Loading [MathJax]/jax/output/SVG/jax.js
Research article

A class of nearly optimal codebooks and their applications in strongly regular Cayley graphs

  • Received: 01 February 2024 Revised: 15 May 2024 Accepted: 27 May 2024 Published: 30 May 2024
  • MSC : 94B05, 11T23, 11T24, 12E20

  • Codebooks with small inner-product correlations are desirable in many fields, including compressed sensing, direct spread code division multiple access (CDMA) systems, and space-time codes. The objective of this paper is to present a class of codebooks and explore their applications in strongly regular Cayley graphs. The obtained codebooks are nearly optimal in the sense that their maximum cross-correlation amplitude nearly meets the Welch bound. As far as we know, this construction of codebooks provides new parameters.

    Citation: Qiuyan Wang, Weixin Liu, Jianming Wang, Yang Yan. A class of nearly optimal codebooks and their applications in strongly regular Cayley graphs[J]. AIMS Mathematics, 2024, 9(7): 18236-18246. doi: 10.3934/math.2024890

    Related Papers:

    [1] Yang Yan, Xingguo Zhang, Rize Jin, Limin Zhou . A construction of strongly regular Cayley graphs and their applications to codebooks. AIMS Mathematics, 2024, 9(2): 2672-2683. doi: 10.3934/math.2024132
    [2] Yang Yan, Hanning Chen, Jianming Wang, Gang Wang . A new construction of asymptotically optimal codebooks. AIMS Mathematics, 2024, 9(4): 9631-9640. doi: 10.3934/math.2024471
    [3] Tao Cheng, Junchao Mao . A new class of directed strongly regular Cayley graphs over dicyclic groups. AIMS Mathematics, 2024, 9(9): 24184-24192. doi: 10.3934/math.20241176
    [4] Nuttawoot Nupo, Sayan Panma . Certain structural properties for Cayley regularity graphs of semigroups and their theoretical applications. AIMS Mathematics, 2023, 8(7): 16228-16239. doi: 10.3934/math.2023830
    [5] Ganesh Gandal, R Mary Jeya Jothi, Narayan Phadatare . On very strongly perfect Cartesian product graphs. AIMS Mathematics, 2022, 7(2): 2634-2645. doi: 10.3934/math.2022148
    [6] Igal Sason . Observations on graph invariants with the Lovász ϑ-function. AIMS Mathematics, 2024, 9(6): 15385-15468. doi: 10.3934/math.2024747
    [7] Ligong Wang . Output statistics, equivocation, and state masking. AIMS Mathematics, 2025, 10(6): 13151-13165. doi: 10.3934/math.2025590
    [8] Songpon Sriwongsa, Siripong Sirisuk . Nonisotropic symplectic graphs over finite commutative rings. AIMS Mathematics, 2022, 7(1): 821-839. doi: 10.3934/math.2022049
    [9] Yubin Zhong, Sakander Hayat, Suliman Khan, Vito Napolitano, Mohammed J. F. Alenazi . Combinatorial analysis of line graphs: domination, chromaticity, and Hamiltoniancity. AIMS Mathematics, 2025, 10(6): 13343-13364. doi: 10.3934/math.2025599
    [10] He Song, Longmin Wang, Kainan Xiang, Qingpei Zang . The continuity of biased random walk's spectral radius on free product graphs. AIMS Mathematics, 2024, 9(7): 19529-19545. doi: 10.3934/math.2024952
  • Codebooks with small inner-product correlations are desirable in many fields, including compressed sensing, direct spread code division multiple access (CDMA) systems, and space-time codes. The objective of this paper is to present a class of codebooks and explore their applications in strongly regular Cayley graphs. The obtained codebooks are nearly optimal in the sense that their maximum cross-correlation amplitude nearly meets the Welch bound. As far as we know, this construction of codebooks provides new parameters.



    To distinguish the signals between different users in CDMA communication systems, codebooks are required to have small inner-product correlation. An (N,K) codebook C is a vector set {ci}N1i=0, where ci is a unit norm 1×K complex vector over an alphabet A. As an important performance measure of a codebook, the maximum cross-correlation amplitude of C is defined by

    Imax(C)=max0ijN1|cicHj|,

    where cHj denotes the conjugate transpose of cj. For a given K, it is preferable to construct codebooks with N being as large as possible and Imax(C) being minimal simultaneously. However, the Welch bound demonstrates that there is a tradeoff between N, K and Imax(C) of a codebook.

