 𝔽pm. Abualrub and Siap in [12] gave the structure of (1 + u)-constacyclic codes of arbitrary length n over 𝔽2 + u𝔽2. Kai et al. in [13] studied the (1 + λu)-constacyclic codes of arbitrary length n over 𝔽p[u]/〈um〉, where (1 + λu) is a unite of 𝔽p[u]/〈um〉. Guenda and Gulliver in [14] gave the structure of repeated root constacyclic codes of length mps over 𝔽pr + u𝔽pr + ⋯ + ue−1𝔽pr.

The class of finite commutative rings of the form R + uR has been studied by many authors, where u2 = 1. For example, in [15] Cengellenmis gave the structure of cyclic codes over 𝔽3 + v𝔽3, where v2 = 1. ¨Qzen et al. in [16] gave the structure of cyclic and some constacyclic codes over the ring ℤ4[u]/〈u2 − 1〉. The class of finite commutative rings of the form 𝔽pm + u 𝔽pm has been studied by many authors, where u2 = u. For example, in [17], Kong and Chang described the structure of cyclic codes and self dual cyclic codes over 𝔽p + u𝔽p, where u2 = u. Cengellenmis et al. in [18] gave the structure of codes over 𝔽2[u1, u2,⋯, uk]/〈ui2 = ui, uiuj = ujui〉 with a Gray map. Li et al. in [19] gave the structure of linear codes over ℤ4[u, v]/〈u2 = u, v2 = v, uv = vu〉. In [20], the generators of cyclic codes and (λ1 + λ2u + λ3v + λ4uv)-constacyclic codes over 𝔽p + u𝔽p + v𝔽p + uv𝔽p were given. The purpose of this paper is to continue this line of research. We determine the algebraic structures of all λ-constacyclic codes of 𝔽pm[u1, u2,⋯, uk]/〈ui2 = ui, uiuj = ujui〉, where λ is an arbitrary unit of the ring 𝔽pm[u1, u2,⋯, uk]/〈ui2 = ui, uiuj = ujui〉.

The remainder of this paper is organized as follows. In section 2, we provide the preliminaries that we need and define a Gray map from RkntoFpm2kn. In section 3, we study the Gray image of linear codes over Rk. In section 4, we give the structure of constacyclic codes of arbitrary length over Rk.

2 Preliminaries

An ideal I of a finite commutative ring R is called principal if it is generated by one element. R is a principal ideal ring if its ideals are principal. R is called a local ring if R has a unique maximal ideal. R is called a chain ring if its ideals are linearly ordered by inclusion.

As defined in [18], let

Rk=Fpm[u1,u2,,uk]/ui2=ui,uiuj=ujui.

For any subset A ⊆ {1, 2, ⋯, k}, let

uA=iAui

with the convention that u = 1. Then any element of Rk can be represented as

A{1,2,,k}cAuA,cAFpm.

We can easily observe that

uAuB=uAB.

Let Pk be the power set of the set {1, 2, ⋯, k}.

It follows that

(APkcAuA)(BPkcBuB)=DPk(AB=DcAcB)uD.

By the same method of Theorem 2.3 and Lemma 2.4 in [18] we have the following theorem:

Theorem 2.1

The idealw1, w2,⋯, wk〉, wherewi ∈ {ui, 1 − ui}, is an ideal of cardinalitypm(2k−1)and there are 2ksuch ideals.

Let ωi = 〈wi1, wi2,⋯, wik〉 be an ideal as described in Theorem 2.1, where wij ∈ {uj, 1 − uj}, 1 ≤ i ≤ 2k. An element e is called an idempotent element if e2 = e. For x, yRk, x, y are called orthogonal if xy = 0. Let ei = wi1wi2wik, where i = 1, 2, ⋯, 2k. We know that ui2 = ui, (1 − ui)2 = 1 − ui, ui(1 − ui) = 0, so e1, e2, ⋯, e2k are pairwise orthogonal non-zero idempotent elements over Rk. By the induction method over Rk, we have 1 = e1 + e2 + ⋯ + e2k. By the Chinese Remainder Theorem, we have that Rk = e1Rk + e2Rk + ⋯ + e2kRk, and for any element rRk, r can be expressed uniquely as r = r1e1 + r2e2 + ⋯ + r2ke2k, where ri ∈ 𝔽pm, i = 1, 2,⋯, 2k.

Theorem 2.2

RkRk/ω1 × … × Rk/ω2k.

Proof

First, we prove that i=12kωi={0}.

We use mathematical induction over Rk.

Base case: Setting over R1, we get

i=12ωi=u11u1=u1u12={0}.

Induction step: Over Rk−1, suppose that

i=12k1ωi={0},

where ωi = 〈wi1, wi2, ⋯, wik−1〉, wij ∈ {uj, 1 − uj}, 1 ≤ i ≤ 2k−1, 1 ≤ jk − 1.

