Next Article in Journal
Robustness of Entanglement for Dicke-W and Greenberger-Horne-Zeilinger Mixed States
Previous Article in Journal
An Additively Optimal Interpreter for Approximating Kolmogorov Prefix Complexity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Some Results for Double Cyclic Codes over Fq+vFq+v2Fq

1
Department of Mathematics, Tsinghua University, Beijing 100084, China
2
College of Mathematics Science, Inner Mongolia Normal University, Hohhot 010022, China
3
Center for Applied Mathematical Science, Inner Mongolia, Hohhot 010022, China
4
Laboratory of Infinite-Dimensional Hamiltonian System and Its Algorithm Application, Inner Mongolia, Hohhot 010022, China
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(9), 803; https://doi.org/10.3390/e26090803
Submission received: 17 July 2024 / Revised: 1 September 2024 / Accepted: 11 September 2024 / Published: 20 September 2024
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
Let F q be a finite field with an odd characteristic. In this paper, we present a new result about double cyclic codes over a finite non-chain ring. Specifically, we study the double cyclic code over F q + v F q + v 2 F q with v 3 = v , which is isomorphic to F q × F q × F q . This study mainly involves generator polynomials and generator matrices. The generating polynomial of the dual code is also obtained. We show the relationship between the generating polynomials of the double cyclic codes and those of their dual codes. Finally, as an application of these results, we construct some optimal codes over F 3 .

1. Introduction

The theory of error-correcting codes plays a crucial role in Internet data transmission, satellite positioning, and communication. The significance has become increasingly prominent with the promotion and popularization of high technologies such as artificial intelligence and 5G technology. For most coding researchers, cyclic codes are the leading research object because of their reasonable structure and their ease of discovery, understanding, and decoding in the application process.
Coding theory over finite rings is gaining increasing attention in current research due to the increased flexibility of algebraic structures. Recently, Borges et al. proposed a new class of codes called Z 2 Z 4 -additive codes in [1]. Since then, the theory and applications of this code family have been substantial, and various generalizations have received extensive research. Works by Abualrub in [2,3] and Aydogdu in [4,5,6] have been remarkable. Around 2014, Borges et al. investigated the algebraic structures of double cyclic codes over Z 2 in [7]. The generating polynomials and duals for this family of codes were identified by the authors. It was vital work for the research on double cyclic codes. Since then, numerous articles about double cyclic codes have appeared, such as [8,9,10,11]. Additionally, references like [12,13,14,15,16] are also relevant to this topic. In particular, references to double skew cyclic codes over F q ([17]) and F q 2 -double cyclic codes concerning the Hermitian inner product ([18]) represent generalized theories of double cyclic codes over finite fields. For F q + v F q + v 2 F q with v 3 = v , there are many results about this non-chain ring, such as [19,20,21].
In this paper, by applying the methods developed by Borges et al. and Gao et al., we obtain the algebraic structures of double cyclic codes over F q + v F q + v 2 F q . Specifically, we give some examples of these double cyclic codes that improve upon those available in the database [22]. The main results of this paper are listed as follows.
Theorem 1. 
Let C be an R-double cyclic code of length ( m , n ) over F q + v F q + v 2 F q .
Then, C , C have the forms of
C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = i = 1 3 ι v i ( x ) v i | 0 , i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i , C = ( ι ¯ ( x ) | 0 ) , ( ¯ ( x ) | θ ¯ ( x ) ) = i = 1 3 ι ¯ v i ( x ) v i | 0 , i = 1 3 ¯ v i ( x ) v i | i = 1 3 θ ¯ v i ( x ) v i .
where ι v i ( x ) | x m 1 , θ v i ( x ) | x n 1 , and i = 1 , 2 , 3 .
If C is a separable R-double cyclic code, we have v i ( x ) = 0 , i = 1 , 2 , 3 .
If C is a free R-double cyclic code, then the following statements hold:
(1). deg ( v i ( x ) ) < deg ( ι v i ( x ) ) , i = 1 , 2 , 3
(2). ι v i ( x ) | x n 1 θ v i ( x ) gcd ( ι v i ( x ) , v i ( x ) ) , i = 1 , 2 , 3
Theorem 2. 
Let C be a double cyclic code of length ( m , n ) over F q + v F q + v 2 F q , and set C , C to have the forms of
C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = i = 1 3 ι v i ( x ) v i | 0 , i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i , C = ( ι ¯ ( x ) | 0 ) , ( ¯ ( x ) | θ ¯ ( x ) ) = i = 1 3 ι ¯ v i ( x ) v i | 0 , i = 1 3 ¯ v i ( x ) v i | i = 1 3 θ ¯ v i ( x ) v i .
Then,
(1) ι ¯ ( x ) = i = 1 3 x m 1 gcd * ( ι v i ( x ) , v i ( x ) ) v i
(2) θ ¯ ( x ) = i = 1 3 ( x n 1 ) gcd * ( ι v i ( x ) , v i ( x ) ) ι v i * ( x ) θ v i * ( x ) v i
(3) ¯ ( x ) = ρ ( x ) i = 1 3 x m 1 ι v i * ( x ) v i , where
ρ ( x ) = 0 if C is separable , or otherwise ρ ( x ) = i = 1 3 x l deg ( θ v i ( x ) ) + deg ( ι v i ( x ) ) v i ι * ( x ) gcd * ( ι ( x ) , ( x ) ) 1 m o d ι * ( x ) gcd * ( ι ( x ) , ( x ) ) .
The rest of the article is organized as follows. In Section 2, we provide some necessary preliminaries about the polynomial theory over F q + v F q + v 2 F q . In Section 3, we present the definition of double cyclic codes and set up some structural properties of double cyclic codes over F q + v F q + v 2 F q . Section 4 gives the generating matrix forms of these double cyclic codes. Simultaneously, utilizing these generating matrix forms, we obtain some quantitative information relating to double cyclic codes. Section 5 discusses the relationship between the generators of double cyclic codes and their duals. In Section 6, some examples of optimal codes over finite fields are given.

