Limit search to available items
Book Cover
E-book

Title Interference mitigation in device-to-device communications / edited by Masood Ur Rehman, Ghazanfar Ali Safdar, Mohammad Asad Rehman Chaudhry
Published Hoboken, NJ : Wiley, 2022
Online access available from:
ProQuest Ebook Central    View Resource Record  

Copies

Description 1 online resource
Contents Preface -- Acknowledgments -- About the Editors -- List of Contributors -- Chapter 1: Introduction to D2D Communications -- 1.1 Evolution of D2D Communication -- 1.2 D2D Communication in Cellular Spectrum -- 1.3 Classification of D2D Communication -- 1.3.1 In-band D2D Communication -- 1.3.2 Out-band D2D Communication -- 1.4 Challenges in D2D Implementation -- 1.5 Book Organization -- 1.6 Summary -- Chapter 2: Interference Mitigation in D2D Communication Underlaying LTE-A Network -- 2.1 Applicability of D2D Communication -- 2.2 Interference - The Compelling Issue in D2D -- 2.3 Types of D2D Communication -- 2.3.1 In-Band D2D Communication -- 2.3.1.1Underlay In-Band -- 2.3.1.2 Overlay In-Band -- 2.3.2 Out-Band D2D Communication -- 2.3.2.1 Network-Assisted D2D Communication -- 2.3.2.2Autonomous D2D Communication -- 2.4 D2D Communication Underlaying Cellular Network - The Challenges -- 2.4.1 Device Discovery -- 2.4.2 Mode Selection -- 2.4.3 Radio Resource Management -- 2.4.4 Modification to LTE-A Architecture -- 2.4.5 Security in D2D -- 2.4.6 Mobility Management -- 2.5 Interference Management Techniques in D2D -- 2.5.1 Power Control Techniques -- 2.5.2 Radio Resource Allocation Techniques -- 2.5.3 Joint Power Control and Radio Resource Allocation Techniques -- 2.5.4 Spectrum Splitting Techniques -- 2.5.5 Other Interference Mitigation Techniques -- 2.5.6 Multiple-Input Multiple-Output Techniques -- 2.5.7 Comparative Analysis of D2D Interference Mitigation Techniques -- 2.6 Summary -- Chapter 3: Rethinking D2D Interference: Beyond the Past -- 3.1 Interference Manipulation -- 3.1.1 Example -- 3.2 Formulation of Interference Manipulation Problem -- 3.3 Matrix Rank Minimization: A Way to Manipulate Interference -- 3.3.1 Reduction of Interference Manipulation to Matrix Rank Minimization -- 3.3.2 Minimum Rank Matrix to Transmission Scheme -- 3.3.3 Does the Field Size Matter? -- 3.4 Interference Manipulation: A Boolean Satisfiability Approach -- 3.5 Interference Manipulation: Index Coding Perspective -- 3.5.1 Interference Manipulation is NP-hard -- 3.5.2: An Efficient Solution for Interference Manipulation -- 3.4 Summary -- Chapter 4: User Pairing Scheme for Efficient D2D Content Delivery in Cellular Networks -- 4.1 D2D Content Delivery -- 4.2 D2D Content Delivery Architecture -- 4.2.1 Network Model -- 4.2.2 Channel Model -- 4.2.3 Content Delivery Model -- 4.3 D2D Content Delivery Strategies -- 4.3.1 Pairing Range -- 4.3.2 Energy Efficiency for Multicast and Unicast -- 4.3.3 Caching and Delivery -- 4.4 D2D Delivery Mode Selection -- 4.5 Performance Evaluation -- 4.6 Summary -- Chapter 5: Resource Allocation for NOMA-based D2D Systems Coexisting with Cellular Networks -- 5.1 NOMA-based D2D Systems -- 5.2 System Model and Performance Analysis -- 5.2.1 System Model and Assumptions -- 5.2.2 Capacity Analysis of D2D and Cellular Networks -- 5.2.2.1 Uplink Cellular Networks Transmission -- 5.2.2.2 Downlink NOMA-D2D Transmission -- 5.3 Joint Subchannel Assignment and Power Control for D2D Communication -- 5.3.1 Subchannel Assignment Scheme -- 5.3.2 Power Control Scheme -- 5.4 Optimization of D2D Device Pairing -- 5.5 Results and Discussion -- 5.5.1 Channel Model -- 5.5.2 Performance Evaluation -- 5.6 Summary -- Chapter 6: Distributed Multi-Agent RL-Based Autonomous Spectrum Allocation in D2D Enabled Multi-Tier HetNets -- 6.1 D2D Resource Allocation Methods -- 6.2 Reinforcement Q-Learning -- 6.3 System Model -- 6.4 Resource Allocation in Multi-tier D2D Communication -- 6.4.1 Autonomous Spectrum Allocation Scheme -- 6.5 Performance Evaluation -- 6.5.1 Performance of D2D Users -- 6.5.2 Performance of Cellular Users -- 6.5.3 Coverage Analysis -- 6.5.4 Computational Time Analysis -- 6.5.5 Memory Requirements -- 6.5.6 Effect of Base Stations Density -- 6.5.7 Effect of Network Tiers -- 6.6 Summary -- Chapter 7: Adaptive Interference Aware Device-to-Device Enabled Unmanned Aerial Vehicle Communications -- 7.1 Key Elements in D2D Communication -- 7.1.1 D2D Network Discovery -- 7.1.2 SWIPT for D2D -- 7.1.3 Resource Allocation -- 7.1.4 3GPP Standardization -- 7.2 Unmanned Aerial Vehicles in D2D -- 7.2.1 Key Challenges in UAV-based D2D -- 7.2.2 Transmission over PC5 Interface for UAV-based D2D Discovery -- 7.2.3 Interference in UAV-based D2D -- 7.3 Summary -- Chapter 8: Emergency Device-to-Device Communication: Applicability, Case Studies and Interference Mitigation -- 8.1 Emergency D2D Communication -- 8.2 Approaches for Efficient Emergency D2D Communication -- 8.3 Emergency D2D Communication: Case Studies -- 8.4 Interference Mitigation in Emergency D2D Communication -- 8.4.1 Radiated Power Management -- 8.4.2 Frequency Allocation -- 8.4.2.1 Hybrid Schemes for Power Control and Intelligent Frequency Allocation -- 8.4.3 Time Division Multiplexing (TDM) -- 8.4.4 Adjacent Channel Interference Cancellation in DSRC -- 8.4.5 Use of MIMO Antennas -- 8.4.5.1 Beam Steering in 3GPP 5G NR Supported Vehicular Systems -- 8.5 Summary -- Chapter 9: Disaster Management Using D2D Communication With Power Transfer and Clustering Techniques -- 9.1 D2D Communication in Disaster Management -- 9.2 D2D Communication in Disaster Management: Key Considerations -- 9.3 D2D Disaster Management System Architecture -- 9.3.1 Time Switching Based Protocol -- 9.3.2 Network Configuration -- 9.3.3 Outage Probability for Mode Selection -- 9.4 Power Transfer Using Relaying and Clustering in D2D Disaster Management -- 9.4.1 System Model -- 9.4.2 Performance Evaluation -- 9.5 Results and Discussion -- 9.6 Summary -- Chapter 10: Road Ahead for D2D Communications -- 10.1 Future Prospects and Challenges -- 10.1.1 Spectrum Sharing and Coexistence -- 10.1.2 Standardization -- 10.1.3 Secure Communication -- 10.1.4 Energy Consumption and Energy Harvesting -- 10.1.5 Interreference Management -- 10.1.6 Resource Allocation -- 10.1.7 Device Discovery -- 10.1.8 Handover -- 10.1.9 D2D in Vehicular Communications -- 10.1.10 D2D in Disaster Management -- 10.1.11 D2D at Millimeter Wave Frequencies -- 10.1.12 D2D and Social Networks -- 10.1.13 D2D and Visible Light Communication -- Index
Summary "Device-to-Device Communications (D2D) is one of the key enabling technologies for the IoT and 5G which are the next technological marvels for the wireless industry. The performance of these wireless systems is degraded due to the interfering signals from proximity of legacy systems operating in similar frequency bands. Restriction of device form-factor and co-location of a number of electronic components in a small volume further complicates the design and efficiency challenge. These factors should be explored in order to get an efficient D2D solution working at a minimal interference level. This book fills the gap in addressing these important issues and will educate the reader on the most important aspects of the D2D communication and interference management techniques and lay the foundations for future advancements."-- Provided by publisher
Notes Includes index
Description based on print version record and CIP data provided by publisher; resource not viewed
Subject Electromagnetic interference.
Wireless communication systems.
Electromagnetic interference.
Wireless communication systems.
Form Electronic book
Author Chaudhry, Mohammad Asad Rehman, editor.
Safdar, Ghazanfar Ali, 1973- editor.
Ur-Rehman, Masood, editor.
LC no. 2021046320
ISBN 1119788803
1119788811
111978882X
9781119788805
9781119788812
9781119788829