Then over Rk

i=12kωi=i=12kwi1,wi2,,wik=(i=12k1wi1,wi2,,wik1,uk)(i=12k1wi1,wi2,,wik1,1uk)=(i=12k1(ωi+uk))(i=12k1(ωi+1uk))=(i=12k1ωi+uk)(i=12k1ωi+1uk)=uk1uk=ukuk2={0},

where ωi = 〈wi1, wi2,⋯, wik〉, wij ∈ {uj, 1 − uj}, 1 ≤ i ≤ 2k, 1 ≤ jk.

Secondly, we prove that ω1, ω2, ⋯, ω2k are pairwise coprime. For any two different ideals ωi, ωj, there exist utωi, (1 − ut) ∈ ωj, such that 1 ∈ ωi + ωj, then ωi + ωj = Rk. So ω1, ω2, ⋯, ω2k are pairwise coprime.

By the Chinese Remainder Theorem, we can get that RkRk/ω1 × … × Rk/ω2k. □

Theorem 2.3

The ringRkhas cardinalitypm2k. The idealωiis a maximal ideal ofRk, wherei = 1, 2,⋯, 2k. Consequently, RkFpm2k.

Proof

By Theorem 2.2, we have that |Rk|=|Rk||ω1|××|Rk||ω2k|. By Theorem 2.1 |ωi| = pm(2k−1), where i = 1, 2,⋯, 2k.

We have that |Rk| = pm2k. Thus |Rk||ωi| = pm, where i = 1, 2,⋯, 2k. So ωi is a maximal ideal of Rk, we can get that Rk/ωi≅ 𝔽pm, where i = 1, 2,⋯, 2k. So RkFpm2k. □

Corollary 2.4

There are (pm − 1)2kunits in the ringRk.

Proof

There are (pm − 1) units in 𝔽pm. By Theorem 2.3, we know there are (pm − 1)2k units in the ring Rk. □

Theorem 2.5

(cf. [21, Theorem 2]). The ringRkis a principal ideal ring, not a chain ring.

We define the Gray map as follows:

For r = r1e1 + r2e2 + ⋯ + r2ke2kRk, we define ϕ : r ↦ (r1, r2, ⋯, r2k). We expand ϕ as:

Φ:RknFpm2kn(c0,c1,,cn1)(r1,0,,r1,n1,r2,0,,r2,n1,,r2k,0,,r2k,n1),

where ci = r1,ie1 + r2,ie2 + ⋯ + r2k,ie2kRk.

A linear code C of length n over Rk is an Rk-submodule of Rkn. Every codeword c in such a code C is just an n-tuple of the form c = (c0, c1, ⋯, cn−1) ∈ Rkn, and can be represented by a polynomial in Rk[x] as follows:

c=(c0,c1,,cn1)c(x)=i=0n1cixiRk[x].

We define a constacyclic shift operator as:

σλ(c0,c1,,cn1)=(λcn1,c0,,cn2).

If for any cC, we have σλ(c) ∈ C, then C is called λ-constacyclic code over Rk. Let a = (a0, a1, ⋯, an−1) and b = (b0, b1, ⋯, bn−1) be two elements of Rkn. Then the usual inner product of a and b is defined as ab=i=0n1aibi. If ab = 0, then a and b are said to be orthogonal.

The dual code of C is C = {a| ∀ bC, ab = 0}, which is also a linear code. A code C is self-orthogonal if CC and self dual if C = C.

For all rRk, define the Lee weight of r as follows: wL(r) = wH(ϕ(r)), where let wH(ϕ(r)) denote the Hamming weight of the image of r under ϕ.

For all x = (x1, x2,⋯, xn) ∈ Rkn, define the Lee weight of x as follows wL(x) = i=1nwL(xi), the Lee distance of codewords x, y over Rkn is defined as dL(x, y) = wL(xy). The Lee distance of C is defined by

dL(C)=min{dL(xy),x,yC,xy}.

By the definition of the Gray map and the Lee weight of Rk, we can get that Φ is one-to-one and a distance preserving linear map from RkntoFpm2kn.

3 Linear codes over Rk

Using the polynomial representation of codewords in Rkn, we easily have the following.

Lemma 3.1

A subsetCofRknisa λ-constacyclic code of lengthnoverRkif and only if its polynomial representation is an ideal of the ringRk[x]/〈xn - λ〉.

For any r = (r(0), r(1), ⋯, r(n−1)) ∈ Rkn, where r(i) = j=12krijej, i = 0, 1, ⋯, n − 1. Then r can be uniquely express as r = j=12krjej, where rj = (r0j, r1j, ⋯, rn−1,j) ∈ Fpmn,j = 1, 2,⋯, 2k.

For any r, sRkn, where s = j=12ksjej, sj = (s0j, s1j, ⋯, sn−1,j) ∈ Fpmn, we can get that

rs=j=12k(rjsj)ej,

where rjsj=i=0n1(rijsij).

Let C be a linear code over Rk. For j = 1, 2,⋯, 2k, we denote Cj as follows:

Cj={rjFpmn|i=12krieiC,riFpmn,},j=1,2,,2k.