2. Preliminaries

Throughout this paper, let R denote F q + v F q + v 2 F q , where v 3 = v and F q is a finite field of odd characteristic. From the theory of finite rings, we know that R is isomorphic to the quotient ring F q [ x ] / v 3 v , which is a finite commutative ring with identity. This implies that R is a principal ring with exactly three non-trivial maximal ideals: 1 v ,   v ,   1 + v . Consequently, by the Chinese Remainder Theorem, we obtain
R = R / v R / 1 v R / 1 + v .
Define v 1 = 1 v 2 ,   v 2 = v + v 2 2 ,   v 3 = v 2 v 2 . Note that v 1 , v 2 , v 3 are orthogonal idempotent elements in R. Thus, R can be decomposed as
R = R v 1 R v 2 R v 3 = F q v 1 F q v 2 F q v 3 .
For r R , express r as r = i = 1 3 r v i v i with r v i F q ,   for   i = 1 , 2 , 3 . Define three projections P v i : r = i = 1 3 r v i v i r v i , i = 1 , 2 , 3 . These mappings P v i , i = 1 , 2 , 3 are F q -algebra homomorphisms. For any n N , extend P v i naturally from R to R n as P v i : R n F q n , ( r 1 , r n ) ( ( r 1 ) v i , ( r n ) v i ) , i = 1 , 2 , 3 . These extensions remain F q -algebra homomorphisms, and similarly extend to polynomial rings over R.
For each polynomial r ( x ) R [ x ] , considering the commutativity with v 1 , v 2 , v 3 and x, decompose the coefficients into standard bases, and appropriately combine analogous terms to obtain the unique decomposition r ( x ) = i = 1 3 r v i ( x ) v i relative to these standard bases. Define three maps P v i : R [ x ] F q [ x ] r ( x ) = i = 1 3 r v i ( x ) v i r v i ( x ) , i = 1 , 2 , 3 . For a ( x ) , b ( x ) R [ x ] , let a ( x ) = i = 1 3 a v i ( x ) v i ,   b ( x ) = i = 1 3 b v i ( x ) v i , and we have that
a ( x ) + b ( x ) = i = 1 3 ( a v i ( x ) + b v i ( x ) ) v i , a ( x ) b ( x ) = i = 1 3 ( a v i ( x ) b v i ( x ) ) v i .
This means that the projections P v i , i = 1 , 2 , 3 into R [ x ] are also F q [ x ] -homomorphisms. From the above station, we obtain that R [ x ] = ( i = 1 3 F q v i ) [ x ] = i = 1 3 F q [ x ] v i .
Regarding the divisibility between any two elements in R [ x ] , we have the following.
Lemma 1. 
Let a ( x ) , b ( x ) R [ x ] with a ( x ) = i = 1 3 a v i ( x ) v i , b ( x ) = i = 1 3 b v i ( x ) v i . Then, a ( x ) | b ( x ) in R [ x ] , if and only if a v i ( x ) | b v i ( x ) , i = 1 , 2 , 3 in F q [ x ] .
Proof. 
If a ( x ) | b ( x ) , we can set b ( x ) = e ( x ) a ( x ) with e ( x ) R [ x ] . Hence,
i = 1 3 b v i ( x ) v i = i = 1 3 e v i ( x ) v i i = 1 3 a v i ( x ) v i = i = 1 3 ( e v i ( x ) a v i ( x ) ) v i .
Then, we have b v i ( x ) = e v i ( x ) a v i ( x ) , i = 1 , 2 , 3 . This means that a v i ( x ) | b v i ( x ) , i = 1 , 2 , 3 in F q [ x ] .
On the contrary, due to a v i ( x ) | b v i ( x ) , i = 1 , 2 , 3 , we can set b v i ( x ) = e v i ( x ) a v i ( x ) with e v i ( x ) F q [ x ] i = 1 , 2 , 3 . Then,
b ( x ) = i = 1 3 b v i ( x ) v i = i = 1 3 e v i ( x ) a v i ( x ) v i = i = 1 3 e v i ( x ) v i i = 1 3 a v i ( x ) v i = i = 1 3 e v i ( x ) v i a ( x ) .
Let e ( x ) = i = 1 3 e v i ( x ) v i R [ x ] . This shows that a ( x ) | b ( x ) in R [ x ] . □
Remark 1. 
From Lemma 1, it also follows that P v i ( b ( x ) a ( x ) ) = e v i ( x ) = P v i ( b ( x ) ) P v i ( a ( x ) ) , i = 1 , 2 , 3 , when a ( x ) , b ( x ) R [ x ] , a ( x ) | b ( x ) .
We also have the following finding on the greatest common divisor between any two elements in R [ x ] for the purpose of the divisible form.
Lemma 2. 
Let a ( x ) , b ( x ) R [ x ] with a ( x ) = i = 1 3 a v i ( x ) v i , b ( x ) = i = 1 3 b v i ( x ) v i . Then, in R [ x ] , we have
gcd ( a ( x ) , b ( x ) ) = gcd i = 1 3 a v i ( x ) v i , i = 1 3 b v i ( x ) v i = i = 1 3 gcd ( a v i ( x ) , b v i ( x ) ) v i ,
where the greatest common divisor of the polynomials in F q [ x ] is denoted by the gcd ( , ) on the right side of the expression.
Proof. 
Denote i = 1 3 gcd ( a v i ( x ) , b v i ( x ) ) v i by m ( x ) , then m ( x ) R [ x ] . From the conventional polynomial theory, we know that gcd ( a v i ( x ) , b v i ( x ) ) | a v i ( x ) , gcd ( a v i ( x ) , b v i ( x ) ) | b v i ( x ) , i = 1 , 2 , 3 . For Lemma 1, we have m ( x ) | a ( x ) , m ( x ) | b ( x ) . It follows that m ( x ) is a common divisor of a ( x ) and b ( x ) .
Let r ( x ) R [ x ] with r ( x ) | a ( x ) , r ( x ) | b ( x ) . We can write r ( x ) = i = 1 3 r v i ( x ) v i . By the same reasoning as in Lemma 1, we have r v i ( x ) | a v i ( x ) , r v i ( x ) | b v i ( x ) for i = 1 , 2 , 3 . Thus, r v i ( x ) | gcd ( a v i ( x ) , b v i ( x ) ) in F q [ x ] for i = 1 , 2 , 3 . Consequently, r ( x ) | m ( x ) . This reveals that every common divisor of a ( x ) and b ( x ) is a divisor of m ( x ) .
In conclusion, we have i = 1 3 gcd ( a v i ( x ) , b v i ( x ) ) v i = m ( x ) = gcd ( a ( x ) , b ( x ) ) . □
Remark 2. 
From the proof above, we also have
P v i ( gcd ( a ( x ) , b ( x ) ) ) = m v i ( x ) = gcd ( P v i ( a ( x ) ) , P v i ( b ( x ) ) ) , i = 1 , 2 , 3 .
Summarizing the above statement, we have
R [ x ] / r [ x ] = ( i = 1 3 F q [ x ] v i ) / i = 1 3 r v i ( x ) v i = i = 1 3 ( F q [ x ] / r v i ( x ) ) v i ,
where r ( x ) R [ x ] with r ( x ) = i = 1 3 r v i ( x ) v i .
For cyclic codes over R, see [19].

