m=1
c
m
e
j2(f0+mf)t
, (1)
where f is an integer multiple of the OFDM symbol rate
and f
0
is the lowest carrier frequency. c = (c
1
, . . . , c
n
) is the
complex modulating vector whose entries are taken from a 16
QAM constellation. An admissible modulating vector is called
a codeword and the ensemble of all the possible codewords
constitutes the code C . The mean power of S
c
(t) during a
symbol period T is
1
T
_
T
0
S
c
(t)
2
dt = c
2
m=1
c
m

2
, (2)
and the mean envelope power P
av
(C) of a code C is
P
av
(C)=
1
T
cC
_
T
0
p(c)S
c
(t)
2
dt =
cC
p(c)c
2
, (3)
where p(c) is the probability of transmitting codeword c . The
peaktomean envelope power ratio (PMEPR) of a codeword
c is dened as
PMEPR(c)
max
t[0,T]
S
c
(t)
2
P
av
(C)
. (4)
Our goal is to systematically construct a set of codewords
whose PMEPRs are bounded above by 3.6 where entries of
these codewords are modulated by a 16QAM constellation.
Throughout our discussion, we impose the restriction n =
2
k
(k positive integer) and use C
C{0} and S
1
{z
C : z = 1} where C denotes the set of complex numbers.
World Academy of Science, Engineering and Technology 11 2005
390
Fig. 1. Construction of 16QAM symbols from two QPSK symbols
A. The Extended RudinShapiro Construction
The extended RudinShapiro map
introduced in [10],
[11] is dened as follows: Given any polynomial Q(z) ,
is
(Q(z))
1
_
Q(z
2
) + z
1
Q(z
2
)
, (5)
where we require , C
, and S
1
.
In [11], we conne parameters , , S
1
, develop a
procedure to construct P
k
of degree 2
k
and prove
P
k
(z ;
k
,
k
,
k
, . . . ,
1
,
1
,
1
)
2
+P
k
(z ;
k
,
k
,
k
, . . . ,
1
,
1
,
1
)
2
=2
k+1
, z S
1
(6)
for any choices of
k
,
k
,
k
, . . . ,
1
,
1
,
1
S
1
.
III. A SIMPLE EXAMPLE
A fourcarrier OFDM signal of (1) where the entries of
(c
1
, c
2
, c
3
, c
4
) are chosen from a 16QAM constellation is
used to illustrate our construction procedure. Instead of per
forming an exhaustive search, as originally described in [2],
the procedure we present can efciently identify a set of
codewords whose PMEPR bounds are bounded above by 3.6 .
A. A construction procedure
Based on the procedure developed in [11] or our derivation
of Section D, we have a polynomial of degree 4 represented
as:
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
=
2
1
z
4
+
2
1
z
3
1
z
2
+
2
1
z . (7)
According to [1], any point on the 16QAM constellation
can be written as
q(, ) = ae
j/4
+ be
j/4
(8)
This representation of a 16QAM symbol in terms of two
QPSK symbols is shown in Fig. 1 . Assuming all the 16
QAM symbols are equiprobable, we require a = 2/
5 and
b = 1/
1
= ae
j/4
+ be
j/4
1
=ae
j/4
+ be
j/4
2
=
2
=
2
=
(9)
where , , , , , and are chosen from Z
4
.
Thus, equation (7) becomes
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
=
2
1
z
4
+
2
1
z
3
1
z
2
+
2
1
z
=
2
2
(ae
j/4
+be
j/4
)z
4
+
2
2
(ae
j/4
+be
j/4
)z
3
2
(ae
j/4
+be
j/4
)z
2
+
2
(ae
j/4
+be
j/4
)z
=
(ae
j/4
+be
j/4
)z
4
+
(ae
j/4
+be
j/4
)z
3
+
2
(ae
j/4
+be
j/4
)z
2
+
(ae
j/4
+be
j/4
)z
= e
j/4
++
(a+b
)z
4
+ e
j/4
++
(a+b
)z
3
+e
j/4
++2
(a+b
)z
2
+e
j/4
+
(a+b
)z . (10)
We dene
2,1
as the set of all codewords generated by
equation (10) when parameters , , , , , and run
over Z
4
, i.e.,
2,1
=
_
, Z4
, Z4
, , Z4
e
j/4
++
(a + b
)
e
j/4
++
(a + b
)
e
j/4
++2
(a + b
)
e
j/4
+
(a + b
)
. (11)
We can also choose the parameters of (7) in a way differ
ent from (9) to produce more codewords with low PMEPR
bounds. Further discussion on this issue, especially, on how
to tuning parameter is presented in another paper.
Here, another choice for the set of parameters in (7) is
1
=
1
=
2
=ae
j/4
+ be
j/4
2
=ae
j/4
+ be
j/4
2
=
(12)
where , , , , , and are chosen from Z
4
. Substitut
ing (12) for parameters in (7), we similarly dene
2,2
, i.e.,
2
=
2,1
_
2,2
. (13)
B. PMEPR bounds
Now, we compute PMEPR upper bounds for the codewords
of (13). For this purpose, we rst prove the following lemma.
Lemma 1: If 
2
 = 
2
 and
2
S
1
, then the polynomial
(7) satises
max
zS
1
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
4(
1

2
+
1

2
)
2

2
. (14)
The proof of Lemma 1 is contained in Appendix I.
Corollary 1: If 
1
 = 
1
 and
2
S
1
, then the polynomial
(7) satises
max
zS
1
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
4(
2

2
+
2

2
)
1

2
. (15)
The proof of this corollary is similar to Lemma 1 .
Because of
ae
j/4
+be
j/4
 =e
j/4
(a+b
) =a+b
(16)
and (recalling a = 2/
5 , b = 1/
5 and = e
j
2
)
a + b
i

2
=
a + b
2
= 1.8 , if i = 0
a
2
+b
2
= 1 , if i {1 , 3}
a b
2
= 0.2 , if i = 2
, (17)
in view of (9), it follows

1

2
+
1

2
{3.6 , 2.8 , 2.0 , 1.2 , 0.4} . (18)
Utilizing (18) and (9), we can therefore derive
World Academy of Science, Engineering and Technology 11 2005
391
(
1

2
+
1

2
)
2

2
= (
1

2
+
1

2
) 3.6 (19)
which and Lemma 1 yield
max
zS
1
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
3.6 4 . (20)
Recalling P
av
= 4 , we prove
PMEPR(c) 3.6 (21)
for every codeword c
2,1
.
Utilizing Corollary 1, we can similarly prove (21) for every
codeword c
2,2
. In view of (13), we therefore prove (21)
for every codeword c
2
.
C. The size of
2
To compute the size of
2
, we rst nd the sizes of
2,1
,
2,2
and
2,1
2,2
, and then obtain the size of
2
.
Property 1: When
1
,
1
,
2
,
2
and
2
dened by either
(9) or (12) are used, the sizes of
2,1
,
2,2
and
2,1
2,2
are respectively 16
2
4 , 16
2
4 and 16
2
.
Proof: In view of (7), every codeword of
2
can be expressed
as
c =(
2
2
2
1
2
1
2
1
) (22)
where
1
,
1
,
2
,
2
and
2
are from either (9) or (12) .
Case 1: Compute the size of
2,1
. In this case, the parameters
dened in (9) are used, which suggests that both
1
and
1
are points on the 16QAM constellation (Fig. 1) and the
rest parameters are selected from a 4PSK constellation, i.e.,
{1 , 1 , j , j} . Rewriting (22) as
2
(
2
1
2
2
2
1
2
2
1
) , we observe that the rst, third and fourth entry
can independently be changed through
1
,
1
and
2
2
respec
tively. Thus, every choice of
1
,
1
and
2
2
yields a distinct
codeword in
2,1
. Since there are 16 choices for each of
1
and
1
and 4 choices for
2
2
, the size of
2,1
is equal to
16
2
4 .
Case 2: Compute the size of
2,2
. In this case, the parameters
dened in (12) are used. A similar argument as Case 1 can
prove that the size of
2,2
is equal to 16
2
4 too.
Case 3: To compute the size of
2,1
2,2
, we assume
(
2
2
2
1
2
1
2
1
)=(
2
1
2
2
2
1
2
1
), (23)
where
1
,
1
,
2
,
2
and
2
represent the parameters dened
by (9) but
1
,
1
,
2
,
2
and
2
are the parameters dened
by (12) . The equation (23) suggests
2
=
2
1
2
(24)
1
=
2
2
1
. (25)
Dividing (24) by (25), we obtain
1
=
2
2
=
2
1
2
2
2
1
=
2
2
. (26)
Since
2
and
2
are dened by (9), we have
2
2
=
for
some Z
4
. Combining this with (26), we obtain
2
=
2
. (27)
Now, we are ready to estimate the size of
2,1
2,2
.
When 
2
 > 1 , for each xed
2
there are only 4 choices
of
2
(Fig. 1) satisfying (27) . Since we have 4 choices for
each of
2
, the total number of choices of these parameters
satisfying (27) are 4 4 = 16 .
When 
2
 < 1 , a similar argument as 
2
 > 1 yields
another 16 possible choices of parameters.
When 
2
 = 1 , there are 8 distinct choices for each of
2
or
2
. For each choice of
2
, however, there only 4 choices
of
2
(Fig. 1) satisfying (27) . Thus, there are total 84 = 32
choices of these parameters satisfying (27) .
Combining Case 1Case 3, we obtain 16 + 16 + 32 = 64
codewords satisfying (27) . On the other hand, rewriting the
codewords in
2,2
as
1
(
2
1
1
2
2
2
1
1
2
2
) , we
observe that for each pair of
2
and
2
satisfying (27) , there
are 4 choices of
1
1
. Therefore, the size of
2,1
2,2
is
464 = 256 . In view of (13) and results from Case 1Case 3,
the number codewords in
2
is at least 16
2
4+16
2
4256 =
16
2
(4 2 1) = 1792.
D. Derivation of P
2
(z ;
2
,
2
,
2
,
1
,
1
)
P
2
(z ;
2
,
2
,
2
,
1
,
1
) can be derived through the
following 3 steps.
Step 1: For the sake of consistence, we choose
0
=
0
=
0
= 1 . Start with P
0
(z) = z .
Step 2: Substituting P
0
(z) = z for Q(z) in (5), we compute
P
1
(z ;
1
,
1
,
1
)
111
(P
0
(z))
=
1
1
_
1
P
0
(
1
z
2
) +
1
z
1
P
0
(
1
z
2
)
=
1
1
_
1
z
2
+
1
z
1
(
1
z
2
)
=
1
z
2
1
z , (28)
where both
1
and
1
belong to C
. Since P
1
is independent
of
1
, we use P
1
(z;
1
,
1
) to represent P
1
(z;
1
,
1
,
1
) from
now on. Utilizing (28), for all z S
1
, we compute
P
1
(z ;
1
,
1
)
2
+P
1
(z ;
1
,
1
)
2
=
1
z
2
1
z
2
+
1
(z)
2
1
(z)
2
=(
1
z
2
1
z)(
1
z
2
1
z)
+(
1
z
2
+
1
z)(
1
z
2
+
1
z)
=
1
z
2

2
1
z(
1
z
2
)
(
1
z)
1
z
2
+
1
z
2
+
1
z
2

2
+
1
z(
1
z
2
)
+ (
1
z)
1
z
2
+
1
z
2
=2
1

2
z
2

2
+ 2
1

2
z
2
= 2(
1

2
+
1

2
) (29)
for all z S
1
. From (29), it follows
max
zS
1
_
P
1
(z ;
1
,
1
)
2
+P
1
(z ;
1
,
1
)
2
_
=2(
1

2
+
1

2
) (30)
for any z S
1
and for any choice of
1
,
1
C
.
Step 3: As Step 2, substituting P
1
(z ;
1
,
1
,
1
) =
1
z
2
1
z for Q(z) in (5), we compute
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
222
(P
1
(z ;
1
,
1
))
=
[
2
P
1
(
2
z
2
,
1
,
1
) +
2
z
1
P
1
(
2
z
2
,
1
,
1
)]
2
=
[
2
(
1
(
2
z
2
)
2
2
z
2
)+
2
z
1
(
1
(
2
z
2
)
2
1
(
2
z
2
))]
2
=
1
2
[
1
2
2
z
4
2
z
2
+
2
(
1
2
2
z
3
+
1
2
z)]
=
1
2
z
4
+
1
2
z
3
1
z
2
+
1
2
z . (31)
for any choices of
2
,
2
,
1
and
1
C
and
2
in S
1
.
World Academy of Science, Engineering and Technology 11 2005
392
IV. 16QAM CODEWORDS OF LENGTH n = 2
k
HAVING
LOW PMEPR BOUNDS
In this section, we extend the procedure developed in
previous section to construct 16QAM codewords of length
n = 2
k
with low PMEPR bounds. Our procedure is proceeded
in the following steps:
Step 1: For k = 2 , as shown in previous section,
we construct polynomial P
2
. Then, we dene
2
(equa
tion (13)) comprising of all the codewords produced by
P
2
(z ;
2
,
2
,
2
,
1
,
1
) when the parameters dened by
(9) and (12) are employed. We show that the PMEPR bounds
for all the codewords of
2
are bounded above by 3.6 .
Furthermore, we prove that the size of
2
is 16
2
(421) .
Step 2: For k = l , assume that we have constructed polyno
mial P
l
of degree 2
l
.
Dene the following l sets of the parameters
l
,
l
,
l
, . . . ,
2
,
2
,
2
,
1
,
1
as
(1)
1
= q(, )
1
= q( , )
2
=
1
2
=
1
2
=
1
.
.
.
l
=
l1
l
=
l1
l
=
l1
. . . (l)
1
=
1
1
=
1
2
=
2
2
=
2
2
=
1
.
.
.
l1
=
l1
l1
=
l1
l1
=
l2
l
= q(, )
l
= q( , )
l
=
l1
(32)
where , , , ,
1
,
1
,
1
, . . . ,
l1
,
l1
and
l1
are
chosen from Z
4
. As done in (11), we replace the parameters of
P
l
(z ;
l
,
l
,
l
, . . . ,
2
,
2
,
2
,
1
,
1
) with (i) of (32)
(1 i l) and then dene
l,i
as the set comprising of
all the codewords produced by this polynomial. The set
l
is
dened as
l
=
l
_
i=1
l,i
. (33)
Induction also assumes that the sizes of
l,i
(1 i l) and
l
respectively are 16
2
4
l1
and 16
2
(4
l1
l l + 1) .
Step 3: For k = l+1 , let P
l
represent the polynomial of degree
n = 2
l
constructed in Step 2 . Employing (5), we construct the
polynomial of degree n = 2
l+1
as follows:
P
l+1
(z ;
l+1
,
l+1
,
l+1
, . . . ,
2
,
2
,
2
,
1
,
1
)
=
1
l+1
_
l+1
P
l
(
l+1
z
2
) +
l+1
z
1
P
l
(
l+1
z
2
)
. (34)
Lemma 2: If
i
S
1
for all i with 2 i l + 1 and 
i
 =

i
 for all i (1 i l +1) but some i
0
with 1 i
0
l +1 ,
then the polynomial (34) satises
max
zS
1
P
l+1
(z ;
l+1
,
l+1
,
l+1
, . . . ,
2
,
2
,
2
,
1
,
1
)
2
2
l+1
(
i0

2
+
i0

2
)
l+1
i=1 , i=i0

i

2
. (35)
The proof of Lemma 2 is contained in Appendix II.
Dene the following l + 1 sets of the parameters
l+1
,
l+1
,
l+1
, . . . ,
2
,
2
,
2
,
1
,
1
as
(1)
1
= q(, )
1
= q( , )
2
=
1
2
=
1
2
=
1
.
.
.
l+1
=
l
l+1
=
l
l+1
=
l
. . . (l + 1)
1
=
1
1
=
1
2
=
2
2
=
2
2
=
1
.
.
.
l
=
l
l
=
l
l
=
l1
l+1
= q( , )
l+1
= q( , )
l+1
=
l
(36)
where , , , ,
1
,
1
,
1
, . . . ,
l
,
l
and
l
are
chosen from Z
4
. As done in (11), we replace the parame
ters of P
l+1
(z ;
l+1
,
l+1
,
l+1
, . . . ,
2
,
2
,
2
,
1
,
1
)
with (i) of (36) (1 i l+1) and then dene
l+1,i
as the set
comprising of all the codewords produced by this polynomial.
The set
l+1
is dened as
l+1
=
l+1
_
i=1
l+1,i
. (37)
A. PMEPR bounds
We rst show that the PMEPR bounds of the codewords in
l+1,1
are bounded above by 3.6 . Recalling (17), we have

1

2
+
1

2
{3.6 , 2.8 , 2.0 , 1.2 , 0.4} . (38)
Utilizing (35) of Lemma 2 and noticing
i
S
1
for all i
(2 i l + 1) , we prove
max
zS
1
P
l+1
(z ;
l+1
,
l+1
,
l+1
, . . . ,
2
,
2
,
2
,
1
,
1
)
2
2
l+1
(
1

2
+
1

2
)
l+1
i=2

i

2
2
l+1
3.6 . (39)
Since the codewords of
l+1
has length n = 2
l+1
, we have
P
av
= 2
l+1
which yields
PMEPR(c) 3.6 (40)
for every codeword c
l+1,1
. Utilizing Lemma 2, we can
follow a similar argument to prove (40) for any codeword in
l+1,i
(1 i l + 1) . Thus, in view of (37), it follows that
equation is valid for any codeword in
l+1
.
B. The size of
l+1
To estimate the size of
l+1
, we rst need to prove the
following property.
Property 2: The coefcients of the polynomial
P
k
(z ;
k
,
k
,
k
, . . . ,
2
,
2
,
2
,
1
,
1
) associated
with z
2
k
and z
2
k
1
are respectively
f(
k
, . . . ,
2
)
k
i=1
i
h(
k
, . . . ,
2
)
k
k1
i=1
i
(41)
where f and h both represent products of the powers of
i
(2 i k) .
Proof: We proceed our proof through induction.
For k = 2 , in view of (7), Property 2 is valid for the
coefcients of P
2
associated with z
4
and z
3
.
World Academy of Science, Engineering and Technology 11 2005
393
For k = l , assume that the coefcients of
P
l
(z ;
l
,
l
,
l
, . . . ,
2
,
2
,
2
,
1
,
1
) associated
with z
2
k
and z
2
k
1
are respectively
f(
l
, . . . ,
2
)
l
i=1
i
h(
l
, . . . ,
2
)
l
l1
i=1
i
(42)
where f and h are dened as stated in Property 2 .
For k = l + 1 , from equation (34), we see that the
coefcients of P
l+1
associated with z
2
k
and z
2
k
1
are respec
tively equal to the leading coefcients of
l+1
l+1
P
l
(
l+1
z
2
) and
l+1
l+1
P
l
(
l+1
z
2
) . Thus, utilizing the induction assumption
(42) , we compute the coefcients of P
l+1
associated with
z
2
l+1
and z
2
l+1
1
respectively as follows:
l+1
l+1
2
l
l+1
f(
l
, . . . ,
2
)
l
i=1
i
=
f(
l+1
, . . . ,
2
)
l+1
i=1
i
l+1
l+1
(
l+1
)
2
l
f(
l
, . . . ,
2
)
l
i=1
i
=
h(
l+1
, . . . ,
2
)
l+1
l
i=1
i
(43)
This completes our proof.
Now, we are ready to estimate the size of
l+1
. To do that,
we rst prove the following property.
Property 3: When the parameters of
P
l+1
(z ;
l+1
,
l+1
,
l+1
, . . . ,
2
,
2
,
2
,
1
,
1
) are
replaced with the numbers from (i) of (36) (1 i l + 1) ,
the sizes of
l+1,i
and (
l
i=1
l+1,i
)
l+1,l+1
respectively
are 16
2
4
l
and 16
2
.
Proof: We proceed with our proof through the following cases.
Case 1: Compute the size of
l+1,i
(1 i l) . In this
case, the set (i) of (36) is selected, which suggests that
l+1
l+1
belongs to {1 , 1 , j , j} . In (34), we see that a choice
of {P
l
,
l+1
l+1
} yields a distinct P
l+1
(A similar proof for the
parameters chosen from a BPSK constellation can be found
in [10]) . From the induction assumption of Step 2, there are
16
2
4
l1
distinct P
l
(the size of
l,i
) which suggests that the
number of codewords in
l+1,i
is 16
2
4
l1
4 = 16
2
4
l
.
Case 2: Compute the size of
l+1,l+1
. In this case, the set
(l+1) of (36) is selected, which implies that all the parameters
but
l+1
and
l+1
are selected from a 4PSK constellation.
When all the parameters chosen from a 4PSK constellation,
following the same induction argument of Step 1Step 3 or
utilizing a similar argument in [10], we can prove that there
are 4
l+1
distinct P
l
of degree 2
l
. In addition, a straightforward
argument can show that when the argument of
l+1
l+1
is not
2
,
a choice of {P
l
,
l+1
,
l+1
} yields a distinct P
l+1
. From
Fig. 1, for each choice of
l+1
, there are 4 choices of
l+1
that
meet this requirement. Thus, there are 4
l+1
164 = 16
2
4
l
choices of {P
l
,
l+1
,
l+1
} which yield distinct P
l+1
. The
size of
l+1,l+1
is 16
2
4
l
.
Case 3: Compute the size of (
l
i=1
l+1,i
)
l+1,l+1
. For
any codeword of (
l
i=1
l+1,i
)
l+1,l+1
, we have
P
l+1
(z;
l+1
,
l+1
,
l+1
, . . . ,
2
,
2
,
2
,
1
,
1
)
= P
l+1
(z ;
l+1
,
l+1
,
l+1
, . . . ,
2
,
2
,
2
,
1
,
1
)(44)
where
i
,
i
,
i
(1 i l + 1) are from (t) of (36) (1
t l) and
i
,
i
,
i
(1 i l +1) are from (l +1) of (36) .
Equation (44) suggests that the individual summands of these
two polynomials must be equal. In particular, the coefcients
associated with z
2
l
and z
2
l1
must be equal, which, in view
of (41) of Property 2, yields
f(
l+1
, . . . ,
2
)
l+1
i=1
i
= f(
l+1
, . . . ,
2
)
l+1
i=1
i
(45)
h(
l+1
, . . . ,
2
)
l+1
l
i=1
i
= h(
l+1
, . . . ,
2
)
l+1
l
i=1
i
(46)
For these parameters are nonzero, dividing (45) by (46) renders
f(
l+1
, . . . ,
2
)
l+1
i=1
i
h(
l+1
, . . . ,
2
)
l+1
l
i=1
i
=
f(
l+1
, . . . ,
2
)
l+1
i=1
i
h(
l+1
, . . . ,
2
)
l+1
l
i=1
i
(47)
Simplifying this equation, we obtain
f(
l+1
, . . . ,
2
)
h(
l+1
, . . . ,
2
)
l+1
l+1
=
f(
l+1
, . . . ,
2
)
h(
l+1
, . . . ,
2
)
l+1
l+1
(48)
Since parameters
i
,
i
,
l+1
and
l+1
are all chosen from
a 4 constellation (not from (l + 1) of (36)) , and functions f
and g are products of powers of
i
(2 i l + 1) , we have
{
f(
l+1
, . . . ,
2
)
h(
l+1
, . . . ,
2
)
l+1
l+1
,
f(
l+1
, . . . ,
2
)
h(
l+1
, . . . ,
2
)
}{1, 1, j, j} .(49)
Combining (48)(49), it follows that
l+1
=
l+1
, Z
4
. (50)
Clearly, equation (50) is similar to (27). Therefore, an argu
ment similar to the one for computing the size of
2,1
2,2
proves that the size of (
l
i=1
l+1,i
)
l+1,l+1
is 16
2
. Thus,
the number of distinct codewords contained in
l
is at least
16
2
4
l
(l + 1) 16
2
l = 16
2
[4
l
(l + 1) l] .
V. CONCLUSION
We present a novel construction of 16QAM codewords
of length n = 2
k
. The number of constructed codewords is
16
2
[4
k1
k k +1] . When these constructed codewords
are utilized as a code in OFDM systems, their peaktomean
envelope power ratios (PMEPR) are bounded above by 3.6 .
The principle of our scheme is illustrated with a four subcarrier
example.
APPENDIX I
PROOF OF LEMMA 1
The proof of Lemma 1: From (5) and
2
S
1
, it follows
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
+P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
=

2
P
1
(
2
z
2
;
1
,
1
)+
2
z
1
P
1
(
2
z
2
;
1
,
1
)
2

2

+

2
P
1
(
2
(z)
2
;
1
,
1
)
2
z
1
P
1
(
2
(z)
2
;
1
,
1
)
2

2

=
2

2
P
1
(
2
z
2
;
1
,
1
)
2
+
2
P
1
(
2
z
2
;
1
,
1
)[
2
z
1
P
1
(
2
z
2
;
1
,
1
)]
+[
2
P
1
(
2
z
2
;
1
,
1
)]
2
z
1
P
1
(
2
z
2
;
1
,
1
)
+
2

2
z
1
P
1
(
2
z
2
;
1
,
1
)
2
+
2

2
P
1
(
2
z
2
;
1
,
1
)
2
2
P
1
(
2
z
2
;
1
,
1
)[
2
z
1
P
1
(
2
z
2
;
1
,
1
)]
[
2
P
1
(
2
z
2
;
1
,
1
)]
2
z
1
P
1
(
2
z
2
;
1
,
1
)
+
2

2
z
1
P
1
(
2
z
2
;
1
,
1
)
2
=2
2

2
P
1
(
2
z
2
;
1
,
1
)
2
+2
2

2
z
1
P
1
(
2
z
2
;
1
,
1
)
2
.(51)
By requiring 
2
 = 
2
 , equation (51) becomes
2
2

2
(P
1
(
2
z
2
;
1
,
1
)
2
+P
1
(
2
z
2
;
1
,
1
)
2
) . (52)
World Academy of Science, Engineering and Technology 11 2005
394
On the other hand, since z S
1
and
2
S
1
suggest
2
z
2
S
1
, from (29) it follows
P
1
(
2
z
2
;
1
,
1
)
2
+P
1
(
2
z
2
;
1
,
1
)
2
=2(
1

2
+
1

2
) , (53)
z S
1
. Combining (52) and (53), we prove
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
+P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
= 4(
1

2
+
1

2
)
2

2
(54)
which suggests
max
zS
1
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
max
zS
1
_
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
+P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
_
= 4(
1

2
+
1

2
)
2

2
(55)
APPENDIX II
PROOF OF LEMMA 2
Without loss of generality, we use induction to prove the
case where the parameters are chosen from (1) of (36) .
Step 1: For k = 2, we have proved that when 
2
 = 
2
 and
2
S
1
, equation (54) is valid in Appendix I, i.e.
P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
+P
2
(z ;
2
,
2
,
2
,
1
,
1
)
2
= 4(
1

2
+
1

2
)
2

2
. (56)
Step 2: For k l, assume that when 
i
 = 
i
 and
i
S
1
with i {2 , . . . , l} , we have
P
l
(z;
l
,
l
,
l
, . . . ,
2
,
2
,
2
,
1
,
1
)
2
+P
l
(z;
l
,
l
,
l
, . . . ,
2
,
2
,
2
,
1
,
1
)
2
= 2
l
(
1

2
+
1

2
)
l
i=2

i

2
(57)
for z S
1
.
Step 3: For k = l + 1, we compute
P
l+1
(z ;
l+1
,
l+1
,
l+1
, ...,
1
,
1
)
2
+P
l+1
(z ;
l+1
,
l+1
,
l+1
, ...,
1
,
1
)
2
=

l+1
P
l
(
l+1
z
2
) +
l+1
z
1
P
l
(
l+1
z
2
)
2

l+1

+

l+1
P
l
(
l+1
(z)
2
)
l+1
z
1
P
l
(
l+1
(z)
2
)
2

l+1

=
_
l+1
P
l
(
l+1
z
2
) +
l+1
z
1
P
l
(
l+1
z
2
)
l+1
P
l
(
l+1
z
2
)+
l+1
z
1
P
l
(
l+1
z
2
)
+
_
l+1
P
l
(
l+1
z
2
)
l+1
z
1
P
l
(
l+1
z
2
)
l+1
P
l
(
l+1
z
2
)
l+1
z
1
P
l
(
l+1
z
2
)
=
l+1

2
P
l
(
l+1
z
2
)
2
+
l+1
P
l
(
l+1
z
2
)[
l+1
z
1
P
l
(
l+1
z
2
)]
+
l+1
z
1
P
l
(
l+1
z
2
)[
l+1
P
l
(
l+1
z
2
)]
+
l+1
z
1

2
P
l
(
l+1
z
2
)
2
+
l+1

2
P
l
(
l+1
z
2
)
2
l+1
P
l
(
l+1
z
2
)[
l+1
z
1
P
l
(
l+1
z
2
)]
l+1
z
1
P
l
(
l+1
z
2
)[
l+1
P
l
(
l+1
z
2
)]
+
l+1
z
1

2
P
l
(
l+1
z
2
)
2
=2
l+1

2
P
l
(
l+1
z
2
)
2
+2
l+1

2
z
1

2
P
l
(
l+1
z
2
)
2
=2
l+1

2
P
l
(
l+1
z
2
)
2
+2
l+1

2
P
l
(z
2
)
2
, z S
1
. (58)
for all z S
1
. Since 
l+1
 = 
l+1
 , the above equation
becomes
2
_
P
l
(
l+1
z
2
)
2
+P
l
(
l+1
z
2
)
2
_

l+1

2
. (59)
Noticing that 
i
 = 
i
 and
i
S
1
(i {2 , . . . , l})
and
l+1
z
2
S
1
for any z S
1
, we apply the induction
assumption (57) of Step 2 to (59) and obtain
P
l
(
l+1
z
2
)
2
+P
l
(
l+1
z
2
)
2
=2
l
(
1

2
+
1

2
)
l
i=2

i

2
, z S
1
. (60)
Combining (60) and (59), we prove that
P
l+1
(z ;
l+1
,
l+1
,
l+1
, ...,
1
,
1
)
2
+P
l+1
(z ;
l+1
,
l+1
,
l+1
, ...,
1
,
1
)
2
=2
l+1
(
1

2
+
1

2
)
l
i=2

i

2

l+1

2
=2
l+1
(
1

2
+
1

2
)
l+1
i=2

i

2
(61)
which renders
max
zS
1
P
l+1
(z ;
l+1
,
l+1
,
l+1
,
1
,
1
)
2
max
zS
1
_
P
l+1
(z ;
l+1
,
l+1
,
l+1
,
1
,
1
)
2
+P
l+1
(z ;
l+1
,
l+1
,
l+1
,
1
,
1
)
2
_
2
l+1
(
1

2
+
1

2
)
l+1
i=2

i

2
(62)
for all z S
1
and the parameters chosen from (1) of (36) .
REFERENCES
[1] C. R oing and V. Tarokh, A construction of OFDM 16QAM codewords
having low peak powers, IEEE Trans. Inform. Theory, Vol. 47, No. 5,
pp. 20912094, Nov. 2001.
[2] A.E. Jones, T.A. Wilkinson and S.K. Barton, Block coding scheme
for reduction of peak to mean envelope power ratio of multicarrier
transmission schemes, Electron. Lett., Vol. 30, No. 25, pp. 20982099,
Dec. 1994.
[3] C.V. Chong, R. Venkataramani and V. Tarokh, A new construction of
16QAM Golay complementary sequences, IEEE Trans. Inform. Theory,
Vol. 49, No. 11, pp. 29532959, Nov. 2003.
[4] S. Boyd, Multitone signals with low crest factor, IEEE Trans. Circuits
Syst., Vol. CAS33, No. 10, pp. 10181022, 1986.
[5] J. A. Davis and J. Jedwab, Peaktomean power control in OFDM, Golay
complementary sequences and ReedMuller codes, IEEE Trans. Inform.
Theory, Vol. 45, No. 7, pp. 23972417, Nov. 1997.
[6] J. A. C. Bingham, Multicarrier modulation for data transmission: An idea
whose time has come, IEEE Commun. Mag., Vol. 28, No. 1, pp. 514,
May 1990.
[7] X. Li and L. J. Cimini Jr., Effects of clipping on the performance of
OFDM with transmitter diversity, Proc. IEEE VTC97, pp. 16341638,
May 1997.
[8] M. G. Parker and C. Tellambura, Generalised RudinShapiro construc
tions, Electronic Notes in Discrete Mathematics, WCC2001 International
Workshop on Coding and Cryptography, Vol. 6, Paris, April 2001.
[9] M. An, J. Byrnes, W. Moran, B. Saffari, H. S. Shapiro and R. Tolimieri,
PONS, ReedMuller codes, and group algebras, NATO Advanced Study
Institute: Computational Noncommutative Algebra and Applications, Tus
cany, Italy, July 2003.
[10] J. Zhao, Efcient identication of the codewords with low peakto
mean envelope power ratio of multicarrier transmission, Proc. IEEE
VTC04, pp. 373377, Sept. 2004.
[11] J. Zhao, A peaktomean power control schemethe extended Rudin
Shapiro construction, Proc. IEEE VTC04, pp. 621625, Sept. 2004.
[12] D. Wulich, Reduction of peaktomean ratio of multicarrier modulation
using cyclic coding, Electron. Lett., Vol. 32, No. 5, pp. 432433, Feb.
1996.
[13] R. B auml, R. Fischer and J. Huber, Reducing the peaktoaverage
power ratio of multicarrier modulation by selected mapping, Elect. Letts.,
Vol. 32, No. 22, pp. 20562057, Oct. 1996.
World Academy of Science, Engineering and Technology 11 2005
395