Research Article
Exploiting Opportunistic Scheduling for Physical-Layer Security in Multitwo User NOMA Networks
Algorithm 1
The Descent-based Algorithm for Finding
.Input: system parameters such as , , , , , , , ; and the given optimization parameters | such as step size, = , search length, = | Output: | (1) Assign iteration index to the initial: | (2) Choose a starting point of the searching optimal value: | (3) while do | (4) Update the searching optimal value: , | (5) end while | (6) return |
|