3. Double Cyclic Codes

In this section, we describe the basic structure of R-double cyclic codes.
Definition 1. 
Let C be an R-linear code of length m + n . A code C is referred to as a double cyclic code of length ( m , n ) over R if, for any
c = ( c 0 1 , , c m 2 1 , c m 1 1 | c 0 2 , , c n 2 2 , c n 1 2 ) C ,
it implies the cyclic shift
T ( c ) = ( c m 1 1 , c 0 1 , , c m 2 1 | c n 1 2 , c 0 2 , , c n 2 2 ) C .
We learn that the double cyclic code C can be thought of as an R-submodule of R m × R n from the definition of double cyclic codes over R.
Let c , d R m × R n with c = ( c 0 1 , , c m 1 1 | c 0 2 , , c n 1 2 ) , d = ( d 0 1 , , d m 1 1 | d 0 2 , , d n 1 2 ) ; we define the inner product of these two elements as c , d i = 0 m 1 c i 1 d i 1 + j = 0 n 1 c j 2 d j 2 .
For the double cyclic code C, the dual code is defined as
C = d R m × R n | d , c = 0 , c C .
For R m × R n , define two coordinate projections as
P m : R m × R n R m , ( r 1 1 , , r m 1 | r 1 2 , , r n 2 ) ( r 1 1 , , r m 1 ) , P n : R m × R n R n , ( r 1 1 , , r m 1 | r 1 2 , , r n 2 ) ( r 1 2 , , r n 2 ) .
For f ( x ) F q [ x ] , owing to i = 1 3 v i = 1 , we can view it as f ( x ) = i = 1 3 f ( x ) v i . This guarantees that, for every f ( x ) F q [ x ] , the quotient ring R [ x ] / f ( x ) is well-defined. Then, for x m 1 , x n 1 F q [ x ] , let
R m [ x ] R [ x ] / x m 1 ; R m , n [ x ] R [ x ] / x m 1 × R [ x ] / x n 1 ; R n [ x ] R [ x ] / x n 1 .
The multiplication of R [ x ] can induce the action of R [ x ] on R m [ x ] , R m , n [ x ] and R n [ x ] naturally. With this action, the rings R m [ x ] , R m , n [ x ] , and R n [ x ] become R [ x ] -modules. Let r ( x ) R [ x ] , a ( x ) R m [ x ] , b ( x ) R n [ x ] , then ( a ( x ) | b ( x ) ) R m , n [ x ] and
r ( x ) a ( x ) = r ( x ) a ( x ) ( mod ( x m 1 ) ) , r ( x ) ( a ( x ) | b ( x ) ) = ( r ( x ) a ( x ) ( m o d ( x m 1 ) ) | r ( x ) b ( x ) ( mod ( x n 1 ) ) , r ( x ) b ( x ) = r ( x ) b ( x ) ( mod ( x n 1 ) ) .
There are also two coordinate projections for the bijection from R m × R n to R m , n [ x ] , given by
( c 0 1 , c 1 1 , , c m 1 1 | c 0 2 , c 1 2 , , c n 1 2 ) ( c 0 1 + c 1 1 x + + c m 1 1 x m 1 | c 0 2 + c 1 2 x + + c n 1 2 x n 1 ) .
They are
P m : R m , n [ x ] R m [ x ] ( a ( x ) | b ( x ) ) a ( x ) , P n : R m , n [ x ] R n [ x ] ( a ( x ) | b ( x ) ) b ( x ) .
Then, P m ,   P n are still R [ x ] -module homomorphisms. Similarly, based on the one-to-one correspondence between R m × R n and R m , n [ x ] , it reveals the fact that C is a double cyclic code of length ( m , n ) over R, if and only if the corresponding polynomial set is an R [ x ] -submodule of R m , n [ x ] . Then, we can use the R [ x ] -submodule of R m , n [ x ] , and regard R-double cyclic codes as the R [ x ] -submodule of R m , n [ x ] . At the same time, we obtain two types of projections: the canonical projections ( P v i , i = 1 , 2 , 3 ) and the coordinate projections ( P m , P n ). Unless otherwise specified, a mathematical object will appear with the subscripts m , n , v 1 , v 2 , v 3 , which means we use their corresponding projections by default.
Let l = [ m , n ] (i.e., l denotes the least common multiple of m and n).
Proposition 1. 
If C is a double cyclic code of length ( m , n ) over R, then the dual code C is also an R-double cyclic code of the same length.
Proof. 
Assume that C is an R-double cyclic code of length ( m , n ) , and d = ( d 0 1 , , d m 1 1 | d 0 2 , , d n 1 2 ) is a codeword in C . We must describe how the cyclic shift codeword T ( d ) C is defined for R-double cyclic codes. This means that we need to prove T ( d ) , c = 0 for all codewords c C .
Let c be any codeword of C. By mathematical induction, we can easily obtain T l 1 ( c ) = T l 2 ( T ( c ) ) C . Note that T l ( c ) = c . Fix c = ( c 0 1 , , c m 1 1 | c 0 2 , , c n 1 2 ) , and write the specific form of T l 1 ( c ) ; we obtain T l 1 ( c ) = ( c 1 1 , , c m 1 1 , c 0 1 | c 1 2 , , c n 1 2 , c 0 2 ) . Since d C and c C , we have
0 = d , T l 1 ( c ) = d 0 1 c 1 1 + + d m 2 1 c 0 1 + d m 1 1 c 0 1 + d 0 2 c 1 2 + + d m 2 2 c 0 2 + d m 1 2 c 0 2 = T ( d ) , c ,
which implies that T ( d ) C . Consequently, C is likewise an R-double cyclic code of length ( m , n ) . □
Proposition 2. 
Let C be an R-double cyclic code with length ( m , n ) . Then, there exist polynomials ι ( x ) , ( x ) R m [ x ] , θ ( x ) R n [ x ] with ι ( x ) = i = 1 3 ι v i ( x ) v i , ( x ) = i = 1 3 v i ( x ) v i , θ ( x ) = i = 1 3 θ v i ( x ) v i , such that C has the forms of
C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = i = 1 3 ι v i ( x ) v i | 0 , i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i ,
where ι v i ( x ) | x m 1 , i = 1 , 2 , 3 and θ v i ( x ) | x n 1 , i = 1 , 2 , 3 .
Proof. 
Consider the coordinate projection P n : R m , n [ x ] R n [ x ] defined by ( a ( x ) | b ( x ) ) b ( x ) . Clearly, P n is an R [ x ] -module homomorphism. Since the double cyclic code C is an R [ x ] -submodule of R m , n [ x ] , P n ( C ) is an R [ x ] -submodule of R n [ x ] , which means that P n ( C ) is an ideal of R n [ x ] . From the structure of R n [ x ] , we can write P n ( C ) = θ ( x ) with θ ( x ) = i = 1 3 θ v i ( x ) v i , where θ v i ( x ) ( x n 1 ) for i = 1 , 2 , 3 . Note that Ker ( P n | C ) = ( c 1 ( x ) | c 2 ( x ) ) C c 2 ( x ) = 0 . Define the set I = c 1 ( x ) R m [ x ] ( c 1 ( x ) | 0 ) Ker ( P n | C ) . Obviously, I is an ideal of R m [ x ] . Similarly, I = ι ( x ) with ι ( x ) = i = 1 3 ι v i ( x ) v i , where ι v i ( x ) ( x m 1 ) for i = 1 , 2 , 3 .
For any element ( c 1 ( x ) | 0 ) Ker ( P n | C ) , there exists a polynomial m ( x ) R [ x ] , such that c 1 ( x ) = m ( x ) ι ( x ) . Thus, ( c 1 ( x ) | 0 ) = m ( x ) ( ι ( x ) | 0 ) , implying that Ker ( P n | C ) is an R [ x ] -submodule of C generated by ( ι ( x ) | 0 ) . By the first isomorphism theorem for module homomorphisms, we have C / Ker ( P n | C ) Img ( P n | C ) = P n ( C ) = θ ( x ) .
For θ ( x ) , let ( ( x ) | θ ( x ) ) C with P n ( ( x ) | θ ( x ) ) = θ ( x ) , where ( x ) = i = 1 3 v i ( x ) v i , v i ( x ) F q [ x ] for i = 1 , 2 , 3 . In the proof that follows, we demonstrate C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) .
Let c ( x ) = ( c 1 ( x ) | c 2 ( x ) ) C ; then, c 2 ( x ) = P n ( ( c 1 ( x ) | c 2 ( x ) ) ) P n ( C ) . Therefore, s ( x ) R n [ x ] , such that c 2 ( x ) = s ( x ) θ ( x ) . Hence,
c ( x ) s ( x ) ( ( x ) | θ ( x ) ) = ( c 1 ( x ) | c 2 ( x ) ) s ( x ) ( ( x ) | θ ( x ) ) = ( c 1 ( x ) s ( x ) ( x ) | 0 ) Ker ( P n | C ) .
Thus, r ( x ) R m [ x ] , such that c 1 ( x ) s ( x ) ( x ) = r ( x ) ι ( x ) and ( c 1 ( x ) s ( x ) ( x ) | 0 ) = r ( x ) ( ι ( x ) | 0 ) . Hence,
c ( x ) = ( c 1 ( x ) | c 2 ( x ) ) = r ( x ) ( ι ( x ) | 0 ) + s ( x ) ( ( x ) | θ ( x ) ) .
These indicate that C is finitely generated by ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) . □
Lemma 3. 
Let C be an R-double cyclic code with length ( m , n ) , with
C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = i = 1 3 ι v i ( x ) v i | 0 , i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i .
As the most basic forms of generator polynomials, we have deg ( v i ( x ) ) < deg ( ι v i ( x ) ) for i = 1 , 2 , 3 .
Proof. 
If not, there exists i { 1 , 2 , 3 } , such that deg ( v i ( x ) ) deg ( ι v i ( x ) ) . Without loss of generality, assume deg ( v 3 ( x ) ) deg ( ι v 3 ( x ) ) . Let k = deg ( v 3 ( x ) ) deg ( ι v 3 ( x ) ) , where k 0 . Define D = i = 1 3 ι v i ( x ) v i | 0 , i = 1 2 v i ( x ) v i + ( v 3 ( x ) x k ι v 3 ( x ) ) v 3 | i = 1 3 θ v i ( x ) v i . It is obvious that deg ( v 3 ( x ) x k ι v 3 ( x ) ) < deg ( v 3 ( x ) ) . Since the generators of D belong to C, we have D C . On the other hand,
( i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i ) = ( i = 1 2 v i ( x ) v i + ( v 3 ( x ) x k ι v 3 ( x ) ) v 3 | i = 1 3 θ v i ( x ) v i ) + v 3 x k ( i = 1 3 ι v i ( x ) v i | 0 ) .
Thus, i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i D , showing that C D . Consequently, D = C . Thus, we arrive at deg ( v 3 ( x ) ) < deg ( ι v 3 ( x ) ) by reducing deg ( v 3 ( x ) ) . □
Lemma 4. 
Let C be a double cyclic code with length ( m , n ) over R, and set
C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = i = 1 3 ι v i ( x ) v i | 0 , i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i .
Then, ι v i ( x ) x n 1 θ v i ( x ) v i ( x ) for i = 1 , 2 , 3 .
Proof. 
By the proof of Proposition 2, we know that Ker ( P n | C ) = ( ι ( x ) | 0 ) , where P n | C is the second coordinate projection restricted to C. We concern about the codeword to x n 1 θ ( x ) ( ( x ) | θ ( x ) ) .
Since x n 1 θ ( x ) ( ( x ) | θ ( x ) ) = x n 1 θ ( x ) ( x ) | 0 Ker ( P n | C ) , we have ι ( x ) x n 1 θ ( x ) ( x ) . From Lemma 1, we obtain ι v i ( x ) x n 1 θ v i ( x ) v i ( x ) for i = 1 , 2 , 3 . □
Lemma 5. 
Let C be a double cyclic code with length ( m , n ) over R, and set
C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = i = 1 3 ι v i ( x ) v i | 0 , i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i .
Then, ι v i ( x ) x n 1 θ v i ( x ) gcd ( ι v i ( x ) , v i ( x ) ) for i = 1 , 2 , 3 .
Proof. 
From Proposition 2, we have θ v i ( x ) ( x n 1 ) for i = 1 , 2 , 3 . This implies that ι v i ( x ) x n 1 θ v i ( x ) ι v i ( x ) for i = 1 , 2 , 3 . By Lemma 4, we have ι v i ( x ) x n 1 θ v i ( x ) v i ( x ) for i = 1 , 2 , 3 . Therefore,
ι v i ( x ) gcd x n 1 θ v i ( x ) ι v i ( x ) , x n 1 θ v i ( x ) v i ( x ) x n 1 θ v i ( x ) gcd ( ι v i ( x ) , v i ( x ) ) , for i = 1 , 2 , 3 .
Consequently, ι v i ( x ) x n 1 θ v i ( x ) gcd ( ι v i ( x ) , v i ( x ) ) for i = 1 , 2 , 3 . □
Definition 2. 
Given C in the form of a double cyclic code with length ( m , n ) over R, a separable double cyclic code is one in which C is the direct product of C m and C n .
Lemma 6. 
If C = i = 1 3 ι v i ( x ) v i | 0 , i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i is a separable R-double cyclic code, then v i ( x ) = 0 for i = 1 , 2 , 3 .
Proof. 
Consider the generator polynomial ( ( x ) | θ ( x ) ) = i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i . Since C a separable R-double cyclic code, it means that ( x ) = i = 1 3 v i ( x ) v i is the polynomial corresponding to a codeword of a cyclic code of length m over R. From the proof of Proposition 2, we know that the generator polynomial of the cyclic code of the first coordinate projection of all vectors in C is ι ( x ) = i = 1 3 ι v i ( x ) v i . This means that
i = 1 3 v i ( x ) v i = ( x ) ( ι ( x ) ) = ( i = 1 3 ι v i ( x ) v i ) .
Then, i = 1 3 ι v i ( x ) v i = ι ( x ) | ( x ) = i = 1 3 v i ( x ) v i . Therefore, ι v i ( x ) | v i ( x ) , i = 1 , 2 , 3 . But by Lemma 3, we have deg ( v i ( x ) ) < deg ( ι v i ( x ) ) for i = 1 , 2 , 3 . This forces the conclusion to hold. □
Combining Propositions 1 and 2, and Lemmas 3, 4, 5, and 6 in this section, we obtain the first significant theorem of this paper.
Theorem 1. 
Let C be an R-double cyclic code of length ( m , n ) , and let C , C have the forms:
C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = i = 1 3 ι v i ( x ) v i | 0 , i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i , C = ( ι ¯ ( x ) | 0 ) , ( ¯ ( x ) | θ ¯ ( x ) ) = i = 1 3 ι ¯ v i ( x ) v i | 0 , i = 1 3 ¯ v i ( x ) v i | i = 1 3 θ ¯ v i ( x ) v i .
Then, ι v i ( x ) x m 1 and θ v i ( x ) x n 1 for i = 1 , 2 , 3 .
If C is a separable R-double cyclic code, then v i ( x ) = 0 for i = 1 , 2 , 3 .
If C is a free R-double cyclic code, then the following statements hold:
(1) deg ( v i ( x ) ) < deg ( ι v i ( x ) ) for i = 1 , 2 , 3 .
(2) ι v i ( x ) x n 1 θ v i ( x ) gcd ( ι v i ( x ) , v i ( x ) ) for i = 1 , 2 , 3 .