Clearly, Cj is a linear code of length n over 𝔽pm.

By the definition above we have the following theorems easily.

Theorem 3.2

LetCbe a linear code overRk, thenC=j=12kejCj,|C|=j=12k|Cj|,whereC1, C2, ⋯, C2kare linear codes of lengthnover 𝔽pm, and the direct sum decomposition is unique.

Theorem 3.3

LetCbe a linear code overRk, thenC=j=12kejCj,whereCjis the dual code ofCj, wherej = 1, 2,⋯, 2k.

Proof

Let C~=j=12kejCj. For anycC,c~C~,cc~=j=12k(cjcj~)ej, wherec=j=12kejcj,c~=j=12kejcj~,cjCj,cj~Cj. Then c = 0, and thus C. The ring Rk is a principal ideal ring and thus a Frobenius ring, we have |C||C| = |Rk|n. Thus

|C~|=j=12k|Cj|=j=12kpn|Cj|=|Rk|n|C|=|C|.

So C = . □

Theorem 3.4

LetCbe a linear code overRk, thenCis a self-orthogonal code if and only ifCjis a self-orthogonal over 𝔽pm, wherec=j=12kejcj.Cis a self-dual code if and only ifCjis a self-dual code over 𝔽pm, wherej = 1, 2,⋯, 2k.

Proof

By Theorems 3.2 and 3.3, CC if and only if CjCj, so if C is a self-orthogonal code then Cj is a self-orthogonal code over 𝔽pm, where j = 1, 2,⋯, 2k. Similarly, C is a self-dual code then Cj is a self-dual code over 𝔽pm, where j = 1, 2,⋯, 2k. □

Let C be a linear code of length n over Rk, for any c = c1e1 + c2e2 + ⋯ + c2ke2kC, Φ(c) = (c1, c2, ⋯, c2k) ∈ Fpm2kn. Let C1,C2, ⋯, C2k be linear codes of length n over 𝔽pm, we define

C1×C2××C2k={(c1,c2,,c2k),ciCi,i=1,2,,2k}.

Theorem 3.5

LetC = e1C1 + e2C2 + ⋯ + e2kC2kbe a linear code of lengthn over Rkwith |C| = pmland the minimum Lee distancedL(C) = d. ThenΦ(C) = C1× C2× ⋯ × C2kis a linear code with parameter [2kn, l, d] andΦ(C) = Φ(C). IfCis a self-dual code overRk, thenΦ(C) is a self-dual code over 𝔽pm.

Proof

By the definition above, we can know that

C1×C2××C2kΦ(C)

and

|C1×C2××C2k|=|C1||C2||C2k|=|C|.

This gives that

Φ(C)=C1×C2××C2k.

Let c=j=12kejcjC,d=j=12kejdjC,wherecjCj,djCj,thencd=j=12kejcjdj=0, which implies cjdj = 0, so

Φ(c)Φ(d)=j=12kcjdj=0,

which implies

Φ(C)Φ(C).

By Theorem 3.3, we have

Φ(C)=C1×C2××C2k.

Since Φ is one-to-one, we have

|Φ(C)|=pm2kn|C|=pm2kn|Φ(C)|=|Φ(C)|.

So

Φ(C)=Φ(C).

Let τ be a cyclic shift operator on Fpmn.Leta=(a(1)|a(2)||a(2k))Fpm2kn, wherea(j)Fpmn for j = 1, 2,⋯, 2k. Let τ2k be the quasi-shift given by

τ2k(a(1)|a(2)||a(2k))=(τ(a(1))|τ(a(2))||τ(a(2k))).

Proposition 3.6

Letσbe a cyclic shift onRkn, letΦbe the Gray map fromRkntoFpm2kn, and letτ2kbe as above. ThenΦσ = τ2kΦ.

Proof

Let r = (r0, r1, ⋯, rn−1) ∈ Rkn, where ri=j=12krijej, i = 0, 1, ⋯, n − 1. We have σ(r) = (rn−1, r0, ⋯, rn−2). If we apply Φ, we have

Φ(σ(r))=Φ(rn1,r0,,rn2)=(r1,n1,r1,0,,r1,n2,r2,n1,r2,0,,r2,n2,,r2k,n1,r2k,0,,r2k,n2).

On the other hand,

τ2k(Φ(r))=τ2k(Φ(r0,r1,,rn1))=τ2k(r1,0,r1,1,,r1,n1,r2,0,r2,1,,r2,n1,,r2k,0,r2k,1,,r2k,n1)=(r1,n1,r1,0,,r1,n2,r2,n1,r2,0,,r2,n2,,r2k,n1,r2k,0,,r2k,n2).

Therefore, we have

Φσ=τ2kΦ.

Theorem 3.7

LetCbe a cyclic code of lengthnoverRk. ThenΦ(C) is a quasi-cyclic code of index 2kover 𝔽pmwith length 2kn.