    Lemma 1. (Welch bound, [1]) For any (N,K) codebook C with NK, then

    Imax(C)NK(N1)K. (1.1)

    The equality in (1.1) achieves if and only if

    |cicHj|=NK(N1)K,

    for all pairs of (i,j) with ij.

    If the equality in (1.1) holds, then C is called a maximum-Welch-bound-equality (MWBE) codebook. MWBE codebooks are applied in many practical fields, such as CDMA communications systems, compressed sensing and space-time codes. Unfortunately, it is very difficult to construct MWBE codebooks, and only a few MWBE codebooks are known in the literature [2,3,4,5,6,7,8,9]. Hence, a lot of attempts are made to construct codebooks which nearly meet the Welch bound, i.e., limN+Imax(C)/Iw(C)=1 for an (N,K) codebook C with NK. Many classes of known nearly optimal codebooks have been produced for the past few years [10,11,12,13,14,15,16,17,18].

    In this paper, we are concerned with two purposes. The first objective is to give a new construction of codebooks which are nearly optimal with respect to the Welch bound. The other objective is to provide a new construction of strongly regular Cayley graphs using the set D in (3.1). It should be pointed out that these presented codebooks have new parameters.

    This paper is arranged as follows. Some basic definitions and results on exponential sums are given in Sect. Ⅱ. The constructions of nearly optimal codebooks and strongly regular Cayley graphs are ordered in Sect. Ⅲ. We make a conclusion in Sect. Ⅳ.

    In this section, we present some basic concepts and a number of lemmas on exponential sums. Some symbols and notations are given as follows.

    m1 and m2 are two integers.

    n1=pm1+1 and n2=pm2+1.

    q1=p2m1, q2=p2m2 and p is an odd prime.

    ζp=e2π1p is a primitive p-th root of unity.

    Tr1 denotes the trace function from Fq1 to Fp.

    Tr2 denotes the trace function from Fq2 to Fp.

    χ1 denotes the canonicial additive character of Fp.

    η1 denotes the quadratic character of Fp.

    Let G be a finite Abelian group with order n, and U be the multiplicative group of complex numbers of absolute value 1. A character χ of G is a homomorphism from G to U with χ(ab)=χ(a)χ(b) for all a,bG. Given two characters χ, χ of G, we can get a product character χχ by letting χχ(a)=χ(a)χ(a) for all aG. It can be easily seen that the set G consisting of all characters of G forms an Abelian group under the multiplication of characters.

    Let p be an odd prime and q=pn with nN. Let Fq be the finite field with q elements and Tr the trace function from Fq to Fp. For a finite field Fq, there are two finite abelian groups, i.e., the additive group F+q and the multiplicative group Fq of Fq. In both cases, explicit formulas for the characters are given as follows.

    Definition 1. The canonical additive character of F+q is defined by χ(x)=ζTr(x)p for all xFq. For bFq, the function μb with μb(x)=χ(bx) is an additive character of Fq and every additive character of Fq can be obtained in this way.

    Definition 2. Let α be a fixed primitive element of Fq. For each 0jq2, the function φj with

    φj(αi)=ζijq1 for i=0,1,,q2,

    defines a multiplicative character of Fq. For j=(q1)/2, the character φ(q1)/2, denoted by η, is called the quadratic character of Fq and is extended by setting η(0)=0.

    The Gauss sum G(η,χ) over Fq is defined by

    G(η,χ)=xFqη(x)χ(x).

    The explicit values of G(η,χ) are determined in [19].

    Lemma 2. ([19], Theorem 5.15) With the symbols and notations above, we have

    G(η,χ)=(1)n1(1)(p1)n4q.

    Briefly, we use G(η) to denote G(η,χ). The following identities on Gauss sums will be employed in the sequel.

    Lemma 3. (Theorem 5.12 , [19]) For yFq, we obtain

    zFqη(z)ζTr(zy)p={0, if y=0,G(η)η(y), if yFq.

    Gauss sums are the most significant types of exponential sums, since they govern the transition from the multiplicative to the additive structure.

    Lemma 4. ([19], p.195) With the symbols and notations above, we have

    η(x)=1qzFqG(η)η(z)χ(zx)  for all xFq.

    The following several lemmas are useful in the next section.

    Lemma 5. ([20]) Let n=2m for a positive integer m and N=pm+1 for an odd prime p. Assume zFp and aFq. Then

    xFqζTr(zxN)+Tr(ax)p=pmζTr(aN4z)p.

    Lemma 6. ([21], Theorem 2) Assume that n=2m for a positive integer m and N=pm+1 for an odd prime p. For zFp, we have

    xFqζzTr(xN)p=pm.

    Lemma 7. ([22], Lemma 3.12) Let Fq1 and Fq2 denote the finite fields with q1 and q2 elements, respectively. Then there is an isomorphism

    (F+q1×F+q2)(F+q1)×(F+q2).

    From this lemma, we know

    (F+q1×F+q2)={μa,b:aFq1,bFq1},

    where μa,b(x,y)=ζTr1(ax)+Tr2(by)p for (x,y)Fq1×Fq2.

    In this section, we give a construction of nearly optimal codebooks, introduce their parameters and give the proofs. Then we analyse the strongly regular Cayley graphs derived from the presented codebooks.

    Define

    D={(x,y)Fq1×Fq2:Tr1(xn1)+Tr2(yn2)F2p}, (3.1)

    where F2p=β2 and β is a primitive element of Fp.

    The codebook CD is given by

    CD={ca,b:aFq1,bFq2}, (3.2)

    where

    ca,b(x,y)=1|D|(μa,b(x,y))(x,y)D,μa,b(x,y)=ζTr1(ax)+Tr2(by)p,

    and |D| denotes the cardinality of the set D.

    To prove the main results of this paper, we introduce the sets E and F, which are defined by (3.3) and (3.4), respectively. Let

    E={(x,y)Fq1×Fq2:Tr1(xn1)+Tr2(yn2)0}, (3.3)
    F={(x,y)Fq1×Fq2:Tr1(xn1)+Tr2(yn2)=0}. (3.4)

    Regarding the set D, we have the following two lemmas.

    Lemma 8. With the symbols and notations above, we have

    |D|=12(p1)(p2m1+2m21pm1+m21).

    Proof. From Lemma 6, we obtain

    |F|=1pzFpxFq1ζTr1(zxn1)pyFq2ζTr2(zyn2)p=p2m1+2m21+1pzFp(pm1)(pm2)=p2m1+2m21+(p1)pm1+m21.

    Hence, we have

    |E|=xFq1,yFq21|F|=(p1)(p2m1+2m21pm1+m21). (3.5)

    It can be easily checked that

    |D|=(x,y)Eη1(Tr1(xn1)+Tr2(yn2))+12=12(x,y)E1+12xFq1,yFq2η1(Tr1(xn1)+Tr2(yn2)). (3.6)

    By Lemma 4, we obtain

    xFq1,yFq2η1(Tr1(xn1)+Tr2(yn2))=1pxFq1,yFq2zFpG(η1)η1(z)χ1(zTr1(xn1)+zTr2(xn2))=G(η1)pzFpη1(z)(pm1)(pm2),

    where the last equality follows from Lemma 6. From the fact that zFpη1(z)=0, we have

    xFq1,yFq2η1(Tr1(xn1)+Tr2(yn2))=0. (3.7)

    Then the desired conclusion follows from (3.5)–(3.7).

    Example 1. Let p=5 and (m1,m2)=(2,1). By the Magma program, we get that the cardinality |D| of the set D is 6200, which accords with Lemma 8.

    Example 2. Let p=7 and (m1,m2)=(2,2). By Lemma 8, we get |D|=2469600, which is consistent with the numerical computation by Magma.

    Lemma 9. For (a,b)Fq1×Fq2 and (a,b)(0,0), we have

    (x,y)Dμa,b(x,y)={12pm1+m21(p1), if Tr1(an1)+Tr2(bn2)=0,12pm1+m21+12(1)p12pm1+m2, if Tr1(an1)+Tr2(bn2)F2p,12pm1+m2112(1)p12pm1+m2, if Tr1(an1)+Tr2(bn2)FpF2p.

    Proof. By definition, we have

    (x,y)Dμa,b(x,y)=(x,y)Eη1(Tr1(xn1)+Tr2(yn2))+12ζTr1(ax)+Tr2(by)p,

    where the set E is given in (3.3). Note that

    xFq1,yFq2ζTr1(ax)+Tr2(by)p=0,

    if (a,b)Fq1×Fq2{(0,0)}. Hence, we get

    (x,y)Dμa,b(x,y)=12(x,y)FζTr1(ax)+Tr2(by)p+12xFq1,yFq2η1(Tr1(xn1)+Tr2(yn2))ζTr1(ax)+Tr2(by)p, (3.8)

    where the set F is given in (3.4). Together with Lemma 5, we derive

    (x,y)FζTr1(ax)+Tr2(by)p=1pxFq1,yFq2ζTr1(ax)+Tr2(by)pzFpζzTr1(xn1)+zTr2(yn2)p=1pzFpxFq1ζTr1(zxn1+ax)pyFq2ζTr2(zyn2+by)p=pm1+m21zFpζTr1(an14z)Tr2(bn24z)p.

    For zFp, from the map 14zz, we get

    (x,y)FζTr1(ax)+Tr2(by)p=pm1+m21zFpζz(Tr1(an1)+Tr2(bn2))p={pm1+m21(p1),if Tr1(an1)+Tr2(bn2)=0,pm1+m21,if Tr1(an1)+Tr2(bn2)0. (3.9)

    From Lemma 4, we obtain

    xFq1,yFq2η1(Tr1(xn1)+Tr2(yn2))ζTr1(ax)+Tr2(by)p=1pxFq1,yFq2ζTr1(ax)+Tr2(by)pzFpG(η1)η1(z)χ1(Tr1(zxn1)+Tr2(zyn2))=G(η1)pzFpη1(z)xFq1ζTr1(zxn1+ax)pyFq2ζTr2(zyn2+by)p=G(η1)pzFpη1(z)(pm1ζTr1(an14z)p)(pm2ζTr2(bn24z)p),

    where the last equality follows from Lemma 5. For zFp, from the map 14zz, we get

    xFq1,yFq2η1(Tr1(xn1)+Tr2(yn2))ζTr1(ax)+Tr2(by)p=pm1+m11G(η1)zFpη1(z)ζz(Tr1(an1)+Tr2(bn2))p={0,if Tr1(an1)+Tr2(bn2)=0,(1)p12pm1+m2η1(Tr1(an1)+Tr2(bn2)),if Tr1(an1)+Tr2(bn2)0, (3.10)

    where the last equality follows from Lemmas 2 and 3. The desired conclusion follows from (3.8)–(3.10).

    Theorem 10. Let

    K=12(p1)(p2m1+2m21pm1+m21). (3.11)

    Then the set CD defined in (3.2) is a [p2m1+2m2,K] codebook with Imax(CD)=pm1+m21(p+1)/(2K).

    Proof. From the definition of the codebook CD and Lemma 8, we deduce that CD is a [p2m1+2m2,K] codebook. Given two codewords ca,b and cc,d with (ac,bd)(0,0), we have

    |ca,bcHc,d|=1K|(x,y)Dμac,bd(x,y)|.

    By Lemma 9, we obtain that

    |ca,bcHc,d|{12Kpm1+m21(p+1),12Kpm1+m21(p1)}.

    Hence, we have

    Imax(CD)=pm1+m21(p+1)2K.

    Theorem 11. The codebook CD constructed in Theorem 10 is nearly optimal with respect to the Welch bound.

    Proof. By Theorem 10, we derive that

    Iw(CD)=pm1+m2+1+pm1+m2+p1(p1)(pm1+m21)(p2m1+2m21).

    Therefore, we deduce that

    Imax(CD)Iw(CD)=(p+1)2(pm1+m2+1)(p1)(pm1+m2+1+pm1+m2+p1).

    Obviously,

    limp+Imax(CD)Iw(CD)=1,

    which implies that CD is nearly optimal with respect to the Welch bound.

    Table 1 lists some parameters of the codebooks defined in (3.2). From this table, we can derive that Imax(CD) is very close to Iw(CD), as the odd prime p increases. This accords with Theorems 10 and 11 and also guarantees the correctness of our main results.

    Table 1.  The parameters of the codebook CD in (3.2).
    p (m1,m2) N K Imax(C) Iw(C) Imax/Iw
    3 (1, 1) 34 24 1/4 1.7230×101 1.4600
    5 (2, 1) 56 6200 3/248 9.8639×103 1.2264
    5 (2, 2) 58 156000 1/416 1.9622×103 1.2251
    7 (3, 2) 710 121053618 2/25209 6.8707×105 1.1547
    11 (3, 3) 1112 1426557547800 1/1476300 6.1835×107 1.0954
    13 (5, 5) 1320 6(1319139) 1/118164421584 7.8350×1012 1.0801
    17 (6, 6) 1724 8(17231711) 1/517886433093120 1.8205×1015 1.0607

     | Show Table
    DownLoad: CSV

    For (p,m1,m2)=(199,6,6), it can be easily checked that Imax/Iw=1.0050. This implies that the ratio Imax/Iw is much closer to 1, if p is a larger prime.

    Motivated by the work in [23], we use the set D defined in (3.1) to give a construction of strongly regular Cayley graphs. The definition of strongly regular graphs is given below.

    Definition 3 ([4]) A strongly regular graph (v,k,λ,μ) is a graph with v vertices which is not complete or edgeless and which has the following properties:

    (1) The graph is regular of valency k, i.e., each vertex is adjacent to k vertices.

    (2) There are exactly λ vertices adjacent to both x and y, if x and y are two adjacent vertices.

    (3) There are exactly μ vertices adjacent to both x and y, if x and y are two nonadjacent vertices.

    One of the most efficient approaches to construct strongly regular graphs is the Cayley graph construction. Let G be a finite Abelian group and D be a subset of G satisfying that 0D and D={d:dD}=D. The Cayley graph on G with connection set D, written as Cay(G,D), is the graph with the elements of G as vertices; two vertices x and y are adjacent if and only if xyD.

    For the set D given in (3.1), it is clear that 0D and D=D. Here and hereafter, we use Cay(Fq1×Fq2,D) to denote the Cayley graph on Fq1×Fq2 with connection set D. For (a,b)Fq1×Fq2, let

    μa,b(D)=(x,y)Dμa,b(x,y),

    where μa,b(Fq1×Fq2). The eigenvalues of Cay(Fq1×Fq2,D) are defined by μa,b(D). When (a,b)=(0,0), we have μ0,0(D)=|D|=K, which is called the trivial eigenvalue of Cay(Fq1×Fq2,D). It is known that Cay(Fq1×Fq2,D) is strongly regular if and only if μa,b(D) with (a,b)(0,0) has exactly two distinct values.

    Theorem 12. Let D be the set given in (3.1), and K is the integer given in (3.11). Then we have

    (1) Cay(Fq1×Fq2,D) has two distinct nontrivial eigenvalues, pm1+m21(1+p)/2 and pm1+m21(1p)/2.

    (2) Cay(Fq1×Fq2,D) is strongly regular with parameters

    (p2m1+2m2,K,14pm1+m21(pm1+m21(1p)22p+6),14pm1+m21(pm1+m21(1p)22p+2)).

    Proof. (1) By Lemma 9, we know

    μa,b(D)=12pm1+m21(1+p) or  μa,b(D)=12pm1+m21(1p),

    for (a,b)Fq1×Fq2{(0,0)}. This implies that Cay(Fq1×Fq2,D) has precisely two distinct nontrivial eigenvalues pm1+m21(1+p)/2 and pm1+m21(1p)/2.

    (2) From the definition of Cay(Fq1×Fq2,D) and the first part of this theorem, we get that Cay(Fq1×Fq2,D) has p2m1+2m2 vertices and Cay(Fq1×Fq2,D) is regular of valency |D|. Let k denote the valency of Cay(Fq1×Fq2,D). Then

    k=|D|=12(p1)(p2m1+2m21pm1+m21).

    Let r and s denote the two nontrivial eigenvalues of Cay(Fq1×Fq2,D). By Theorem 9.1.2 in [24], the parameters λ and μ of the strongly regular graph can be computed by λ=s+r+k+sr and μ=k+sr. Then the second part of this theorem follows.

    As a comparison, the parameters of some known strongly regular graphs and the newly presented ones are listed in Table 2.

    Table 2.  The parameters of some strongly regular graphs.
    (p,m1,m2) v k λ μ r s References
    81 16 7 2 7 -2 [25]
    (3, 1, 1) 81 24 9 6 6 -3 Theorem 12
    14080 3159 918 648 279 -9 [25]
    (5, 2, 1) 15625 6200 2475 2450 75 -50 Theorem 12

     | Show Table
    DownLoad: CSV

    In this paper, a class of codebooks is constructed using the combination of the quadratic character over Fp and the trace functions over finite fields. Main results show that they are nearly optimal with respect to the Welch bound. Their applications in Cayley graphs are investigated and a kind of strongly regular Cayley graphs is obtained by the use of set D. Some interesting nearly optimal codebooks were presented in [10,12,13,14,15,16,17,18]. The parameters of the codebooks obtained in this paper were not found in the literature. This means that CD has new parameters.

    The authors contributed equally to the writing of this paper. All authors have read and agreed to the published version of the manuscript.

    The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This work is supported by the Humanities and Social Sciences Youth Foundation of Ministry of Education of China (No. 22YJC870018), the Science and Technology Development Fund of Tianjin Education Commission for Higher Education (No. 2020KJ112, KYQD1817), and Science and Technology Project of Putian City (No. 2021R4001-10), Haihe Lab. of Information Technology Application Innovation (No. 22HHXCJC00002), the Open Project of Tianjin Key Laboratory of Autonomous Intelligence Technology and Systems (No. TJKL-AITS-20241004, No. TJKL-AITS-20241006).

    The authors declare no conflicts of interest.



    [1] L. Welch, Lower bounds on the maximum cross correlation of signals, IEEE T. Inform. Theory, 20 (1974), 397–399. https://doi.org/10.1109/TIT.1974.1055219 doi: 10.1109/TIT.1974.1055219
    [2] J. H. Conway, R. H. Harding, N. J. A. Sloane, Packing lines, planes, etc.: Packings in Grassmannian spaces, Exp. Math., 5 (1996), 139–159. https://doi.org/10.1080/10586458.1996.10504585 doi: 10.1080/10586458.1996.10504585
    [3] C. Ding, Complex codebooks from combinatorial designs, IEEE T. Inform. Theory, 52 (2006), 4229–4235. https://doi.org/10.1109/TIT.2006.880058 doi: 10.1109/TIT.2006.880058
    [4] M. Fickus, D. G. Mixon, J. Jasper, Equiangular tight frames from hyperovals, IEEE T. Inform. Theory, 62 (2016), 5225–5236. https://doi.org/10.1109/TIT.2016.2587865 doi: 10.1109/TIT.2016.2587865
    [5] M. Fickus, D. G. Mixon, J. C. Tremain, Steiner equiangular tight frames, Linear Algebra Appl., 436 (2012), 1014–1027. https://doi.org/10.1016/j.laa.2011.06.027 doi: 10.1016/j.laa.2011.06.027
    [6] F. Rahimi, Covering graphs and equiangular tight frames, Univ. Waterloo, 2016. Available from: http://hdl.handle.net/10012/10793
    [7] D. Sarwate, Meeting the Welch bound with equality, Sequences their Appl., 1999, 63–79. Available from: https://link.springer.com/chapter/10.1007/978-1-4471-0551-0_6
    [8] T. Strohmer, J. R. W. Heath, Grassmannian frames with applications to coding and communication, Appl. Comput. Harmon. Anal., 14 (2003), 257–275. https://doi.org/10.1016/S1063-5203(03)00023-X doi: 10.1016/S1063-5203(03)00023-X
    [9] P. Xia, S. Zhou, G. Giannakis, Achieving the Welch bound with difference sets, IEEE T. Inf. Theory, 51 (2005), 1900–1907. https://doi.org/10.1109/TIT.2005.846411 doi: 10.1109/TIT.2005.846411
    [10] S. Hong, H. Park, T. Helleset, Y. Kim, Near optimal partial Hadamard codebook construction using binary sequences obtained from quadratic residue mapping, IEEE T. Inf. Theory, 60 (2014), 3698–3705. https://doi.org/10.1109/TIT.2014.2314298 doi: 10.1109/TIT.2014.2314298
    [11] Z. Heng, C. Ding, Q. Yue, New constructions of asymptotically optimal codebooks with multiplicative characters, IEEE T. Inf. Theory, 63 (2017), 6179–6187. https://doi.org/10.1109/TIT.2017.2693204 doi: 10.1109/TIT.2017.2693204
    [12] H. Hu, J. Wu, New constructions of codebooks nearly meeting the Welch bound with equality, IEEE T. Inf. Theory, 60 (2014), 1348–1355. https://doi.org/10.1109/TIT.2013.2292745 doi: 10.1109/TIT.2013.2292745
    [13] G. Luo, X. Cao, Two constructions of asymptotically optimal codebooks via the hyper eisenstein sum, IEEE T. Inf. Theory, 64 (2018), 6498–6505. https://doi.org/10.1109/TIT.2017.2777492 doi: 10.1109/TIT.2017.2777492
    [14] S. Satake, Y. Gu, Constructions of complex codebooks asymptotically meeting the Welch bound: A graph theoretic approach, IEEE Int. Symposium Inf. Theory, 2020, 48–53. 10.1109/ISIT44484.2020.9174496 doi: 10.1109/ISIT44484.2020.9174496
    [15] X. Wu, W. Lu, X. Cao, Two constructions of asymptotically optimal codebooks via the trace functions, Cryptogr. Commun., 12 (2020), 1195–1211. https://doi.org/10.1007/s12095-020-00448-w doi: 10.1007/s12095-020-00448-w
    [16] Q. Wang, Y. Yan, Asymptotically optimal codebooks derived from generalised bent functions, IEEE Access, 8 (2020), 54905–54909. https://doi.org/10.1109/ACCESS.2020.2980330 doi: 10.1109/ACCESS.2020.2980330
    [17] Y. Yan, Y. Yao, Z. Chen, Q. Wang, Two new families of asymptotically optimal codebooks from characters of cyclic groups, IEICE Trans. Fundament. Electr. Commun. Comput. Sci., E104 (2021), 1027–1032. https://doi.org/10.1587/transfun.2020EAP1124 doi: 10.1587/transfun.2020EAP1124
    [18] N. Yu, A construction of codebooks associated with binary sequences, IEEE T. Inf. Theory, 58 (2012), 5522–5533. https://doi.org/10.1109/TIT.2012.2196021 doi: 10.1109/TIT.2012.2196021
    [19] R. Lidl, H. Niederreiter, Finite fields, Cambridge: Cambridge University Press, 1997. Available from: https://dl.acm.org/doi/10.5555/248301
    [20] R. S. Coulter, Further evaluation of some Weil sums, Acta Arith., 86 (1998), 217–226. Available from: http://matwbn.icm.edu.pl/ksiazki/aa/aa86/aa8633.pdf
    [21] R. S. Coulter, Explicit evaluations of some Weil sums, Acta Arith., 83 (1998), 241–251. Available from: http://matwbn.icm.edu.pl/ksiazki/aa/aa83/aa8334.pdf
    [22] K. Conrad, Characters of finite abelian groups, Lect. Notes, 17 (2010). Available from: https://kconrad.math.uconn.edu/blurbs/grouptheory/charthy.pdf
    [23] Q. Wang, X. Liang, R. Jin, Y. Yan, Applications of strongly regular cayley graphs to codebooks, IEEE Access, 11 (2023), 106980–106986. https://doi.org/10.1109/ACCESS.2023.3320559 doi: 10.1109/ACCESS.2023.3320559
    [24] A. E. Brouwer, W. H. Haemers, Spectra of graphs, Springer Science & Business Media, 2011.
    [25] Online content: Parameters of Strongly Regular Graphs, Eindhoven: The University, 2024. Available from: https://www.win.tue.nl/aeb/graphs/srg/srgtab.html
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1111) PDF downloads(39) Cited by(0)

Figures and Tables

Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog