Supported by the expert-level advice of pioneering researchers, Orthogonal Frequency Division Multiple Access Fundamentals and Applications provides a comprehensive and accessible introduction to the foundations and applications of one of the most promising access technologies for current and future wireless networks. It includes authoritative coverage of the history, fundamental principles, key techniques, and critical design issues of OFDM systems.
Covering various techniques of effective resource management for OFDM/OFDMA-based wireless communication...
Supported by the expert-level advice of pioneering researchers, Orthogonal Frequency Division Multiple Access Fundamentals and Application...
This brief introduces overlapping coalition formation games (OCF games), a novel mathematical framework from cooperative game theory that can be used to model, design and analyze cooperative scenarios in future wireless communication networks.
The concepts of OCF games are explained, and several algorithmic aspects are studied. In addition, several major application scenarios are discussed. These applications are drawn from a variety of fields that include radio resource allocation in dense wireless networks, cooperative spectrum sensing for cognitive radio networks, and resource...
This brief introduces overlapping coalition formation games (OCF games), a novel mathematical framework from cooperative game theory that can be us...
Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless networks. Compared to cryptographic approaches, physical layer security is a fundamentally different paradigm where secrecy is achieved by exploiting the physical layer properties of the communication system, such as thermal noise, interference, and the time-varying nature of fading channels.
Written by pioneering researchers, Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent...
Physical layer security has recently become an emerging technique to complement and significantly improve the communication security of wireless ne...
Covering the fundamental theory together with the state of the art in research and development, this practical guide provides the techniques needed to design, analyze, and optimize device-to-device (D2D) communications in wireless networking. With an ever-increasing demand for higher data rate wireless access, D2D communication is set to become a key feature supported by next generation cellular networks. This book introduces D2D-based wireless communications from the physical, MAC, network, and application layer perspectives, providing all the key background information before moving on to...
Covering the fundamental theory together with the state of the art in research and development, this practical guide provides the techniques needed to...
This brief focuses on the use of full-duplex radio in cognitive radio networks, presenting a novel spectrum sharing protocol that allows the secondary users to simultaneously sense and access the vacant spectrum. This protocol, called "Listen-and-talk" (LAT), is evaluated by both mathematical analysis and computer simulations in comparison with other existing protocols, including the listen-before-talk protocol. In addition to LAT-based signal processing and resource allocation, the brief discusses techniques such as spectrum sensing and dynamic spectrum access. The brief proposes LAT as a...
This brief focuses on the use of full-duplex radio in cognitive radio networks, presenting a novel spectrum sharing protocol that allows the secondary...
This brief focuses on introducing a novel mathematical framework, referred as hypergraph theory, to model and solve the multiple interferer scenarios for future wireless communication networks. First, in Chap. 1, the authors introduce the basic preliminaries of hypergraph theory in general, and develop two hypergraph based polynomial algorithms, i.e., hypergraph coloring and hypergraph clustering. Then, in Chaps. 2 and 3, the authors present two emerging applications of hypergraph coloring and hypergraph clustering in Device-to-Device (D2D) underlay communication networks, respectively, in...
This brief focuses on introducing a novel mathematical framework, referred as hypergraph theory, to model and solve the multiple interferer scenari...