Research Article
Energy-Efficient Computational Offloading for Secure NOMA-Enabled Mobile Edge Computing Networks
Algorithm 2
Optimal solution to problem (
).1: Setting: , , , , , , ; | 2: Repeat | 3: Setting: , , , , , , ; | 4: Initialization: , ; | 5: Repeat | 6: Repeat | 7: Repeat | 8: Search with certain and via constraint of (22c); | 9: Until SOP converges to within a prescribed accuracy; | 10: Calculate ; | 11: Until satisfies the condition in (23b) | 12: Until | 13: Search to make the least; | 14: Calculate , , ; | 15: Output: , , , ; | 16:Until |
|