Proof

Since C is a cyclic code, then σ(C) = C. If we apply Φ, we have Φσ(C) = Φ(C). By the Proposition 3.6, Φ(σ(C)) = Φ(C) = τ2k(Φ(C)), so Φ(C) is a quasi-cyclic code of index 2k over 𝔽pm with length 2kn. □

Let C be a linear code of length n over Rk, let A0, A1, ⋯, A2kn denote the number of codewords in C of the Lee weight, and the Lee weight distribution of C is simply the tuple of numbers {A0, A1, ⋯, A2kn}.

Let LeeC(x, y) = i=02knAix2kniyi denote the Lee weight enumerator of C, we get that

LeeC(x,y)=cCx2knwL(c)ywL(c).

Let WC(x, y) = cCx2knwH(c)ywH(c) denote the Hamming weight enumerator of C.

By the results of [22], we have

WC(x,y)=1|C|WC(x+(|Rk|1)y,xy).

By a proof similar to (cf. [23, Lemma 1]), we obtain the following lemma.

Lemma 3.8

Letxandybe two vectors inRkn, and letdH(Φ(x), Φ(y)) denote the Hamming distance ofΦ(x),Φ(y), whereΦ(x), Φ(y) are codewords inFpm2kn. LetwH(Φ(x)) denote the Hamming weight ofΦ, then

  1. wL(x) = wH(Φ(x)),

  2. dL(x, y) = dH(Φ(x), Φ(y)).

Theorem 3.9

LetCbe a linear code of lengthnoverRk, then LeeC(x, y) = 1|Φ(C)|WΦ(C)(x + (pm2k − 1)y, xy).

Proof

By Theorem 3.5, we have that

LeeC(x,y)=WΦ(C)(x,y)=WΦ(C)(x,y).

So

LeeC(x,y)=cCx2knwL(c)ywL(c)=Φ(c)Φ(C)x2knwH(Φ(c))ywH(Φ(c))=WΦ(C)(x,y).

As Φ is one-to-one, we have that |Φ(C)| = |C|, hence

LeeC(x,y)=WΦ(C)(x,y)=1|Φ(C)|WΦ(C)(x+(pm2k1)y,xy).

4 λ-Constacyclic codes over Rk

Theorem 4.1

LetC = e1C1 + e2C2 + ⋯ + e2kC2kbe a linear code overRk, thenCis a1e1 + λ2e2 + ⋯ + λ2ke2k)-constacyclic code overRkif and only ifC1, C2, ⋯, C2kare λi-constacyclic codes over 𝔽pm, where λ1e1 + λ2e2 + ⋯ + λ2ke2kis a unit overRk.

Proof

For any ci = (ci,0, ci,1, ⋯, ci,n−1) ∈ Ci, where i = 1, 2,⋯, 2k. Then

c=e1c1+e2c2++e2kc2k=(i=12keici,0,i=12keici,1,,i=12keici,n1)C.

If λ1e1 + λ2e2 + ⋯ + λ2ke2k is a unit over Rk, it is easy to know that for any element r = r1e1 + r2e2 + ⋯ + r2ke2kRk, r is a unit if and only if ri ≠ 0, where i = 1, 2,⋯, 2k.

For i = 1, 2,⋯, 2k, if Ci is a λi-constacyclic code over 𝔽pm, then

σλi(ci)=σλi(ci,0,ci,1,,ci,n1)=(λici,n1,ci,0,,ci,n2)Ci.

Then we have

σλ1e1+λ2e2++λ2ke2k(c)=((λ1e1+λ2e2++λ2ke2k)i=12keici,n1,i=12keici,0,,i=12keici,n2)=e1σλ1(c1)+e2σλ2(c2)++e2kσλ2k(c2k)C.

This proves that C is a (λ1e1 + λ2e2 + ⋯ + λ2ke2k)-constacyclic code over Rk.

Conversely, if C is a (λ1e1 + λ2e2 + ⋯ + λ2ke2k)-constacyclic code over Rk, then

σλ1e1+λ2e2++λ2ke2k(c)=e1σλ1(c1)+e2σλ2(c2)++e2kσλ2k(c2k)C.

Thus σλi(ci) ∈ Ci, where i = 1, 2,⋯, 2k.

So Ci is a λi-constacyclic code over 𝔽pm, where i = 1, 2,⋯, 2k. □

Theorem 4.2

LetC = e1C1 + e2C2 + ⋯ + e2kC2kbe a1e1 + λ2e2 + ⋯ + λ2ke2k)-constacyclic code of lengthnoverRk, then there exists a polynomiale1g1(x) + e2g2(x) + ⋯ + e2kg2k(x) inRk[x] that dividesxn-(λ1e1 + λ2e2 + ⋯ + λ2ke2k) generates the code, wheregiis the generator polynomial ofCi, i = 1, 2,⋯, 2k.

Proof

If C = e1C1 + e2C2 + ⋯ + e2kC2k be a (λ1e1 + λ2e2 + ⋯ + λ2ke2k)-constacyclic n over Rk, by Theorem 4.1 we know that Ci is λi-constacyclic code over 𝔽pm, where i = 1, 2,⋯, 2k. Let gi be the generator polynomial of Ci, where i = 1, 2,⋯, 2k. It follows that C has the form

C=e1g1(x),e2g2(x),,e2kg2k(x).

Let C′ = 〈e1g1(x) + e2g2(x) + ⋯ + e2kg2k(x)〉. We have that C′ ⊆ C.

Note that

ei[(e1g1(x)+e2g2(x)++e2kg2k(x)]=eigi(x),

where i = 1, 2,⋯, 2k.

We get that CC′. So C = C′, and C is generated by a single element g(x) = e1g1(x) + e2g2(x) + ⋯ + e2kg2k(x).

We know that gi divides xni, since gi is the generator polynomial of Ci, where i = 1, 2,⋯, 2k. Let fi(x) be the polynomial such that gi(x)fi(x) = xni, where i = 1, 2,⋯, 2k.

Then we have

[e1g1(x)+e2g2(x)++e2kg2k(x)][e1f1(x)+e2f2(x)++e2kf2k(x)]=λ1e1+λ2e2++λ2ke2k.

So we have e1g1(x) + e2g2(x) + ⋯ + e2kg2k(x) in Rk[x] that divides xn-(λ1e1 + λ2e2 + ⋯ + λ2ke2k). □

By Theorem 4.2 we have the following theorem easily:

Theorem 4.3

LetC = e1C1 + e2C2 + ⋯ + e2kC2kbe a1e1 + λ2e2 + ⋯ + λ2ke2k)-constacyclic code of lengthnoverRk. ThenC=e1f1(x)+e2f2(x)++e2kf2k(x),|C|=pm(i=12kdeg(gi)),wherefi (x) is the reciprocal polynomial offi(x),i.e., fi(x) = (xni)/gi(x), fi (x) = xdeg(fi)f(x−1), fori = 1, 2,⋯, 2k.

Example 4.4

Letn = 10 andR2 = 𝔽3 + u1𝔽3 + u2𝔽3 + u1u2𝔽3, λ = − 1, x10 + 1 = (x2 + 1)(x4 + x3 + 2x + 1)(x4 + 2x3 + x + 1) in 𝔽3(x). Letf1(x) = f2(x) = (x4 + x3 + 2x + 1), f3(x) = f4(x) = (x4 + 2x3 + x + 1), C = 〈(1 + u1 + u2 + u1u2)f1(x),(u1 + u1u2)f2(x),(u2 + u1u2)f3(x),(u1u2)f4(x)〉. C1, C2, C3, C4are [10, 6,4] linear codes of length 10 with the minimum Lee weightdL = 4. SoΦ(C) is a [40, 24,4] linear code.

Example 4.5

Letn = 15 andR3 = 𝔽2[u1, u2, u3]/〈ui2 = ui, uiuj = ujui〉, x15 − 1 = (x + 1)(x2 + x + 1)(x4 + x + 1)(x4 + x3 + 1)(x4 + x3 + x2 + x + 1) in 𝔽2(x). Letf1(x) = f2(x) = f3(x) = f4(x) = (x4 + x + 1), f5(x) = f6(x) = f7(x) = f8(x) = (x4 + x3 + 1), C = 〈 i=13 (1 + ui)f1(x), u1(1 + u2)(1 + u3)f2(x), u2(1 + u1)(1 + u3)f3(x), u3(1 + u1)(1 + u2)f4(x), u1u2(1 + u3)f5(x), u1u3(1 + u2)f6(x), u2u3(1 + u1)f7(x), u1u2u3f8(x)〉. Ciis a [15, 11,3] linear code of length 15 with the minimum Lee weightdL = 3, i = 1, 2, ⋯, 8. SoΦ(C) is a [120, 88,3] linear code.

5 Conclusion

In this paper, we studied the constacyclic codes over Rk = 𝔽pm[u1, u2,⋯, uk]/〈ui2 = ui, uiuj = ujui〉. We proved that the (λ1e1 + λ2e2 + ⋯ + λ2ke2k)-constacyclic codes of arbitrary length over Rk can be generated by one polynomial.

Acknowledgement

This work was supported by the Basic and Advanced Technology Research Project of Henan Province (No.162300410083) and the Science and Technology Developing Project of Henan Province(No.172102210243).

References

[1] Chen B., Dinh H. Q., Liu H., Repeated-root constacyclic codes of length 2lmpn, Finite Fields Appl., 2015, 33, 137-15910.1016/j.ffa.2014.11.006Search in Google Scholar

[2] Chen B., Fan Y., Lin L., Liu H., Constacyclic codes over finite fields, Finite Fields Appl., 2012, 18, 1217-123110.1016/j.ffa.2012.10.001Search in Google Scholar

[3] Dinh H. Q., Repeated-root constacyclic codes of length 2ps, Finite Fields Appl., 2012, 18, 133-14310.1016/j.ffa.2011.07.003Search in Google Scholar

[4] Dinh H. Q., Structure of repeated-root constacyclic codes of length 3ps, Discrete Math., 2013, 313, 983-99110.1016/j.disc.2013.01.024Search in Google Scholar

[5] Dinh H. Q., Lopez-Permouth S. R., Cyclic and negacyclic codes over finite chain rings, IEEE Trans. Inform. Theory, 2004, 50, 1728-174410.1109/TIT.2004.831789Search in Google Scholar

[6] Kong B., Zheng X., Ma H., The depth spectrums of constacyclic codes over finite chain rings, Discrete Math., 2015, 338, 256-26110.1016/j.disc.2014.09.013Search in Google Scholar

[7] Cao Y., On constacyclic codes over finite chain rings, Finite Fields Appl., 2013, 24, 124-13510.1016/j.ffa.2013.07.001Search in Google Scholar

[8] Somphong J., Patanee U., On The generator polynomials of constacyclic codes over finite chain rings, Int. J. Pure Appl. Math., 2010, 59, 213-224Search in Google Scholar

[9] Chen B., Dinh H. Q., Liu H., Wang L., Constacyclic codes of length 2ps over 𝔽pm + u 𝔽pm, Finite Fields Appl., 2016, 37, 108-13010.1016/j.ffa.2015.09.006Search in Google Scholar

[10] Sobhani R., Complete classification of (δ + αu2)-constacyclic codes of length pk over 𝔽pm + u 𝔽pm + u2𝔽pm, Finite Fields Appl., 2015, 34, 123-13810.1016/j.ffa.2015.01.008Search in Google Scholar

[11] Liu X., Xu X., Cyclic and negacyclic codes of length 2ps over 𝔽pm + u 𝔽pm, Acta Math. Sci.,2014, 34B, 829-83910.1016/S0252-9602(14)60053-9Search in Google Scholar

[12] Abualrub T., Siap I., Constacyclic codes over 𝔽2 + u𝔽2, J. Franklin I., 2009, 346, 520-52910.1016/j.jfranklin.2009.02.001Search in Google Scholar

[13] Kai X., Zhu S., Li P., (1 + λu)-constacyclic codes over 𝔽p[u]/〈um〉, J. Franklin I., 2010, 347, 751-76210.1016/j.jfranklin.2010.02.003Search in Google Scholar

[14] Guenda K., Gulliver T. A., Repeated root constacyclic codes of length mps over 𝔽pr + u𝔽pr + ⋯ + ue−1𝔽pr, J. Algebra Appl., 2015, 14, 145008110.1142/S0219498814500819Search in Google Scholar

[15] Cengellenmis Y., On the cyclic codes over 𝔽3 + v𝔽3, Int. J. Algebra, 2010, 4, 253-259Search in Google Scholar

[16] ¨Qzen M., Uzekmek F. Z., Aydin N., ¨Qzzaim N. T., Cyclic and some constacyclic codes over the ring ℤ4[u]/〈u2-1〉, Finite Fields Appl., 2016, 38, 27-3910.1016/j.ffa.2015.12.003Search in Google Scholar

[17] Kong B., Chang X., Cyclic Codes over ring 𝔽p + u𝔽p(in Chinese), J. Zhengzhou Univ.(Nat. Sci. Ed.), 2016, 48, 28-31Search in Google Scholar

[18] Cengellenmis Y., Dertli A., Dougherty S. T., Codes over an infinite family of rings with a Gray map, Des. Codes Cryptogr., 2014, 72, 559-58010.1007/s10623-012-9787-ySearch in Google Scholar

[19] Li P., Guo X., Zhu S., Kai X., Some results on linear codes over the ring ℤ4 + u4 + v4 + +uv4, J. Appl. Math. Comput., 2016, 54, 307-32410.1007/s12190-016-1011-1Search in Google Scholar

[20] Zheng X., Kong B., Cyclic codes and λ1 + λ2u + λ3v + λ4uv-constacyclic codes over 𝔽p + u𝔽p + v𝔽p + uv𝔽p, Appl. Math. Comput., 2017, 306, 86–9110.1016/j.amc.2017.02.017Search in Google Scholar

[21] Cazaran J., Kelarev A. V., On finite principal ideal rings, Acta Math. Univ. Comenianae, 1999, 68, 77-84Search in Google Scholar

[22] Shi M., Zhu S., Macwilliams identities of linear codes over non-principal ideal ringFp + vFp(in Chinese), Acta Electronica Sinica, 2011, 39, 2449-2453Search in Google Scholar

[23] Dougherty S. T., Yildiz B., Karadeniz S., Codes over Rk, Gray maps and their binary images, Finite Fields Appl., 2011, 17, 205-21910.1016/j.ffa.2010.11.002Search in Google Scholar

Received: 2017-08-30
Accepted: 2018-03-22
Published Online: 2018-05-10

© 2018 Zheng and Kong, published by De Gruyter

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.

Articles in the same Issue

  1. Regular Articles
  2. Algebraic proofs for shallow water bi–Hamiltonian systems for three cocycle of the semi-direct product of Kac–Moody and Virasoro Lie algebras
  3. On a viscous two-fluid channel flow including evaporation
  4. Generation of pseudo-random numbers with the use of inverse chaotic transformation
  5. Singular Cauchy problem for the general Euler-Poisson-Darboux equation
  6. Ternary and n-ary f-distributive structures
  7. On the fine Simpson moduli spaces of 1-dimensional sheaves supported on plane quartics
  8. Evaluation of integrals with hypergeometric and logarithmic functions
  9. Bounded solutions of self-adjoint second order linear difference equations with periodic coeffients
  10. Oscillation of first order linear differential equations with several non-monotone delays
  11. Existence and regularity of mild solutions in some interpolation spaces for functional partial differential equations with nonlocal initial conditions
  12. The log-concavity of the q-derangement numbers of type B
  13. Generalized state maps and states on pseudo equality algebras
  14. Monotone subsequence via ultrapower
  15. Note on group irregularity strength of disconnected graphs
  16. On the security of the Courtois-Finiasz-Sendrier signature
  17. A further study on ordered regular equivalence relations in ordered semihypergroups
  18. On the structure vector field of a real hypersurface in complex quadric
  19. Rank relations between a {0, 1}-matrix and its complement
  20. Lie n superderivations and generalized Lie n superderivations of superalgebras
  21. Time parallelization scheme with an adaptive time step size for solving stiff initial value problems
  22. Stability problems and numerical integration on the Lie group SO(3) × R3 × R3
  23. On some fixed point results for (s, p, α)-contractive mappings in b-metric-like spaces and applications to integral equations
  24. On algebraic characterization of SSC of the Jahangir’s graph 𝓙n,m
  25. A greedy algorithm for interval greedoids
  26. On nonlinear evolution equation of second order in Banach spaces
  27. A primal-dual approach of weak vector equilibrium problems
  28. On new strong versions of Browder type theorems
  29. A Geršgorin-type eigenvalue localization set with n parameters for stochastic matrices
  30. Restriction conditions on PL(7, 2) codes (3 ≤ |𝓖i| ≤ 7)
  31. Singular integrals with variable kernel and fractional differentiation in homogeneous Morrey-Herz-type Hardy spaces with variable exponents
  32. Introduction to disoriented knot theory
  33. Restricted triangulation on circulant graphs
  34. Boundedness control sets for linear systems on Lie groups
  35. Chen’s inequalities for submanifolds in (κ, μ)-contact space form with a semi-symmetric metric connection
  36. Disjointed sum of products by a novel technique of orthogonalizing ORing
  37. A parametric linearizing approach for quadratically inequality constrained quadratic programs
  38. Generalizations of Steffensen’s inequality via the extension of Montgomery identity
  39. Vector fields satisfying the barycenter property
  40. On the freeness of hypersurface arrangements consisting of hyperplanes and spheres
  41. Biderivations of the higher rank Witt algebra without anti-symmetric condition
  42. Some remarks on spectra of nuclear operators
  43. Recursive interpolating sequences
  44. Involutory biquandles and singular knots and links
  45. Constacyclic codes over 𝔽pm[u1, u2,⋯,uk]/〈 ui2 = ui, uiuj = ujui
  46. Topological entropy for positively weak measure expansive shadowable maps
  47. Oscillation and non-oscillation of half-linear differential equations with coeffcients determined by functions having mean values
  48. On 𝓠-regular semigroups
  49. One kind power mean of the hybrid Gauss sums
  50. A reduced space branch and bound algorithm for a class of sum of ratios problems
  51. Some recurrence formulas for the Hermite polynomials and their squares
  52. A relaxed block splitting preconditioner for complex symmetric indefinite linear systems
  53. On f - prime radical in ordered semigroups
  54. Positive solutions of semipositone singular fractional differential systems with a parameter and integral boundary conditions
  55. Disjoint hypercyclicity equals disjoint supercyclicity for families of Taylor-type operators
  56. A stochastic differential game of low carbon technology sharing in collaborative innovation system of superior enterprises and inferior enterprises under uncertain environment
  57. Dynamic behavior analysis of a prey-predator model with ratio-dependent Monod-Haldane functional response
  58. The points and diameters of quantales
  59. Directed colimits of some flatness properties and purity of epimorphisms in S-posets
  60. Super (a, d)-H-antimagic labeling of subdivided graphs
  61. On the power sum problem of Lucas polynomials and its divisible property
  62. Existence of solutions for a shear thickening fluid-particle system with non-Newtonian potential
  63. On generalized P-reducible Finsler manifolds
  64. On Banach and Kuratowski Theorem, K-Lusin sets and strong sequences
  65. On the boundedness of square function generated by the Bessel differential operator in weighted Lebesque Lp,α spaces
  66. On the different kinds of separability of the space of Borel functions
  67. Curves in the Lorentz-Minkowski plane: elasticae, catenaries and grim-reapers
  68. Functional analysis method for the M/G/1 queueing model with single working vacation
  69. Existence of asymptotically periodic solutions for semilinear evolution equations with nonlocal initial conditions
  70. The existence of solutions to certain type of nonlinear difference-differential equations
  71. Domination in 4-regular Knödel graphs
  72. Stepanov-like pseudo almost periodic functions on time scales and applications to dynamic equations with delay
  73. Algebras of right ample semigroups
  74. Random attractors for stochastic retarded reaction-diffusion equations with multiplicative white noise on unbounded domains
  75. Nontrivial periodic solutions to delay difference equations via Morse theory
  76. A note on the three-way generalization of the Jordan canonical form
  77. On some varieties of ai-semirings satisfying xp+1x
  78. Abstract-valued Orlicz spaces of range-varying type
  79. On the recursive properties of one kind hybrid power mean involving two-term exponential sums and Gauss sums
  80. Arithmetic of generalized Dedekind sums and their modularity
  81. Multipreconditioned GMRES for simulating stochastic automata networks
  82. Regularization and error estimates for an inverse heat problem under the conformable derivative
  83. Transitivity of the εm-relation on (m-idempotent) hyperrings
  84. Learning Bayesian networks based on bi-velocity discrete particle swarm optimization with mutation operator
  85. Simultaneous prediction in the generalized linear model
  86. Two asymptotic expansions for gamma function developed by Windschitl’s formula
  87. State maps on semihoops
  88. 𝓜𝓝-convergence and lim-inf𝓜-convergence in partially ordered sets
  89. Stability and convergence of a local discontinuous Galerkin finite element method for the general Lax equation
  90. New topology in residuated lattices
  91. Optimality and duality in set-valued optimization utilizing limit sets
  92. An improved Schwarz Lemma at the boundary
  93. Initial layer problem of the Boussinesq system for Rayleigh-Bénard convection with infinite Prandtl number limit
  94. Toeplitz matrices whose elements are coefficients of Bazilevič functions
  95. Epi-mild normality
  96. Nonlinear elastic beam problems with the parameter near resonance
  97. Orlicz difference bodies
  98. The Picard group of Brauer-Severi varieties
  99. Galoisian and qualitative approaches to linear Polyanin-Zaitsev vector fields
  100. Weak group inverse
  101. Infinite growth of solutions of second order complex differential equation
  102. Semi-Hurewicz-Type properties in ditopological texture spaces
  103. Chaos and bifurcation in the controlled chaotic system
  104. Translatability and translatable semigroups
  105. Sharp bounds for partition dimension of generalized Möbius ladders
  106. Uniqueness theorems for L-functions in the extended Selberg class
  107. An effective algorithm for globally solving quadratic programs using parametric linearization technique
  108. Bounds of Strong EMT Strength for certain Subdivision of Star and Bistar
  109. On categorical aspects of S -quantales
  110. On the algebraicity of coefficients of half-integral weight mock modular forms
  111. Dunkl analogue of Szász-mirakjan operators of blending type
  112. Majorization, “useful” Csiszár divergence and “useful” Zipf-Mandelbrot law
  113. Global stability of a distributed delayed viral model with general incidence rate
  114. Analyzing a generalized pest-natural enemy model with nonlinear impulsive control
  115. Boundary value problems of a discrete generalized beam equation via variational methods
  116. Common fixed point theorem of six self-mappings in Menger spaces using (CLRST) property
  117. Periodic and subharmonic solutions for a 2nth-order p-Laplacian difference equation containing both advances and retardations
  118. Spectrum of free-form Sudoku graphs
  119. Regularity of fuzzy convergence spaces
  120. The well-posedness of solution to a compressible non-Newtonian fluid with self-gravitational potential
  121. On further refinements for Young inequalities
  122. Pretty good state transfer on 1-sum of star graphs
  123. On a conjecture about generalized Q-recurrence
  124. Univariate approximating schemes and their non-tensor product generalization
  125. Multi-term fractional differential equations with nonlocal boundary conditions
  126. Homoclinic and heteroclinic solutions to a hepatitis C evolution model
  127. Regularity of one-sided multilinear fractional maximal functions
  128. Galois connections between sets of paths and closure operators in simple graphs
  129. KGSA: A Gravitational Search Algorithm for Multimodal Optimization based on K-Means Niching Technique and a Novel Elitism Strategy
  130. θ-type Calderón-Zygmund Operators and Commutators in Variable Exponents Herz space
  131. An integral that counts the zeros of a function
  132. On rough sets induced by fuzzy relations approach in semigroups
  133. Computational uncertainty quantification for random non-autonomous second order linear differential equations via adapted gPC: a comparative case study with random Fröbenius method and Monte Carlo simulation
  134. The fourth order strongly noncanonical operators
  135. Topical Issue on Cyber-security Mathematics
  136. Review of Cryptographic Schemes applied to Remote Electronic Voting systems: remaining challenges and the upcoming post-quantum paradigm
  137. Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
  138. On dynamic network security: A random decentering algorithm on graphs
Downloaded on 6.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/math-2018-0045/html?lang=en
Scroll to top button