4. Generator Matrices

In this section, we consider the generating matrices of R-double cyclic codes.
Proposition 3. 
Let C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = ( i = 1 3 ι v i ( x ) v i | 0 ) , ( i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i ) be a double cyclic code with length ( m , n ) over R. Then, C is permutation equal to a F q -linear code with a generator matrix in the form G = G 1 v 1 G 2 v 2 G 3 v 3 , where
G i = I m deg ( ι v i ( x ) ) A i 1 A i 2 0 B i 1 B i 2 0 0 0 | 0 0 0 B i 3 I k i 0 M i 1 M i 2 I n deg ( ι v i ( x ) ) k i , i = 1 , 2 , 3
and k i = deg ( ι v i ( x ) ) deg ( gcd ( ι v i ( x ) , v i ( x ) ) ) N , i = 1 , 2 , 3 .
Proof. 
We know that all of C v i , i = 1 , 2 , 3 are double cyclic codes over F q from the canonical projections. By Proposition 8 of paper [7], we know that each of C v i is a permutation equivalent to a linear code over F q , and their generator matrices have the following forms:
G i = I m deg ( ι v i ( x ) ) A i 1 A i 2 0 B i 1 B i 2 0 0 0 | 0 0 0 B i 3 I k i 0 M i 1 M i 2 I n deg ( ι v i ( x ) ) k i , i = 1 , 2 , 3 ,
where B i 1 are full rank square matrices of size k i × k i , i = 1 , 2 , 3 . By reducing the canonical projections to the double cyclic codes, we obtain that the matrix form of C is G. □
From the generator matrix of the R-double cyclic codes, we have an easy computation, as follows.
Corollary 1. 
Let C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = ( i = 1 3 ι v i ( x ) v i | 0 ) , ( i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i ) be a double cyclic code with length ( m , n ) over R. Then, C is an F q -linear code of dimension 3 m + 3 n i = 1 3 ( deg ( ι v i ( x ) ) + deg ( θ v i ( x ) ) ) .
Proposition 4. 
Let C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = ( i = 1 3 ι v i ( x ) v i | 0 ) , ( i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i ) be a double cyclic code with length ( m , n ) over R, and
C = ( ι ¯ ( x ) | 0 ) , ( ¯ ( x ) | θ ¯ ( x ) ) = i = 1 3 ι ¯ v i ( x ) v i | 0 , i = 1 3 ¯ v i ( x ) v i | i = 1 3 θ ¯ v i ( x ) v i .
Then,
| C m | = q 3 m + i = 1 3 k i i = 1 3 deg ( ι v i ( x ) ) , | C n | = q 3 n i = 1 3 deg ( θ v i ( x ) ) , | ( C ) m | = q i = 1 3 deg ( θ v i ( x ) ) , | ( C ) n | = q i = 1 3 deg ( θ v i ( x ) ) + i = 1 3 k i ,
where k i = deg ( ι v i ( x ) ) deg ( gcd ( ι v i ( x ) , v i ( x ) ) ) N , i = 1 , 2 , 3 .
Proof. 
We know that C m is generated by the polynomial gcd ( ι ( x ) , ( x ) ) , and C n is generated by θ ( x ) , in accordance with Proposition 2. By mapping the codewords to single cyclic codes over R, we obtain that
| C m | = i = 1 3 | ( C m ) v i | = i = 1 3 q m deg ( ι v i ( x ) , v i ( x ) ) = q 3 m + i = 1 3 k i i = 1 3 deg ( ι v i ( x ) ) ; | C n | = i = 1 3 | ( C n ) v i | = i = 1 3 q n deg ( θ v i ( x ) ) = q 3 n i = 1 3 deg ( θ v i ( x ) ) .
From the generating matrix forms of C, we can efficiently work out the parity check matrix of C is H = H 1 v 1 H 2 v 2 H 3 v 3 , where
H i = ( A i 1 ) t I k i 0 ( A i 2 ) t 0 I deg ( ι v i ( x ) ) k i 0 0 0 | 0 ( B i 1 ) t ( B i 1 ) t ( M i 2 ) t 0 ( B i 2 ) t ( B i 2 ) t ( M i 2 ) t I deg ( θ v i ( x ) ) ( B i 3 ) t ( M i 1 ) t + ( B i 3 ) t ( M i 2 ) t , i = 1 , 2 , 3 .
Taking advantage of the connection between cyclic codes and their dual codes about the matrix forms, we can apply the same approach as before to obtain that
| ( C ) m | = i = 1 3 | ( ( C ) m ) v i | = q i = 1 3 deg ( θ v i ( x ) ) , | ( C ) n | = i = 1 3 | ( ( C ) n ) v i | = q i = 1 3 deg ( θ v i ( x ) ) + i = 1 3 k i .
Corollary 2. 
Let C and C be defined as presented above. Then,
deg ( ι ¯ v i ( x ) ) = m deg ( gcd ( ι v i ( x ) , v i ( x ) ) ) , deg ( θ ¯ v i ( x ) ) = n deg ( ι v i ( x ) ) deg ( θ v i ( x ) ) + deg ( gcd ( ι v i ( x ) , v i ( x ) ) ) , i = 1 , 2 , 3 .
Proof. 
Given that ( C m ) is a cyclic code generated by ι ¯ ( x ) , we can deduce from the findings on cyclic codes over R that | ( ( C m ) ) v i | = q m deg ( ι v i ( x ) ) for i = 1 , 2 , 3 . Furthermore, by Proposition 4, we have | ( ( C m ) ) v i | = q deg ( ι v i ( x ) ) k i , i = 1 , 2 , 3 . Thus, deg ( ι ¯ v i ( x ) ) = m deg ( gcd ( ι v i ( x ) , v i ( x ) ) ) , i = 1 , 2 , 3 .
Because ( C ) m is a cyclic code generated by θ ¯ ( x ) , and C is also a R-double cyclic code of length ( m , n ) , therefore, | ( ( C ) m ) v i | = q n deg ( θ ¯ v i ( x ) ) . According to Proposition 4, we have | ( ( C ) m ) v i | = q deg ( θ v i ( x ) ) + k i for i = 1 , 2 , 3 . Consequently,
deg ( θ ¯ v i ( x ) ) = n deg ( ι v i ( x ) ) deg ( θ v i ( x ) ) + deg ( gcd ( ι v i ( x ) , v i ( x ) ) ) , i = 1 , 2 , 3 .

5. Dual Codes over F q + v F q + v 2 F q

In this section, we mainly consider the generating polynomials of dual codes of double cyclic codes over F q + v F q + v 2 F q .
Definition 3. 
Let r ( x ) = i = 1 3 r v i ( x ) v i with r v i ( x ) F q [ x ] , i = 1 , 2 , 3 for r ( x ) R [ x ] . Provide an explanation of the monic reciprocal polynomial r ( x ) , which is defined as
r * ( x ) = i = 1 3 r v i * ( x ) v i = i = 1 3 ( l c ( r v i ( x ) ) ) 1 x deg ( r v i ( x ) ) r v i ( x 1 ) v i ,
where l c ( r v i ( x ) ) is expressed by the lowest term coefficient of r v i ( x ) for i = 1 , 2 , 3 .
Remark 3. 
The definition of the monic reciprocal polynomial in R [ x ] can be regarded as a generalization to the case of finite fields. According to this definition, we also have ( r * ( x ) ) v i = ( r v i ( x ) ) * , i = 1 , 2 , 3 . For this reason, we can write r v i * ( x ) , i = 1 , 2 , 3 without confusion.
As in Lemma 1, we also have the following.
Lemma 7. 
Let a ( x ) , b ( x ) R [ x ] with a ( x ) | b ( x ) . Then, ( b ( x ) a ( x ) ) * = b * ( x ) a * ( x ) .
Proof. 
It is equivalent to prove ( a ( x ) b ( x ) ) * = a * ( x ) b * ( x ) for a ( x ) , b ( x ) R [ x ] . We obtain ( f ( x ) g ( x ) ) * = f * ( x ) g * ( x ) , f ( x ) , g ( x ) F q [ x ] by applying polynomial theory to conventional finite fields, while we can combine v 1 , v 2 , v 3 to decompose r ( x ) i n R [ x ] , which corresponds to the case of the polynomial over finite fields. Then, we obtain the results in this way. □
Remark 4. 
We still have r * * ( x ) = r ( x ) , r ( x ) R [ x ] , as in the case of finite fields. In the next decomposition of polynomials, we will repeatedly use this Lemma, as well as Lemmas 1 and 2, without further explanation.
Proposition 5. 
Using the findings from Lemma 6, let
C = ( ι ( x ) | 0 ) , ( 0 | θ ( x ) ) = i = 1 3 ι v i ( x ) v i | 0 , i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i
be a separable R-double cyclic code of length ( m , n ) . Additionally, C is a separable R-double cyclic code, and
C = x m 1 ι * ( x ) | 0 , 0 | x n 1 θ * ( x ) = i = 1 3 x m 1 ι v i * ( x ) v i | 0 , 0 | i = 1 3 x n 1 θ v i * ( x ) v i .
Proof. 
Since C is separable, we have C = C m × C n . Thus, it is easy to obtain C = C m × C n . Referring to cyclic codes over F q + v F q + v 2 F q in [19], we achieve that
C = x m 1 ι * ( x ) | 0 , 0 | x n 1 θ * ( x ) = i = 1 3 x m 1 ι v i * ( x ) v i | 0 , 0 | i = 1 3 x n 1 θ v i * ( x ) v i .
Let ω m ( x ) represent the polynomial i = 0 m 1 x i . Using this symbol, we can easily justify that
Lemma 8. 
Let m , n N ; then, x m n 1 = ( x m 1 ) ω n ( x m ) .
Definition 4. 
Let c ( x ) = i = 1 3 c v i 1 ( x ) v i | i = 1 3 c v i 2 ( x ) v i , d ( x ) = i = 1 3 d v i 1 ( x ) v i | i = 1 3 d v i 2 ( x ) v i be two elements in R m , n [ x ] . We define the map : R m , n [ x ] × R m , n [ x ] R l [ x ] as
( c ( x ) , d ( x ) ) = i = 1 3 c v i 1 ( x ) ω l m ( x m ) x l 1 deg ( d v i 1 ( x ) ) d v i 1 * ( x ) + c v i 2 ( x ) θ l m ( x m ) x l 1 deg ( d v i 2 ( x ) ) d v i 2 * ( x ) v i ,
where the right side of the equality is the combination of polynomials module x l 1 .
We denote ( c ( x ) , d ( x ) ) by c ( x ) d ( x ) for the sake of simplicity and convenience.
Lemma 9. 
Let c , d be two vectors in R m × R n , with corresponding polynomials
c ( x ) = i = 1 3 c v i 1 ( x ) v i | i = 1 3 c v i 2 ( x ) v i , d ( x ) = i = 1 3 d v i 1 ( x ) v i | i = 1 3 d v i 2 ( x ) v i
respectively. Then, c is orthogonal to d and all of its shift, if and only if c ( x ) d ( x ) 0 .
Proof. 
Let d ( s ) = ( d 0 + s 1 , , d m 1 + s 1 d 0 + s 2 , , d n 1 + s 2 ) be the s-th cyclic shift of vector d, 0 s l 1 . We know that c , d ( s ) = 0 , if and only if k 1 = 0 m 1 c k 1 1 d k 1 + s 1 + k 2 = 0 n 1 c k 2 2 d k 2 + s 2 = 0 . Fixing Δ s = k 1 = 0 m 1 c k 1 1 d k 1 + s 1 + k 2 = 0 n 1 c k 2 2 d k 2 + s 2 , we can obtain that
c ( x ) d ( x ) = i = 0 m 1 ω l m ( x m ) k 1 = 0 m 1 c k 1 1 d k 1 + i 1 x l 1 i + j = 0 n 1 ω l n ( x n ) k 2 = 0 n 1 c k 2 2 d k 2 + j 2 x l 1 j = ω l m ( x m ) i = 0 m 1 k 1 = 0 m 1 c k 1 1 d k 1 + i 1 x l 1 i + ω l n ( x n ) j = 0 m 1 k 2 = 0 n 1 c k 2 2 d k 2 + j 2 x l 1 j = s = 0 l 1 Δ s x l 1 s
in R [ x ] / ( x l 1 ) . Hence, c ( x ) d ( x ) = 0 only if and when Δ s = 0 for all 0 s l 1 . □
Lemma 10. 
Let c ( x ) = ( c 1 ( x ) | c 2 ( x ) ) and d ( x ) = ( d 1 ( x ) | d 2 ( x ) ) be two elements in the set R m , n [ x ] , such that c ( x ) d ( x ) = 0 mod ( x l 1 ) . When c 1 ( x ) 0 or d 1 ( x ) 0 , then c 2 ( x ) d 2 * ( x ) = 0 mod ( x n 1 ) . In turn, if c 2 ( x ) 0 or d 2 ( x ) 0 , then c 1 ( x ) d 1 * ( x ) = 0 mod ( x m 1 ) .
Proof. 
Let c 2 ( x ) or d 2 ( x ) be equal to 0 module x n 1 . This means that c v i 2 ( x ) 0 , i = 1 , 2 , 3 or d v i 2 ( x ) 0 , i = 1 , 2 , 3 . By the concrete definition forms of ∘ in R [ x ] , we have
c ( x ) d ( x ) = i = 1 3 c v i 1 ( x ) ω l m ( x m ) x l 1 deg ( d v i 1 ( x ) ) d v i 1 * ( x ) v i = 0 mod ( x l 1 ) .
Therefore, a polynomial π ( x ) R [ x ] with π ( x ) = i = 1 3 π v i ( x ) v i , such that
i = 1 3 c v i 1 ( x ) ω l m ( x m ) x l 1 deg ( d v i 1 ( x ) ) d v i 1 * ( x ) v i = π ( x ) ( x l 1 ) = i = 1 3 π v i ( x ) ( x l 1 ) v i .
exists.
Then, c v i 1 ( x ) ω l m ( x m ) x l 1 deg ( d v i 1 ( x ) ) d v i 1 * ( x ) = π v i ( x ) ( x l 1 ) , i = 1 , 2 , 3 . Let Π ( x ) = i = 1 3 Π v i ( x ) v i with Π v i ( x ) = x deg ( d v i 1 ( x ) ) + 1 π v i ( x ) , i = 1 , 2 , 3 ; we have c v i 1 ( x ) ω l m ( x m ) x l d v i 1 * ( x ) = Π v i ( x ) ( x l 1 ) , i = 1 , 2 , 3 . By Lemma 8, we obtain x l 1 = ω l m ( x m ) ( x m 1 ) . So, c v i 1 ( x ) d v i 1 * ( x ) x l = Π v i ( x ) ( x m 1 ) i = 1 , 2 , 3 . This means that x m 1 | c v i 1 ( x ) d v i 1 * ( x ) x l , i = 1 , 2 , 3 . Obviously, x m 1 and x l are co-prime to each other. This leads to x m 1 | c v i 1 ( x ) d v i 1 * ( x ) , i = 1 , 2 , 3 . Hence,
i = 1 3 c v i 1 ( x ) d v i 1 * ( x ) v i = c 1 ( x ) d 1 * ( x ) = 0 mod ( x m 1 ) .
The same assertion can be proved for the other cases. □
Proposition 6. 
Let C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = ( i = 1 3 ι v i ( x ) v i | 0 ) , ( i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i ) be a double cyclic code of length ( m , n ) over R and its dual,
C = ( ι ¯ ( x ) | 0 ) , ( ¯ ( x ) | θ ¯ ( x ) ) = i = 1 3 ι ¯ v i ( x ) v i | 0 , i = 1 3 ¯ v i ( x ) v i | i = 1 3 θ ¯ v i ( x ) v i .
Then, ι ¯ ( x ) = x m 1 gcd * ( ι ( x ) , ( x ) ) = i = 1 3 x m 1 gcd * ( ι v i ( x ) , v i ( x ) ) v i .
Proof. 
Obviously, ( ι ¯ ( x ) | 0 ) belongs to C . As a consequence of Lemma 9, we have
( ι ¯ ( x ) | 0 ) ( ι ( x ) | 0 ) = 0 mod ( x l 1 ) , ( ι ¯ ( x ) | 0 ) ( ( x ) | θ ( x ) ) = 0 mod ( x l 1 ) .
Therefore, by Lemma 10, we also have
ι ¯ * ( x ) ι ( x ) = 0 mod ( x m 1 ) ( x m 1 ) | ι ¯ * ( x ) ι ( x ) , ι ¯ * ( x ) ( x ) = 0 mod ( x m 1 ) ( x m 1 ) | ι ¯ * ( x ) ( x ) .
Then, we obtain x m 1 | gcd ( ι ¯ * ( x ) ι ( x ) , ι ¯ * ( x ) ( x ) ) | ι ¯ * ( x ) gcd ( ι ( x ) , ( x ) ) , while x m 1 | ι ¯ * ( x ) gcd ( ι ( x ) , ( x ) ) , if and only if
x m 1 | ι ¯ v i * ( x ) gcd v i ( ι ( x ) , ( x ) ) = ι ¯ v i * ( x ) gcd ( ι v i ( x ) , v i ( x ) ) , i = 1 , 2 , 3 .
Since all of ι ¯ v i * ( x ) , gcd ( ι v i ( x ) , v i ( x ) ) , i = 1 , 2 , 3 are factors of x m 1 , by Corollary 2, we have
deg ( ι ¯ v i * ( x ) ) = deg ( ι ¯ v i ( x ) ) = m deg ( gcd ( ι v i ( x ) , v i ( x ) ) ) , i = 1 , 2 , 3 .
Therefore, x m 1 = ι ¯ v i * ( x ) gcd v i ( ι ( x ) , ( x ) ) = ι ¯ v i * ( x ) gcd ( ι v i ( x ) , v i ( x ) ) , i = 1 , 2 , 3 . Then, we obtain
ι ¯ * ( x ) gcd ( ι ( x ) , ( x ) ) = i = 1 3 ι ¯ v i * ( x ) gcd ( ι v i ( x ) , v i ( x ) ) v i = i = 1 3 ( x m 1 ) v i = x m 1 .
Consequently, we have ι ¯ ( x ) = x m 1 gcd * ( ι ( x ) , ( x ) ) = i = 1 3 x m 1 gcd * ( ι v i ( x ) , v i ( x ) ) v i . □
Proposition 7. 
Let C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = ( i = 1 3 ι v i ( x ) v i | 0 ) , ( i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i ) be an R-double cyclic code of length ( m , n ) and its dual,
C = ( ι ¯ ( x ) | 0 ) , ( ¯ ( x ) | θ ¯ ( x ) ) = i = 1 3 ι ¯ v i ( x ) v i | 0 , i = 1 3 ¯ v i ( x ) v i | i = 1 3 θ ¯ v i ( x ) v i .
Then, θ ¯ ( x ) = ( x n 1 ) gcd * ( ι ( x ) , ( x ) ) ι * ( x ) θ * ( x ) = i = 1 3 ( x n 1 ) gcd * ( ι v i ( x ) , v i ( x ) ) ι v i * ( x ) θ v i * ( x ) v i .
Proof. 
Considering the codeword
0 | ι ( x ) gcd ( ι ( x ) , ( x ) ) θ ( x ) = ι ( x ) gcd ( ι ( x ) , ( x ) ) ( ( x ) | θ ( x ) ) ( x ) gcd ( ι ( x ) , ( x ) ) ( ι ( x ) | 0 ) ,
we have 0 | ι ( x ) gcd ( ι ( x ) , ( x ) ) θ ( x ) C . By Lemma 9, we obtain
( ¯ ( x ) | θ ¯ ( x ) ) 0 | ι ( x ) gcd ( ι ( x ) , ( x ) ) θ ( x ) = 0 mod ( x l 1 ) .
Then, from Lemma 10, we obtain that
θ ¯ ( x ) ι * ( x ) θ * ( x ) gcd * ( ι ( x ) , ( x ) ) = 0 mod ( x n 1 ) x n 1 | θ ¯ ( x ) ι * ( x ) θ * ( x ) gcd * ( ι ( x ) , ( x ) ) .
while x n 1 | θ ¯ ( x ) ι * ( x ) θ * ( x ) gcd * ( ι ( x ) , ( x ) ) , if and only if
x n 1 | θ ¯ v i ( x ) ι v i * ( x ) θ v i * ( x ) gcd v i * ( ι ( x ) , ( x ) ) = θ ¯ v i ( x ) ι v i * ( x ) θ v i * ( x ) gcd * ( ι v i ( x ) , v i ( x ) ) , i = 1 , 2 , 3 .
From Theorem 1, we acquire θ ¯ v i ( x ) | ( x n 1 ) , i = 1 , 2 , 3 . Simultaneously, by Lemma 5, we have that ι v i * ( x ) θ v i * ( x ) gcd ( ι v i ( x ) , v i ( x ) ) | ( x n 1 ) , i = 1 , 2 , 3 . From Corollary 2, we gain
deg ( θ ¯ v i ( x ) ) = n deg ( ι v i ( x ) ) deg ( θ v i ( x ) ) + deg ( gcd ( ξ v i ( x ) , v i ( x ) ) , i = 1 , 2 , 3 .
Therefore, deg ( θ ¯ v i ( x ) ι v i * ( x ) θ v i * ( x ) gcd * ( ι v i ( x ) , v i ( x ) ) ) = n , i = 1 , 2 , 3 . This indicates that x n 1 = θ ¯ v i ( x ) ι v i * ( x ) θ v i * ( x ) gcd * ( ι v i ( x ) , v i ( x ) ) , i = 1 , 2 , 3 . Hence,
θ ¯ ( x ) ι * ( x ) θ * ( x ) gcd * ( ι ( x ) , ( x ) ) = i = 1 3 θ ¯ v i ( x ) ι v i * ( x ) θ v i * ( x ) gcd * ( ι v i ( x ) , v i ( x ) ) v i = i = 1 3 ( x n 1 ) v i = ( x n 1 ) i = 1 3 v i = x n 1 .
Thereby, θ ¯ ( x ) = ( x n 1 ) gcd * ( ι ( x ) , ( x ) ) ι * ( x ) θ * ( x ) = i = 1 3 ( x n 1 ) gcd * ( ι v i ( x ) , v i ( x ) ) ι v i * ( x ) θ v i * ( x ) v i . □
Remark 5. 
We use the fact that deg ( f * ( x ) ) = deg ( f ( x ) ) for f ( x ) F q [ x ] .
Proposition 8. 
Let C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = ( i = 1 3 ι v i ( x ) v i | 0 ) , ( i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i ) be a double cyclic code of length ( m , n ) over R, with
C = ( ι ¯ ( x ) | 0 ) , ( ¯ ( x ) | θ ¯ ( x ) ) = i = 1 3 ι ¯ v i ( x ) v i | 0 , i = 1 3 ¯ v i ( x ) v i | i = 1 3 θ ¯ v i ( x ) v i .
Then, ¯ ( x ) = ρ ( x ) i = 1 3 x m 1 ι v i * ( x ) v i , where
ρ ( x ) = i = 1 3 x l deg ( θ v i ( x ) ) + deg ( ι v i ( x ) ) v i ι * ( x ) gcd * ( ι ( x ) , ( x ) ) 1 mod ι * ( x ) gcd * ( ι ( x ) , ( x ) ) .
Proof. 
Since ( ¯ ( x ) | θ ¯ ( x ) ) C and ( ι ( x ) | 0 ) C , we have
( ¯ ( x ) | ( ¯ θ ) ( x ) ) ( ι ( x ) | 0 ) 0 mod ( x l 1 )
from Lemma 9. Then, we obtain ¯ ( x ) ι * ( x ) = 0 mod ( x m 1 ) from Lemma 10. Thus, there exists a polynomial ρ ( x ) R [ x ] such that ¯ ( x ) = x m 1 ι * ( x ) ρ ( x ) = ( i = 1 3 x m 1 ι v i * ( x ) v i ) ρ ( x ) . We explain the details of ρ ( x ) in the following proof.
From Lemma 9, we have ( ¯ ( x ) θ ¯ ( x ) ) ( ( x ) | θ ( x ) ) = 0 mod ( x l 1 ) . Writing the concrete expression of ( ¯ ( x ) θ ¯ ( x ) ) ( ( x ) | θ ( x ) ) , we obtain that
( ¯ ( x ) | θ ¯ ( x ) ) ( ( x ) | θ ( x ) ) = x m 1 ι * ( x ) ρ ( x ) | ( x n 1 ) gcd * ( ι ( x ) , ( x ) ) ι * ( x ) θ * ( x ) ( ( x ) | θ ( x ) ) = i = 1 3 ( x m 1 ι v i * ( x ) ρ ( x ) ω l m ( x m ) x l 1 deg ( v i ( x ) ) v i * ( x ) + ( x n 1 ) gcd v i * ( ι ( x ) , ( x ) ) ι v i * ( x ) θ v i * ( x ) ω l n ( x n ) x l 1 deg ( θ v i ( x ) ) θ v i * ( x ) v i .
And ( x m 1 ) ω l m ( x m ) = x l 1 , ( x n 1 ) ω l n ( x n ) = x l 1 , we have
i = 1 3 ( x l 1 ) gcd v i * ( ι ( x ) , ( x ) ) ι v i * ( x ) ρ v i ( x ) x l deg ( v i ( x ) ) v i * ( x ) gcd v i * ( ι ( x ) , ( x ) ) + x l deg ( θ v i ( x ) ) 1 v i = 0 mod ( x l 1 ) .
This reveals that
i = 1 3 x l 1 ι v i * ( x ) / gcd v * ( ι ( x ) , ( x ) ) ρ v i ( x ) x l deg ( v i ( x ) ) v i * ( x ) gcd v i * ( ι ( x ) , ( x ) ) + x l deg ( θ v i ( x ) ) 1 v i = 0 mod ( x l 1 ) .
Set ι ˜ ( x ) = ι ( x ) gcd ( ι ( x ) , ( x ) ) , ˜ ( x ) = ( x ) gcd ( ι ( x ) , ( x ) ) ; hence,
i = 1 3 x l 1 ι ˜ v i * ( x ) ρ v i ( x ) x l deg ( v i ( x ) ) ˜ v i * ( x ) + x l deg ( θ v i ( x ) ) 1 v i = 0 mod ( x l 1 ) .
Therefore,
i = 1 3 ρ v i ( x ) x l deg ( v i ( x ) ) ˜ v i * ( x ) + x l deg ( θ v i ( x ) ) 1 v i = 0 mod ( x l 1 )
or
i = 1 3 ρ v i ( x ) x l deg ( v i ( x ) ) ˜ v i * ( x ) + x l deg ( θ v i ( x ) ) 1 v i = 0 mod ( ι ˜ * ( x ) ) .
Since the former can be deduced the latter by reason of ι ˜ * ( x ) | ( x l 1 ) , we can assume that
i = 1 3 ρ v i ( x ) x l deg ( v i ( x ) ) ˜ v i * ( x ) + x l deg ( θ v i ( x ) ) 1 v i = 0 mod ( ι ˜ * ( x ) ) .
From the fixing of ι ˜ ( x ) and ˜ ( x ) , it is obvious that gcd ( ι ˜ ( x ) , ˜ ( x ) ) = 1 . Furthermore, x l = 1 mod ι * ( x ) . Then, ˜ * ( x ) is an invertible element modulo ι ˜ * ( x ) . Consequently, we have
ρ ( x ) = i = 1 3 x l deg ( θ v i ( x ) ) + deg ( ι v i ( x ) ) v i * ( x ) gcd * ( ι ( x ) , ( x ) ) 1 mod ι * ( x ) gcd * ( ι ( x ) , ( x ) ) .
Summarizing several propositions and lemmas, we obtain the second primary theorem of this article.
Theorem 2. 
Let C be an R-double cyclic code of length ( m , n ) , and set C , C to have the forms of
C = ( ι ( x ) | 0 ) , ( ( x ) | θ ( x ) ) = i = 1 3 ι v i ( x ) v i | 0 , i = 1 3 v i ( x ) v i | i = 1 3 θ v i ( x ) v i , C = ( ι ¯ ( x ) | 0 ) , ( ¯ ( x ) | θ ¯ ( x ) ) = i = 1 3 ι ¯ v i ( x ) v i | 0 , i = 1 3 ¯ v i ( x ) v i | i = 1 3 θ ¯ v i ( x ) v i .
Then,
(1) ι ¯ ( x ) = i = 1 3 x m 1 gcd * ( ι v i ( x ) , v i ( x ) ) v i .
(2) θ ¯ ( x ) = i = 1 3 ( x n 1 ) gcd * ( ι v i ( x ) , v i ( x ) ) ι v i * ( x ) θ v i * ( x ) v i .
(3) ¯ ( x ) = ρ ( x ) i = 1 3 x m 1 ι v i * ( x ) v i , where
ρ ( x ) = 0 if C is separable , or otherwise ρ ( x ) = i = 1 3 x l deg ( θ v i ( x ) ) + deg ( ι v i ( x ) ) v i ι * ( x ) gcd * ( ι ( x ) , ( x ) ) 1 mod ι * ( x ) gcd * ( ι ( x ) , ( x ) ) .

6. Examples of Optimal Codes

In this section, we provide some examples of double cyclic codes over F q + v F q + v 2 F q with v 3 = v . According to [22], the codes that we present in this section have optimal parameters.
Example 1. 
Let ι ( x ) = x + v 2 + 2 v + 2 , ( x ) = v 2 + v + 2 and θ ( x ) = 1 , where F q = F 3 , m = n = 4 .
Since ι ( x ) = x + 2 v 2 + v + 1 = ( x + 1 ) v 1 + ( x + 1 ) v 2 + ( x + 2 ) v 3 , ( x ) = v 2 + v + 2 = 2 v 1 + v 2 + 2 v 3 and θ ( x ) = 1 = v 1 + v 2 + v 3 . This means that
C v 1 = ( x + 2 | 0 ) , ( 2 | 1 ) , C v 2 = ( x + 2 | 0 ) , ( 1 | 1 ) , C v 3 = ( x + 1 | 0 ) , ( 2 | 1 ) .
Therefore, C v i , i = 1 , 2 , 3 have the following generator matrices:
G 1 = 2 1 0 0 0 2 1 0 0 0 2 1 2 0 0 0 0 2 0 0 0 0 2 0 0 0 0 2 | 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 , G 2 = 2 1 0 0 0 2 1 0 0 0 2 1 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 | 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 , G 3 = 1 1 0 0 0 1 1 0 0 0 1 1 2 0 0 0 0 2 0 0 0 0 2 0 0 0 0 2 | 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 .
It is easy to see that all three codes C v i , i = 1 , 2 , 3 are MDS codes with parameter [ 8 , 7 , 2 ] over F 3 . Therefore, C = C v 1 v 1 C v 2 v 2 C v 3 v 3 is a [ 24 , 21 , 2 ] 3 code. From [22], we know that this is an optimal code over F 3 .
Example 2. 
Let ι ( x ) = x + 2 v 2 + v + 1 , ( x ) = 2 v 2 + 2 and θ ( x ) = 2 v 2 + v + 1 , where F q = F 3 , m = n = 6 .
Since ι ( x ) = x + 2 v 2 + v + 1 = ( x + 1 ) v 1 + ( x + 1 ) v 2 + ( x + 2 ) v 3 , ( x ) = v 2 + v + 2 = 2 v 1 + v 2 + v 3 and θ ( x ) = 2 v 2 + v + 1 = v 1 + v 2 + 2 v 3 , this means that
C v 1 = ( x + 1 | 0 ) , ( 2 | 1 ) , C v 2 = ( x + 1 | 0 ) , ( 1 | 1 ) , C v 3 = ( x + 2 | 0 ) , ( 1 | 2 ) .
Therefore, C v i , i = 1 , 2 , 3 have the following generator matrices:
G 1 = 1 1 0 0 0 0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 0 1 1 2 0 0 0 0 0 0 2 0 0 0 0 0 0 2 0 0 0 0 0 0 2 0 0 0 0 0 0 2 0 0 0 0 0 0 2 | 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 ,
G 2 = 1 1 0 0 0 0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 0 1 1 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 | 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1
and
G 3 = 2 1 0 0 0 0 0 2 1 0 0 0 0 0 2 1 0 0 0 0 0 2 1 0 0 0 0 0 2 1 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 | 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 2 0 0 0 0 0 0 2 0 0 0 0 0 0 2 0 0 0 0 0 0 2 0 0 0 0 0 0 2 .
From Magma, we know that all three codes C v i , i = 1 , 2 , 3 are MDS codes with parameter [ 12 , 11 , 2 ] over F 3 . Consequently, C = C v 1 v 1 C v 2 v 2 C v 3 v 3 is a [ 36 , 33 , 2 ] 3 code. According to [22], this is also an optimal code over F 3 .
Example 3. 
Let F q = F 3 , m = n = 7 . At the same time, let ι ( x ) = x + 2 , ( x ) = v 2 + v + 2 and θ ( x ) = ( 2 v 2 + v ) x + 2 v 2 + v + 1 .
Since ι ( x ) = x + 2 = ( x + 2 ) v 1 + ( x + 2 ) v 2 + ( x + 2 ) v 3 , ( x ) = v 2 + v + 2 = 2 v 1 + v 2 + v 3 and θ ( x ) = ( 2 v 2 + v ) x + 2 v 2 + v + 1 = v 1 + v 2 + ( x + 2 ) v 3 . This means that
C v 1 = ( x + 2 | 0 ) , ( 2 | 1 ) , C v 2 = ( x + 2 | 0 ) , ( 1 | 1 ) , C v 3 = ( x + 2 | 0 ) , ( 1 | x + 2 ) .
Therefore, C v i , i = 1 , 2 , 3 have the following generator matrices:
G 1 = 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 2 | 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 ,
G 2 = 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 | 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1
and
G 3 = 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 | 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 0 0 0 0 0 0 2 1 .
According to Magma, we know that C v 1 and C v 2 are MDS codes with parameters [ 14 , 13 , 2 ] over F 3 , while C v 3 has the parameter [ 14 , 12 , 2 ] over F 3 . Then, C = C v 1 v 1 C v 2 v 2 C v 3 v 3 is a [ 42 , 38 , 2 ] 3 code in the same way. According to [22], this is also an optimal code over F 3 .
These examples show that we can use some MDS codes with small lengths to construct an optimal code with a considerable length.

7. Conclusions

In this paper, we analyzed the algebraic structure of double cyclic codes over F q + v F q + v 2 F q with v 3 = v . We provided the generator polynomials of these codes, and give their generating matrix forms. Furthermore, we discussed the quantitative relationship between the double cyclic codes and their duals. Finally, we determined the relationship between the generators of double cyclic codes and their duals. As an application, we obtained some optimal codes with longer length by using MDS codes with shorter lengths. Last year, Biswas and Maheshanand Bhaintwal considered a new construction of quantum codes from quasi-cyclic codes over finite fields in [23]. Meanwhile, Mohammad Ashraf et al. considered quantum codes from cyclic codes over a mixed alphabet structure in [24]. Therefore, as a special case of generalized quasi-cyclic codes, we can also considered the construction of quantum codes in the future.

Author Contributions

All authors contributed to the study’s conception and design. Material preparation, data collection, and analysis were performed by T.D. and J.Y. The first draft of the manuscript was written by T.D. and all authors commented on previous versions of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data available on request and not publicly accessible due to ownership restrictions.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Borges, J.; Fernández-Córdoba, C.; Pujol, J.; Pujol, J.; Rifà, J.; Villanueva, M. Z 2 Z 4-linear codes: Generator matrices and duality. Des. Codes Cryptogr. 2010, 54, 167–179. [Google Scholar] [CrossRef]
  2. Abualrub, T.; Siap, I.; Aydin, N. Z 2 Z 4-Additive Cyclic Codes. IEEE Trans. Inf. Theory 2014, 60, 1508–1514. [Google Scholar] [CrossRef]
  3. Abualrub, T.; Siap, I.; Aydogdu, I. Z 2( Z 2 + u Z 2)-Linear cyclic codes. In Proceedings of the IMECS, Hong Kong, China, 12–14 March 2014; Volume 2. [Google Scholar]
  4. Aydogdu, I.; Abualrub, T.; Siap, I. Z 2 Z 2[u]–Cyclic and Constacyclic Codes. IEEE Trans. Inf. Theory 2016, 63, 4883–4893. [Google Scholar] [CrossRef]
  5. Aydogdu, I.; Abualrub, T. The structure of Z 2 Z 2s-additive cyclic codes. Discret. Math. Algorithms Appl. 2018, 10, 1850048. [Google Scholar] [CrossRef]
  6. Aydogdu, I.; Siap, I. On Z pr Z ps-additive codes. Linear Multilinear Algebra 2015, 63, 2089–2102. [Google Scholar] [CrossRef]
  7. Borges, J.; Fernández-Córdoba, C.; Ten-Valls, R. Z 2-double cyclic codes. Des. Codes Cryptogr. 2018, 86, 463–479. [Google Scholar] [CrossRef]
  8. Gao, J.; Shi, M.; Wu, T.; Fu, F.W. On double cyclic codes over Z 4. Finite Fields Appl. 2016, 39, 233–250. [Google Scholar] [CrossRef]
  9. Gao, J.; Hou, X. Z 4-Double Cyclic Codes Are Asymptotically Good. IEEE Commun. Lett. 2020, 24, 1593–1597. [Google Scholar] [CrossRef]
  10. Wang, Y.; Gao, J. Double λ-constacyclic codes over finite chain rings. J. Shandong Univ. Technol. (Natural Sci. Ed.) 2018, 32, 1672–1697. (In Chinese) [Google Scholar]
  11. Yao, T.; Shi, M.; Solé, P. Double cyclic codes over F q + u F q + u 2 F q . Int. Inf. Coding Theory 2015, 3, 145–157. [Google Scholar]
  12. Gao, J. Some results on linear codes over F q + u F q + u 2 F q . J. Appl. Math. Comput. 2015, 47, 473–485. [Google Scholar] [CrossRef]
  13. Diao, L.; Gao, J.; Lu, J. Some results on Z p Z p[v]-additive cyclic codes. Adv. Math. Commun. 2020, 14, 555. [Google Scholar] [CrossRef]
  14. Shi, M.; Qian, L.; Solé, P. On self-dual negacirculant codes of index two and four. Des. Codes Cryptogr. 2018, 86, 2485–2494. [Google Scholar] [CrossRef]
  15. Shi, M.; Wu, R.; Krotov, D.S. On Z p Z pk-Additive codes and their duality. IEEE Trans. Inf. Theory 2018, 65, 3841–3847. [Google Scholar] [CrossRef]
  16. Shi, M.; Özbudak, F.; Xu, L.; Solé, P. LCD codes from tridiagonal Toeplitz matrices. Finite Fields Appl. 2021, 75, 101892. [Google Scholar] [CrossRef]
  17. Aydogdu, I.; Hesari, R.M.; Samei, K. Double skew cyclic codes over F q . Comput. Appl. Math. 2022, 41, 1–17. [Google Scholar] [CrossRef]
  18. Aydogdu, I.; Abualrub, T.; Samei, K. F q 2 -double cyclic codes with respect to the Hermitian inner product. Appl. Algebra Eng. Commun. Comput. 2024, 35, 151–166. [Google Scholar] [CrossRef]
  19. Melakhessou, A.; Guenda, K.; Gulliver, T.A.; Shi, M.; Solé, P. On codes over F q + v F q + v 2 F q . J. Appl. Math. Comput. 2018, 57, 375–391. [Google Scholar] [CrossRef]
  20. Ma, F.; Gao, J.; Fu, F.W. Constacyclic codes over the ring F q + v F q + v 2 F q and their applications of constructing new non-binary quantum codes. Quantum Inf. Process. 2018, 17, 1–19. [Google Scholar] [CrossRef]
  21. Shi, M.; Yao, T.; Alahmadi, A.; Solé, P. Skew Cyclic Codes over F q + v F q + v 2 F q . Ieice Trans. Fundam. Electron. Commun. Comput. Sci. 2015, 98, 1845–1848. [Google Scholar]
  22. Grassl, M. Bounds on the Minimum Distance of Linear Codes and Quantum Codes. Available online: http://www.codetables.de (accessed on 2 October 2023).
  23. Biswas, S.; Bhaintwal, M. A new construction of quantum codes from quasi-cyclic codes over finite fields. Indian J. Pure Appl. Math. 2023, 54, 375–388. [Google Scholar] [CrossRef]
  24. Ashraf, M.; Khan, N.; Mohammad, G. Quantum codes from cyclic codes over the mixed alphabet structure. Quantum Inf. Process. 2022, 21, 180. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Deng, T.; Yang, J. Some Results for Double Cyclic Codes over Fq+vFq+v2Fq. Entropy 2024, 26, 803. https://doi.org/10.3390/e26090803

AMA Style

Deng T, Yang J. Some Results for Double Cyclic Codes over Fq+vFq+v2Fq. Entropy. 2024; 26(9):803. https://doi.org/10.3390/e26090803

Chicago/Turabian Style

Deng, Tenghui, and Jing Yang. 2024. "Some Results for Double Cyclic Codes over Fq+vFq+v2Fq" Entropy 26, no. 9: 803. https://doi.org/10.3390/e26090803

APA Style

Deng, T., & Yang, J. (2024). Some Results for Double Cyclic Codes over Fq+vFq+v2Fq. Entropy, 26(9), 803. https://doi.org/10.3390/e26090803

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop