Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

On the structure of cyclic codes over 픽qRS and applications in quantum and LCD codes constructions

IEEE Access
...Read more
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2017.DOI On the structure of cyclic codes over F q RS and applications in quantum and LCD codes constructions HAI Q. DINH 1,2 , TUSHAR BAG 3 , ASHISH KUMAR UPADHYAY 4 , RAMAKRISHNA BANDI 5 , WARATTAYA CHINNAKUM 6 1 Division of Computational Mathematics and Engineering, Institute for Computational Science, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam. (e-mail: dinhquanghai@tdtu.edu.vn) 2 Faculty of Mathematics and Statistics, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam. (e-mail: dinhquanghai@tdtu.edu.vn) 3 Department of Mathematics, Indian Institute of Technology Patna, Patna 801103, India. (e-mail: tushar.pma16@iitp.ac.in) 4 Department of Mathematics, Indian Institute of Technology Patna, Patna 801103, India. (e-mail: upadhyay@iitp.ac.in) 5 Department of Mathematics, International Institute of Information Technology Naya Raipur, Atal Nagar 493661, India. (e-mail: ramakrishna@iiitnr.edu.in ) 6 Centre of Excellence in Econometrics, Chiang Mai University, Thailand. (e-mail: warattaya_chin@hotmail.co.th) Corresponding author: Hai Q. Dinh (e-mail: dinhquanghai@tdtu.edu.vn). ABSTRACT Let p be an odd prime, q = p m , R = F q + uF q with u 2 =1, and S = F q + uF q + vF q + uvF q with u 2 =1,v 2 =1,uv = vu. In this paper, F q RS-cyclic codes over F q RS are studied. As an application, we present a construction of quantum error-correcting codes (QECCs) from the F q RS-cyclic codes over F q RS, which provides new QECCs. We also consider linear complementary dual (LCD) codes from the F q RS-cyclic codes over F q RS. Among others, we construct a Gray map over F q RS and discuss the Gray images of F q RS-cyclic codes over F q . INDEX TERMS Cyclic codes, Mixed alphabet codes, QECCs, LCD codes. I. INTRODUCTION The family of cyclic codes is one of the most important families of codes which was introduced by Prange [41], [47] in 1954. Due to their rich algebraic structure and ease in implementation, these codes are widely used. The study of cyclic codes over finite rings has seen rapid growth after the work of Hammons et al. [27]. The properties of cyclic codes and their constructions over various finite rings are well explored in the literature. Since the last two decades, researchers have started study- ing codes over mixed alphabets. The study of linear codes over mixed alphabets was initiated by Brouwer et al. [17] in 1998. In [17], the authors studied mixed alphabet codes as Z 2 -submodule over Z r 2 Z s 3 . However, thereafter not much work has been done on mixed alphabet codes. Recently, codes over mixed alphabets have caught attention of the researchers. In 2010, Borges et al. [15] studied Z 2 Z 4 -additive codes and the corresponding Z 2 Z 4 -linear codes. In this work, they discussed the standard form for generator matrices, parity-check matrices of Z 2 Z 4 -additive codes and estab- lished the relation between them. They also talked about the automorphism groups of these codes. In 2013, Aydogdu et al. [10] studied the structure of Z 2 Z 2 s -additive codes, which generalize Z 2 Z 4 -additive codes. In that paper, the authors presented some fundamental parameters, standard form of generator and parity-check matrices of Z 2 Z 4 -additive codes. Furthermore, they also provided two bounds on the minimum distance of Z 2 Z 4 -additive codes. In a similar line, Aydogdu et al. [8] generalized these results of [10], [15] over Z p r Z p s . In 2014, Abualrub et al. [1] studied Z 2 Z 4 -additive cyclic codes. They showed that dual of a Z 2 Z 4 -cyclic code is also a Z 2 Z 4 -cyclic code, and studied infinite family of MDS codes. Then Borges et al. [16] obtained some important properties of Z 2 Z 4 -additive cyclic codes, and introduced generator polynomials of Z 2 Z 4 -additive cyclic and dual Z 2 Z 4 -additive cyclic codes. They also presented the parameters of Z 2 Z 4 - additive cyclic codes in terms of the degrees of the generator polynomials of these codes. Then in [5], Aydogdu et al. studied MacWilliams identity over Z 2 Z 2 [u]-additive codes, and constructed some optimal binary codes from this study. In [44], Srinivasulu et al. stud- ied Z 2 (Z 2 + uZ 2 )-additive cyclic codes and presented their generators and minimal spanning sets. They also determined the generators of duals Z 2 (Z 2 + uZ 2 )-additive cyclic codes for odd code-lengths. After that, Aydogdu et al. [6] studied Z 2 Z 2 [u]-cyclic and constacyclic codes. They presented the VOLUME 4, 2016 1
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS generator polynomials, minimal spanning sets, their sizes and binary images of Z 2 Z 2 [u]-cyclic and constacyclic codes under a Gray map. Recently, there are several papers on mixed alphabets such as Z 2 Z 2 [u 3 ] [9]; Z 2 Z 2 [u] [32]. Using these concepts of mixed alphabet codes, Borges et al. [14] studied double cyclic codes over Z 2 . Then Gao et al. [21] generalized that to consider double cyclic codes over Z 4 . After that, extending this double cyclic code structure, Mostafanasab [40] introduced the triple cyclic codes over Z 2 . Recently, Wu et al. [48] and Aydogdu et al. [7] independently studied Z 2 Z 2 Z 4 -additive cyclic codes and Z 2 Z 4 Z 8 -cyclic codes, respectively. In all of the aforementioned works, researchers mainly focused on exploring the structural properties of mixed alpha- bet codes such as generator matrices, parity check matrices, generating polynomials, minimal generating sets, generating polynomials for dual codes etc. There are hardly any papers on the applications of mixed alphabets codes. In this work, our main goal is to study mixed alphabet F q RS-cyclic codes as well as finding the tools to apply them in some of the recent topics of research like construction of quantum error- correcting codes (QECC) and linear complementary dual (LCD) codes. To do that, in the first part of our article, we study the properties of F q RS-cyclic codes, and in the later part (Sections 6 and 7), we discuss the construction of QECCs and LCD codes from F q RS-cyclic codes. In this article, we first study linear codes and then cyclic code over F q RS, where R = F q + uF q ,u 2 = 1 and S = F q + uF q + vF q + uvF q ,u 2 =1,v 2 =1,uv = vu and q = p m for odd prime p and positive integer m. As an application of this work, using the structure of cyclic code over F q RS, we construct QECCs and also LCD codes over F q . The paper is organized as follows: In Section 2, we describe the basic terminology to understand cyclic codes over F q RS and their properties. In Section 3, a construction of linear codes over R and S have been discussed. In Section 4, we define a Gray map, through which we discuss some properties of codes over F q RS. In Section 5, cyclic codes over R,S and F q RS are studied. As an application of this study, in Section 6 and Section 7, we construct QECCs and LCD codes, respectively, with worked out examples. All the computations are done using Magma Computing Software. II. PRELIMINARIES Let F q denote the finite field of characteristic p with q elements, where q = p m for odd prime p and positive integer m. The set F n q of all ordered n-tuples over F q forms a vector space with the usual component-wise addition and scalar multiplication of vectors. A non-empty subset C of F n q is called a code of length n over F q , and it is called a linear code if C is a subspace of F n q . An element of C is called a codeword. Throughout this article we use the word code to refer a linear code. By w H (C ), we denote the Hamming weight of a code C , which is defined as the smallest Hamming weight of all of its non-zero codewords. Let x =(x 0 ,x 1 ,...,x n1 ), y =(y 0 ,y 1 ,...,y n1 ) F n q , then the Hamming distance between x and y is defined as d H (x, y)= |{i | x i = y i }|, i.e., d H (x, y)= w H (x y). The Hamming distance of a code C is defined as d H (C )= min{d H (x, y)| x, y C, x = y}. The Euclidean inner product of x and y in F n q is defined as x · y = x 0 y 0 + x 1 y 1 + ··· + x n1 y n1 . The dual code C of C is defined as C = {x F n q | x · y =0, y C }. A code C of length n over F q is called a cyclic code if (c 0 ,c 1 ,...,c n1 ) C implies (c n1 ,c 0 ,...,c n2 ) C . In polynomial representation, each codeword c = (c 0 ,c 1 ,...,c n1 ) C is identified with a polynomial c(x)= c 0 + c 1 x + ··· + c n1 x n1 Fq [x] x n 1 . By this identification, it can be easily shown that a linear code C of length n over F q is a cyclic code if and only if it is an ideal of the ring Fq [x] x n 1 . We can extend these concepts to linear code, dual code, cyclic code over finite commutative rings depending upon the structure of the rings. Let R be any finite commutative ring. Then we refer a nonempty subset C as a linear code of length n over R if it forms an R-submodule of R n . Continuing our discussion we extend previous discussion to codes over product of finite commutative rings. From now onward, we denote R = F q + uF q , with u 2 =1 and S = F q + uF q + vF q + uvF q , with u 2 =1,v 2 =1,uv = vu, where q = p m for odd prime p and positive integer m. Let s = a + ub + vc + uvd be an element of S. Then we define two maps η and τ as follows: η : S −→ F q such that η(s)= a, and τ : S −→ R such that τ (s)= a + ub. It is clear that the maps η and τ are ring homomorphisms. Now for any s S and (x,y,z) F q RS we define the following S-scalar multiplication on F q RS as : S × F q RS −→ F q RS such that s (x,y,z)=(η(s)x,τ (s)y,sz). This is a well-defined multiplication. It can be extended component-wise over F α q × R β × S γ as follows: : S × (F α q × R β × S γ ) −→ F α q × R β × S γ where s t =(η(s)x 0 (s)x 1 ,...,η(s)x α1 (s)y 0 (s)y 1 , ...,τ (s)y β1 ,sz 0 ,sz 1 ,...,sz γ1 ), where s S and t =(x 0 ,x 1 ,...,x α1 ,y 0 ,y 1 ,...,y β1 ,z 0 , z 1 ,...,z γ1 ) F α q × R β × S γ . By this multiplication, F α q × R β × S γ forms an S-module. 2 VOLUME 4, 2016
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000. Digital Object Identifier 10.1109/ACCESS.2017.DOI On the structure of cyclic codes over Fq RS and applications in quantum and LCD codes constructions HAI Q. DINH1,2 , TUSHAR BAG3 , ASHISH KUMAR UPADHYAY4 , RAMAKRISHNA BANDI5 , WARATTAYA CHINNAKUM6 1 Division of Computational Mathematics and Engineering, Institute for Computational Science, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam. (e-mail: dinhquanghai@tdtu.edu.vn) 2 Faculty of Mathematics and Statistics, Ton Duc Thang University, Ho Chi Minh City 700000, Vietnam. (e-mail: dinhquanghai@tdtu.edu.vn) 3 Department of Mathematics, Indian Institute of Technology Patna, Patna 801103, India. (e-mail: tushar.pma16@iitp.ac.in) 4 Department of Mathematics, Indian Institute of Technology Patna, Patna 801103, India. (e-mail: upadhyay@iitp.ac.in) 5 Department of Mathematics, International Institute of Information Technology Naya Raipur, Atal Nagar 493661, India. (e-mail: ramakrishna@iiitnr.edu.in ) 6 Centre of Excellence in Econometrics, Chiang Mai University, Thailand. (e-mail: warattaya_chin@hotmail.co.th) Corresponding author: Hai Q. Dinh (e-mail: dinhquanghai@tdtu.edu.vn). ABSTRACT Let p be an odd prime, q = pm , R = Fq +uFq with u2 = 1, and S = Fq +uFq +vFq +uvFq with u2 = 1, v 2 = 1, uv = vu. In this paper, Fq RS-cyclic codes over Fq RS are studied. As an application, we present a construction of quantum error-correcting codes (QECCs) from the Fq RS-cyclic codes over Fq RS, which provides new QECCs. We also consider linear complementary dual (LCD) codes from the Fq RS-cyclic codes over Fq RS. Among others, we construct a Gray map over Fq RS and discuss the Gray images of Fq RS-cyclic codes over Fq . INDEX TERMS Cyclic codes, Mixed alphabet codes, QECCs, LCD codes. I. INTRODUCTION The family of cyclic codes is one of the most important families of codes which was introduced by Prange [41], [47] in 1954. Due to their rich algebraic structure and ease in implementation, these codes are widely used. The study of cyclic codes over finite rings has seen rapid growth after the work of Hammons et al. [27]. The properties of cyclic codes and their constructions over various finite rings are well explored in the literature. Since the last two decades, researchers have started studying codes over mixed alphabets. The study of linear codes over mixed alphabets was initiated by Brouwer et al. [17] in 1998. In [17], the authors studied mixed alphabet codes as Z2 -submodule over Zr2 Zs3 . However, thereafter not much work has been done on mixed alphabet codes. Recently, codes over mixed alphabets have caught attention of the researchers. In 2010, Borges et al. [15] studied Z2 Z4 -additive codes and the corresponding Z2 Z4 -linear codes. In this work, they discussed the standard form for generator matrices, parity-check matrices of Z2 Z4 -additive codes and established the relation between them. They also talked about the automorphism groups of these codes. In 2013, Aydogdu et al. [10] studied the structure of Z2 Z2s -additive codes, which generalize Z2 Z4 -additive codes. In that paper, the authors presented some fundamental parameters, standard form of generator and parity-check matrices of Z2 Z4 -additive codes. Furthermore, they also provided two bounds on the minimum distance of Z2 Z4 -additive codes. In a similar line, Aydogdu et al. [8] generalized these results of [10], [15] over Zpr Zps . In 2014, Abualrub et al. [1] studied Z2 Z4 -additive cyclic codes. They showed that dual of a Z2 Z4 -cyclic code is also a Z2 Z4 -cyclic code, and studied infinite family of MDS codes. Then Borges et al. [16] obtained some important properties of Z2 Z4 -additive cyclic codes, and introduced generator polynomials of Z2 Z4 -additive cyclic and dual Z2 Z4 -additive cyclic codes. They also presented the parameters of Z2 Z4 additive cyclic codes in terms of the degrees of the generator polynomials of these codes. Then in [5], Aydogdu et al. studied MacWilliams identity over Z2 Z2 [u]-additive codes, and constructed some optimal binary codes from this study. In [44], Srinivasulu et al. studied Z2 (Z2 + uZ2 )-additive cyclic codes and presented their generators and minimal spanning sets. They also determined the generators of duals Z2 (Z2 + uZ2 )-additive cyclic codes for odd code-lengths. After that, Aydogdu et al. [6] studied Z2 Z2 [u]-cyclic and constacyclic codes. They presented the 1 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS generator polynomials, minimal spanning sets, their sizes and binary images of Z2 Z2 [u]-cyclic and constacyclic codes under a Gray map. Recently, there are several papers on mixed alphabets such as Z2 Z2 [u3 ] [9]; Z2 Z2 [u] [32]. Using these concepts of mixed alphabet codes, Borges et al. [14] studied double cyclic codes over Z2 . Then Gao et al. [21] generalized that to consider double cyclic codes over Z4 . After that, extending this double cyclic code structure, Mostafanasab [40] introduced the triple cyclic codes over Z2 . Recently, Wu et al. [48] and Aydogdu et al. [7] independently studied Z2 Z2 Z4 -additive cyclic codes and Z2 Z4 Z8 -cyclic codes, respectively. In all of the aforementioned works, researchers mainly focused on exploring the structural properties of mixed alphabet codes such as generator matrices, parity check matrices, generating polynomials, minimal generating sets, generating polynomials for dual codes etc. There are hardly any papers on the applications of mixed alphabets codes. In this work, our main goal is to study mixed alphabet Fq RS-cyclic codes as well as finding the tools to apply them in some of the recent topics of research like construction of quantum errorcorrecting codes (QECC) and linear complementary dual (LCD) codes. To do that, in the first part of our article, we study the properties of Fq RS-cyclic codes, and in the later part (Sections 6 and 7), we discuss the construction of QECCs and LCD codes from Fq RS-cyclic codes. In this article, we first study linear codes and then cyclic code over Fq RS, where R = Fq + uFq , u2 = 1 and S = Fq + uFq + vFq + uvFq , u2 = 1, v 2 = 1, uv = vu and q = pm for odd prime p and positive integer m. As an application of this work, using the structure of cyclic code over Fq RS, we construct QECCs and also LCD codes over Fq . The paper is organized as follows: In Section 2, we describe the basic terminology to understand cyclic codes over Fq RS and their properties. In Section 3, a construction of linear codes over R and S have been discussed. In Section 4, we define a Gray map, through which we discuss some properties of codes over Fq RS. In Section 5, cyclic codes over R, S and Fq RS are studied. As an application of this study, in Section 6 and Section 7, we construct QECCs and LCD codes, respectively, with worked out examples. All the computations are done using Magma Computing Software. II. PRELIMINARIES Let Fq denote the finite field of characteristic p with q elements, where q = pm for odd prime p and positive integer m. The set Fnq of all ordered n-tuples over Fq forms a vector space with the usual component-wise addition and scalar multiplication of vectors. A non-empty subset C of Fnq is called a code of length n over Fq , and it is called a linear code if C is a subspace of Fnq . An element of C is called a codeword. Throughout this article we use the word code to refer a linear code. By wH (C), we denote the Hamming weight of a code C, which is defined as the smallest Hamming weight of all of its non-zero codewords. Let x = (x0 , x1 , . . . , xn−1 ), y = (y0 , y1 , . . . , yn−1 ) ∈ Fnq , then the Hamming distance between x and y is defined as dH (x, y) = |{i | xi 6= yi }|, i.e., dH (x, y) = wH (x − y). The Hamming distance of a code C is defined as dH (C) = min{dH (x, y)| x, y ∈ C, x 6= y}. The Euclidean inner product of x and y in Fnq is defined as x · y = x0 y0 + x1 y1 + · · · + xn−1 yn−1 . The dual code C ⊥ of C is defined as C ⊥ = {x ∈ Fnq | x · y = 0, ∀ y ∈ C}. A code C of length n over Fq is called a cyclic code if (c0 , c1 , . . . , cn−1 ) ∈ C implies (cn−1 , c0 , . . . , cn−2 ) ∈ C. In polynomial representation, each codeword c = (c0 , c1 , . . . , cn−1 ) ∈ C is identified with a polynomial F [x] c(x) = c0 + c1 x + · · · + cn−1 xn−1 ∈ hxnq −1i . By this identification, it can be easily shown that a linear code C of length n over Fq is a cyclic code if and only if it is an ideal F [x] of the ring hxnq −1i . We can extend these concepts to linear code, dual code, cyclic code over finite commutative rings depending upon the structure of the rings. Let R be any finite commutative ring. Then we refer a nonempty subset C as a linear code of length n over R if it forms an R-submodule of Rn . Continuing our discussion we extend previous discussion to codes over product of finite commutative rings. From now onward, we denote R = Fq + uFq , with u2 = 1 and S = Fq + uFq + vFq + uvFq , with u2 = 1, v 2 = 1, uv = vu, where q = pm for odd prime p and positive integer m. Let s = a + ub + vc + uvd be an element of S. Then we define two maps η and τ as follows: η : S −→ Fq such that η(s) = a, and τ : S −→ R such that τ (s) = a + ub. It is clear that the maps η and τ are ring homomorphisms. Now for any s ∈ S and (x, y, z) ∈ Fq RS we define the following S-scalar multiplication on Fq RS as • : S × Fq RS −→ Fq RS such that s • (x, y, z) = (η(s)x, τ (s)y, sz). This is a well-defined multiplication. It can be extended β γ component-wise over Fα q × R × S as follows: β γ α β γ • : S × (Fα q × R × S ) −→ Fq × R × S where s • t = (η(s)x0 , η(s)x1 , . . . , η(s)xα−1 , τ (s)y0 , τ (s)y1 , . . . , τ (s)yβ−1 , sz0 , sz1 , . . . , szγ−1 ), where s ∈ S and t = (x0 , x1 , . . . , xα−1 , y0 , y1 , . . . , yβ−1 , z0 , β γ z1 , . . . , zγ−1 ) ∈ Fα q × R × S . By this multiplication, α β γ Fq × R × S forms an S-module. 2 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS β γ Definition 2.1. A non-empty subset C of Fα q × R × S is said to be a Fq RS-linear code of length (α, β, γ) if C is an β γ S-submodule of Fα q ×R ×S . Let t = (x0 , x1 , . . . , xα−1 , y0 , y1 , . . . , yβ−1 , z0 , z1 , . . . , ′ , z0′ , z1′ , zγ−1 ) and t′ = (x′0 , x′1 , . . . , x′α−1 , y0′ , y1′ , . . . , yβ−1 ′ β γ . . . , zγ−1 ) ∈ Fα q × R × S . Now we define inner product as, γ−1 β−1 α−1 X X X zi zi′ . yi yi′ + xi x′i + v t · t′ = uv j=0 i=0 k=0 Let C be a Fq RS-linear code of length (α, β, γ). Then the dual code of C is defined as β γ ′ C ⊥ = {t′ ∈ Fα q × R × S | t · t = 0, ∀t ∈ C}. β γ Definition 2.2. An S-submodule C of Fα q × R × S is said to be a Fq RS-cyclic code of length (α, β, γ) if for any c = (x0 , x1 , . . . , xα−1 , y0 , y1 , . . . , yβ−1 , z0 , z1 , . . . , zγ−1 ) ∈ C its cyclic shift ℘(c) := (xα−1 , x0 , x1 , . . . , xα−2 , yβ−1 , y0 , y1 , . . . , yβ−2 , zγ−1 , z0 , z1 , . . . , zγ−2 ) ∈ C. Proposition 2.3. Let C be a Fq RS-cyclic code of length (α, β, γ). Then C ⊥ is also a Fq RS-cyclic code of length (α, β, γ). Proof. Let C be a Fq RS-cyclic code of length (α, β, γ) and ′ ′ t′ = (x′0 , x′1 , . . . , x′α−1 , y0′ , y1′ , . . . , yβ−1 , z0′ , z1′ , . . . , zγ−1 )∈ ⊥ C . Take lcm(α, β, γ) = l and t = (x0 , x1 , . . . , xα−1 , y0 , y1 , . . . , yβ−1 , z0 , z1 , . . . , zγ−1 ) ∈ C. We have to show, ℘(t′ ) = ′ ′ ′ , y0′ , y1′ , . . . , yβ−2 , zγ−1 , z0′ , z1′ , (x′α−1 , x′0 , x′1 , . . . , x′α−2 , yβ−1 ′ ⊥ . . . , zγ−2 ) ∈ C . Now by the above defined inner product we get, t · ℘(t′ ) = uv{x0 x′α−1 + x1 x′0 + · · · + xα−1 x′α−2 } ′ ′ + y1 y0′ + · · · + yβ−1 yβ−2 } +v{y0 yβ−1 ′ ′ ′ +{z0 zγ−1 + z1 z0 + · · · + zγ−1 zγ−2 }. As C is a Fq RS-cyclic code and lcm(α, β, γ) = l, ℘l−1 (t) ∈ C, where ℘l−1 (t) = (x1 , x2 , . . . , xα−1 , x0 , y1 , y2 , . . . , yβ−1 , y0 , z1 , z2 . . . , zγ−1 , z0 ). Taking the inner product of ℘l−1 (t) and t′ , we get ℘l−1 (t) · t′ = 0, where ℘ l−1 (t) · t ′ = uv{x1 x′0 + x2 x′1 + · · · + x0 x′α−1 } ′ +v{y1 y0′ + y2 y1′ + · · · + y0 yβ−1 } ′ +{z1 z0′ + z2 z1′ + · · · + z0 zγ−1 }. Comparing the coefficients from both sides we get, x1 x′0 + x2 x′1 + · · · + xα−1 x′α−2 + x0 x′α−1 = 0, ′ ′ y1 y0′ + y2 y1′ + · · · + yβ−1 yβ−2 + y0 yβ−1 = 0, ′ ′ z1 z0′ + z2 z1′ + · · · + zγ−1 zγ−2 + z0 zγ−1 = 0. Therefore, t · ℘(t′ ) = 0. Hence ℘(t′ ) ∈ C ⊥ , implying C ⊥ is a Fq RS-cyclic code of length (α, β, γ).  Fq [x] hxα −1i R[x] hxβ −1i S[x] hxγ −1i Let Sα,β,γ = × × and f = (a0 , a1 , . . . , aα−1 , b0 , b1 , . . . , bβ−1 , c0 , c1 , . . . , cγ−1 ) ∈ β γ Fα q × R × S . Then f can be identified by an element in Sα,β,γ as f (x) = = (a0 + a1 x + · · · + aα−1 xα−1 , b0 + b1 x + · · · + bβ−1 xβ−1 , c0 + c1 x + · · · + cγ−1 xγ−1 ) (a(x), b(x), c(x)), β which gives the one-to-one identification between Fα q ×R × γ S and Sα,β,γ . Let s(x) = s0 + s1 x + · · · + sδ xδ ∈ S[x] and (a(x), b(x), c(x)) ∈ Sα,β,γ . Then the above defined Sscalar multiplication induces the multiplication ⋆ in Sα,β,γ as follows, s(x) ⋆ (a(x), b(x), c(x)) = (η(s(x))a(x), τ (s(x))b(x), s(x)c(x)), where η(s(x)) = η(s0 ) + η(s1 )x + · · · + η(sδ )xδ and τ (s(x)) = τ (s0 ) + τ (s1 )x + · · · + τ (sδ )xδ . It is easy to show that, with respect to the multiplication ⋆, Sα,β,γ forms an S[x]-module. Proposition 2.4. A code C is a Fq RS-cyclic code of length (α, β, γ) if and only if C is an S[x]-submodule of Sα,β,γ . Proof. Suppose C is a Fq RS-cyclic code of length (α, β, γ). Let f = (a0 , a1 , . . . , aα−1 , r0 , r1 , . . . , rβ−1 , s0 , . . . , sγ−1 ) ∈ C and the corresponding element of f be f (x) = (a(x), r(x), s(x)). Note that x ⋆ f (x) = (aα−1 + a0 x + · · · + aα−2 xα−1 , rβ−1 + r0 x + · · · + rβ−2 xβ−1 , sγ−1 + s0 x + · · · + sγ−2 xγ−1 ), corresponds to the cyclic shift (aα−1 , a0 , a1 , . . . , aα−2 , rβ−1 , r0 , r1 , . . . , rβ−2 , sγ−1 , s0 , s1 , . . . , sγ−2 ) of f , thus, x ⋆ f (x) ∈ C. Then by the linearity property of C, c(x)⋆f (x) ∈ C for any c(x) ∈ S[x]. Thus, C is an S[x]-submodule of Sα,β,γ . The other side is trivial by the definition.  III. DECOMPOSITION OF LINEAR CODES OVER R AND S. Recall that R = Fq + uFq , where u2 = 1 and S = Fq + uFq + vFq + uvFq , where u2 = 1, v 2 = 1, uv = vu. For a, b ∈ Fq , any r ∈ R is of the form r = a + ub = η1 â + η2 b̂, where â, b̂ ∈ Fq such that â = (a − b), b̂ = (a + b) and η1 = 1−u , 2 η2 = 1+u . 2 It is easy to check that ηi2 = ηi , ηi ηj = 0 and η1 +η2 = 1, for i, j = 1, 2; i 6= j. Therefore, R = η1 R ⊕ η2 R and any r ∈ R can be expressed as r = η1 r1 + η2 r2 , where r1 , r2 ∈ Fq . We define a Gray map ψR : R → F2q given as ψR (r) = (r1 , r2 ). This map can be extended Rβ → F2β component wise as (r0 , r1 , . . . , rβ−1 ) 7→ q 3 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS (r0,1 , r1,1 , . . . , rβ−1,1 , r0,2 , r1,2 , . . . , rβ−1,2 ), where r = (r0 , r1 , . . . , rβ−1 ) ∈ Rβ and ri = η1 ri,1 + η2 ri,2 for i = 0, 1, . . . , β − 1. Then for ri = η1 ri,1 + η2 ri,2 ∈ R, we define the Lee weight of ri as wL (ri ) = wH (ψR (ri )), where wH denotes the Hamming weight over Fq . The Lee distance between ri and ri′ ∈ R is defined as dL (ri , ri′ ) = wL (ri − ri′ ) = wH (ψR (ri − ri′ )). Then it is easy to show that, the Gray map ψR is a distance preserving Fq -linear map from Rβ (Lee distance) to F2β q (Hamming distance). Let Bβ be a linear code of length β over R. Then we define Bβ,1 = {r1 ∈ Fβq | η1 r1 + η2 r2 ∈ Bβ ; r2 ∈ Fβq }, Bβ,2 = {r2 ∈ Fβq | η1 r1 + η2 r2 ∈ Bβ ; r1 ∈ Fβq }. Therefore, Bβ,i are linear codes of length β over Fq for i = 1, 2. So a linear code Bβ of length β over R can be uniquely expressed as Bβ = η1 Bβ,1 ⊕ η2 Bβ,2 , then | Bβ |=| Bβ,1 || Bβ,2 |. By definition of the Gray map we have ψR (Bβ ) = Bβ,1 ⊗ Bβ,2 , then using the fact ψR is distance preserving, we get dL (Bβ ) = dH (ψR (Bβ )) = dH (Bβ,1 ⊗ Bβ,2 ) = min{dH (Bβ,i ) | i = 1, 2}. Similarly, for x, y, w, z ∈ Fq , any s = x+uy+vw+uvz ∈ S can be expressed as below s = x + uy + vw + uvz = ζ1 (x + y + w + z) + ζ2 (x + y − w − z) + ζ3 (x − y + w − z) + ζ4 (x − y − w + z) = ζ1 x̂ + ζ2 ŷ + ζ3 ŵ + ζ4 ẑ, where x̂, ŷ, ŵ, ŵ ∈ Fq such that x̂ = (x + y + w + z), ŷ = (x + y − w − z), ŵ = (x − y + w − z), ẑ = (x − y − w + z) and 1 1 ζ2 = (1 + u − v − uv), ζ1 = (1 + u + v + uv), 4 4 1 1 ζ3 = (1 − u + v − uv), ζ4 = (1 − u − v + uv). 4 4 P4 2 It is easy to see that ζi = ζi , ζi ζj = 0 and i=1 ζi = 1, where i, j = 1, 2, 3, 4; i 6= j. Therefore, S = ζ1 S ⊕ ζ2 S ⊕ ζ3 S ⊕ ζ4 S. Thus, any s ∈ S can be uniquely expressed as s = ζ1 s1 + ζ2 s2 + ζ3 s3 + ζ4 s4 , where s1 , s2 , s3 , s4 ∈ Fq . We define a Gray map over S as ψS : S → F4q such that ψS (s) = (s1 , s2 , s3 , s4 ). This map can be extended S γ → F4γ q component wise as Let Cγ be a linear code of length γ over S, then we define Cγ,1 = Cγ,2 = Cγ,3 = Cγ,4 = {s1 ∈ Fγq | ζ1 s1 + ζ2 s2 + ζ3 s3 + ζ4 s4 and s2 , s3 , s4 ∈ Fγq }, {s2 ∈ Fγq | ζ1 s1 + ζ2 s2 + ζ3 s3 + ζ4 s4 and s1 , s3 , s4 ∈ Fγq }, {s3 ∈ Fγq | ζ1 s1 + ζ2 s2 + ζ3 s3 + ζ4 s4 and s1 , s2 , s4 ∈ Fγq }, {s4 ∈ Fγq | ζ1 s1 + ζ2 s2 + ζ3 s3 + ζ4 s4 and s1 , s2 , s3 ∈ Fγq }. ∈ Cγ ∈ Cγ ∈ Cγ ∈ Cγ Arguing as above, any linear code Cγ of length γ over S can be written asQ Cγ = ζ1 Cγ,1 ⊕ ζ2 Cγ,2 ⊕ ζ3 Cγ,3 ⊕ ζ4 Cγ,4 4 then | Cγ |= j=1 | Cγ,j |. Similarly using the facts ψS is a distance preserving map and ψS (Cγ ) = ⊗4j=1 Cγ,j , we get dL (Cγ ) = dH (ψS (Cγ )) = dH (⊗4j=1 Cγ,j ) = min{dH (Cγ,j ) | j = 1, 2, 3, 4}. IV. GRAY MAP OVER Fq RS. Any arbitrary element of Fq RS can be written as (a, r, s) = (a, η1 r1 +η2 r2 , ζ1 s1 +ζ2 s2 +ζ3 s3 +ζ4 s4 ), where a ∈ Fq , r ∈ R and s ∈ S. Define a Gray map Ψ : Fq RS → F7q as follows: Ψ(a, r, s) = (a, r1 , r2 , s1 , s2 , s3 , s4 ). This is also a Fq -linear map and can be extended componentwise in the following way: β γ α+2β+4γ Ψ : Fα q R S −→ Fq defined by (a0 , a1 , . . . , aα−1 , r0 , r1 , . . . , rβ−1 , s0 , s1 , . . . , sγ−1 ) 7→ (a0 , a1 , . . . , aα−1 , r0,1 , r1,1 , . . . , rβ−1,1 , r0,2 , r1,2 , . . . , rβ−1,2 , s0,1 , s1,1 , . . . , sγ−1,1 , s02 , s1,2 , . . . , sγ−1,2 , s0,3 , s1,3 , . . . , sγ−1,3 , s0,4 , s1,4 , . . . , sγ−1,4 ), β where (a0 , a1 , . . . , aα−1 ) ∈ Fα q , (r0 , r1 , . . . , rβ−1 ) ∈ R γ and (s0 , s1 , . . . , sγ−1 ) ∈ S such that each ri = η1 ri,1 + η2 ri,2 ∈ R and sj = ζ1 sj,1 + ζ2 sj,2 + ζ3 sj,3 + ζ4 sj,4 ∈ S, for i = 0, 1, . . . , β − 1 and j = 0, 1, . . . , γ − 1. (s0 , s1 , . . . , sγ−1 ) 7→ (s0,1 , s1,1 , . . . , sγ−1,1 , s0,2 , s1,2 , . . . , sγ−1,2 , s0,3 , . . . , sγ−1,3 , s0,4 , s1,4 , . . . , sγ−1,4 ), β γ Similar to [48], for any element (a′ , r′ , s′ ) ∈ Fα q ×R ×S ′ ′ ′ ′ ′ ′ we define the Lee weight of (a , r , s ) as wL (a , r , s ) = wH (a′ ) + wL (r′ ) + wL (s′ ), where wH denote the Hamming weight and wL denote the Lee weight. The Lee distance β γ ′ ′′ between x′ , x′′ ∈ Fα q × R × S is defined as dL (x , x ) = ′ ′′ ′ ′′ wL (x − x ) = wH (Ψ(x − x )). where s = (s0 , s1 , . . . , sγ−1 ) ∈ S γ and sj = ζ1 sj,1 + ζ2 sj,2 + ζ3 sj,3 + ζ4 sj,4 for j = 0, 1, . . . , γ − 1. As above, for sj = ζ1 sj,1 + ζ2 sj,2 + ζ3 sj,3 + ζ4 sj,4 ∈ S, we define wL (sj ) = wH (ψS (sj )), and dL (sj , s′j ) = wL (sj − s′j ) = wH (ψS (sj − s′j )) for s′j ∈ S γ . Then we can easily show that the Gray map ψS is a distance preserving Fq -linear map from S γ (Lee distance) to F4γ q (Hamming distance). Proposition 4.1. Let Ψ be the Gray map defined above. Then, 1) Ψ is a Fq -linear distance preserving map from β γ α+2β+4γ Fα (Hamming disq R S (Lee distance) to Fq tance). 2) C is a Fq RS-linear code of length (α, β, γ) over Fq RS, then Ψ(C) is a [α + 2β + 4γ, k, dH ] linear code over Fq , where dL = dH . 4 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS Proof. (1.) Let x′ = (a′ , r′ , s′ ), x′′ = (a′′ , r′′ , s′′ ) ∈ β γ Fα q R S , where a′ = (a′0 , a′1 , . . . , a′α−1 ), a′′ = (a′′0 , a′′1 , . . . , a′′α−1 ) ∈ Fα q; r′ = η1 r′1 + η2 r′2 , r′′ = η1 r′′1 + η2 r′′2 ∈ Rβ , and s′ = ζ1 s′1 + ζ2 s′2 + ζ3 s′3 + ζ4 s′4 , s′′ = ζ1 s′′1 + ζ2 s′′2 + ζ3 s′′3 + ζ4 s′′4 ∈ S γ , such that for i = 1, 2 and j = 1, 2, 3, 4 = ′′ ′′ ′′ (ri,0 , ri,1 , . . . , ri,β−1 ) = Ψ℘(a0 , a1 , . . . , aα−1 , r0 , r1 , . . . , rβ−1 , s0 , s1 , . . . , sγ−1 ) = Ψ(aα−1 , a0 , a1 , . . . , aα−2 , rβ−1 , r0 , r1 , . . . , rβ−2 , sγ−1 , s0 , s1 , . . . , sγ−2 ) = (aα−1 , a0 , a1 , . . . , aα−2 , rβ−1,1 , r0,1 , r1,1 , . . . , rβ−2,1 , rβ−1,2 , r0,2 , r1,2 , . . . , rβ−2,2 , sγ−1,1 , s0,1 , s1,1 , . . . , sγ−2,1 , sγ−1,2 , s0,2 , s1,2 , . . . , sγ−2,2 , sγ−1,3 , s0,3 , s1,3 , . . . , sγ−2,3 , sγ−1,4 , s0,4 , s1,4 , . . . , sγ−2,4 ). On the other hand, χg Ψ(c) ′ ′ ′ r′i = (ri,0 , ri,1 , . . . , ri,β−1 ), r′′i and sj = ζ1 sj,1 + ζ2 sj,2 + ζ3 sj,3 + ζ4 sj,4 ∈ S for i = 0, 1, . . . , β − 1; j = 0, 1, . . . , γ − 1. Then Ψ℘(c) β ∈R , s′j = (s′j,0 , s′j,1 , . . . , s′j,γ−1 ), s′′j = (s′′j,0 , s′′j,1 , . . . , s′′j,γ−1 ) ∈ S γ . Then Ψ(x′ + x′′ ) = (a′ + a′′ , r′1 + r′′1 , r′2 + r′′2 , s′1 + s′′1 , · · · , s′4 + s′′4 ) = (a′ , r′1 , r′2 , s′1 , s′2 , s′3 , s′4 ) + (a′′ , r′′1 , r′′2 , s′′1 , s′′2 , s′′3 , s′′4 ) = Ψ(x′ ) + Ψ(x′′ ), and Ψ(cx′ ) = (ca′ , cr′1 , cr′2 , cs′1 , cs′2 , cs′3 , cs′4 ) = cΨ(x′ ), where c ∈ Fq . Therefore, Ψ is a Fq -linear map. For the other part, using the fact that Ψ is a Fq -linear map we get, dL (x′ , x′′ ) = wL (x′ − x′′ ) = wH (Ψ(x′ − x′′ )) = dH (Ψ(x′ ), Ψ(x′′ )). Hence, the result follows. (2.) It is not difficult to show upon noticing that Ψ is a Fq -linear distance preserving and bijective map.  such that d = Definition 4.2. Suppose d ∈ Fmn q (d1 , d2 , · · · , dn−1 , dn ), where di ∈ Fm q ; i = 1, 2, . . . , n. defined to Fm Let ρ be the cyclic shift from Fm q q by ρ(x0 , x1 , . . . , xm−1 ) = (xm−1 , x0 , . . . , xm−2 ). Define χ : Fmn −→ Fmn by, χ(d1 , d2 , . . . , dn ) = q q (ρ(d1 ), ρ(d2 ), · · · , ρ(dn )). Then a code C is called a quasicyclic code of index n if χ(C) = C. 1 2 n Suppose d′ ∈ Fm × Fm × · · · × Fm such that q q q ′ ′ ′ ′ ′ ′ i d = (d1 , d2 , · · · , dn−1 , dn ), where di ∈ Fm q ;i = mi mi 1, 2, . . . , n. Let ρ be the cyclic shift from Fq to Fq defined by ρ(x0 , x1 , . . . , xmi −1 ) = (xmi −1 , x0 , . . . , xmi −2 ). Define m2 mn m2 mn 1 1 −→ Fm χ g : Fm q × Fq × · · · × F q q × Fq × · · · × F q ′ ′ ′ ′ ′ ′ by, χg (d1 , d2 , · · · , dn ) = (ρ(d1 ), ρ(d2 ), · · · , ρ(dn )), then a code C is called a generalized quasi-cyclic code of index n if χg (C) = C. = χg Ψ(a0 , a1 , . . . , aα−1 , r0 , r1 , . . . , rβ−1 , s0 , . . . , sγ−1 ) = χg (a0 , a1 , . . . , aα−1 , r0,1 , . . . , rβ−1,1 , r0,2 , r1,2 , . . . , rβ−1,2 , s0,1 , s1,1 , . . . , sγ−1,1 , s0,2 , . . . , sγ−1,2 , s0,3 , . . . , sγ−1,3 , s0,4 , s1,4 , . . . , sγ−1,4 ) = (aα−1 , a0 , a1 , . . . , aα−2 , rβ−1,1 , r0,1 , r1,1 , . . . , rβ−2,1 , rβ−1,2 , r0,2 , r1,2 , . . . , rβ−2,2 , sγ−1,1 , s0,1 , s1,1 , . . . , sγ−2,1 , sγ−1,2 , s0,2 , s1,2 , . . . , sγ−2,2 , sγ−1,3 , s0,3 , . . . , sγ−2,3 , sγ−1,4 , s0,4 , s1,4 , . . . , sγ−2,4 ). Therefore, Ψ℘=χg Ψ.  Using Proposition 4.3, we have the following result. Theorem 4.4. Let C be a linear code of length (α, β, γ) over Fq RS. Then the Ψ-Gray image of Fq RS-cyclic code of length (α, β, γ) is a generalized quasi-cyclic code of index 7 over Fq . In particular, when α = β = γ, the Ψ-Gray image of a Fq RS-cyclic code of length (α, β, γ) is a quasi-cyclic code of index 7 over Fq . V. CYCLIC CODES OVER Fq , R, S AND Fq RS In this section, we study cyclic codes of length α, β and γ over the rings Fq , R and S, respectively. Then using the structure of the cyclic codes over Fq , R and S, we discuss the cyclic codes of length (α, β, γ) over Fq RS. A. CYCLIC CODES OVER Fq Theorem 5.1. [28, Theorem 12.9] Let A be a cyclic code of length α over Fq . Then there exists a unique monic polynomial a(x) ∈ Fq [x]/hxα − 1i such that Aα = ha(x)i and a(x) | (xα − 1). Moreover, the dimension of Aα is r = α − deg(a) with {a(x), xa(x), · · · , xr−1 a(x)} as a basis. B. CYCLIC CODES OVER R AND S Proposition 4.3. Let χg and Ψ be the maps defined above, and ℘ be the cyclic shift over Fq RS. Then Ψ℘=χg Ψ. Theorem 5.2. Let Bβ = η1 Bβ,1 ⊕ η2 Bβ,2 be a linear code of length β over R. Then Bβ is a cyclic code of length β over R if and only if Bβ,i are cyclic codes of length β over Fq , for i = 1, 2. Proof. Let c = (a0 , a1 , . . . , aα−1 , r0 , r1 , . . . , rβ−1 , s0 , s1 , . . . , β γ sγ−1 ) ∈ Fα q R S , where each ri = η1 ri,1 + η2 ri,2 ∈ R Proof. Let (x0 , x1 , . . . , xβ−1 ) ∈ Bβ,1 and (y0 , y1 , . . . , yβ−1 ) ∈ Bβ,2 . Then z = (z0 , z1 , . . . , zβ−1 ) ∈ Bβ , where zi = Based on Definition 4.2, we have the following result. 5 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS η1 xi + η2 yi , and xi , yi ∈ Fq for i = 0, 1, . . . , β − 1. Suppose Bβ is a cyclic code of length β over R, then ρ(z) ∈ Bβ , where ρ(z) = (zβ−1 , z0 , . . . , zβ−2 ) = (η1 xβ−1 + η2 yβ−1 , η1 x0 + η2 y0 , . . . , η1 xβ−2 + η2 yβ−2 ) = η1 (xβ−1 , x0 , . . . , xβ−2 ) + η2 (yβ−1 , y0 , . . . , yβ−2 ). Therefore, by the direct sum decomposition of the linear code Bβ we get (xβ−1 , x0 , . . . , xβ−2 ) ∈ Bβ,1 and (yβ−1 , y0 , . . . , yβ−2 ) ∈ Bβ,2 . Hence, Bβ,i are cyclic codes of length β over Fq , for i = 1, 2. ′ ) ∈ Bβ such that Conversely, let z′ = (z0′ , z1′ , . . . , zβ−1 each zi′ = η1 x′i + η2 yi′ , where x′i , yi′ ∈ Fq for i = 0, 1, . . . , β − 1. Then x′ = (x′0 , x′1 , . . . , x′β−1 ) ∈ Bβ,1 ′ and y′ = (y0′ , y1′ , . . . , yβ−1 ) ∈ Bβ,2 . Suppose that Bβ,i are cyclic codes of length β over Fq , for i = 1, 2. Then ρ(x′ ) ∈ B1 and ρ(y′ ) ∈ B2 . Note that η1 ρ(x′ ) + η2 ρ(y′ ) ′ ′ = η1 (x′β−1 , x′0 , . . . , x′β−2 ) + η2 (yβ−1 , y0′ , . . . , yβ−2 ) ′ ′ ) = (η1 x′β−1 + η2 yβ−1 , η1 x′0 + η2 y0′ , . . . , η1 x′β−2 + η2 yβ−2 ′ ′ = (zβ−1 , z0′ , . . . , zβ−2 ) = ρ(z′ ) ∈ Bβ . Therefore, Bβ is a cyclic code of length β over R.  Using the direct sum decomposition of dual linear code Bβ⊥ over R, and arguing as above we can show the direct sum decomposition of the dual cyclic code over R as follows. Corollary 5.3. Let Bβ be a cyclic code of length β over R. ⊥ ⊥ is also a cyclic code of Then its dual Bβ⊥ = η1 Bβ,1 ⊕ η2 Bβ,2 ⊥ length β over R if and only if Bβ,i are cyclic codes of length β over Fq , for i = 1, 2. In Theorem 5.2, we have presented the direct sum decomposition of a cyclic code Bβ over R. Here we give the generator polynomial for such codes. Theorem 5.4. Let Bβ = η1 Bβ,1 ⊕ η2 Bβ,2 be a cyclic code of length β over R and ri (x) be the generator monic polynomial of the cyclic code Bβ,i , for i = 1, 2. Then P2 1) Bβ = hη1 r1 (x), η2 r2 (x)i and |Bβ | = q 2β− i=1 deg(ri ) , 2) Bβ = hr(x)i, where r(x) = η1 r1 (x) + η2 r2 (x) such that r(x) | (xβ − 1). Proof. (1.) Suppose Bβ is a cyclic code of length β over R. Then by Theorem 5.2, we get that Bβ,i are cyclic codes of F [x] length β over Fq , implying Bβ,i = hri (x)i ⊆ hxβq −1i for i = 1, 2. As Bβ = η1 Bβ,1 ⊕ η2 Bβ,2 , we can write Bβ = {r(x) | r(x) = η1 r1 (x) + η2 r2 (x); ri (x) ∈ Bβ,i , i = 1, 2}, which implies Bβ ⊆ hη1 r1 (x), η2 r2 (x)i ⊆ hxR[x] β −1i . On the other hand, let η1 r1 (x)h1 (x) + η2 r2 (x)h2 (x) ∈ hη1 r1 (x), η2 r2 (x)i, where h1 (x), h2 (x) ∈ hxR[x] β −1i . Suppose that the coefficients of hi (x), i = 1, 2 are hij = gj + ugj′ ∈ R. Using the decomposition of elements in R, we can write hij = η1 ĝj + η2 gˆj ′ , where ĝj , gˆj ′ ∈ Fq . Thus, we get η1 h1 (x) = η1 g1 (x) and η2 h2 (x) = η2 g2 (x), where g1 (x) = ĝ0 +ĝ1 x+· · ·+ĝβ−1 xβ−1 and g2 (x) = gˆ0 ′ + gˆ1 ′ x+ F [x] · · ·+gβ−1 ˆ ′ xβ−1 ∈ hxβq −1i . Therefore, hη1 r1 (x), η2 r2 (x)i ⊆ Bβ . Hence, Bβ = hη1 r1 (x), η2 r2 (x)i. For the other part, note that |Bβ | = |Bβ,1 ||Bβ,2 |. Therefore, |Bβ | = q β−deg(r1 ) × q β−deg(r2 ) = 2β−(deg(r1 )+deg(r2 )) q . (2.) Let ri (x) be the generator monic polynomial of the cyclic code Bβ,i , for i = 1, 2. By the first part, Bβ = hη1 r1 (x), η2 r2 (x)i. Suppose r(x) = η1 r1 (x) + η2 r2 (x) such that B̂ = hr(x)i. Then r(x) ∈ Bβ , implying B̂ ⊆ Bβ . Also as ηi (η1 r1 (x) + η2 r2 (x)) = ηi ri (x) for i = 1, 2, implies Bβ ⊆ B̂. Therefore Bβ = B̂ = hr(x)i, where r(x) = η1 r1 (x) + η2 r2 (x). As ri (x) is the monic generator polynomial of the cyclic code Bβ,i , ri (x) divides xβ − 1 such that there is fi (x) ∈ Fq [x] with xβ −1 = ri (x)fi (x), for i = 1, 2. Thus, xβ −1 = hxβ −1i (η1 + η2 )(xβ − 1) = (η1 r1 (x)f1 (x) + η2 r2 (x)f2 (x)) = (η1 f1 (x) + η2 f2 (x))(η1 r1 (x) + η2 r2 (x)), for i = 1, 2. Therefore, xβ − 1 = (η1 f1 (x) + η2 f2 (x))r(x). Hence, r(x) | (xβ − 1).  Using Corollary 5.3 and Theorem 5.4, we present the following result. Corollary 5.5. Let Bβ = η1 Bβ,1 ⊕ η2 Bβ,2 be a cyclic code of length β over R. Suppose ri (x) are the monic generator polynomials of the cyclic codes Bi and fi∗ (x) are the reciprocal polynomials of fi (x) such that xβ − 1 = fi (x)ri (x), for i = 1, 2. Then P2 1) Bβ⊥ = hη1 f1∗ (x), η2 f2∗ (x)i and |Bβ⊥ | = q i=1 deg(ri )) , 2) Bβ⊥ = hf ′ (x)i, where f ′ (x) = η1 f1∗ (x) + η2 f2∗ (x). We demonstrate our results, presenting the following examples. Example 5.6. Let β = 5 and R = F49 +uF49 , where u2 = 1. 7 [x] and w is a zero of the polynomial Take F49 = hx2F+6x+3i 2 x + 6x + 3 in F49 , then x5 − 1 = (x + 6)(x2 + w27 x + 1)(x2 + w45 x + 1) ∈ F49 [x]. Let r1 (x) = x2 + w27 x + 1 and r2 (x) = x2 + w45 x + 1. Then Bβ,1 = hr1 (x)i and Bβ,2 = hr2 (x)i are cyclic codes of length 5 over F49 . Therefore, Bβ = η1 Bβ,1 ⊕ η2 Bβ,2 is a cyclic code of length 5 over R. Thus, Bβ = hη1 r1 (x), η2 r2 (x)i = hr(x)i, where r(x) = η1 r1 (x) + η2 r2 (x). Then η1 r1 (x) + η2 r2 (x) 1 1 = (1 − u)(x2 + w27 x + 1) + (1 + u)(x2 + w45 x + 1) 2 2 1 = {2x2 + (w27 + w45 )x + u(w45 − w27 )x + 2} 2 1 = {2x2 + x + uw44 x + 2} 2 = x2 + 4x + 4uw44 x + 1 = x2 + (4 + uw28 )x + 1. 6 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS By direct computation, we get Similar to Example 5.6, here we present an example to illustrate the above results of cyclic codes over S. x5 − 1 = (x3 + (3 + uw4 )x2 + (4 + uw28 )x + 6) Thus, r(x) | (x5 − 1). Also | Bβ |= 4910−4 = 496 . For the dual code of Bβ , note that Example 5.11. Let γ = 4 and S = F9 + uF9 + vF9 + uvF9 , where u2 = 1, v 2 = 1, uv = vu. Clearly x2 + 2x + 2 is irreducible in F3 , fix w to be a zero of the polynomial x2 + 3 [x] , then 2x + 2 in F9 . We view F9 = hx2F+2x+2i f1 (x) = (x + 6)(x2 + w45 x + 1), x4 − 1 = (x + 1)(x + 2)(x + w2 )(x + w6 ) ∈ F9 [x]. × (x2 + (4 + uw28 )x + 1). Let f2 (x) = (x + 6)(x2 + w27 x + 1). s2 (x) = (x + 1)(x + w2 ), s1 (x) = (x + 1)(x + 2), Then, we get f1∗ (x) = 6x3 + w27 x2 + w3 x + 1, s3 (x) = (x + 2)(x + w2 ), f2∗ (x) = 6x3 + w45 x2 + w21 x + 1. Then Cγ,j (x) = hsj (x)i are cyclic codes of length 4 over F9 , for j = 1, 2, 3, 4. Therefore, Cγ = ζ1 Cγ,1 ⊕ ζ2 Cγ,2 ⊕ ζ3 Cγ,3 ⊕ ζ4 Cγ,4 is a cyclic code of length 4 over S, where ζj ; j = 1, 2, 3, 4 are as above. ⊥ Thus, Bβ,i = hfi∗ (x)i are dual cyclic codes of length 5 ⊥ ⊥ over F49 , for i = 1, 2. Therefore, Bβ⊥ = η1 Bβ,1 ⊕ η2 Bβ,2 ⊥ is a dual cyclic code of length 5 over R and Bβ = hη1 f1∗ (x), η2 f2∗ (x)i = hf ′ (x)i, where f ′ (x) = η1 f1∗ (x) + η2 f2∗ (x) = 6x3 + (4 + uw28 )x2 + (3 + uw4 )x + 1. Also | Bβ⊥ |= 494 .  Using similar arguments as in the case of cyclic codes over R, we obtain the following results on cyclic codes over S. Theorem 5.7. Let Cγ = ζ1 Cγ,1 ⊕ ζ2 Cγ,2 ⊕ ζ3 Cγ,3 ⊕ ζ4 Cγ,4 be a linear code of length γ over S. Then Cγ is a cyclic code of length γ over S if and only if Cγ,j are cyclic codes of length γ over Fq , where j = 1, 2, 3, 4. Corollary 5.8. Let Cγ = ζ1 Cγ,1 ⊕ ζ2 Cγ,2 ⊕ ζ3 Cγ,3 ⊕ ζ4 Cγ,4 be a cyclic code of length γ over S. Then the dual Cγ⊥ = ⊥ ⊥ ⊥ ⊥ ζ1 Cγ,1 ⊕ ζ2 Cγ,2 ⊕ ζ3 Cγ,3 ⊕ ζ4 Cγ,4 is a cyclic code of length ⊥ γ over S if and only if Cγ,j are cyclic codes of length γ over Fq , for j = 1, 2, 3, 4. Theorem 5.9. Let Cγ = ζ1 Cγ,1 ⊕ ζ2 Cγ,2 ⊕ ζ3 Cγ,3 ⊕ ζ4 Cγ,4 be a cyclic code of length γ over S and sj (x) be generator monic polynomial of Cγ,j , for j = 1, 2, 3, 4. Then 1) Cγ = hζ1 s1 (x), ζ2 s2 (x), ζ3 s3 (x), ζ4 s4 (x)i and | Cγ |= q 4γ−(deg(s1 )+deg(s2 )+deg(s3 )+deg(s4 )) . 2) Cγ = hs(x)i, where s(x) = ζ1 s1 (x) + ζ2 s2 (x) + ζ3 s3 (x) + ζ4 s4 (x) such that s(x) | (xγ − 1). Corollary 5.10. Let Cγ = ζ1 Cγ,1 ⊕ζ2 Cγ,2 ⊕ζ3 Cγ,3 ⊕ζ4 Cγ,4 be a cyclic code of length γ over S. Suppose sj (x) are the generator monic polynomials of Cγ,j and gj∗ (x) are the reciprocal polynomials of gj (x) such that xγ −1 = gj (x)sj (x), for j = 1, 2, 3, 4. Then 1) Cγ⊥ = hζ1 g1∗ (x), ζ2 g2∗ (x), ζ3 g3∗ (x), ζ4 g4∗ (x)i and | Cγ⊥ |= q (deg(s1 )+deg(s2 )+deg(s3 )+deg(s4 )) . 2) Cγ⊥ = hg ′ (x)i, where g ′ (x) = ζ1 g1∗ (x) + ζ2 g2∗ (x) + ζ3 g3∗ (x) + ζ4 g4∗ (x). s4 (x) = (x + w2 )(x + w6 ). Thus, Cγ = hs(x)i, where s(x) = ζ1 s1 (x) + ζ2 s2 (x) + ζ3 s3 (x) + ζ4 s4 (x) 1 = (1 + u + v + uv)(x + 1)(x + 2) 4 1 + (1 + u − v − uv)(x + 1)(x + w2 ) 4 1 + (1 − u + v − uv)(x + 2)(x + w2 ) 4 1 + (1 − u − v + uv)(x + w2 )(x + w6 ) 4 = x2 + (w6 + 2u + v + uvw2 )x + (uw5 + vw7 ). By direct computation we get, x4 − 1 = (x2 + (w2 + u + 2v + uvw6 )x + (uw3 + vw)) × (x2 + (w6 + 2u + v + uvw2 )x + (uw5 + vw7 )). Thus, s(x) | (x4 − 1). Also | Cγ |= 932−8 = 924 . For the dual code of Cγ , note that g1 (x) = x2 + 1, g2 (x) = x2 + w3 x + w2 , g3 (x) = x2 + w5 x + w6 , g4 (x) = x2 + 2. Then the reciprocal polynomials are as follows, g1∗ (x) = x2 + 1, g2∗ (x) = w2 x2 + w3 x + 1, g3∗ (x) = w6 x2 + w5 x + 1, g4∗ (x) = 2x2 + 1. ⊥ (x) = hgj (x)i are dual cyclic codes of length 4 Then Cγ,j ⊥ ⊥ over F9 , for j = 1, 2, 3, 4 and Cγ⊥ = ζ1 Cγ,1 ⊕ ζ2 Cγ,2 ⊕ ⊥ ⊥ ζ3 Cγ,3 ⊕ ζ4 Cγ,4 is a dual cyclic code of length 4 over S. Therefore, Cγ⊥ = hg ′ (x)i, where g ′ (x) = ζ1 g1∗ (x) + ζ2 g2∗ (x) + ζ3 g3∗ (x) + ζ4 g4∗ (x) = (2 + uw6 + vw2 + 2uv)x2 + (w2 + u + 2v + w6 uv)x + (2 + 2u + 2v + uv). Also | Cγ⊥ |= 98 .  7 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS C. Fq RS-CYCLIC CODES In Theorem 5.1, Theorem 5.4 and Theorem 5.9, we have discussed the generator polynomials for cyclic codes over Fq , R and S respectively. Now we present the generator polynomials for Fq RS-cyclic codes as follows. Theorem 5.12. Let C be a Fq RS-cyclic code. Then C = h(a(x)|0|0), (0|r(x)|0), (l1 (x)|l2 (x)|s(x))i, where a(x)|(xα − 1), r(x)|(xβ − 1), s(x)|(xγ − 1) and l1 (x) ∈ Fq [x]/hxα − 1i, l2 (x) ∈ R[x]/hxβ − 1i. Proof. From Theorems 5.1, 5.4 and 5.9, we have Aα = ha(x)i, Bβ = hr(x)i and Cγ = hs(x)i such that a(x)|(xα − 1), r(x)|(xβ −1), s(x)|(xγ −1). Then the proof follows from Theorem 3.1 of [48].  A Fq RS-linear code C of length (α, β, γ) is called a separable code if C = A′α ⊗ Bβ′ ⊗ Cγ′ , while considering A′α , Bβ′ , and Cγ′ as punctured codes of C by deleting the coordinates outside the α, β and γ components, respectively. Lemma 5.13. Let C = h(a(x)|0|0), (0|r(x)|0), (l1 (x)|l2 (x)| s(x))i be a Fq RS-cyclic code. Then 1) deg(l1 (x)) ≤ deg(a(x)), deg(l2 (x)) ≤ deg(r(x)) and a(x)|r2 (x)l1 (x), r(x)|s4 (x)l2 (x); 2) A′α = hgcd(a(x), l1 (x))i, Bβ′ = hgcd(r(x), l2 (x))i, and Cγ′ = hs(x)i. Proof. Proof is parallel to that of Lemmas 3.2, 3.3 and 3.4 of [48].  Lemma 5.14. Let C = h(a(x)|0|0), (0|r(x)|0), (l1 (x)|l2 (x)| s(x))i be a Fq RS-cyclic code. Then 1) a(x)|l1 (x) if and only if l1 (x) = 0, 2) r(x)|l2 (x) if and only if l2 (x) = 0. Proof. Similar to Lemma 5.8 and Lemma 5.9 of [48].  The following Lemma is a direct consequence of Lemma 5.14. Lemma 5.15. Let C = h(a(x)|0|0), (0|r(x)|0), (l1 (x)|l2 (x)| s(x))i be a Fq RS-cyclic code. Then the following are equivalent: 1) C is separable; 2) a(x)|l1 (x), r(x)|l2 (x); 3) C = h(a(x)|0|0), (0|r(x)|0), (0|0|s(x))i. if Aα , Bβ and Cγ are cyclic codes of length α, β and γ over Fq , R and S, respectively. Proof. Let C be a Fq RS-cyclic code of length (α, β, γ) and (a0 , a1 , . . . , aα−1 , b0 , b1 , . . . , bβ−1 , c0 , c1 , . . . , cγ−1 ) ∈ C, where (a0 , a1 , . . . , aα−1 ) ∈ Aα , (b0 , b1 , . . . , bβ−1 ) ∈ Bβ and (c0 , c1 , . . . , cγ−1 ) ∈ Cγ . As C is a Fq RS-cyclic code, we get (aα−1 , a0 , a1 , . . . , aα−2 , bβ−1 , b0 , b1 , . . . , bβ−2 , cγ−1 , c0 , c1 , . . . , cγ−2 ) ∈ C, which implies (aα−1 , a0 , . . . , aα−2 ) ∈ Aα , (bβ−1 , b0 , . . . , bβ−2 ) ∈ Bβ and (cγ−1 , c0 , c1 , . . . , cγ−2 ) ∈ Cγ . Therefore, Aα , Bβ and Cγ are cyclic codes of length α, β and γ over Fq , R and S, respectively. Conversely, suppose Aα , Bβ and Cγ are cyclic codes of length α, β and γ over Fq , R and S. Let (a′0 , a′1 , . . . , a′α−1 ) ∈ Aα , (b′0 , b′1 , . . . , b′β−1 ) ∈ Bβ and (c′0 , c′1 , . . . , c′γ−1 ) ∈ Cγ , then (a′α−1 , a′0 , . . . , a′α−2 ) ∈ Aα , (b′β−1 , b′0 , . . . , b′β−2 ) ∈ Bβ and (c′γ−1 , c′0 , c′1 , . . . , c′γ−2 ) ∈ Cγ . Therefore, (a′α−1 , a′0 , a′1 , . . . , a′α−2 , b′β−1 , b′0 , b′1 , . . . , b′β−2 , c′γ−1 , c′0 , c′1 , . . . , c′γ−2 ) ∈ Aα ⊗ Bβ ⊗ Cγ = C. Hence, C is a Fq RS-cyclic code of length (α, β, γ).  By Theorems 5.2, 5.7 and 5.16, we have the following corollary. Corollary 5.17. Suppose C = Aα ⊗ Bβ ⊗ Cγ is a Fq RSlinear code of length (α, β, γ), where Aα , Bβ and Cγ are linear codes of length α, β and γ over Fq , R and S, respectively. Then C is a Fq RS-cyclic code of length (α, β, γ) if and only if Aα , Bβ,i and Cγ,j are cyclic codes of length α, β and γ over Fq , R and S, where i = 1, 2; j = 1, 2, 3, 4. In Theorem 5.12, we have studied the generator polynomial for a Fq RS-cyclic code of length (α, β, γ). Now here we study the generator polynomial for a separable Fq RScyclic code of length (α, β, γ) as follows. Theorem 5.18. Let C = Aα ⊗ Bβ ⊗ Cγ be a Fq RS-cyclic code of length (α, β, γ), where Aα = ha(x)i , Bβ = hr(x)i and Cγ = hs(x)i. Then C = ha(x)i ⊗ hr(x)i ⊗ hs(x)i. A′α = hgcd(a(x), 0)i = ha(x)i = Aα , Example 5.19. Let α = 4, β = 5 and γ = 8. Denote R[x] S[x] F81 [x] Sα,β,γ = hx 4 −1i × hx5 −1i × hx8 −1i , where R = F81 + 2 uF81 (u = 1) and S = F81 + uF81 + vF81 + uvF81 (u2 = F3 [x] 1, v 2 = 1, uv = vu). Take F81 = hx4 +2x 3 +2i and w is a zero 4 3 of the polynomial x + 2x + 2 in F81 , then Bβ′ = hgcd(r(x), 0)i = hr(x)i = Bβ , x4 − 1 = (x + 1)(x + 2)(x + w20 )(x + w60 ) ∈ F81 [x]. Cγ′ = hs(x)i = Cγ . Let a(x) = (x + 2)(x + w20 ). Then Aα = ha(x)i is a cyclic code of length 4 over F81 . Theorem 5.16. Suppose C = Aα ⊗Bβ ⊗Cγ is a Fq RS-linear code of length (α, β, γ), where Aα , Bβ and Cγ are linear codes of length α, β and γ over Fq , R and S respectively. Then C is a Fq RS-cyclic code of length (α, β, γ) if and only x5 −1 = (x+2)(x+w8 )(x+w24 )(x+w56 )(x+w72 ) ∈ F81 [x]. Thus, for a separable code, we get Let r1 (x) = (x + w8 )(x + w24 ) and r2 (x) = (x + w56 )(x + w72 ). Then Bβ,1 = hr1 (x)i and Bβ,2 = hr2 (x)i are cyclic 8 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS codes of length 5 over F81 . Therefore, Bβ = hr(x)i is a cyclic code of length 5 over R, where r(x) = η1 r1 (x) + η2 r2 (x) 1 = (1 − u)(x2 + w46 x + w32 ) 2 1 + (1 + u)(x2 + w14 x + w48 ) 2 1 2 46 = {2x + x(w + w14 ) + (w32 + w48 ) 2 + ux(w14 − w46 ) + u(w48 − w32 )} 1 = {2x2 + x + w70 + uw35 x + uw55 } 2 = x2 + (2 + uw75 )x + (w30 + uw15 ). x8 − 1 = (x + 1)(x + 2)(x + w10 )(x + w20 )(x + w30 ) × (x + w50 )(x + w60 )(x + w70 ) ∈ F81 [x]. Let s1 (x) = (x + 1)(x + w10 ), s2 (x) = (x + 2)(x + w20 ), s3 (x) = x+w30 )(x+w50 ), s4 (x) = (x+w60 )(x+w70 ). Then Cγ,j (x) = hsj (x)i are cyclic codes of length 8 over F81 , for j = 1, 2, 3, 4. Therefore, Cγ = hs(x)i is a cyclic code of length 8 over S, where s(x) = ζ1 s1 (x) + ζ2 s2 (x) + ζ3 s3 (x) + ζ4 s4 (x) 1 = (1 + u + v + uv)(x2 + w20 x + w10 ) 4 1 + (1 + u − v − uv)(x2 + w10 x + w60 ) 4 1 + (1 − u + v − uv)(x2 + w20 x + 1) 4 1 + (1 − u − v + uv)(x2 + x + w50 ) 4 = x2 + (uw70 + vw20 + uvw30 )x + (uw20 + 2v + uvw10 ). Thus, C = h(a(x)|0|0), (0|r(x)|0), (0|0|s(x))i = ha(x)i ⊗ hr(x)i ⊗ hs(x)i is a separable Fq RS-cyclic code of length (4, 5, 8), where a(x), r(x) and s(x) are as above.  VI. APPLICATION Properties of mixed alphabet cyclic codes has been studied in [48]. In the next two sections we mainly focus on the applications of separable Fq RS-cyclic codes. A. QUANTUM ERROR-CORRECTING CODES (QECCs) FROM Fq RS-CYCLIC CODES By [3], let H be a Hilbert space of dimension q over the complex numbers C. Define H ⊗n to be n-fold tensor product of the Hilbert space H, that is, H ⊗n = H ⊗ H ⊗ · · · ⊗ H(ntimes). Then H ⊗n is a Hilbert space of dimension q n . A QECC of length n and dimension k over Fq is defined to be a Hilbert subspace of H ⊗n having dimension q k . A QECC with length n, dimension k and minimum distance d over Fq is denoted by [[n, k, d]]q . One of the important advancements in the construction of codes is the construction of QECCs from classical errorcorrecting codes. Errors prompted by inevitable interaction with environments - such as decoherence, quantum noise and other inaccuracies are among the prominent impediments leading to erroneous in quantum information. QECCs secures the quantum information from being exploited by such inaccuracy. Chronologically speaking, the first QECC was studied independently by Shor [45] and Steane [46]. However the construction of QECCs from classical codes, their existence proofs, and correction methods were given by Calderbank et al. in [18]. Later many QECCs have been constructed using ideas of [18] over finite fields and finite rings (See [2], [3], [11], [13], [24]–[26], [29], [30], [33], [34], [42]). Theorem 6.1. [18] (CSS Construction) Let C1 and C2 be [n, k1 , d1 ] and [n, k2 , d2 ] linear codes over GF(q) respectively with C2⊥ ⊆ C1 . Furthermore, let d = min{d1 , d2 }. Then there exists a QECC, C with parameters [[n, k1 + k2 − n, d]]q . In particular, if C1⊥ ⊆ C1 , then there exists a QECC with parameters [[n, 2k1 − n, d1 ]]q Here we recall the dual containing property for cyclic codes from [18]. Lemma 6.2. [18] Let C be a cyclic code of length n with generator polynomial m(x) over Fq . Then C contains its dual code if and only if xn − 1 ≡ 0 (mod m(x)m∗ (x)), where m∗ (x) is the reciprocal polynomial of m(x). Now we present the Ψ-image of Fq RS-linear codes, which will take a crucial role in our construction of QECCs from Fq RS-cyclic codes. Proposition 6.3. Let C be a Fq RS-linear code of length (α, β, γ). Then Ψ(C) = Aα ⊗ Bβ,1 ⊗ Bβ,2 ⊗ Cγ,1 ⊗ Cγ,2 ⊗ Cγ,3 ⊗ Cγ,4 is a linear code of length (α + 2β + 4γ) over Fq , where Aα , Bβ,i and Cγ,j are codes of length α, β and γ over Fq , for i = 1, 2; j = 1, 2, 3, 4. Moreover, |Ψ(C)| = |Aα ||Bβ,1 ||Bβ,2 ||Cγ,1 ||Cγ,2 ||Cγ,3 ||Cγ,4 | and dH (Ψ(C)) = min{dH (Aα ), dH (Bβ,i ), dH (Cγ,j )}, where i = 1, 2; j = 1, 2, 3, 4. Proof. Follows from the definition of ⊗ and Ψ(C).  Now we give our main result to construct QECCs from Fq RS-cyclic codes. Theorem 6.4. Let C = Aα ⊗Bβ ⊗Cγ be a Fq RS-cyclic code ⊥ ⊥ of length (α, β, γ). If A⊥ α ⊆ Aα , Bβ,i ⊆ Bβ,i and Cγ,j ⊆ Cγ,j , for i = 1, 2; j = 1, 2, 3, 4, then there exists a QECC with parameters [[(α + 2β + 4γ), 2k − (α + 2β + 4γ), dH ]], where dH denotes the Hamming distance and k denotes the dimension of the code Ψ(C), respectively. Proof. As Ψ(C) = Aα ⊗ Bβ,1 ⊗ Bβ,2 ⊗ Cγ,1 ⊗ Cγ,2 ⊗ Cγ,3 ⊗ 9 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS ⊥ ⊥ Cγ,4 , it is easy to check that Ψ(C)⊥ = A⊥ α ⊗ Bβ,1 ⊗ Bβ,2 ⊗ ⊥ ⊥ ⊥ ⊥ ⊥ ⊥ Cγ,1 ⊗ Cγ,2 ⊗ Cγ,3 ⊗ Cγ,4 . Now let Aα ⊆ Aα , Bβ,i ⊆ Bβ,i ⊥ ⊆ Cγ,j , for i = 1, 2; j = 1, 2, 3, 4 holds. Then and Cγ,j ⊥ Ψ(C) ⊆ Ψ(C). Thus, by Theorem 6.1, there exists a QECC with parameters [[(α + 2β + 4γ), 2k − (α + 2β + 4γ), dH ]]q , where dH denotes the Hamming distance of the code Ψ(C) and k denotes the dimension of the code Ψ(C).  Example 6.5. Let α = 10, β = 15, γ = 20 and Sα,β,γ = F5 [x] R[x] S[x] 2 hx10 −1i × hx15 −1i × hx20 −1i , where R = F5 + uF5 (u = 1) 2 2 and S = F5 + uF5 + vF5 + uvF5 (u = 1, v = 1, uv = vu). x10 − 1 = (x + 1)5 (x + 4)5 ∈ F5 [x]. Let a(x) = (x + 1)2 (x + 4). Then Aα = ha(x)i is a cyclic code of length 10 over F5 with parameters [10, 7, 3]. x15 − 1 = (x + 4)5 (x2 + x + 1)5 ∈ F5 [x]. Let r1 (x) = (x + 4)2 (x2 + x + 1) and r2 (x) = (x2 + x + 1)2 . Then Bβ,1 (x) = hr1 (x)i and Bβ,2 (x) = hr2 (x)i are cyclic codes having same parameters [15, 12, 3]. Therefore, Bβ = hη1 r1 (x), η2 r2 (x)i is a cyclic code of length 15 over R. x20 − 1 = (x + 1)5 (x + 2)5 (x + 3)5 (x + 4)5 ∈ F5 [x]. 2 2 Let s1 (x) = (x + 1) (x + 2), s2 (x) = (x + 2) (x + 4), s3 (x) = (x + 1)2 (x + 3) and s4 (x) = (x + 1)(x + 3)2 . Then Cγ,i (x) = hsi (x)i and Cγ,j (x) = hsj (x)i are cyclic codes of length 20 with same parameters [20, 17, 3], where i = 1, 2 and j = 3, 4. Therefore, Cγ = hζ1 s1 (x), ζ2 s2 (x), ζ3 s3 (x), ζ4 s4 (x)i is a cyclic code of length 20 over S. Thus, Ψ(C) is a linear code with parameters [120, 99, 3] over F5 . Note that a(x)a∗ (x) divides x10 − 1; ri (x)ri∗ (x) divides x15 − 1, for i = 1, 2; and sj (x)s∗j (x) divides x20 − 1, for j = 1, 2, 3, 4. Hence, by Lemma 6.2, we get A⊥ α ⊆ ⊥ ⊥ Aα , Bβ,i ⊆ Bβ,i and Cγ,j ⊆ Cγ,j , i = 1, 2; j = 1, 2, 3, 4. Then by Theorem 6.4, we get Ψ(C)⊥ ⊆ Ψ(C). Therefore, by Theorem 6.4, there exists a QECC with parameters [[120, 96, 3]]5 .  Example 6.6. Let α = 7, β = 14, γ = 21 and Sα,β,γ = R[x] S[x] F7 [x] 2 hx7 −1i × hx14 −1i × hx21 −1i , where R = F7 + uF7 (u = 1) 2 2 and S = F7 +uF7 +vF7 +uvF7 (u = 1, v = 1, uv = vu). x7 − 1 = (x + 6)7 ∈ F7 [x]. Let a(x) = (x + 6)2 . Then Aα = ha(x)i is a cyclic code of length 7 over F7 with parameters [7, 5, 3]. x14 − 1 = (x + 1)7 (x + 6)7 ∈ F7 [x]. Let r1 (x) = (x + 1)2 (x + 6) and r2 (x) = (x + 1)(x + 6)2 . Then Bβ,i (x) = hri (x)i are cyclic codes of length 14 having same parameters [14, 11, 3], where i = 1, 2. Therefore, Bβ = hη1 r1 (x), η2 r2 (x)i is a cyclic code of length 14 over R. x21 − 1 = (x + 3)7 (x + 5)7 (x + 6)7 ∈ F7 [x]. Let s1 (x) = (x + 3)(x + 5)2 , s2 (x) = (x + 5)(x + 6)2 , s3 (x) = s4 (x) = (x + 3)(x + 6)2 . Then Cγ,j (x) = hsj (x)i are cyclic codes of length 21 having same parameters [21, 18, 3], for j = 1, 2, 3, 4. Therefore, Cγ = hζ1 s1 (x), ζ2 s2 (x), ζ3 s3 (x), ζ4 s4 (x)i is a cyclic code of length 21 over S. Thus, Ψ(C) is a linear code with parameters [119, 99, 3] over F7 . Because a(x)a∗ (x) divides x7 − 1, ri (x)ri∗ (x) divides x14 − 1, for i = 1, 2; and sj (x)s∗j (x) divides x21 − 1, for j = 1, 2, 3, 4; it follows from Lemma 6.2 that ⊥ ⊥ A⊥ α ⊆ Aα , Bβ,i ⊆ Bβ,i and Cγ,j ⊆ Cγ,j , i = 1, 2; j = 1, 2, 3, 4. Then by Theorem 6.4, we get Ψ(C)⊥ ⊆ Ψ(C). Hence, by Theorem 6.4, there exists a QECC with parameters [[119, 79, 3]]7 .  Example 6.7. Let α = 12, β = 15, γ = 30 and Sα,β,γ = R[x] S[x] F25 [x] 2 hx12 −1i × hx15 −1i × hx30 −1i , where R = F25 + uF25 (u = 1), and S = F25 + uF25 + vF25 + uvF25 (u2 = 1, v 2 = 5 [x] and w is a zero of the 1, uv = vu). Take F25 = hx2F+4x+2i 2 polynomial x + 4x + 2 in F25 , then x12 − 1 = (x + 1)(x + 2)(x + 3)(x + 4)(x + w2 )(x + w4 ) × (x + w8 )(x + w10 )(x + w14 )(x + w16 ) × (x + w20 )(x + w22 ) ∈ F25 [x]. Let a(x) = (x+w4 )(x+w8 )(x+w10 ). Then Aα = ha(x)i is a cyclic code of length 12 over F25 with parameters [12, 9, 3]. x15 − 1 = (x + 4)5 (x + w4 )5 (x + w20 )5 ∈ F25 [x]. Let r1 (x) = (x+w4 )2 (x+4) and r2 (x) = (x+w20 )2 (x+4). Then Bβ,1 (x) = hr1 (x)i and Bβ,2 (x) = hr2 (x)i are cyclic codes of length 15 having same parameters [15, 12, 3]. Therefore, Bβ = hη1 r1 (x), η2 r2 (x)i is a cyclic code of length 15 over R. x30 − 1 = (x + 1)5 (x + 4)5 (x + w4 )5 (x + w8 )5 × (x + w16 )5 (x + w20 )5 ∈ F25 [x]. Let s1 (x) = (x + w8 )(x + 1)2 (x + 4), s2 (x) = (x + w4 )(x + 2)2 (x + 1), s3 (x) = (x + w16 )2 (x + w20 )(x + 4) and s4 (x) = (x + w20 )2 (x + w4 )(x + 1). Then Cγ,j (x) = hsj (x)i are cyclic codes of length 30 having same parameters [30, 26, 3] for j = 1, 2, 3, 4. Therefore, Cγ = hζ1 s1 (x), ζ2 s2 (x), ζ3 s3 (x), ζ4 s4 (x)i is a cyclic code of length 30 over S. Thus, Ψ(C) is a linear code with parameters [162, 137, 3] over F25 . Clearly, a(x)a∗ (x) divides x12 − 1; ri (x)ri∗ (x) divides x15 − 1, for i = 1, 2; and sj (x)s∗j (x) divides x30 − 1, for j = 1, 2, 3, 4. Hence, by Lemma 6.2, we get A⊥ α ⊆ ⊥ ⊥ Aα , Bβ,i ⊆ Bβ,i and Cγ,j ⊆ Cγ,j , i = 1, 2; j = 1, 2, 3, 4. Then by Theorem 6.4, we get Ψ(C)⊥ ⊆ Ψ(C). Therefore, by Theorem 6.4, there exists a QECC with parameters [[162, 112, 3]]25 .  In TABLEs 1, 2, 3, and 4, we present some new QECCs with better parameters from our study of cyclic codes over 10 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS Fp , R, S and Fp R, respectively. We denote A, B, C, D, E, F and G, to represent the numbers 10, 11, 12, 13, 14, 15 and 16, respectively. For simpicity in calculation, in TABLEs 2 and 4, we take the generator r1 (x) = r2 (x) for the corresponding cyclic codes Bβ,i for i = 1, 2. Similarly, in TABLE 3, we take the generator s1 (x) = s2 (x) = s3 (x) = s4 (x) for the corresponding cyclic codes Cγ,j for j = 1, 2, 3, 4. We write the coefficients of the generator polynomials in decreasing order, for example, we write 120C4F to represent the polynomial x5 + 2x4 + 12x2 + 4x + 15. In TABLE 4, the fifth column presents parameters of Gray images over Fp R, which is the restriction on Ψ over Fp R. A linear code C is called LCD or linear complementary dual code if C ∩ C ⊥ = {0}. LCD codes were first introduced by Massey [39]. This family of codes have shown effectiveness against side-channel attacks(SCA) and fault injection attacks(FIA) to improve the security related information on sensitive devices [19]. Authors have explored properties of LCD codes with various conditions and structures in [35], [36], [49]. In this section, we briefly discuss the LCD codes over Fq , R and Fq RS and give some examples for better understanding of our study. Lemma 6.8. [39] Let C be a cyclic code over Fq generated by f (x). Then C is LCD if and only if f (x) is self-reciprocal. Proposition 6.9. Let Bβ = hη1 r1 (x), η2 r2 (x)i be a cyclic code over R. Then Bβ is a LCD code over R if and only if ri (x) are self-reciprocal polynomials over Fq , for i = 1, 2. Proof. Let Bβ be a LCD code over R, i.e. Bβ ∩ Bβ⊥ = {0}. Note that Bβ ∩ = η1 (Bβ,1 ∩ ⊥ Bβ,1 ) ⊕ η2 (Bβ,2 ∩ ⊥ Bβ,2 ). Bβ ∩ Bβ⊥ = ⊥ Bβ,2 ∩ Bβ,2 = Then by the definition of ⊕, we get {0}, ⊥ whenever both Bβ,1 ∩ Bβ,1 = {0} and {0}, in other words, whenever both Bβ,1 and Bβ,2 are LCD codes over Fq . Hence, by Lemma 6.8, ri (x) are self-reciprocal polynomials over Fq , for i = 1, 2. Conversely, let ri (x) be a self-reciprocal polynomial over Fq , for i = 1, 2. As ri (x) is the monic generator polynomial of Bβ,i , for i = 1, 2, by Lemma 6.8 we get, Bβ,1 and Bβ,2 ⊥ are LCD codes over Fq . Thus, Bβ,1 ∩ Bβ,1 = {0} and Bβ,2 ∩ ⊥ Bβ,2 = {0}. Also as Bβ = η1 Bβ,1 ⊕ η2 Bβ,2 , ⊥ ⊥ Bβ ∩ Bβ⊥ = (η1 Bβ,1 ⊕ η2 Bβ,2 ) ∩ (η1 Bβ,1 ⊕ η2 Bβ,2 ) ⊥ ⊥ = η1 (Bβ,1 ∩ Bβ,1 ) ⊕ η2 (Bβ,2 ∩ Bβ,2 ) = {0}. Hence, Bβ is a LCD code over R. Proposition 6.11. Let C be a Fq RS-cyclic code of length (α, β, γ). Then Ψ(C) = Aα ⊗ Bβ,1 ⊗ Bβ,2 ⊗ Cγ,1 ⊗ Cγ,2 ⊗ Cγ,3 ⊗ Cγ,4 is a LCD code of length (α + 2β + 4γ) over Fq if and only if Aα , Bβ,i and Cγ,j are LCD codes of length α, β and γ over Fq , for i = 1, 2; j = 1, 2, 3, 4. Proof. Note that Ψ(C) ∩ Ψ(C)⊥ = (Aα ⊗ Bβ,1 ⊗ Bβ,2 ⊗ Cγ,1 ⊗ · · · ⊗ Cγ,4 ) ⊥ ⊥ ⊥ ⊥ ∩ (A⊥ α ⊗ Bβ,1 ⊗ Bβ,2 ⊗ Cγ,1 ⊗ · · · ⊗ Cγ,4 ) ⊥ ⊥ = (Aα ∩ A⊥ α ) ⊗ (Bβ,1 ∩ Bβ,1 ) ⊗ (Bβ,2 ∩ Bβ,2 ) B. LINEAR COMPLEMENTARY DUAL CODES. Bβ⊥ Proposition 6.10. Let Cγ = hζ1 s1 (x), ζ2 s2 (x), ζ3 s3 (x), ζ4 s4 (x)i be a cyclic code over S. Then Cγ is a LCD code over S if and only if sj (x) are self-reciprocal polynomials over Fq , for j = 1, 2, 3, 4.  Using similar arguments we can prove the following result over S. ⊥ ⊥ ⊗ (Cγ,1 ∩ Cγ,1 ) ⊗ · · · ⊗ (Cγ,4 ∩ Cγ,4 ). Therefore, Ψ(C) ∩ Ψ(C)⊥ = {0} if and only if Aα ∩ A⊥ α = ⊥ ⊥ {0}, Bβ,i ∩ Bβ,i = {0}, and Cγ,j ∩ Cγ,j = {0}, for i = 1, 2; j = 1, 2, 3, 4. Hence, Ψ(C) is a LCD code if and only if Aα , Bβ,i and Cγ,j are LCD codes over Fq , for i = 1, 2; j = 1, 2, 3, 4.  Example 6.12. Let R = F7 + uF7 , where u2 = 1 and β = 6. x6 −1 = (x+1)(x+2)(x+3)(x+4)(x+5)(x+6) ∈ F7 [x]. Let r1 (x) = (x + 3)(x + 5) = x2 + x + 1 and r2 (x) = (x + 2)(x + 4) = x2 + x + 1. Then both r1 (x) and r2 (x) are self-reciprocal. Therefore, Bγ,1 = hr1 (x)i and Bβ,2 = hr2 (x)i are LCD codes of length 6 over F7 . Hence, Bβ = hη1 r1 (x), η2 r2 (x)i is a LCD code over R.  Example 6.13. Let R = F3 + uF3 , where u2 = 1 and S = F3 + uF3 + vF3 + uvF3 where u2 = 1, v 2 = 1, uv = vu. Take α = 4, β = 7 and γ = 12. Then x4 − 1 = (x + 1)(x + 2)(x2 + 1) ∈ F3 [x]. Let a(x) = (x+1)(x2 +1). As a(x) is self-reciprocal, Aα = ha(x)i is a LCD code over F3 . x7 − 1 = (x + 2)(x6 + x5 + x4 + x3 + x2 + x + 1) ∈ F3 [x]. Let r1 (x) = r2 (x) = (x6 + x5 + x4 + x3 + x2 + x + 1). As ri (x) are self-reciprocal, Bβ,i = hbi (x)i are LCD codes over F3 , for i = 1, 2. x12 − 1 = (x + 1)3 (x + 2)3 (x2 + 1)3 ∈ F3 [x]. Let s1 (x) = (x + 1), s2 (x) = (x2 + 1), s3 (x) = (x2 + 1)2 and s4 (x) = (x2 + 1)3 . As sj (x) are self reciprocal, Cγ,j = hsj (x)i are LCD codes over F3 , for j = 1, 2, 3, 4. Hence, Ψ(C) is a LCD code of length 66 over F3 .  Example 6.14. Let R = F9 + uF9 , where u2 = 1 and S = F9 + uF9 + vF9 + uvF9 where u2 = 1, v 2 = 1, uv = vu. 3 [x] and w Let α = 4, β = 7 and γ = 16. Take F9 = hx2F+2x+2i is a zero of the polynomial x2 + 2x + 2 in F9 , then x4 − 1 = (x + 1)(x + 2)(x + w2 )(x + w6 ) ∈ F9 [x], 11 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS TABLE 1. New QECCs from cyclic codes over Fp . α 9 10 12 24 24 32 36 42 48 Coefficient of a(x) 12 11 116 115C392 113B5AA4 1AF 6B15F 2 14 14 11183 Parameters of Aα [9, 8, 2]3 [10, 9, 2]5 [12, 10, 3]13 [24, 18, 5]13 [24, 17, 6]13 [32, 24, 6]17 [36, 35, 2]17 [42, 41, 2]7 [48, 44, 4]17 New QECCs [[9, 7, 2]]3 [[10, 8, 2]]5 [[12, 8, 3]]13 [[24, 12, 5]]13 [24, 10, 6]13 [[32, 16, 6]]17 [[36, 34, 2]]17 [[42, 40, 2]]7 [[48, 40, 4]]17 Existing QECCs [[9, 3, 2]]3 (ref. [43]) [[10, 6, 2]]5 (ref. [22]) [[12, 4, 3]]13 (ref. [23]) [[24, 12, 4]]13 (ref. [23]) [[24, 4, 6]]13 (ref. [23]) [[32, 12, 6]]17 (ref. [23]) [[36, 30, 2]]17 (ref. [23]) [[42, 38, 2]]7 (ref. [22]) [[48, 30, 4]]17 (ref. [23]) TABLE 2. New QECCs from cyclic codes over R. β Coefficient of ri (x) Parameters of Bβ,i Parameters of ψR(Bβ ) New QECCs Existing QECCs 9 12 18 20 20 48 72 90 12 14 11 12 1034 13 13 14 [9, 8, 2]3 [12, 11, 2]17 [18, 17, 2]3 [20, 19, 2]5 [20, 17, 3]5 [48, 47, 2]5 [72, 71, 2]5 [90, 89, 2]5 [18, 16, 2]3 [24, 22, 2]17 [36, 34, 2]3 [40, 38, 2]5 [40, 34, 3]5 [96, 94, 2]5 [144, 142, 2]5 [180, 178, 2]5 [[18, 14, 2]]3 [[24, 20, 2]]17 [[36, 32, 2]]3 [[40, 36, 2]]5 [[40, 28, 3]]5 [[96, 92, 2]]5 [[144, 140, 2]]5 [[180, 176, 2]]5 [[18, 12, 2]]3 (ref. [43]) [[24, 18, 2]]17 (ref. [23]) [[36, 30, 2]]3 (ref. [23]) [[40, 32, 2]]5 (ref. [3]) [[40, 24, 3]]5 (ref. [38]) [[96, 90, 2]]5 (ref. [37]) [[144, 138, 2]]5 (ref. [37]) [[180, 172, 2]]5 (ref. [38]) TABLE 3. New QECCs from cyclic codes over S. γ 20 20 24 78 Coefficient of sj (x) 14 1103 1405 1A7A Parameters of Cγ,j [20, 19, 2]5 [20, 17, 3]5 [24, 21, 3]7 [78, 75, 3]13 Parameters of ψS(Cγ ) [80, 76, 2]5 [80, 68, 3]5 [96, 84, 3]7 [312, 300, 3]17 New QECCs [[80, 72, 2]]5 [[80, 56, 3]]5 [[96, 72, 3]]7 [[312, 288, 3]]13 Existing QECCs [[66, 52, 2]]5 (ref. [13]) [[80, 54, 3]]5 (ref. [13]) [[96, 60, 3]]7 (ref. [20]) [[312, 282, 3]]13 (ref. [20]) TABLE 4. New QECCs from cyclic codes over Fp R. α β Coefficient of a(x) Coefficient of ri (x) 5 5 56 110 10 10 56 44 14 131 12143201 11 11 1144 11201044 13 Parameters of Gray images over Fp R [25, 23, 2]5 [25, 17, 3]5 [168, 147, 3]5 [198, 195, 2]5 x7 − 1 = (x + 2)(x3 + wx2 + w7 x + 2) 3 3 2 5 × (x + w x + w x + 2) ∈ F9 [x], x16 −1 = (x+1)(x+2)(x+w)(x+w2 )(x+w3 )(x+w5 ) ×(x+w6 )(x+w7 )(x2 +w)(x2 +w3 )(x+w5 )(x+w7 ) ∈ F9 [x]. Let a(x) = (x + w2 )(x + w6 ), ri (x) = (x3 + wx2 + w7 x + 2)(x3 + w3 x2 + w5 x + 2) and sj (x) = (x2 + w7 )(x2 + w5 )(x2 + w)(x2 + w3 ). Note that a(x), ri (x) and sj (x) are self-reciprocal, for i = 1, 2; j = 1, 2, 3, 4. Thus, arguing as above, we get that Aα , Bβ,i and Cγ,j are LCD codes over F9 , for i = 1, 2; j = 1, 2, 3, 4. Hence, Ψ(C) is a LCD code of length 82 over F9 .  New QECCs Existing QECCs [[25, 19, 2]]5 [[25, 9, 3]]5 [[168, 126, 3]]5 [[198, 192, 2]]5 [[25, 15, 2]]5 (ref. [43]) [[25, 5, 3]]5 (ref. [43]) [[168, 96, 2]]5 (ref. [4]) [[198, 132, 2]]5 (ref. [4]) VII. CONCLUSION In this paper, we first discussed the cyclic codes over R and S, then using these structures we studied the concatenated structure of Fq RS-cyclic codes. We defined a Gray map over Fq RS and discussed some properties of Fq RS-cyclic codes. As an application of our study, we constructed quantum codes from Fq RS-cyclic codes. We also studied LCD codes as another application of the Fq RS-cyclic codes. This study can be generalized over product of finite rings. In our recent work [12], we gave necessary and sufficient conditions of dual-containing property for a skew cyclic, skew negacyclic, self-dual skew constacyclic codes over a finite ring. So taking direct product of cyclic, constacyclic, skew cyclic and skew constacyclic codes over finite rings, one can also construct QECCs. 12 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS ACKNOWLEDGEMENT T. Bag is thankful to the University Grant Commission (UGC), Govt. of India, for financial support under Sr. No. 2061441025 with Ref No. 22/06/2014(i)EU-V. Apart of this paper was written during a stay of H.Q. Dinh in the Vietnam Institute For Advanced Study in Mathematics (VIASM), he would like to thank the members of VIASM for their hospitality. H.Q. Dinh and W. Chinnakum are grateful to the Centre of Excellence in Econometrics, Chiang Mai University, Thailand, for partial financial support. This research is partially supported by the Research Administration Centre, Chaing Mai University, Thailand. REFERENCES [1] T. Abualrub, I. Siap and N. Aydin, Z2 Z4 -Additive cyclic and codes, IEEE Trans. Inf. Theory 60(3), 1508–1514, 2014. [2] M. Ashraf and G. Mohammad, Construction of quantum codes from cyclic codes over Fp + v Fp , Int. J. Inf. Coding Theory 3(2), 137–144, 2015. [3] M. Ashraf and G. Mohammad, Quantum codes from cyclic codes over Fq + uFq + v Fq + uv Fq , Quantum Inf. Process. 15(10), 4089–4098, 2016. [4] M. Ashraf and G. Mohammad, Quantum codes over Fp from cyclic codes over Fp [u, v]/hu2 − 1, v 3 − v, uv − vui, Cryptogr. Commun. 11(2), 325–335, 2019. [5] I. Aydogdu, T. Abualrub and I. Siap, On Z2 Z2 [u]-additive codes, Int. J. Comput. Math. 92(9), 1806–1814, 2015. [6] I. Aydogdu, T. Abualrub and I. Siap, On Z2 Z2 [u]-cyclic and constacyclic codes, IEEE Trans. Inf. Theory 63(8), 4883–4893, 2016. [7] I. Aydogdu and F. Gursoy, Z2 Z4 Z8 -Cyclic codes, J. Appl. Math. Comput., DOI: 10.1007/s12190-018-01216-z, 2018. [8] I. Aydogdu and I. Siap, On Zpr Zps -additive codes, Linear and Multilinear Algebra 63(10), 2089–2102, 2015. [9] I. Aydogdu, I. Siap and R.T. Valls, On the structure of Z2 Z2 [u3 ]-linear and cyclic codes, Finite Fields Appl. 48, 241–260, 2017. [10] I. Aydogdu and I. Siap, The structure of Z2 Z2s -additive codes: bounds on the minimum distance, Appl. Math. Inf. Sci. 7(6), 2271–2278, 2013. [11] T. Bag, A. K. Upadhyay, M. Ashraf and G. Mohammad, Quantum codes from cyclic codes over the ring Fp [u]/hu3 −ui, Asian-Eur. J. Math. 13(1), 2050008, 2020. [12] T. Bag, H. Q. Dinh, A. K. Upadhyay, R Bandi and W. Yamaka, Quantum codes from classes of skew constacyclic codes over the ring Fq [u, v]/hu2 − 1, v 2 − 1, uv − vui, Discrete Math. 343, DOI:10.1016/j.disc.2019.111737, 2020. [13] T. Bag, H. Q. Dinh, A. K. Upadhyay and W. Yamaka, New non-binary quantum codes from cyclic codes over product rings, IEEE Commun. Lett., DOI 10.1109/LCOMM.2019.2959529, 2020. [14] J. Borges, C. F. Cordoba and R. T. Valls, Z2 -double cyclic codes, Des. Codes Cryptogr. 86(3), 463–479, 2018. [15] J. Borges, C. F. Cordoba, J. Pujol, J. Rifa and M. Villanueva, Z2 Z4 -linear codes: Generator matrices and duality, Des. Codes Cryptogr. 54(2), 167– 179, 2010. [16] J. Borges, C. F. Cordoba and R. T. Valls, Z2 Z4 -additive cyclic codes, generator polynomials and dual codes, IEEE Trans. Inf. Theory 62(11), 6348–6354, 2016. [17] A. E. Brouwer, H. O. Hamalainen, P. R. J. Ostergard and N. J. A. Sloane, Bounds on mixed binary/ternary codes, IEEE Trans. Inf. Theory 44(1), 140–161, 1998. [18] A. R. Calderbank, E. M. Rains, P. M. Shor and N. J. A. Sloane, Quantum error-correction via codes over GF(4), IEEE Trans. Inf. Theory 44, 1369– 1387, 1998. [19] C. Carlet, Boolean Functions for Cryptography and Error Correcting Codes, Cambridge University Press, Cambridge, 257–397, 2010. [20] H. Q. Dinh, T. Bag, A.K. Upadhyay, M. Ashraf, G. Mohammad, and W. Chinnakum, Quantum codes from a class of constacyclic codes over finite commutative rings, J. Algebra Appl. 21, 2150003, 1–19, 2021, DOI:10.1142/S0219498821500031. [21] J. Gao, M. J. Shi, T. Wu and F. W. Fu, On double cyclic codes over Z4 , Finite Fields Appl. 39, 233–250, 2016. [22] J. Gao and Y Wang, u-Constacyclic codes over Fp + uFp and their applications of constructing new non-binary quantum codes, Quantum Inf Process 17(4), 1–9, 2018. [23] Y. Gao, J. Gao and F. W. Fu, Quantum codes from cyclic codes over the ring Fq +v1 Fq +· · ·+vr Fq , AAECC, DOI:10.1007/s00200-018-0366-y, 2019. [24] G. Gaurdia and R. Palazzo Jr., Constructions of new families of nonbinary CSS codes, Discrete Math. 310, 2935–2945, 2010. [25] M. Grassl and T. Beth, On optimal quantum codes, Int. J. Quantum Inf. 2, 55–64, 2004. [26] D. Gottesman, An introduction to quantum error-correction, Proc. Sympos. Appl. Math. 68, 2010. [27] A. R. Hammons, Jr., P. V. Kumar, A. R. Calderbank, N. J. A. Slone and P. Sole, The Z4 linearity of Kerdock, Preparata, Goethals and related codes, IEEE Trans. Inf. Theory 40(4), 301–319, 1994. [28] R. Hill, A First Course in Coding Theory, Clarendon Press, February 1986, Oxford. [29] X. Kai and S. Zhu, Quaternary construction of quantum codes from cyclic codes over F4 + uF4 , Int. J. Quantum Inf. 9(2), 689–700, 2011. [30] A. Ketkar, A. Klappenecker, S. Kumar and P. K. Sarvepalli, Nonbinary quantum stabilizer codes over finite fields, IEEE Trans. Inf. Theory 52, 4892–4914, 2006. [31] H. Islam and O. Prakash, Quantum codes from the cyclic codes over Fp [u, v, w]/hu2 − 1, v 2 − 1, w2 − 1, uv − vu, vw − wv, wu − uwi, J. Appl. Math. Comput. 60(1-2), 625–635, 2019. [32] P. Li, W. Dai and X. Kai, Z2 Z2 [u]-(1 + u)-additive constacyclic, arXiv:1611.03169v1. [33] R. Li, Z. Xu and X. Li, Binary construction of quantum codes of minimum distance three and four, IEEE Trans. Inf. Theory 50, 1331–1335, 2004. [34] R. Li and Z. Xu, Construction of [[n, n − 4, 3]]q quantum codes for odd prime power q , Phys. Rev. A 82, 1–4, 2010. [35] X. Liu and H. Liu, LCD codes over finite chain rings, Finite Fields Appl. 34, 1–19, 2015. [36] C. Li, C. Ding and S. Li, LCD cyclic codes over finite fields, IEEE Trans. Inf. Theory 63(7), 4344–4356, 2017. [37] F. Ma, J Gao and F.W. Fu, Constacyclic codes over the ring Fq + v Fq + v 2 Fq and their applications of constructing new non-binary quantum codes, Quantum Inf. Process 17(6), 1–19, 2018. [38] F. Ma, J Gao and F.W. Fu, New non-binary quantum codes from constacyclic codes over the ring Fq [u, v]/hu2 − 1, v 2 − v, uv − vui, Adv. Math. Commun. 13(3), 421–434, 2019. [39] J. L. Massey, Linear codes with complementary duals, Discrete Math, 106/107, 337–342, 1992. [40] H. Mostafanasab, Triple cyclic codes over Z2 , Palest. J. Math. 6(II), 123– 134, 2017. [41] E. Prange, Some cyclic error-correcting codes with simple decoding algorithm, Air Force Cambridge Research Center-TN-58-156, Cambridge, MA, 1958. [42] J. Qian, W. Ma and W. Gou, Quantum codes from cyclic codes over finite ring, Int. J. Quantum Inf. 7, 1277–1283, 2009. [43] M. Sari and I. Siap, On quantum codes from cyclic codes over a class of nonchain rings, Bull. Korean Math. Soc. 53(6), 1617–1628, 2016. [44] B. Srinivasulu and M. Bhaintwal, Z2 (Z2 + uZ2 )-Additive cyclic codes and their duals, Discrete Math. Algorithm. Appl. 8, 1650027, 1–9, 2016. [45] A. M. Steane, Simple quantum error-correcting codes, Phys. Rev. A 54, 4741–4751, 1996. [46] P. W. Shor, Scheme for reducing decoherence in quantum computer memory, Phys. Rev. A, 52, 2493–2496, 1995. [47] N. J. A. Sloane and J. G. Thompson, Cyclic self-dual codes, IEEE Trans. Inf. Theory 29(3), 364–366, 1983. [48] T. Wu, J. Gao, Y. Gao and F. W. Fu, Z2 Z2 Z4 -additive cyclic codes, Adv. Math. Commun. 12(4), 641–657, 2018. [49] X. Yang and J. L. Massey, The condition for a cyclic code to have a complementary dual, Discrete Math. 126, 391–393, 1994. 13 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2966542, IEEE Access Author et al.: Preparation of Papers for IEEE TRANSACTIONS and JOURNALS HAI Q. DINH is a professor in Applied Mathematics at the Department of Mathematical Sciences, Kent State University, USA. After completed his B.Sc. (1998), M.Sc. (2000), and Ph.D. (2003) in Mathematics at Ohio University, USA, he worked one year as a visiting professor at North Dakota State University, USA. Since 2004, Prof. Dinh has been working at Kent State University as a tenure professor in mathematics. Prof. Dinh research interests include Algebra and Coding Theory. Since 2004, he has published more than 80 papers at high level SCI(E) research journals such as Journal of Algebra, Journal of Pure and Applied Algebra, IEEE Transactions in Information Theory, IEEE Communication Letters, Finite Fields and Their Applications, Applicable Algebra in Engineering Communication and Computing, Discrete Applied Mathematics. Prof. Dinh has been a well known invited/keynote speaker at numerous international conferences and mathematics colloquium. Other than universities in the US, he also gave many honorary tutorial lectures at international universities in China, Indonesia, Kuwait, Mexico, Singapore, Thailand, Vietnam. WARATTAYA CHINNAKUM is an assistant professor in the Faculty of Economics of Chiang Mai University. She works on the macroeconomic theory, economic development, econometrics and economic for public policy. Also, she is a member of the Centre of Excellence in Econometrics.Her research has explored a wide range of topics including economic development, financial econometrics and tourism economics. TUSHAR BAG has completed his BSc degree from Ramakrishna Mission Vidymandira under University of Calcutta and MSc degree from IIT Kanpur, India. Tushar Bag is pursuing his PhD from Department of Mathematics, IIT Patna, India. His main research focus is on algebraic coding theory and codes over rings. Till now he has published 12 papers. ASHISH KUMAR UPADHYAY received a BSc and a MSc degree in Mathematics from the University of Allahabad, India. He received his PhD degree from Indian Institute of Science in 2005. He is currently working as an Associate Professor in Dept of Mathematics, IIT Patna. His research interests include Algebraic coding Theory and Algebraic Topology. RAMAKRISHNA BANDI is an assistant professor in the Department of Mathematics, Dr SPM International Institute of Information Technology Naya Raipur. He received PhD from Indian Institute of Technology Roorkee, Roorkee. His area of interests are Algebraic Coding Theory ans Information Theory. 14 VOLUME 4, 2016 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.