CN105307280A - User combination determining method and device based on non-orthogonal multiple access - Google Patents

User combination determining method and device based on non-orthogonal multiple access Download PDF

Info

Publication number
CN105307280A
CN105307280A CN201510770576.0A CN201510770576A CN105307280A CN 105307280 A CN105307280 A CN 105307280A CN 201510770576 A CN201510770576 A CN 201510770576A CN 105307280 A CN105307280 A CN 105307280A
Authority
CN
China
Prior art keywords
group
user
cryptographic hash
noise ratio
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510770576.0A
Other languages
Chinese (zh)
Other versions
CN105307280B (en
Inventor
龙航
姚磊
梅杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201510770576.0A priority Critical patent/CN105307280B/en
Publication of CN105307280A publication Critical patent/CN105307280A/en
Application granted granted Critical
Publication of CN105307280B publication Critical patent/CN105307280B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • H04W72/121Wireless traffic scheduling for groups of terminals or users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria

Abstract

The embodiment of the invention discloses a user combination determining method and device based on non-orthogonal multiple access. In the case that the number of current regional users is N, if the number M of users in a final user combination is equal to 2, calculation of a proportional fairness factor value for at most N times needs to be carried out; if the number M of users in the final user combination is more than 2, calculation of the proportional fairness factor value for at most the time as shown in the specification needs to be carried out; calculation is far less than calculation of the proportional fairness factor value for the time as shown in the specification in the existing determining method; therefore, the time complexity for determining the final user combination is reduced; and occupation of system resources is reduced.

Description

A kind of user based on non-orthogonal multiple combines defining method and device
Technical field
The present invention relates to moving communicating field, particularly a kind of user based on non-orthogonal multiple combines defining method and device.
Background technology
Non-orthogonal multiple technology adopts nonopiate transmission at transmitting terminal, initiatively introduces interfere information, realize the technology of correct demodulation at receiving terminal by serial interference delete receiver.
At present, the user based on non-orthogonal multiple combines defining method and is: from N number of user of current region, choose M non-orthogonal multiple users multiplexing combine, total plant combination; Often kind of combination is calculated to the equitable proportion factor values of this combination; By combination maximum for the equitable proportion factor values calculated, be defined as end user's combination.
But, apply above-mentioned defining method, determine that the time complexity of final user's combination is higher, need take a long time and can determine final user's combination, occupying system resources.
Summary of the invention
The object of the embodiment of the present invention is to provide a kind of user based on non-orthogonal multiple to combine defining method and device, to reduce the time complexity determining final user's combination, reduces taking of system resource.
For achieving the above object, the embodiment of the invention discloses a kind of user based on non-orthogonal multiple and combining defining method, comprising:
A () obtains the Signal to Interference plus Noise Ratio of each user in N number of user of current region and the number of times that is scheduled, wherein, and a cryptographic Hash in the corresponding Hash table of each user;
B cryptographic Hash corresponding for described N number of user, according to the Signal to Interference plus Noise Ratio of each user in obtained N number of user, is divided into A group and B group by ();
(c) according to the number of times that is scheduled of each user, the cryptographic Hash that the minimum user of number of times of determining to be scheduled in A group and B group is corresponding;
D (), by Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, is defined as the first Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
E () determines the second maximum Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
F (), according to determined described first Signal to Interference plus Noise Ratio and described second Signal to Interference plus Noise Ratio, screens the Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
The equitable proportion factor of g each user that the Signal to Interference plus Noise Ratio of () A group respectively after calculating sifting and B group correspondence is corresponding;
H () by the user that equitable proportion factor pair maximum for the equitable proportion factor that the A group calculated and B group are corresponding is answered, is defined as the targeted customer of this group respectively;
I () judges whether number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination;
If, j () selects the user equal with the number of users M that end user combines from user corresponding to the cryptographic Hash that determined targeted customer is corresponding, selected user is combined, the combination comprising selected user is defined as end user's combination;
If not, (k), according to preset rules, determines the 3rd Signal to Interference plus Noise Ratio of A group and the described targeted customer of B group; And cryptographic Hash corresponding for described for B group targeted customer is replaced with cryptographic Hash corresponding to the described targeted customer of A group;
L cryptographic Hash corresponding for described N number of user, according to the Signal to Interference plus Noise Ratio of determined 3rd Signal to Interference plus Noise Ratio and other users except A group and the described targeted customer of B group, is divided into A group and B group by () again; Continue to perform described (c) to (i), until number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination.
Wherein, according to the Signal to Interference plus Noise Ratio of user each in N number of user, user is divided into A group and B group, can comprises:
According to S Signal to Interference plus Noise Ratio order from big to small, cryptographic Hash corresponding for S Signal to Interference plus Noise Ratio is sorted;
For the cryptographic Hash after sequence, if S is even number, then a front S/2 cryptographic Hash is divided into A group, remaining cryptographic Hash is divided into B group; If S is odd number, then front (S-1)/2 cryptographic Hash is divided into A group, remaining cryptographic Hash is divided into B group.
Wherein, the minimum user of the number of times that is scheduled in A group or B group has multiple, described by Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, be defined as A group and the first Signal to Interference plus Noise Ratio corresponding to B group respectively, can comprise:
By Signal to Interference plus Noise Ratio maximum in Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, be defined as the first Signal to Interference plus Noise Ratio of A group and B group correspondence respectively.
Wherein, described according to determined described first Signal to Interference plus Noise Ratio and described second Signal to Interference plus Noise Ratio, respectively the Signal to Interference plus Noise Ratio of A group and B group correspondence is screened, can comprise:
Filter out the cryptographic Hash that the Signal to Interference plus Noise Ratio of the Signal to Interference plus Noise Ratio in A group and B group, cryptographic Hash is corresponding between described first Signal to Interference plus Noise Ratio and described second Signal to Interference plus Noise Ratio is corresponding respectively.
Wherein, described according to preset rules, determine the 3rd Signal to Interference plus Noise Ratio of A group and the described targeted customer of B group, can comprise:
3rd Signal to Interference plus Noise Ratio of targeted customer described in A group is set to: 10 1 2 [ lg ( 1 + γ k o m a ( u k , i ) ) + lg ( 1 + γ k o m a ( u k , j ) ) ] - 1 ;
Wherein, for the Signal to Interference plus Noise Ratio of targeted customer described in A group, for the Signal to Interference plus Noise Ratio of targeted customer described in B group;
3rd Signal to Interference plus Noise Ratio of targeted customer described in B group is set to 0.
Wherein, number of users corresponding to the described cryptographic Hash corresponding when determined targeted customer is not less than the number of users M of end user's combination, from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, select the user equal with the number of users M that end user combines, can comprise:
When the number of users that the cryptographic Hash that determined targeted customer is corresponding is corresponding equals the number of users M of end user's combination, the user that the cryptographic Hash selecting whole determined targeted customer corresponding is corresponding.
Wherein, number of users corresponding to the described cryptographic Hash corresponding when determined targeted customer is not less than the number of users M of end user's combination, from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, select the user equal with the number of users M that end user combines, can comprise:
When the number of users that the cryptographic Hash that determined targeted customer is corresponding is corresponding is greater than the number of users M of end user's combination, the user that Stochastic choice is equal with the number of users M that end user combines from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding.
Wherein, number of users corresponding to the described cryptographic Hash corresponding when determined targeted customer is not less than the number of users M of end user's combination, from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, select the user equal with the number of users M that end user combines, can comprise:
When the number of users that the cryptographic Hash that determined targeted customer is corresponding is corresponding is greater than the number of users M of end user's combination, according to the order of described cryptographic Hash in Hash table, from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, select the user equal with the number of users M that end user combines.
Wherein, number of users corresponding to the described cryptographic Hash corresponding when determined targeted customer is not less than the number of users M of end user's combination, from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, select the user equal with the number of users M that end user combines, can comprise:
When the number of users that the cryptographic Hash that determined targeted customer is corresponding is corresponding is greater than the number of users M of end user's combination, select the first user corresponding from the cryptographic Hash that the described targeted customer of A group is corresponding;
When the number of users that the cryptographic Hash that the described targeted customer of A group is corresponding is corresponding is less than the number of users M of end user's combination, then select from user corresponding to the cryptographic Hash that the described targeted customer of B group is corresponding.
For achieving the above object, the embodiment of the invention discloses a kind of user's combination determination means based on non-orthogonal multiple, comprise: obtain module, the first grouping module, the first determination module, the second determination module, the 3rd determination module, screening module, computing module, the 4th determination module, judge module, the 5th determination module, the 6th determination module and the second grouping module, wherein
Described acquisition module, for obtain current region N number of user in the Signal to Interference plus Noise Ratio of each user and the number of times that is scheduled, wherein, a cryptographic Hash in the corresponding Hash table of each user;
Described first grouping module, for the Signal to Interference plus Noise Ratio according to each user in obtained N number of user, is divided into A group and B group by cryptographic Hash corresponding for described N number of user;
Described first determination module, for the number of times that is scheduled according to each user, the cryptographic Hash that the minimum user of number of times of determining to be scheduled in A group and B group is corresponding;
Described second determination module, for by Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, is defined as the first Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
Described 3rd determination module, for determining the second maximum Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
Described screening module, for according to determined described first Signal to Interference plus Noise Ratio of described second determination module and determined described second Signal to Interference plus Noise Ratio of described 3rd determination module, screens the Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
Described computing module, the equitable proportion factor of each user that the Signal to Interference plus Noise Ratio for distinguishing the A group after calculating sifting and B group correspondence is corresponding;
Described 4th determination module, for the user that the A group that calculated by described computing module respectively and the maximum equitable proportion factor pair of the equitable proportion factor corresponding to B group are answered, is defined as the targeted customer of this group;
Described judge module, for judging whether number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination;
Described 5th determination module, for judging that at described judge module number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination, the user equal with the number of users M that end user combines is selected from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, selected user is combined, the combination comprising selected user is defined as end user's combination;
Described 6th determination module, for judging that at described judge module number of users corresponding to cryptographic Hash corresponding to determined targeted customer is less than the number of users M of end user's combination, according to preset rules, determine the 3rd Signal to Interference plus Noise Ratio of A group and the described targeted customer of B group; And cryptographic Hash corresponding for described for B group targeted customer is replaced with cryptographic Hash corresponding to the described targeted customer of A group;
Described second grouping module, for the Signal to Interference plus Noise Ratio according to determined 3rd Signal to Interference plus Noise Ratio of described 6th determination module and other users except A group and the described targeted customer of B group, is divided into A group and B group by cryptographic Hash corresponding for described N number of user again.
As seen from the above technical solution, in the embodiment of the present invention, when current region number of users is N, if the number of users M in end user's combination equals 2, then need at most the calculating carrying out N equitable proportion factor values, if the number of users M in end user's combination is greater than 2, then need at most to carry out the calculating of secondary equitable proportion factor values, is far smaller than in existing defining method the calculating of secondary equitable proportion factor values, decreases the time complexity determining final user's combination, decreases taking of system resource.
Certainly, arbitrary product of the present invention is implemented or method must not necessarily need to reach above-described all advantages simultaneously.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 combines a kind of schematic flow sheet of defining method for the user based on non-orthogonal multiple that the embodiment of the present invention provides;
A kind of structural representation of the user's combination determination means based on non-orthogonal multiple that Fig. 2 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
In order to solve prior art problem, embodiments providing a kind of user based on non-orthogonal multiple and combining defining method and device.First a kind of user based on non-orthogonal multiple provided the embodiment of the present invention below combines defining method and is introduced.
Fig. 1 combines a kind of schematic flow sheet of defining method for the user based on non-orthogonal multiple that the embodiment of the present invention provides, can comprise:
S101: obtain the Signal to Interference plus Noise Ratio of each user in N number of user of current region and the number of times that is scheduled, wherein, a cryptographic Hash in the corresponding Hash table of each user.
In actual applications, cryptographic Hash can be the label of user, and Hash table can as the index searching user label.Suppose that N is 22, cryptographic Hash corresponding to each user stored in Hash table is [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22].
S102: according to the Signal to Interference plus Noise Ratio of each user in obtained N number of user, cryptographic Hash corresponding for N number of user is divided into A group and B group.
Preferably, according to the Signal to Interference plus Noise Ratio of user each in N number of user, cryptographic Hash corresponding for user is divided into A group and B group, can according to S Signal to Interference plus Noise Ratio order from big to small, cryptographic Hash corresponding for S Signal to Interference plus Noise Ratio is sorted; For the cryptographic Hash after sequence, if S is even number, then a front S/2 cryptographic Hash is divided into A group, remaining cryptographic Hash is divided into B group; If S is odd number, then front (S-1)/2 cryptographic Hash is divided into A group, remaining cryptographic Hash is divided into B group.
Also be described with above-mentioned example, under initial condition, the corresponding Signal to Interference plus Noise Ratio of each user, the number S of Signal to Interference plus Noise Ratio equals user number N, is 22.Suppose that the Signal to Interference plus Noise Ratio of these 22 users is followed successively by according to order from big to small: [108.26,70.56,54.41,13.61,7.32,7.01,6.89,6.62,5.44,5.21,4.11,3.28,3.05,2.23,1.87,1.25,0.83,0.58,0.50,0.31,0.28,0.15], corresponding cryptographic Hash is followed successively by [7,1,14,2,15,10,16,8,19,17,6,13,5,11,22,3,12,21,20,4,9,18].22 is even number, then front 11 cryptographic Hash are divided into A group, and after remaining cryptographic Hash is divided into B component group, the cryptographic Hash namely in A group is [7,1,14,2,15,10,16,8,19,17,6], the cryptographic Hash in B group is [13,5,11,22,3,12,21,20,4,9,18].
S103: according to the number of times that is scheduled of each user, the cryptographic Hash that the minimum user of number of times of determining to be scheduled in A group and B group is corresponding.
In moving communicating field, when there being multiple user to share resource, the mode with regard to needs scheduling determines the order that resource uses, Resources allocation effectively.In prior art, dispatching algorithm has the scheduling of Round Robin, max carrier to interference, Proportional Fair etc., does not limit at this.
