Research Article

Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks

Algorithm 1

The Descent-based Algorithm for Finding .
Input: system parameters such as , , , , , , , ; and the given optimization parameters
 such as step size, = , search length, =
Output:
(1) Assign iteration index to the initial:
(2) Choose a starting point of the searching optimal value:
(3) while do
(4) Update the searching optimal value: ,
(5) end while
(6) return