Codebooks with small cross-correlation amplitude have extensive applications in many fields including code division multiple access (CDMA) communications systems, space-time codes, and compressed sensing. In this paper, a class of asymptotically optimal codebooks was constructed, and the maximum inner-product of these presented codebooks was determined by using properties of character sums over finite fields. Furthermore, these codebooks provided new parameters.
Citation: Yang Yan, Hanning Chen, Jianming Wang, Gang Wang. A new construction of asymptotically optimal codebooks[J]. AIMS Mathematics, 2024, 9(4): 9631-9640. doi: 10.3934/math.2024471
Related Papers:
[1]
Yang Yan, Xingguo Zhang, Rize Jin, Limin Zhou .
A construction of strongly regular Cayley graphs and their applications to codebooks. AIMS Mathematics, 2024, 9(2): 2672-2683.
doi: 10.3934/math.2024132
[2]
Qiuyan Wang, Weixin Liu, Jianming Wang, Yang Yan .
A class of nearly optimal codebooks and their applications in strongly regular Cayley graphs. AIMS Mathematics, 2024, 9(7): 18236-18246.
doi: 10.3934/math.2024890
[3]
Jiankang Wang, Zhefeng Xu, Minmin Jia .
On the generalized Cochrane sum with Dirichlet characters. AIMS Mathematics, 2023, 8(12): 30182-30193.
doi: 10.3934/math.20231542
[4]
Qiang Zhao, Chao Zhang, Jingjing Wu, Xiuli Wang .
Robust and efficient estimation for nonlinear model based on composite quantile regression with missing covariates. AIMS Mathematics, 2022, 7(5): 8127-8146.
doi: 10.3934/math.2022452
[5]
Changling Xu, Hongbo Chen .
A two-grid $ P_0^2 $-$ P_1 $ mixed finite element scheme for semilinear elliptic optimal control problems. AIMS Mathematics, 2022, 7(4): 6153-6172.
doi: 10.3934/math.2022342
[6]
Zuliang Lu, Xiankui Wu, Fei Huang, Fei Cai, Chunjuan Hou, Yin Yang .
Convergence and quasi-optimality based on an adaptive finite element method for the bilinear optimal control problem. AIMS Mathematics, 2021, 6(9): 9510-9535.
doi: 10.3934/math.2021553
[7]
Yan Wang, Yanxi Fu, Nian Li, Huanyu Wang .
Optimal and near-optimal frequency-hopping sequences based on Gaussian period. AIMS Mathematics, 2023, 8(12): 29158-29170.
doi: 10.3934/math.20231493
[8]
Wajdi Kallel, Noura Allugmani .
Finite-time stabilization of stochastic systems with varying parameters. AIMS Mathematics, 2023, 8(8): 17687-17701.
doi: 10.3934/math.2023903
[9]
Dong Pan, Huizhen Qu .
Finite-time boundary synchronization of space-time discretized stochastic fuzzy genetic regulatory networks with time delays. AIMS Mathematics, 2025, 10(2): 2163-2190.
doi: 10.3934/math.2025101
[10]
Ling Zhu .
Asymptotic expansion of a finite sum involving harmonic numbers. AIMS Mathematics, 2021, 6(3): 2756-2763.
doi: 10.3934/math.2021168
Abstract
Codebooks with small cross-correlation amplitude have extensive applications in many fields including code division multiple access (CDMA) communications systems, space-time codes, and compressed sensing. In this paper, a class of asymptotically optimal codebooks was constructed, and the maximum inner-product of these presented codebooks was determined by using properties of character sums over finite fields. Furthermore, these codebooks provided new parameters.
1.
Introduction
Throughout this paper, let p be an odd prime and q=pn for some positive integer n. Codebooks (also known as signal sets) with low coherence are typically used to distinguish signals of different users in code division multiple access (CDMA) systems. An (N,K) codebook C is a finite set {c0,c1,…,cN−1}, where the codeword ci, 0≤i≤N−1, is a unit norm 1×K complex vector over an alphabet A. The maximum inner-product correlation Imax(C) of C is defined by
Imax(C)=max0≤i≠j≤N−1|cicHj|,
where cHj denotes the conjugate transpose of cj. The maximal cross-correlation amplitude Imax(C) of C is an important index of C, as it can approximately optimize many performance metrics such as outage probability and average signal-to-noise ratio. For a fixed K, researchers are highly interested in designing a codebook C with the parameter N being as large as possible and Imax(C) being as small as possible simultaneously. Unfortunately, there exists a bound between the parameters N, K and Imax(C).
The bound in (1.1) is called the Welch bound of C and is denoted by Iw(C). If the codebook C achieves Iw(C), then C is said to be optimal with respect to the Welch bound. However, constructing codebooks achieving the Welch bound is extremely difficult. Hence, many researchers have focused their main energy on constructing asymptotically optimal codebooks, i.e., Imax(C) asymptotically meets the Welch bound Iw(C) for sufficiently large N[2,3,4,5,6,7].
The objective of this paper is to construct a class of complex codebooks and investigate their maximum inner-product correlation. Results show that these constructed complex codebooks are nearly optimal with respect to the Welch bound, i.e., the ratio of their maximal cross-correlation amplitude to the Welch bound approaches 1. These codebooks may have applications in strongly regular graphs [8], combinatorial designs [9,10], and compressed sensing [11,12].
This paper is organized as follows. In Section 2, we review some essential mathematical concepts regarding characters and Gauss sums over finite fields. In Section 3, we present a class of asymptotically optimal codebooks using the trace functions and multiplicative characters over finite fields. Finally, we make a conclusion in Section 4.
2.
Preliminaries
In this section, we review some essential mathematical concepts regarding characters and Gauss sums over finite fields. These concepts will play significant roles in proving the main results of this paper.
Let n be a positive integer and p an odd prime. Denote the finite field with pn elements by Fpn. The trace function Trn from Fpn to Fp is defined by
Trn(x)=n−1∑i=0xpi.
Let ζp denote a primitive p-th root of complex unity and Trn denote the trace function from Fpn to Fp. For x∈Fpn, it can be checked that χn given by χn(x)=ζTrn(x)p is an additive character of Fpn, and χn is called the canonical additive character of Fpn. Assume a∈Fpn, then every additive character of Fpn can be obtained by μa(x)=χn(ax) where x∈Fpn. The orthogonality relation of μa is given by
∑x∈Fpnμa(x)={pn,ifa=0,0,otherwise.
(2.1)
Let q=pn and α be a primitive element of F∗q, then all multiplicative characters of Fq are given by φj(αi)=ζijq−1, where ζq−1 denotes a primitive (q−1)-th root of unity and 0≤i,j≤q−2. The quadratic character of Fq is the character φ(q−1)/2, which will be denoted by ηn in the sequel, and ηn is extended by setting ηn(0)=0. For φj, its orthogonality relation is given by
∑x∈Fpnφj(x)={q−1,ifj=0,0,otherwise.
The Gauss sum G(ηn) over Fpn is defined by
G(ηn)=∑x∈F∗pnηn(x)χn(x).
The explicit value of G(ηn) is given in the following lemma.
Lemma 2 ([13], Theorem 5.15). With symbols and notations above, we have
G(ηn)=(−1)n−1(−1)(p−1)n4q12.
The following results on exponential sums will play an important role in proving the main results of this paper.
Lemma 3 ([13], p.195). With symbols and notations above, we have
η1(x)=1p∑a∈FpG(η1)η1(−a)χ1(ax),
where η1 denotes the quadratic character and χ1 the canonical additive character of Fp.
Lemma 4 ([13], Theorem 5.33). If f(x)=a2x2+a1x+a0∈Fpn[x] with a2≠0, then
Combining (3.7) and (3.8), we get that Imax(C)=(p+1)pn−1/(2K).□
Example 2.Let f(x) be an irreducible polynomial over the field F3 and f(x)=x2+x+2 in F3[x]. Suppose that p=3, n=2, and α is a root of f(x) over F3, then m=1, q=32, and F9=F3(α). It can be verified that the set D consists of the following 30 elements:
which implies that C asymptotically meets the Welch bound. □
In Table 1, we show some parameters of some specific codebooks defined in (3.1). From this table, we conclude that Imax(C) is very close to Iw(C) for largely enough p, which ensures the correctness of Theorem 9 and Corollary 1.
Table 1.
The parameters of the codebook C in (3.1) for n=4.
This paper presented a family of codebooks by the combination of additive characters and multiplicative characters over finite fields. Results show that the constructed codebooks are asymptotically optimal in the sense that the maximum cross correlation amplitude of the codebooks asymptotically achieves the Welch bound. As a comparison, parameters of some known nearly optimal codebooks and the constructed ones are listed in Table 2. From this table, we can conclude that the parameters of C are not covered by those in [2,3,4,5,6,17,18,19]. This means the presented codebooks have new parameters.
Table 2.
The parameters of codebooks asymptotically meeting the Welch bound.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
Acknowledgments
This work was supported by the Innovation Project of Engineering Research Center of Integration and Application of Digital Learning Technology (No.1221003), Humanities and Social Sciences Youth Foundation of Ministry of Education of China (No. 22YJC870018), the Science and Technology Development Fund of Tianjin Education Commission for Higher Education (No. 2020KJ112, 2022KJ075, KYQD1817), the National Natural Science Foundation of China (Grant No. 12301670), the Natural Science Foundation of Tianjin (Grant No. 23JCQNJC00050), Haihe Lab. of Information Technology Application Innovation (No. 22HHXCJC00002), Fundamental Research Funds for the Central Universities, China (Grant No. ZY2301, BH2316), the Open Project of Tianjin Key Laboratory of Autonomous Intelligence Technology and Systems (No. TJKL-AITS-20241004, No. TJKL-AITS-20241006).
Conflict of interest
The authors declare no conflicts of interest.
References
[1]
L. Welch, Lower bounds on the maximum cross correlation of signals, IEEE Trans. Inform. Theory, 20 (1974), 397–399. https://doi.org/10.1109/TIT.1974.1055219 doi: 10.1109/TIT.1974.1055219
[2]
Z. Heng, C. Ding, Q. Yue, New constructions of asymptotically optimal codebooks with multiplicative characters, IEEE Trans. Inform. Theory, 63 (2017), 6179–6187. https://doi.org/10.1109/TIT.2017.2693204 doi: 10.1109/TIT.2017.2693204
[3]
G. Luo, X. Cao, Two constructions of asymptotically optimal codebooks, Cryptogr. Commun., 11 (2019), 825–838. https://doi.org/10.1007/s12095-018-0331-4 doi: 10.1007/s12095-018-0331-4
[4]
G. Luo, X. Cao, Two constructions of asymptotically optimal codebooks via the hyper eisenstein sum, IEEE Trans. Inform. Theory, 64 (2018), 6498–6505. https://doi.org/10.1109/TIT.2017.2777492 doi: 10.1109/TIT.2017.2777492
[5]
Q. Wang, Y. Yan, Asymptotically optimal codebooks derived from generalised bent functions, IEEE Access, 8 (2020), 54905–54909. https://doi.org/10.1109/ACCESS.2020.2980330 doi: 10.1109/ACCESS.2020.2980330
[6]
Y. Yan, Y. Yao, Z. Chen, Q. Wang, Two new families of asymptotically optimal codebooks from characters of cyclic groups, IEICE Trans. Fund. Electr., E104 (2021), 1027–1032. https://doi.org/10.1587/transfun.2020EAP1124 doi: 10.1587/transfun.2020EAP1124
[7]
W. Lu, X. Wu, X. Cao, Three constructions of asymptotically optimal codebooks via multiplicative characters of finite fields, Adv. Math. Commun., 2022 (2022), 1–9. https://doi.org/10.3934/amc.2022091 doi: 10.3934/amc.2022091
[8]
Q. Wang, X. Liang, R. Jin, Y. Yan, Applications of strongly regular Cayley graphs to codebooks, IEEE Access, 11 (2023), 106980–106986. https://doi.org/10.1109/ACCESS.2023.3320559 doi: 10.1109/ACCESS.2023.3320559
[9]
C. Ding, Complex codebooks from combinatorial designs, IEEE Trans. Inform. Theory, 52 (2006), 4229–4235. https://doi.org/10.1109/TIT.2006.880058 doi: 10.1109/TIT.2006.880058
[10]
P. Xia, S. Zhou, G. Giannakis, Achieving the Welch bound with difference sets, IEEE Trans. Inform. Theory, 51 (2005), 1900–1907. https://doi.org/10.1109/TIT.2005.846411 doi: 10.1109/TIT.2005.846411
[11]
E. Candes, M. Wakin, An introduction to compressive sampling, IEEE Signal Proc. Mag., 25 (2008), 21–30. https://doi.org/10.1109/MSP.2007.914731 doi: 10.1109/MSP.2007.914731
[12]
S. Li, G. Ge, Deterministic sensing matrices arising from near orthogonal systems, IEEE Trans. Inform. Theory, 60 (2014), 2291–2302. https://doi.org/10.1109/TIT.2014.2303973 doi: 10.1109/TIT.2014.2303973
[13]
R. Lidl, H. Niederreiter, Finite fields, Cambridge: Cambridge University Press, 1997.
[14]
R. S. Coulter, Explicit evaluations of some Weil sums, Acta Arith., 83 (1998), 241–251. https://doi.org/10.4064/aa-83-3-241-251 doi: 10.4064/aa-83-3-241-251
[15]
R. S. Coulter, Further evaluation of some Weil sums, Acta Arith., 86 (1998), 217–226. https://doi.org/10.4064/aa-86-3-217-226 doi: 10.4064/aa-86-3-217-226
H. Hu, J. Wu, New constructions of codebooks nearly meeting the Welch bound with equality, IEEE Trans. Inform. Theory, 60 (2014), 1348–1355. https://doi.org/10.1109/TIT.2013.2292745 doi: 10.1109/TIT.2013.2292745
[18]
C. Li, Q. Yue, Y. Huang, Two families of nearly optimal codebooks, Des. Codes Cryptogr., 75 (2015), 43–57. https://doi.org/10.1007/s10623-013-9891-7 doi: 10.1007/s10623-013-9891-7
[19]
L. Tian, Y. Li, T. Liu, C. Xu, Constructions of codebooks asymptotically achieving the welch bound with additive characters, IEEE Signal Proc. Lett., 26 (2019), 622–626. https://doi.org/10.1109/LSP.2019.2891896 doi: 10.1109/LSP.2019.2891896
Yang Yan, Hanning Chen, Jianming Wang, Gang Wang. A new construction of asymptotically optimal codebooks[J]. AIMS Mathematics, 2024, 9(4): 9631-9640. doi: 10.3934/math.2024471
Yang Yan, Hanning Chen, Jianming Wang, Gang Wang. A new construction of asymptotically optimal codebooks[J]. AIMS Mathematics, 2024, 9(4): 9631-9640. doi: 10.3934/math.2024471