S104: by Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, is defined as the first Signal to Interference plus Noise Ratio of A group and B group correspondence respectively.
In actual applications, the minimum user of the number of times that is scheduled in A group or B group has multiple, described by Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, be defined as the first Signal to Interference plus Noise Ratio of A group and B group correspondence respectively, Signal to Interference plus Noise Ratio that can be maximum in the Signal to Interference plus Noise Ratio that user minimum for the number of times that is scheduled in determined A group and B group is corresponding, is defined as A group and the first Signal to Interference plus Noise Ratio corresponding to B group respectively.
S105: the second maximum Signal to Interference plus Noise Ratio determining A group and B group correspondence respectively.
S106: according to determined described first Signal to Interference plus Noise Ratio and described second Signal to Interference plus Noise Ratio, screens the Signal to Interference plus Noise Ratio of A group and B group correspondence respectively.
Concrete, according to determined described first Signal to Interference plus Noise Ratio and described second Signal to Interference plus Noise Ratio, respectively the Signal to Interference plus Noise Ratio of A group and B group correspondence is screened, the cryptographic Hash that the Signal to Interference plus Noise Ratio of the Signal to Interference plus Noise Ratio in A group and B group, cryptographic Hash is corresponding between described first Signal to Interference plus Noise Ratio and described second Signal to Interference plus Noise Ratio is corresponding can be filtered out respectively.
S107: the equitable proportion factor of each user that the Signal to Interference plus Noise Ratio of the A group respectively after calculating sifting and B group correspondence is corresponding.
S108: respectively by the user that equitable proportion factor pair maximum for the equitable proportion factor that the A group calculated and B group are corresponding is answered, be defined as the targeted customer of this group.
Also be described with above-mentioned example, suppose that in A group, the number of times that is scheduled of user is followed successively by [65,67,54,51,81,46,84,68,79,52,43], in B group, the number of times that is scheduled of user is followed successively by [55,137,78,101,47,79,68,51,45,41,63].Cryptographic Hash corresponding to the minimum user of the number of times that is scheduled in A group and B group is respectively [6] and [9], then the first Signal to Interference plus Noise Ratio that in A group and B group, cryptographic Hash is respectively the user of [6] and [9] corresponding is respectively 4.11 and 0.28.
The second maximum Signal to Interference plus Noise Ratio corresponding to A group is 108.26, and corresponding cryptographic Hash be [7], and be 2.48 with the second maximum Signal to Interference plus Noise Ratio of correspondence in B group, the cryptographic Hash of correspondence is [13].
First Signal to Interference plus Noise Ratio corresponding to A group is the 4.11, second Signal to Interference plus Noise Ratio is 108.26, and the cryptographic Hash filtering out Signal to Interference plus Noise Ratio in A group between 4.11-108.26 corresponding is [7,1,14,2,15,10,16,8,19,17,6]; First Signal to Interference plus Noise Ratio corresponding to B group is the 0.28, second Signal to Interference plus Noise Ratio is 2.48, filters out the cryptographic Hash that Signal to Interference plus Noise Ratio in B group between 0.28-2.48 is corresponding, is [13,5,11,22,3,12,21,20,4,9].
The equitable proportion factor of each user that the Signal to Interference plus Noise Ratio of the A group respectively after calculating sifting and B group correspondence is corresponding, the account form of equitable proportion factor values is prior art, does not repeat at this.
Suppose that the equitable proportion factor values of the user that the cryptographic Hash that filters out in A group is corresponding is followed successively by [2.48,2.56,2.70,2.59,2.62,2.0,1,3.87,2.26,3.13,3.64,3.30], maximum equitable proportion factor values is 3.87, corresponding cryptographic Hash is 16, is that the user of 16 is defined as the targeted customer of A group by cryptographic Hash.The equitable proportion factor values of the user that the cryptographic Hash filtered out in B group is corresponding is followed successively by [5.83,3.57,3.46,3.44,10.15,2.82,3.40,7.86,1.76,3.64], maximum equitable proportion factor values is 10.15, corresponding cryptographic Hash is 3, is that the user of 3 is defined as the targeted customer of B group by cryptographic Hash.
S109: judge whether number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination.
If so, perform S110, if not, perform S111.
S110: select the user equal with the number of users M that end user combines from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, selected user combined, is defined as end user's combination by the combination comprising selected user.
The targeted customer of the A group determined for cryptographic Hash be the user of [16], the targeted customer of B group for cryptographic Hash be the user of [3], cryptographic Hash [16] and [3] only corresponding user respectively, number of users corresponding to the cryptographic Hash that therefore determined targeted customer is corresponding is 2.If the number of users of end user's combination is 2, be then that two users of [16] and [3] combine by cryptographic Hash, and this combination is defined as end user's combination.
As can be seen here, when the number of users of end user's combination equals 2, need at most the calculating carrying out N equitable proportion factor values, can determine that end user combines.
S111: according to preset rules, determines the 3rd Signal to Interference plus Noise Ratio of A group and B group targeted customer; And cryptographic Hash corresponding for described for B group targeted customer is replaced with cryptographic Hash corresponding to the described targeted customer of A group.
Concrete, according to preset rules, determine the 3rd Signal to Interference plus Noise Ratio of A group and the described targeted customer of B group, the 3rd Signal to Interference plus Noise Ratio of targeted customer described in A group can be set to: wherein, for the Signal to Interference plus Noise Ratio of targeted customer described in A group, for the Signal to Interference plus Noise Ratio of targeted customer described in B group; 3rd Signal to Interference plus Noise Ratio of targeted customer described in B group is set to 0.
If the number of users of end user's combination is 3, then by the targeted customer of A group, namely cryptographic Hash is that the Signal to Interference plus Noise Ratio of the user of [16] is set to wherein, be the Signal to Interference plus Noise Ratio of the user of [16] for cryptographic Hash, it is the Signal to Interference plus Noise Ratio of the user of [3] for cryptographic Hash.That is, be that the Signal to Interference plus Noise Ratio of user of [16] is set to 3.21 cryptographic Hash.
Be that the Signal to Interference plus Noise Ratio of the user of [3] is set to 0 by cryptographic Hash, and its cryptographic Hash is replaced with [16].Cryptographic Hash corresponding to each user then stored in Hash table is [1,2,16,4,5,6,7,8,9,10,11,12,13,14,7,15,16,17,18,19,20,21,22].
S112: according to the Signal to Interference plus Noise Ratio of determined 3rd Signal to Interference plus Noise Ratio and other users except A group and B group targeted customer, again cryptographic Hash corresponding for described N number of user is divided into A group and B group.
Preferably, according to the Signal to Interference plus Noise Ratio of user each in N number of user, cryptographic Hash corresponding for user is divided into A group and B group, can according to S Signal to Interference plus Noise Ratio order from big to small, cryptographic Hash corresponding for S Signal to Interference plus Noise Ratio is sorted; For the cryptographic Hash after sequence, if S is even number, then a front S/2 cryptographic Hash is divided into A group, remaining cryptographic Hash is divided into B group; If S is odd number, then front (S-1)/2 cryptographic Hash is divided into A group, remaining cryptographic Hash is divided into B group.
The Signal to Interference plus Noise Ratio of A group targeted customer is the Signal to Interference plus Noise Ratio of 3.21, B group targeted customer is 0, gets rid of, again sorts to Signal to Interference plus Noise Ratio: [108.26,70.56,54.41,13.61,7.32 by 0,7.01,6.89,6.62,5.44,5.21,3.28,3.21,3.05,2.23,1.87,0.83,0.58,0.50,0.31,0.28,0.15], corresponding cryptographic Hash is followed successively by [7,1,14,2,15,10,8,19,17,6,13,16,5,11,22,12,21,20,4,9,18].Now, the number S of Signal to Interference plus Noise Ratio is 21,21 is odd number, and front (S-1)/2=10 cryptographic Hash is divided into A group, and remaining cryptographic Hash is divided into B group.Namely the cryptographic Hash in A group is [7,1,14,2,15,10,8,19,17,6], and the cryptographic Hash in B group is [13,16,5,11,22,12,21,4,9,18].
Continue afterwards to perform S103-S109, until number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users of end user's combination.
In A group, the number of times that is scheduled of user is followed successively by [65,67,54,51,81,46,68,79,52,43], and in B group, the number of times that is scheduled of user is followed successively by [55,84,137,78,101,79,68,51,45,41,63].Cryptographic Hash corresponding to the minimum user of the number of times that is scheduled in A group and B group is respectively [6] and [9], then the first Signal to Interference plus Noise Ratio that in A group and B group, cryptographic Hash is respectively the user of [6] and [9] corresponding is respectively 4.11 and 0.28.
The second maximum Signal to Interference plus Noise Ratio that in A group, cryptographic Hash is corresponding is 108.26, and corresponding cryptographic Hash is [7], and the second maximum Signal to Interference plus Noise Ratio that in B group, cryptographic Hash is corresponding is 2.48, and corresponding cryptographic Hash is [13].
Filtering out the Signal to Interference plus Noise Ratio in A group and B group, cryptographic Hash is corresponding is respectively the cryptographic Hash that Signal to Interference plus Noise Ratio between the first Signal to Interference plus Noise Ratio and the second Signal to Interference plus Noise Ratio is corresponding.Filtering out the cryptographic Hash that Signal to Interference plus Noise Ratio in A group between 4.11-108.26 is corresponding, is [7,1,14,2,15,10,8,19,17,6], filtering out the cryptographic Hash that Signal to Interference plus Noise Ratio in B group between 0.28-2.48 is corresponding, is [13,16,5,11,22,12,21,20,4,9].
Calculate the equitable proportion factor values of user corresponding to the cryptographic Hash that filters out in A group and B group respectively, suppose that the equitable proportion factor values of the user that the cryptographic Hash that filters out in A group is corresponding is followed successively by [2.48,2.56,2.70,2.59,2.62,2.0,1,2.26,3.13,3.64,3.30], maximum equitable proportion factor values is 3.64, corresponding cryptographic Hash is 17, is that the user of 17 is defined as the targeted customer of A group by cryptographic Hash.The equitable proportion factor values of the user that the cryptographic Hash filtered out in B group is corresponding is followed successively by [5.83,3.87,3.57,3.46,3.44,2.82,3.40,7.86,1.76,3.64], maximum equitable proportion factor values is 7.86, corresponding cryptographic Hash is 20, is that the user of 20 is defined as the targeted customer of B group by cryptographic Hash.
The targeted customer of the A group determined for cryptographic Hash be the user of [17], the targeted customer of B group for cryptographic Hash be the user of [20], cryptographic Hash [17] and [20] are a corresponding user respectively, number of users corresponding to the cryptographic Hash that therefore determined targeted customer is corresponding is 2, is still less than the number of users 3 of end user's combination.
By the targeted customer of A group, namely cryptographic Hash is that the Signal to Interference plus Noise Ratio of the user of [17] is set to wherein, be the Signal to Interference plus Noise Ratio of the user of [17] for cryptographic Hash, it is the Signal to Interference plus Noise Ratio of the user of [20] for cryptographic Hash.That is, be that the Signal to Interference plus Noise Ratio of user of [17] is set to 2.05 cryptographic Hash.
Be that the Signal to Interference plus Noise Ratio of the user of [20] is set to 0 by cryptographic Hash, and its cryptographic Hash is replaced with [17].Cryptographic Hash corresponding to each user then stored in Hash table is [1,2,16,4,5,6,7,8,9,10,11,12,13,14,7,15,16,17,18,19,17,21,22].
The Signal to Interference plus Noise Ratio of A group targeted customer is the Signal to Interference plus Noise Ratio of 2.05, B group targeted customer is 0, gets rid of, again sorts to Signal to Interference plus Noise Ratio: [108.26,70.56,54.41,13.61,7.32 by 0,7.01,6.89,6.62,5.44,3.28,3.21,3.05,2.23,2.05,1.87,0.83,0.58,0.31,0.28,0.15], corresponding cryptographic Hash is followed successively by [7,1,14,2,15,10,8,19,6,13,16,5,11,17,22,12,21,4,9,18].Now, the number S of Signal to Interference plus Noise Ratio is 20,20 is even number, and a front S/2=10 cryptographic Hash is divided into A group, and remaining cryptographic Hash is divided into B group.Namely the cryptographic Hash in A group is [7,1,14,2,15,10,8,19,6,13], and the cryptographic Hash in B group is [16,5,11,17,22,12,21,4,9,18].
Continue afterwards to perform S103-S109, until number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users of end user's combination.
In A group, the number of times that is scheduled of user is followed successively by [65,67,54,51,81,46,68,79,43,55], and in B group, the number of times that is scheduled of user is followed successively by [84,137,78,52,101,79,68,45,41,63].Cryptographic Hash corresponding to the minimum user of the number of times that is scheduled in A group and B group is respectively [6] and [9], then the first Signal to Interference plus Noise Ratio that in A group and B group, cryptographic Hash is respectively the user of [6] and [9] corresponding is respectively 4.11 and 0.28.
The second maximum Signal to Interference plus Noise Ratio that in A group, cryptographic Hash is corresponding is 108.26, and corresponding cryptographic Hash is [7], and the second maximum Signal to Interference plus Noise Ratio that in B group, cryptographic Hash is corresponding is 2.48, and corresponding cryptographic Hash is [13].
Filtering out the Signal to Interference plus Noise Ratio in A group and B group, cryptographic Hash is corresponding is respectively the cryptographic Hash that Signal to Interference plus Noise Ratio between the first Signal to Interference plus Noise Ratio and the second Signal to Interference plus Noise Ratio is corresponding.Filtering out the cryptographic Hash that Signal to Interference plus Noise Ratio in A group between 4.11-108.26 is corresponding, is [7,1,14,2,15,10,8,19,6,13], filtering out the cryptographic Hash that Signal to Interference plus Noise Ratio in B group between 0.28-2.48 is corresponding, is [16,5,11,17,22,12,21,4,9].
Calculate the equitable proportion factor values of user corresponding to the cryptographic Hash that filters out in A group and B group respectively, suppose that the equitable proportion factor values of the user that the cryptographic Hash that filters out in A group is corresponding is followed successively by [2.48,2.56,2.70,2.59,2.62,2.0,1,2.26,3.13,3.30,5.83], maximum equitable proportion factor values is 5.83, corresponding cryptographic Hash is 13, is that the user of 13 is defined as the targeted customer of A group by cryptographic Hash.The equitable proportion factor values of the user that the cryptographic Hash filtered out in B group is corresponding is followed successively by [3.87,3.57,3.46,3.64,3.44,2.82,3.4,1.76,3.64], maximum equitable proportion factor values is 3.87, and corresponding cryptographic Hash is [16], is the targeted customer that the user of [16] is defined as B group by cryptographic Hash.
The targeted customer of the A group determined for cryptographic Hash be the user of [13], the targeted customer of B group for cryptographic Hash be the user of [16].Corresponding two users of cryptographic Hash [16], the corresponding user of cryptographic Hash [13], number of users corresponding to the cryptographic Hash that therefore determined targeted customer is corresponding is 3.Now, judge that number of users 3 corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users 3 of end user's combination.Two users of a user corresponding by cryptographic Hash [13] and cryptographic Hash [16] correspondence combine, and this combination are defined as end user's combination.
As can be seen here, when the number of users of end user's combination is greater than 2, be set to M, current region number of users is N, then only needed at the most the calculating of secondary equitable proportion factor values.
In actual applications, when the number of users that the cryptographic Hash that determined targeted customer is corresponding is corresponding equals the number of users M of end user's combination, the user that the cryptographic Hash selecting whole determined targeted customer corresponding is corresponding, i.e. the situation of above-mentioned example appearance.
When the number of users that the cryptographic Hash that determined targeted customer is corresponding is corresponding is greater than the number of users M of end user's combination, three kinds of methods can be had.
First method: the user that Stochastic choice is equal with the number of users M that end user combines from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding.
Second method: according to the order of described cryptographic Hash in Hash table, selects the user equal with the number of users M that end user combines from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding.
The third method: select the first user corresponding from the cryptographic Hash that the described targeted customer of A group is corresponding; When the number of users that the cryptographic Hash that the described targeted customer of A group is corresponding is corresponding is less than the number of users M of end user's combination, then select from user corresponding to the cryptographic Hash that the described targeted customer of B group is corresponding.
Suppose the targeted customer of the A group determined for cryptographic Hash be the user of [13], the targeted customer of B group for cryptographic Hash be the user of [16].Corresponding two users of cryptographic Hash [16], cryptographic Hash [13] is corresponding two users also, and number of users corresponding to the cryptographic Hash that therefore determined targeted customer is corresponding is 4.
Can first method be adopted, Stochastic choice 3 in 4 users that the cryptographic Hash that the targeted customer determined is corresponding is corresponding, by this 3 users combination, and combine and be defined as end user and combine.
Can second method be adopted, suppose that the cryptographic Hash stored in Hash table is [1,2,16,4,5,6,7,8,9,10,11,12,13,14,7,15,16,17,18,19,17,13,22], according to cryptographic Hash [13] and [16] sequencing in Hash table, select [16], [13] and [16] three users that cryptographic Hash is corresponding that first occur, by these 3 users' combinations, and combined and be defined as end user and combine.
The third method can be adopted, select the user that the first cryptographic Hash [13] corresponding from A group targeted customer is corresponding; Cryptographic Hash [13] is corresponding two users, are less than the number of users 3 of end user's combination, then select from the user of cryptographic Hash [16] correspondence corresponding to B group targeted customer.
The present invention is embodiment illustrated in fig. 1 in application, when current region number of users is N, if the number of users M in end user's combination equals 2, then need at most the calculating carrying out N equitable proportion factor values, if the number of users M in end user's combination is greater than 2, then need at most to carry out the calculating of secondary equitable proportion factor values, is far smaller than in existing defining method the calculating of secondary equitable proportion factor values, decreases the time complexity determining final user's combination, decreases taking of system resource.
Corresponding with above-mentioned embodiment of the method, the embodiment of the present invention also provides a kind of user's combination determination means based on non-orthogonal multiple.
A kind of structural representation of the user's combination determination means based on non-orthogonal multiple that Fig. 2 provides for the embodiment of the present invention, can comprise: obtain module 201, first grouping module 202, first determination module 203, second determination module 204, the 3rd determination module 205, screening module 206, computing module 207, the 4th determination module 208, judge module 209, the 5th determination module 210, the 6th determination module 211 and the second grouping module 212, wherein
Obtain module 201, for obtain current region N number of user in the Signal to Interference plus Noise Ratio of each user and the number of times that is scheduled, wherein, a cryptographic Hash in the corresponding Hash table of each user;
First grouping module 202, for the Signal to Interference plus Noise Ratio according to each user in obtained N number of user, is divided into A group and B group by cryptographic Hash corresponding for described N number of user;
First determination module 203, for the number of times that is scheduled according to each user, the cryptographic Hash that the minimum user of number of times of determining to be scheduled in A group and B group is corresponding;
Second determination module 204, for by Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, is defined as the first Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
3rd determination module 205, for determining the second maximum Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
Screening module 206, for according to determined described first Signal to Interference plus Noise Ratio of the second determination module 204 and determined described second Signal to Interference plus Noise Ratio of the 3rd determination module 205, screens the Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
Computing module 207, for after respectively calculating sifting, the equitable proportion factor of each user that the Signal to Interference plus Noise Ratio of A group and B group correspondence is corresponding;
4th determination module 208, for the user that the A group that calculated by computing module 207 respectively and the maximum equitable proportion factor pair of the equitable proportion factor corresponding to B group are answered, is defined as the targeted customer of this group;
Judge module 209, for judging whether number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination;
5th determination module 210, for judging that at judge module 209 number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination, the user equal with the number of users M that end user combines is selected from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, selected user is combined, the combination comprising selected user is defined as end user's combination;
6th determination module 211, for judging that at judge module 209 number of users corresponding to cryptographic Hash corresponding to determined targeted customer is less than the number of users M of end user's combination, according to preset rules, determine the 3rd Signal to Interference plus Noise Ratio of A group and the described targeted customer of B group; And cryptographic Hash corresponding for described for B group targeted customer is replaced with cryptographic Hash corresponding to the described targeted customer of A group;
Second grouping module 212, for the Signal to Interference plus Noise Ratio according to determined 3rd Signal to Interference plus Noise Ratio of the 6th determination module 211 and other users except A group and the described targeted customer of B group, is divided into A group and B group by cryptographic Hash corresponding for described N number of user again.
The present invention is embodiment illustrated in fig. 2 in application, when current region number of users is N, if the number of users M in end user's combination equals 2, then need at most the calculating carrying out N equitable proportion factor values, if the number of users M in end user's combination is greater than 2, then need at most to carry out the calculating of secondary equitable proportion factor values, is far smaller than in existing defining method the calculating of secondary equitable proportion factor values, decreases the time complexity determining final user's combination, decreases taking of system resource.
It should be noted that, in this article, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operating space, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
Each embodiment in this specification all adopts relevant mode to describe, between each embodiment identical similar part mutually see, what each embodiment stressed is the difference with other embodiments.Especially, for device embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, relevant part illustrates see the part of embodiment of the method.
One of ordinary skill in the art will appreciate that all or part of step realized in said method execution mode is that the hardware that can carry out instruction relevant by program has come, described program can be stored in computer read/write memory medium, here the alleged storage medium obtained, as: ROM/RAM, magnetic disc, CD etc.
The foregoing is only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention.All any amendments done within the spirit and principles in the present invention, equivalent replacement, improvement etc., be all included in protection scope of the present invention.

Claims (10)

1. the user based on non-orthogonal multiple combines a defining method, it is characterized in that, comprising:
A () obtains the Signal to Interference plus Noise Ratio of each user in N number of user of current region and the number of times that is scheduled, wherein, and a cryptographic Hash in the corresponding Hash table of each user;
B cryptographic Hash corresponding for described N number of user, according to the Signal to Interference plus Noise Ratio of each user in obtained N number of user, is divided into A group and B group by ();
(c) according to the number of times that is scheduled of each user, the cryptographic Hash that the minimum user of number of times of determining to be scheduled in A group and B group is corresponding;
D (), by Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, is defined as the first Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
E () determines the second maximum Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
F (), according to determined described first Signal to Interference plus Noise Ratio and described second Signal to Interference plus Noise Ratio, screens the Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
The equitable proportion factor of g each user that the Signal to Interference plus Noise Ratio of () A group respectively after calculating sifting and B group correspondence is corresponding;
H () by the user that equitable proportion factor pair maximum for the equitable proportion factor that the A group calculated and B group are corresponding is answered, is defined as the targeted customer of this group respectively;
I () judges whether number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination;
If, j () selects the user equal with the number of users M that end user combines from user corresponding to the cryptographic Hash that determined targeted customer is corresponding, selected user is combined, the combination comprising selected user is defined as end user's combination;
If not, (k), according to preset rules, determines the 3rd Signal to Interference plus Noise Ratio of A group and the described targeted customer of B group; And cryptographic Hash corresponding for described for B group targeted customer is replaced with cryptographic Hash corresponding to the described targeted customer of A group;
L cryptographic Hash corresponding for described N number of user, according to the Signal to Interference plus Noise Ratio of determined 3rd Signal to Interference plus Noise Ratio and other users except A group and the described targeted customer of B group, is divided into A group and B group by () again; Continue to perform described (c) to (i), until number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination.
2. method according to claim 1, is characterized in that, according to the Signal to Interference plus Noise Ratio of user each in N number of user, user is divided into A group and B group, comprises:
According to S Signal to Interference plus Noise Ratio order from big to small, cryptographic Hash corresponding for S Signal to Interference plus Noise Ratio is sorted;
For the cryptographic Hash after sequence, if S is even number, then a front S/2 cryptographic Hash is divided into A group, remaining cryptographic Hash is divided into B group; If S is odd number, then front (S-1)/2 cryptographic Hash is divided into A group, remaining cryptographic Hash is divided into B group.
3. method according to claim 1, it is characterized in that, the minimum user of the number of times that is scheduled in A group or B group has multiple, described by Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, be defined as the first Signal to Interference plus Noise Ratio of A group and B group correspondence respectively, comprise:
By Signal to Interference plus Noise Ratio maximum in Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, be defined as the first Signal to Interference plus Noise Ratio of A group and B group correspondence respectively.
4. method according to claim 1, is characterized in that, described according to determined described first Signal to Interference plus Noise Ratio and described second Signal to Interference plus Noise Ratio, screens respectively, comprising the Signal to Interference plus Noise Ratio of A group and B group correspondence:
Filter out the cryptographic Hash that the Signal to Interference plus Noise Ratio of the Signal to Interference plus Noise Ratio in A group and B group, cryptographic Hash is corresponding between described first Signal to Interference plus Noise Ratio and described second Signal to Interference plus Noise Ratio is corresponding respectively.
5. method according to claim 1, is characterized in that, described according to preset rules, determines the 3rd Signal to Interference plus Noise Ratio of A group and the described targeted customer of B group, comprising:
3rd Signal to Interference plus Noise Ratio of targeted customer described in A group is set to: 10 1 2 [ lg ( 1 + γ k o m a ( u k , i ) ) + lg ( 1 + γ k o m a ( u k , j ) ) ] - 1 ;
Wherein, for the Signal to Interference plus Noise Ratio of targeted customer described in A group, for the Signal to Interference plus Noise Ratio of targeted customer described in B group;
3rd Signal to Interference plus Noise Ratio of targeted customer described in B group is set to 0.
6. method according to claim 1, it is characterized in that, number of users corresponding to the described cryptographic Hash corresponding when determined targeted customer is not less than the number of users M of end user's combination, from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, select the user equal with the number of users M that end user combines, comprising:
When the number of users that the cryptographic Hash that determined targeted customer is corresponding is corresponding equals the number of users M of end user's combination, the user that the cryptographic Hash selecting whole determined targeted customer corresponding is corresponding.
7. method according to claim 1, it is characterized in that, number of users corresponding to the described cryptographic Hash corresponding when determined targeted customer is not less than the number of users M of end user's combination, from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, select the user equal with the number of users M that end user combines, comprising:
When the number of users that the cryptographic Hash that determined targeted customer is corresponding is corresponding is greater than the number of users M of end user's combination, the user that Stochastic choice is equal with the number of users M that end user combines from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding.
8. method according to claim 1, it is characterized in that, number of users corresponding to the described cryptographic Hash corresponding when determined targeted customer is not less than the number of users M of end user's combination, from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, select the user equal with the number of users M that end user combines, comprising:
When the number of users that the cryptographic Hash that determined targeted customer is corresponding is corresponding is greater than the number of users M of end user's combination, according to the order of described cryptographic Hash in Hash table, from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, select the user equal with the number of users M that end user combines.
9. method according to claim 1, it is characterized in that, number of users corresponding to the described cryptographic Hash corresponding when determined targeted customer is not less than the number of users M of end user's combination, from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, select the user equal with the number of users M that end user combines, comprising:
When the number of users that the cryptographic Hash that determined targeted customer is corresponding is corresponding is greater than the number of users M of end user's combination, select the first user corresponding from the cryptographic Hash that the described targeted customer of A group is corresponding;
When the number of users that the cryptographic Hash that the described targeted customer of A group is corresponding is corresponding is less than the number of users M of end user's combination, then select from user corresponding to the cryptographic Hash that the described targeted customer of B group is corresponding.
10. the user's combination determination means based on non-orthogonal multiple, it is characterized in that, comprise: obtain module, the first grouping module, the first determination module, the second determination module, the 3rd determination module, screening module, computing module, the 4th determination module, judge module, the 5th determination module, the 6th determination module and the second grouping module, wherein
Described acquisition module, for obtain current region N number of user in the Signal to Interference plus Noise Ratio of each user and the number of times that is scheduled, wherein, a cryptographic Hash in the corresponding Hash table of each user;
Described first grouping module, for the Signal to Interference plus Noise Ratio according to each user in obtained N number of user, is divided into A group and B group by cryptographic Hash corresponding for described N number of user;
Described first determination module, for the number of times that is scheduled according to each user, the cryptographic Hash that the minimum user of number of times of determining to be scheduled in A group and B group is corresponding;
Described second determination module, for by Signal to Interference plus Noise Ratio corresponding for user minimum for the number of times that is scheduled in determined A group and B group, is defined as the first Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
Described 3rd determination module, for determining the second maximum Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
Described screening module, for according to determined described first Signal to Interference plus Noise Ratio of described second determination module and determined described second Signal to Interference plus Noise Ratio of described 3rd determination module, screens the Signal to Interference plus Noise Ratio of A group and B group correspondence respectively;
Described computing module, the equitable proportion factor of each user that the Signal to Interference plus Noise Ratio for distinguishing the A group after calculating sifting and B group correspondence is corresponding;
Described 4th determination module, for the user that the A group that calculated by described computing module respectively and the maximum equitable proportion factor pair of the equitable proportion factor corresponding to B group are answered, is defined as the targeted customer of this group;
Described judge module, for judging whether number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination;
Described 5th determination module, for judging that at described judge module number of users corresponding to cryptographic Hash corresponding to determined targeted customer is not less than the number of users M of end user's combination, the user equal with the number of users M that end user combines is selected from the user that the cryptographic Hash that determined targeted customer is corresponding is corresponding, selected user is combined, the combination comprising selected user is defined as end user's combination;
Described 6th determination module, for judging that at described judge module number of users corresponding to cryptographic Hash corresponding to determined targeted customer is less than the number of users M of end user's combination, according to preset rules, determine the 3rd Signal to Interference plus Noise Ratio of A group and the described targeted customer of B group; And cryptographic Hash corresponding for described for B group targeted customer is replaced with cryptographic Hash corresponding to the described targeted customer of A group;
Described second grouping module, for the Signal to Interference plus Noise Ratio according to determined 3rd Signal to Interference plus Noise Ratio of described 6th determination module and other users except A group and the described targeted customer of B group, is divided into A group and B group by cryptographic Hash corresponding for described N number of user again.
CN201510770576.0A 2015-11-12 2015-11-12 A kind of user based on non-orthogonal multiple, which combines, determines method and device Active CN105307280B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510770576.0A CN105307280B (en) 2015-11-12 2015-11-12 A kind of user based on non-orthogonal multiple, which combines, determines method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510770576.0A CN105307280B (en) 2015-11-12 2015-11-12 A kind of user based on non-orthogonal multiple, which combines, determines method and device

Publications (2)

Publication Number Publication Date
CN105307280A true CN105307280A (en) 2016-02-03
CN105307280B CN105307280B (en) 2018-10-16

Family

ID=55203893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510770576.0A Active CN105307280B (en) 2015-11-12 2015-11-12 A kind of user based on non-orthogonal multiple, which combines, determines method and device

Country Status (1)

Country Link
CN (1) CN105307280B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106028451A (en) * 2016-04-28 2016-10-12 重庆邮电大学 User grouping mechanism applied to NOMA
CN107734697A (en) * 2017-11-28 2018-02-23 重庆邮电大学 Low-complexity multi-user group technology based on NOMA systems

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873703A (en) * 2009-04-27 2010-10-27 大唐移动通信设备有限公司 Dispatching method and communication equipment of space division multiple access resources
WO2014208140A1 (en) * 2013-06-28 2014-12-31 株式会社Nttドコモ Wireless base station, user terminal and wireless communication method
CN104539411A (en) * 2014-12-30 2015-04-22 西安交通大学 User selection method of down link of nonorthogonal multiple-access system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873703A (en) * 2009-04-27 2010-10-27 大唐移动通信设备有限公司 Dispatching method and communication equipment of space division multiple access resources
WO2014208140A1 (en) * 2013-06-28 2014-12-31 株式会社Nttドコモ Wireless base station, user terminal and wireless communication method
CN104539411A (en) * 2014-12-30 2015-04-22 西安交通大学 User selection method of down link of nonorthogonal multiple-access system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106028451A (en) * 2016-04-28 2016-10-12 重庆邮电大学 User grouping mechanism applied to NOMA
CN106028451B (en) * 2016-04-28 2019-06-28 重庆邮电大学 A kind of user grouping system applied in NOMA
CN107734697A (en) * 2017-11-28 2018-02-23 重庆邮电大学 Low-complexity multi-user group technology based on NOMA systems
CN107734697B (en) * 2017-11-28 2021-04-20 重庆邮电大学 Low-complexity multi-user grouping method based on NOMA system

Also Published As

Publication number Publication date
CN105307280B (en) 2018-10-16

Similar Documents

Publication Publication Date Title
Merigó et al. A bibliometric analysis of operations research and management science
CN104793938B (en) Informing message display method and system
CN106296142B (en) Method and system for selecting multiple payment channels
CN102547910A (en) Method for selecting wireless access point and wireless access point
CN106844405A (en) Data query method and apparatus
CN110389822A (en) The node scheduling method, apparatus and server of execution task
CN110362563A (en) The processing method and processing device of tables of data, storage medium, electronic device
CN111176840A (en) Distributed task allocation optimization method and device, storage medium and electronic device
CN105307280A (en) User combination determining method and device based on non-orthogonal multiple access
Lotfi et al. A graph coloring algorithm for large scale scheduling problems
CN106303064A (en) A kind of schedule adding method, device and terminal unit
CN109993417A (en) A kind of service condition mark adding method, device and storage medium
CN109461053A (en) Dynamic shunt method, electronic device and the storage mediums for recommending channel more
CN105991583A (en) Game application recommendation method, application server, terminal and system
CN111428885A (en) User indexing method in federated learning and federated learning device
CN102186248B (en) Scheduling method and device used for interference coordination
CN113642908A (en) Multi-dimensional case allocation method based on credit card post-credit collection service
CN112115121A (en) Data governance real-time data quality detection system
CN115687974B (en) Intelligent interactive blackboard application evaluation system and method based on big data
CN107704320B (en) A kind of method for allocating tasks and system of distributed system
Han et al. Reliability analysis for a divisional seru production system with stochastic capacity
CN114330879B (en) Order distribution method and system of multi-dimensional constraint
CN102507859B (en) Method and device for determining matter content in products
Salassa et al. A stepping horizon view on nurse rostering
CN113822704A (en) Method and device for calculating discount cost, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant