CN108810885A - Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization - Google Patents
Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization Download PDFInfo
- Publication number
- CN108810885A CN108810885A CN201810364696.4A CN201810364696A CN108810885A CN 108810885 A CN108810885 A CN 108810885A CN 201810364696 A CN201810364696 A CN 201810364696A CN 108810885 A CN108810885 A CN 108810885A
- Authority
- CN
- China
- Prior art keywords
- follows
- case
- optimal solution
- optimization
- sub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005457 optimization Methods 0.000 title claims abstract description 33
- 238000000034 method Methods 0.000 title claims abstract description 28
- 230000014509 gene expression Effects 0.000 claims description 47
- 238000005265 energy consumption Methods 0.000 claims description 30
- 238000004458 analytical method Methods 0.000 claims description 27
- 230000009977 dual effect Effects 0.000 claims description 15
- 238000004422 calculation algorithm Methods 0.000 claims description 13
- 238000009795 derivation Methods 0.000 claims description 3
- 238000006243 chemical reaction Methods 0.000 claims 4
- DZSUJUOJJJCWGG-UHFFFAOYSA-N 1-[4-(4-aminothieno[2,3-d]pyrimidin-5-yl)phenyl]-3-(3-methylphenyl)urea Chemical compound CC1=CC=CC(NC(=O)NC=2C=CC(=CC=2)C=2C3=C(N)N=CN=C3SC=2)=C1 DZSUJUOJJJCWGG-UHFFFAOYSA-N 0.000 claims 2
- 241001269238 Data Species 0.000 claims 2
- 238000000354 decomposition reaction Methods 0.000 claims 1
- 238000003780 insertion Methods 0.000 claims 1
- 230000037431 insertion Effects 0.000 claims 1
- 238000006467 substitution reaction Methods 0.000 claims 1
- 230000009466 transformation Effects 0.000 description 6
- 238000004364 calculation method Methods 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000001131 transforming effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 208000000649 small cell carcinoma Diseases 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/10—Flow control between communication endpoints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
一种基于联合保密程度和功率消耗优化的上行双连接数据分流方法,在满足数据保密性要求以及能量有效性的情况下最小化MU的总功率消耗的优化问题描述为一个多变量非凸性优化问题;将问题P1转换为一个底层子问题P1‑Sub和一个顶层问题P1‑Top进行优化求解;将底层子问题P1‑Sub经过多次等效转换为P2‑E问题;得到在P2‑E问题中控制变量范围给定的情况下的问题优化解;列举出不同情况下P2‑E问题的控制变量范围,代入到在控制变量范围给定时所求得的P2‑E问题优化解中;得到底层子问题P1‑Sub的最优化解;在得到底层子问题P1‑Sub的最优化解后,通过使用线性搜索法对顶层问题P1‑Top进行求解,得到顶层问题的最优化解,最终得到了整个优化问题的最优化解。本发明效率较高、灵活度较高。
An uplink dual-connection data splitting method based on joint confidentiality and power consumption optimization, wherein the optimization problem of minimizing the total power consumption of MU under the condition of satisfying data confidentiality requirements and energy effectiveness is described as a multivariable non-convex optimization problem; problem P1 is converted into a bottom subproblem P1-Sub and a top problem P1-Top for optimization and solution; the bottom subproblem P1-Sub is equivalently converted into the P2-E problem for multiple times; the problem optimization solution is obtained when the control variable range in the P2-E problem is given; the control variable ranges of the P2-E problem under different conditions are listed and substituted into the P2-E problem optimization solution obtained when the control variable range is given; the optimal solution of the bottom subproblem P1-Sub is obtained; after obtaining the optimal solution of the bottom subproblem P1-Sub, the top problem P1-Top is solved by using a linear search method to obtain the optimal solution of the top problem, and finally the optimal solution of the entire optimization problem is obtained. The present invention has high efficiency and high flexibility.
Description
技术领域technical field
本发明涉及无线网络,尤其是一种基于联合保密程度和功率消耗优化的上行双连接数据分流方法。The invention relates to a wireless network, in particular to an uplink dual connection data distribution method based on joint security degree and power consumption optimization.
背景技术Background technique
在过去的十年,智能移动终端的爆炸式增长,移动网络服务的受欢迎程度不断提高,蜂窝网中产生了巨大的通信量。在无线电接入网的多层结构上,大量的异构小基站密集覆盖在宏基站的单元内,宏基站将移动通信量分流给小基站,这种方式就是数据分流。数据分流已经作为一种有效并且有经济效益的方法,在宏基站蜂窝网中缓解通信量的拥塞起了很大的作用。但是,这种单一的方式效率和灵活度有较大的欠缺。为了可以更好地分流数据和更灵活地管理资源,第三代合作伙伴项目提出“双连接”技术,能够使用户(MobileUsers,MUs)通过使用两个不同的无线电接口和宏基站(macro Base Station,BS)交流,并且同时将分流的数据传给小基站(small-cell Access Point,AP)。In the past decade, the explosive growth of smart mobile terminals, the increasing popularity of mobile network services, and the huge traffic generated in cellular networks. In the multi-layer structure of the radio access network, a large number of heterogeneous small base stations are densely covered in the unit of the macro base station, and the macro base station offloads mobile traffic to the small base station. This method is data offloading. As an effective and cost-effective method, data offloading has played a significant role in alleviating traffic congestion in macro base station cellular networks. However, the efficiency and flexibility of this single method are relatively lacking. In order to better distribute data and manage resources more flexibly, the Third Generation Partnership Project proposes "dual connectivity" technology, which enables users (MobileUsers, MUs) to use two different radio interfaces and macro base stations (macro Base Station) , BS) to communicate, and at the same time transmit the offloaded data to a small base station (small-cell Access Point, AP).
发明内容Contents of the invention
为了克服现有技术的效率较低、灵活度较低的不足,本发明提供一种效率较高、灵活度较高的无线网络中基于联合保密程度和功率消耗优化的上行双连接数据分流方法。In order to overcome the disadvantages of low efficiency and low flexibility in the prior art, the present invention provides an uplink dual connection data offloading method based on joint security degree and power consumption optimization in a wireless network with high efficiency and high flexibility.
本发明解决其技术问题所采用的技术方案是:The technical solution adopted by the present invention to solve its technical problems is:
一种基于联合保密程度和功率消耗优化的上行双连接数据分流方法,所述方法包括以下步骤:A method for offloading uplink dual connection data based on joint confidentiality and power consumption optimization, said method comprising the following steps:
(1)在基站BS的覆盖范围下有一个移动用户MU,同时部署了一个小蜂窝辅助网络接入点AP通过“双连接”为MU提供数据分流服务;(1) There is a mobile user MU under the coverage of the base station BS, and a small cell auxiliary network access point AP is deployed to provide data offloading services for the MU through "dual connectivity";
在无线网络中,在满足数据保密性要求以及能量有效性的情况下最小化MU的总功率消耗的优化问题描述为如下所示的非凸性优化问题P1问题,该问题表示如下:In a wireless network, the optimization problem of minimizing the total power consumption of a MU while satisfying data confidentiality requirements and energy efficiency is described as a non-convex optimization problem P1 shown below, which is expressed as follows:
min piA+piB min p iA +p iB
限制条件: limitation factor:
xiA≥0x iA ≥ 0
xiB≥0x iB ≥ 0
控制变量:(xiA,piA)和(xiB,piB)Control variables: (x iA ,p iA ) and (x iB ,p iB )
在P1问题中,xiB表示BS侧MU所能达到的最大数据需求流量,piB表示BS侧MU消耗的能量;xiA表示AP侧MU所能达到的最大数据需求流量,piA表示AP侧MU消耗的能量;Pout是关于piA和xiA的函数,表示为Pout(piA,xiA),式(1-5)是通过香农定理得到的;In the P1 problem, x iB represents the maximum data flow required by the MU on the BS side, p iB represents the energy consumed by the MU on the BS side; x iA represents the maximum data flow required by the MU on the AP side, and p iA represents the energy consumed by the MU on the AP side Energy consumed by MU; P out is a function of p iA and x iA , expressed as P out (p iA , x iA ), formula (1-5) is obtained through Shannon's theorem;
将问题中的各个变量的含义说明如下:The meaning of each variable in the question is explained as follows:
piA:AP侧MU消耗的能量/W;p iA : energy consumed by the MU on the AP side/W;
piB:BS侧MU消耗的能量/W;p iB : energy consumed by the MU on the BS side/W;
xiB:BS侧MU所能达到的最大数据需求流量;x iB : the maximum data flow required by the MU on the BS side;
xiA:AP侧MU所能达到的最大数据需求流量;x iA : the maximum data flow required by the MU on the AP side;
WB:MU到BS的信道带宽/HZ;W B : channel bandwidth/HZ from MU to BS;
WA:MU到AP的信道带宽/HZ;W A : channel bandwidth/HZ from MU to AP;
giA:MU到AP的信道增益;g iA : channel gain from MU to AP;
giB:MU到BS的信道增益;g iB : channel gain from MU to BS;
giE:MU到窃听者的信道增益;g iE : channel gain from MU to eavesdropper;
nA:MU到AP的背景噪声功率/W;n A : background noise power from MU to AP/W;
nB:MU到BS的背景噪声功率/W;n B : background noise power from MU to BS/W;
nE:MU到窃听者的背景噪声功率/W;n E : background noise power from MU to eavesdropper/W;
MU到AP可以获得的最大保密数据吞吐量; The maximum confidential data throughput that can be obtained from MU to AP;
Pout:AP在给MU提供数据分流服务时的保密性溢出的概率MU到AP的最大消耗能量/W;P out : probability of confidentiality overflow when AP provides data offload service to MU The maximum energy consumption from MU to AP/W;
MU到BS的最大消耗能量/W; The maximum energy consumption from MU to BS/W;
MU的保密性溢出概率的上界; The upper bound of the confidentiality overflow probability of MU;
∈i:MU的保密性溢出概率;∈ i : Confidentiality overflow probability of MU;
αi:MU到窃听者信道增益的平均值;α i : the average value of channel gain from MU to eavesdropper;
(2)通过对P1问题的分析,将P1问题分解为一个底层子问题P1-Sub和一个顶层问题P1-Top进行优化求解,其中的底层子问题P1-Sub如下所示:(2) Through the analysis of the P1 problem, the P1 problem is decomposed into a bottom sub-problem P1-Sub and a top-level problem P1-Top for optimal solution. The bottom sub-problem P1-Sub is as follows:
V(∈i)=minpiA+piB V(∈ i )=minp iA +p iB
限制条件:Pout(piA,xiA)=∈i (2-1)Constraints: P out (p iA , x iA )=∈ i (2-1)
xiA≥0x iA ≥ 0
xiB≥0x iB ≥ 0
控制变量:(xiA,piA)和(xiB,piB)Control variables: (x iA ,p iA ) and (x iB ,p iB )
顶层问题P1-Top如下所示:The top-level problem P1-Top looks like this:
min V(εi)min V(ε i )
限制条件: limitation factor:
控制变量:εi Control variable: ε i
在P1问题的优化求解过程中,先对底层子问题P1-Sub进行逐步的优化求解;In the process of optimizing the solution of the P1 problem, the underlying sub-problem P1-Sub is first optimized and solved step by step;
(3)保密性溢出的概率函数Pout(piA,xiA)表达式如下:(3) The expression of the probability function P out (p iA , x iA ) of confidentiality overflow is as follows:
上式中的表示MU到AP可以获得的最大保密数据吞吐量,其表达式如下:in the above formula Indicates the maximum confidential data throughput that can be obtained from MU to AP, and its expression is as follows:
将式(3-2)代入(3-1)得到Pout(piA,xiA)表达式如下:Substitute formula (3-2) into (3-1) to get the expression of P out (p iA , x iA ) as follows:
定义一个辅助量表示MU到AP的有效信道功率增益,其表达式如下:define an auxiliary Indicates the effective channel power gain from MU to AP, and its expression is as follows:
结合式(3-4)得到Pout(piA,xiA)表达式如下:Combining formula (3-4) to get the expression of P out (p iA , x iA ) as follows:
(4)通过对(1-1)和(3-5)进行联立分析,得到(1-1)的限制表达式如下:(4) Through the simultaneous analysis of (1-1) and (3-5), the restricted expression of (1-1) is obtained as follows:
定义一个新的变量θiA来量化保密性需求的影响,θiA的表达式如下:Define a new variable θ iA to quantify the impact of confidentiality requirements, the expression of θ iA is as follows:
通过对(4-1)的进一步转化,得到(1-1)的等效表达式如下:By further transforming (4-1), the equivalent expression of (1-1) is obtained as follows:
而在P1问题的最优化方案中,上式为问题的一个严格约束,而在问题分析中,MU的分流数据流量速率满足如下表达式:In the optimization scheme of the P1 problem, the above formula is a strict constraint of the problem, and in the problem analysis, the split data flow rate of the MU satisfies the following expression:
通过(2-2)以及(4-4)的分析得到如下表达式:Through the analysis of (2-2) and (4-4), the following expressions are obtained:
因此,通过联立(2-5)和(4-5),可以得到表达式如下:Therefore, by combining (2-5) and (4-5), the expression can be obtained as follows:
(5)P1-Sub问题的等效转化,代入(4-5)、(4-6)及以上的各关系到P1-Sub问题,得到P2问题表示如下:(5) The equivalent transformation of the P1-Sub problem, substituting (4-5), (4-6) and the above are related to the P1-Sub problem, and the P2 problem is expressed as follows:
限制条件: limitation factor:
控制变量:piA Control variable: p iA
对(5-1)进行等效转化,得到表达式如下:Perform equivalent transformation on (5-1), and get the following expression:
同样对(5-2)也进行等效转化,得到表达式如下:Similarly, (5-2) is also converted equivalently, and the expression is as follows:
通过(5-3)与(5-4)将P2问题进行等价转化为P2-E问题,“E”表示的是等价的,如下:Through (5-3) and (5-4), the P2 problem is equivalently transformed into a P2-E problem, and "E" means equivalence, as follows:
限制条件:条件(1-3)Restrictions: Conditions (1-3)
条件(5-3)Conditions (5-3)
条件(5-4)Conditions (5-4)
控制变量:piA Control variable: p iA
P2-E问题中的限制条件(5-3)和(5-4)都与piA成线性关系,所以在参数设置上,三个限制条件(5-3)、(5-4)、(1-3)产生了一个关于piA的可行区间,即 The constraints (5-3) and (5-4) in the P2-E problem are both linearly related to p iA , so in the parameter setting, the three constraints (5-3), (5-4), ( 1-3) Generate a feasible interval about p iA , namely
(6)P2-E问题看成是一个凸性优化问题,对P2-E中的目标函数进行一阶求导,得到其一阶导数表达式如下:(6) The P2-E problem is regarded as a convex optimization problem, and the first-order derivation is performed on the objective function in P2-E, and the expression of the first-order derivative is obtained as follows:
通过分析知道是关于piA的递增函数;know by analysis is an increasing function about p iA ;
(7)在给定和的情况下,根据P2-E问题中目标函数的一阶导数的单调性求解该问题的算法SolP2E如下:(7) In the given and In the case of , the algorithm SolP2E to solve the problem according to the monotonicity of the first derivative of the objective function in the P2-E problem is as follows:
步骤7.1:设置计算误差的容忍值为γ,flag=1;Step 7.1: Set the tolerance value of the calculation error to γ, flag=1;
步骤7.2:如果成立,那么执行步骤7.6;如果成立,那么执行步骤7.6,否则执行步骤7.3;Step 7.2: If established, then Go to step 7.6; if established, then Go to step 7.6, otherwise go to step 7.3;
步骤7.3设置 Step 7.3 Setup
步骤7.4:当flag=1时,得到如果成立,那么同时设置flag=0,执行步骤7.6;Step 7.4: When flag=1, get if established, then Set flag=0 at the same time, execute step 7.6;
步骤7.5:如果成立,当满足时,更新返回步骤7.4;当满足时,更新返回步骤7.4;Step 7.5: If established when satisfied when, update Return to step 7.4; when satisfied when, update Return to step 7.4;
步骤7.6:结束循环;Step 7.6: end the loop;
步骤7.7:输出P2-E问题的当前最优解为 Step 7.7: Output the current optimal solution of the P2-E problem as
(8)在算法SolP2E中,是在给定piA的上界与下界的情况下计算的,所以要对piA的上界与下界进行求解,需要考虑多种情况下的和定义两个新的参量K和L,其表达式如下所示:(8) In the algorithm SolP2E, it is the upper bound of the given p iA with the nether The case is calculated, so the upper bound of p iA with the nether To solve it, it is necessary to consider various situations and Define two new parameters K and L whose expressions are as follows:
通过参量K和L,(5-3)和(5-4)转化为如下表达式:Through parameters K and L, (5-3) and (5-4) are transformed into the following expressions:
基于以上(8-3)和(8-4)两式来得到和需要考虑不同情况下的K和L,首先通过分析(8-3),得到两种不同的情况,即CaseⅠ:KL≥1;CaseⅡ:KL<1;Based on the above two formulas (8-3) and (8-4) to get and It is necessary to consider K and L in different situations. First, through the analysis (8-3), two different situations are obtained, namely CaseⅠ: KL≥1; CaseⅡ: KL<1;
CaseⅠ是在KL≥1下的情况,在这种情况下,满足 表示BS能满足MU的全部流量需求,不需要AP进行数据分流;相反,CaseⅡ在KL<1下的情况下,BS不能满足MU全部的数据流量需求,因此,P2-E问题在CaseⅡ情况下可能是不可行的;Case I is the case under KL≥1, in this case, satisfy Indicates that the BS can meet all the traffic demands of the MU, and does not require the AP to perform data offloading; on the contrary, when KL<1 in Case II, the BS cannot meet all the data traffic demands of the MU. Therefore, the P2-E problem may occur in Case II is not feasible;
若KL≥1,即为CaseⅠ,通过分析得到两种子情况,如下:If KL≥1, it is Case I. Through analysis, two sub-cases are obtained, as follows:
CaseⅠ.1:当时,得到 CaseⅠ.1: when when, get
CaseⅠ.2:当时,得到 CaseⅠ.2: when when, get
若KL<1,即为CaseⅡ,通过分析得到五种子情况,如下:If KL<1, it is Case II. Five sub-cases are obtained through analysis, as follows:
CaseⅡ.1:当P2-E问题不可行;CaseⅡ.1: when The P2-E problem is infeasible;
CaseⅡ.2a:当且时,得到CaseⅡ.2a: when and when, get
CaseⅡ.2b:当且时,P2-E问题不可行;CaseⅡ.2b: when and When , the P2-E problem is infeasible;
CaseⅡ.3a:当且时,得到 CaseⅡ.3a: When and when, get
CaseⅡ.3b:当且时,P2-E问题不可行;CaseⅡ.3b: when and When , the P2-E problem is infeasible;
最终得到以下各情况:Eventually the following situations are obtained:
CaseⅠ.1 Case I.1
Casecase
Ⅰ.2 I.2
CaseⅡ.1P2-E问题不可行;Case II.1 The P2-E problem is infeasible;
CaseⅡ.2a(且): Case II.2a( and ):
CaseⅡ.2b(且):P2-E问题不可行;CaseⅡ.3a(且):Case II.2b( and ): P2-E problem is infeasible; CaseⅡ.3a( and ):
CaseⅡ.3b(且):Case II.3b( and ):
P2-E问题不可行;The P2-E problem is infeasible;
通过以上过程得到和代入算法SolP2E得到最优解通过得到的最优解得到P2-E问题相应的其他三个最优解 如下:Obtained through the above process and Substitute into the algorithm SolP2E to get the optimal solution The optimal solution obtained by Get the other three optimal solutions corresponding to the P2-E problem as follows:
以上为P2-E问题的最优解,即为P1-Sub问题中,MU在AP侧消耗能量的最优解MU在AP侧数据分流需求最优解MU在BS侧消耗能量的最优解MU在BS侧数据需求的最优解 The above is the optimal solution of the P2-E problem, that is, the optimal solution of the energy consumed by the MU on the AP side in the P1-Sub problem Optimal solution for MU's data distribution requirements on the AP side The Optimal Solution of Energy Consumption by MU on the BS Side Optimal Solution of MU's Data Requirements on BS Side
(9)顶层问题P1-Top的优化求解,通过对底层子问题的分析,顶层问题P1-Top表示如下所示:(9) The optimal solution of the top-level problem P1-Top. Through the analysis of the bottom-level sub-problems, the top-level problem P1-Top is expressed as follows:
限制条件: limitation factor:
控制变量:∈i Control variable: ∈ i
根据∈i在可行范围内的线性搜索法来求解P1-Top的算法SolP1Top如下所示:The algorithm SolP1Top to solve P1-Top according to the linear search method of ∈ i in the feasible range is as follows:
步骤9.1:设置当前最优解CBS为空集,当前最优能量消耗值CBV=∞,同时设置∈i的初值为Δ,步长也为Δ;Step 9.1: Set the current optimal solution CBS as an empty set, the current optimal energy consumption value CBV = ∞, and set the initial value of ∈ i to Δ, and the step size to Δ;
步骤9.2:如果∈i满足则执行步骤9.3;否则执行步骤9.6;Step 9.2: If ∈ i satisfies Then go to step 9.3; otherwise go to step 9.6;
步骤9.3:将∈i带入顶层问题P1-Top的目标函数中,判断所得到的V(∈i)是否小于当前最优能量消耗值CBV;Step 9.3: Bring ∈ i into the objective function of the top-level problem P1-Top, and judge whether the obtained V(∈ i ) is less than the current optimal energy consumption value CBV;
步骤9.4:如果V(∈i)≥CBV成立,那么更新∈i=∈i+Δ,返回步骤9.2;Step 9.4: If V(∈ i )≥CBV is established, then update ∈ i =∈ i +Δ, return to step 9.2;
步骤9.5:如果V(∈i)<CBV成立,那么更新当前最优解当前最优能量消耗值为V*(∈i),同时更新∈i=∈i+Δ,返回步骤9.2;Step 9.5: If V(∈ i )<CBV holds, then update the current optimal solution The current optimal energy consumption value is V * (∈ i ), while updating ∈ i =∈ i +Δ, return to step 9.2;
步骤9.6:结束循环;Step 9.6: end the loop;
步骤9.7:如果当前最优能量消耗值CBV为∞,那么P1问题不可行,否则输出当前最优解当前最优能量消耗值为V*(∈i);Step 9.7: If the current optimal energy consumption value CBV is ∞, then the P1 problem is not feasible, otherwise output the current optimal solution The current optimal energy consumption value is V * (∈ i );
(10)通过对P1问题的分层求解,得到MU在AP侧消耗能量的最优解MU在AP侧数据分流需求最优解MU在BS侧消耗能量的最优解MU在BS侧数据需求的最优解MU的保密性程度最优解MU的最优能量消耗值为V*(∈i)。(10) Through the hierarchical solution to the P1 problem, the optimal solution of the energy consumed by the MU on the AP side is obtained Optimal solution for MU's data distribution requirements on the AP side The Optimal Solution of Energy Consumption by MU on the BS Side Optimal Solution of MU's Data Requirements on BS Side Optimal Solution of MU's Secrecy Degree The optimal energy consumption value of MU is V * (∈ i ).
本发明为基于双连接的无线网络数据分流的优化设计。考虑到在无线网络中,为MU提供数据分流服务的AP工作在未授权频段上,这就导致一个窃听者能在未授权频段上窃听分流到AP的数据流量。所以本发明研究的是双连接下联合保密程度和功率消耗的优化,对AP的数据分流服务进行最优化的方案设计。本发明针对上述所提出的设想,研究了基于联合保密程度和功率消耗的上行双连接数据分流方案设计。The invention is an optimized design of wireless network data distribution based on dual connection. Considering that in the wireless network, the AP that provides the data offload service for the MU works in an unlicensed frequency band, this leads to an eavesdropper being able to eavesdrop on the data traffic offloaded to the AP in the unlicensed frequency band. Therefore, what the present invention researches is the optimization of the joint security degree and power consumption under the dual connection, and the scheme design of optimizing the data offloading service of the AP. Aiming at the idea proposed above, the present invention studies the design of an uplink dual connection data distribution scheme based on joint secrecy degree and power consumption.
本发明的技术构思为:首先,考虑到在异构无线网络中AP和BS通过对于MU的数据分流实现最小化功率来获得一定的经济效益。在本发明中,通过对问题特性分析,将问题转换为一个底层子问题和一个顶层问题。通过等效转换,将底层子问题转换为易于解决的凸性优化问题。之后,通过对所得到的等效问题进行分析,先假设问题中控制变量已经给定,再根据目标函数的一阶导数的单调性以及二分查找法,来获得当前给定控制变量范围的情况下的底层子问题最优化解。之后,通过对问题的分析,列举出不同情况下的控制变量范围,再将不同的控制变量范围代入所求得的最优化解中。最终求解得到底层子问题的最优解。最后,通过线性搜索法对顶层问题进行求解,得到顶层问题的最优化解。最终提出一种基于联合保密程度和功率消耗优化的上行双连接数据分流方法的最优化解决方案。The technical idea of the present invention is as follows: firstly, it is considered that in a heterogeneous wireless network, the AP and the BS achieve certain economic benefits by offloading data to the MU to minimize power. In the present invention, by analyzing the characteristics of the problem, the problem is converted into a bottom sub-problem and a top-level problem. Transform the underlying subproblem into an easily solvable convex optimization problem through an equivalent transformation. Afterwards, by analyzing the obtained equivalent problem, assuming that the control variable in the problem has been given, and then according to the monotonicity of the first derivative of the objective function and the binary search method, to obtain the current range of the given control variable The optimal solution of the underlying subproblem of . Afterwards, through the analysis of the problem, the control variable ranges in different situations are listed, and then the different control variable ranges are substituted into the obtained optimal solution. Finally, the optimal solution to the underlying sub-problem is obtained. Finally, the top-level problem is solved by the linear search method, and the optimal solution of the top-level problem is obtained. Finally, an optimal solution of uplink dual connection data offloading method based on joint security degree and power consumption optimization is proposed.
本发明的有益效果主要表现在:1、对于整体系统而言,双连接技术大大提高了对于无线资源的利用率;2、对于MU而言,在联合保密程度和功率消耗优化,最小化了在双连接下的总功率损耗,既获得了更优质的上行数据流量服务,保证了MU的保密性需求,又提高了能量的利用率。The beneficial effects of the present invention are mainly manifested in: 1. For the overall system, the dual connection technology greatly improves the utilization rate of wireless resources; The total power loss under dual connections not only obtains better uplink data traffic services, ensures the confidentiality requirements of MU, but also improves energy utilization.
附图说明Description of drawings
图1是无线网络中一个用户MU、一个宏基站BS、一个小基站AP以及一个窃听者的场景示意图。Fig. 1 is a schematic diagram of a scene of a user MU, a macro base station BS, a small base station AP and an eavesdropper in a wireless network.
具体实施方式Detailed ways
下面结合附图对于本发明作进一步详细描述。The present invention will be described in further detail below in conjunction with the accompanying drawings.
参照图1,一种基于联合保密程度和功率消耗优化的上行双连接数据分流方法,实现该方法能在满足MU适当的保密性需求的前提下,使MU的总能耗最小,提高整个系统的无线资源利用率以及能源利用率,本发明可以应用于无线网络,如图1所示场景中。针对该目标设计对问题的优化方法主要包括如下步骤:Referring to Figure 1, an uplink dual-connection data offloading method based on joint security degree and power consumption optimization, the implementation of this method can minimize the total energy consumption of the MU under the premise of meeting the appropriate security requirements of the MU, and improve the efficiency of the entire system. Wireless resource utilization and energy utilization, the present invention can be applied to a wireless network, as shown in FIG. 1 . The optimization method designed for the problem mainly includes the following steps:
(1)在基站BS的覆盖范围下有一个移动用户MU,同时部署了一个小蜂窝辅助网络接入点AP通过“双连接”为MU提供数据分流服务;(1) There is a mobile user MU under the coverage of the base station BS, and a small cell auxiliary network access point AP is deployed to provide data offloading services for the MU through "dual connectivity";
在无线网络中,在满足数据保密性要求以及能量有效性的情况下最小化MU的总功率消耗的优化问题描述为如下所示的非凸性优化问题P1问题,该问题表示如下:In a wireless network, the optimization problem of minimizing the total power consumption of a MU while satisfying data confidentiality requirements and energy efficiency is described as a non-convex optimization problem P1 shown below, which is expressed as follows:
min piA+piB min p iA +p iB
限制条件: limitation factor:
xiA≥0x iA ≥ 0
xiB≥0x iB ≥ 0
控制变量:(xiA,piA)和(xiB,piB)Control variables: (x iA ,p iA ) and (x iB ,p iB )
在P1问题中,xiB表示BS侧MU所能达到的最大数据需求流量,piB表示BS侧MU消耗的能量;xiA表示AP侧MU所能达到的最大数据需求流量,piA表示AP侧MU消耗的能量;Pout是关于piA和xiA的函数,表示为Pout(piA,xiA),式(1-5)是通过香农定理得到的;In the P1 problem, x iB represents the maximum data flow required by the MU on the BS side, p iB represents the energy consumed by the MU on the BS side; x iA represents the maximum data flow required by the MU on the AP side, and p iA represents the energy consumed by the MU on the AP side Energy consumed by MU; P out is a function of p iA and x iA , expressed as P out (p iA , x iA ), formula (1-5) is obtained through Shannon's theorem;
将问题中的各个变量的含义说明如下:The meaning of each variable in the question is explained as follows:
piA:AP侧MU消耗的能量/W;p iA : energy consumed by the MU on the AP side/W;
piB:BS侧MU消耗的能量/W;p iB : energy consumed by the MU on the BS side/W;
xiB:BS侧MU所能达到的最大数据需求流量;x iB : the maximum data flow required by the MU on the BS side;
xiA:AP侧MU所能达到的最大数据需求流量;x iA : the maximum data flow required by the MU on the AP side;
WB:MU到BS的信道带宽/HZ;W B : channel bandwidth/HZ from MU to BS;
WA:MU到AP的信道带宽/HZ;W A : channel bandwidth/HZ from MU to AP;
giA:MU到AP的信道增益;g iA : channel gain from MU to AP;
giB:MU到BS的信道增益;g iB : channel gain from MU to BS;
giE:MU到窃听者的信道增益;g iE : channel gain from MU to eavesdropper;
nA:MU到AP的背景噪声功率/W;n A : background noise power from MU to AP/W;
nB:MU到BS的背景噪声功率/W;n B : background noise power from MU to BS/W;
nE:MU到窃听者的背景噪声功率/W;n E : background noise power from MU to eavesdropper/W;
MU到AP可以获得的最大保密数据吞吐量; The maximum confidential data throughput that can be obtained from MU to AP;
Pout:AP在给MU提供数据分流服务时的保密性溢出的概率MU到AP的最大消耗能量/W;P out : probability of confidentiality overflow when AP provides data offload service to MU The maximum energy consumption from MU to AP/W;
MU到BS的最大消耗能量/W; The maximum energy consumption from MU to BS/W;
MU的保密性溢出概率的上界; The upper bound of the confidentiality overflow probability of MU;
∈i:MU的保密性溢出概率;∈ i : Confidentiality overflow probability of MU;
αi:MU到窃听者信道增益的平均值;α i : the average value of channel gain from MU to eavesdropper;
(2)通过对P1问题的分析,将P1问题分解为一个底层子问题P1-Sub和一个顶层问题P1-Top进行优化求解,其中的底层子问题P1-Sub如下所示:(2) Through the analysis of the P1 problem, the P1 problem is decomposed into a bottom sub-problem P1-Sub and a top-level problem P1-Top for optimal solution. The bottom sub-problem P1-Sub is as follows:
V(∈i)=minpiA+piB V(∈ i )=minp iA +p iB
限制条件:Pout(piA,xiA)=εi (2-1)Restrictions: P out (p iA , x iA )=ε i (2-1)
xiA≥0x iA ≥ 0
xiB≥0x iB ≥ 0
控制变量:(xiA,piA)和(xiB,piB)Control variables: (x iA ,p iA ) and (x iB ,p iB )
顶层问题P1-Top如下所示:The top-level problem P1-Top looks like this:
min V(∈i)min V(∈ i )
限制条件: limitation factor:
控制变量:∈i Control variable: ∈ i
在P1问题的优化求解过程中,先对底层子问题P1-Sub进行逐步的优化求解;In the process of optimizing the solution of the P1 problem, the underlying sub-problem P1-Sub is first optimized and solved step by step;
(3)保密性溢出的概率函数Pout(piA,xiA)表达式如下:(3) The expression of the probability function P out (p iA , x iA ) of confidentiality overflow is as follows:
上式中的表示MU到AP可以获得的最大保密数据吞吐量,其表达式如下:in the above formula Indicates the maximum confidential data throughput that can be obtained from MU to AP, and its expression is as follows:
将式(3-2)代入(3-1)得到Pout(piA,xiA)表达式如下:Substitute formula (3-2) into (3-1) to get the expression of P out (p iA , x iA ) as follows:
定义一个辅助量表示MU到AP的有效信道功率增益,其表达式如下:define an auxiliary Indicates the effective channel power gain from MU to AP, and its expression is as follows:
结合式(3-4)得到Pout(piA,xiA)表达式如下:Combining formula (3-4) to get the expression of P out (p iA , x iA ) as follows:
(4)通过对(1-1)和(3-5)进行联立分析,得到(1-1)的限制表达式如下:(4) Through the simultaneous analysis of (1-1) and (3-5), the restricted expression of (1-1) is obtained as follows:
定义一个新的变量θiA来量化保密性需求的影响,θiA的表达式如下:Define a new variable θ iA to quantify the impact of confidentiality requirements, the expression of θ iA is as follows:
通过对(4-1)的进一步转化,得到(1-1)的等效表达式如下:By further transforming (4-1), the equivalent expression of (1-1) is obtained as follows:
而在P1问题的最优化方案中,上式为问题的一个严格约束,而在问题分析中,MU的分流数据流量速率满足如下表达式:In the optimization scheme of the P1 problem, the above formula is a strict constraint of the problem, and in the problem analysis, the split data flow rate of the MU satisfies the following expression:
通过(2-2)以及(4-4)的分析得到如下表达式:Through the analysis of (2-2) and (4-4), the following expressions are obtained:
因此,通过联立(2-5)和(4-5),得到表达式如下:Therefore, by combining (2-5) and (4-5), the expression is as follows:
(5)P1-Sub问题的等效转化,代入(4-5)、(4-6)及以上的各关系到P1-Sub问题,得到P2问题表示如下:(5) The equivalent transformation of the P1-Sub problem, substituting (4-5), (4-6) and the above are related to the P1-Sub problem, and the P2 problem is expressed as follows:
限制条件: limitation factor:
控制变量:piA Control variable: p iA
对(5-1)进行等效转化,得到表达式如下:Perform equivalent transformation on (5-1), and get the following expression:
同样对(5-2)也进行等效转化,得到表达式如下:Similarly, (5-2) is also converted equivalently, and the expression is as follows:
通过(5-3)与(5-4)将P2问题进行等价转化为P2-E问题,“E”表示的是等价的,如下:Through (5-3) and (5-4), the P2 problem is equivalently transformed into a P2-E problem, and "E" means equivalence, as follows:
限制条件:条件(1-3)Restrictions: Conditions (1-3)
条件(5-3)Conditions (5-3)
条件(5-4)Conditions (5-4)
控制变量:piA Control variable: p iA
P2-E问题中的限制条件(5-3)和(5-4)都与piA成线性关系,所以在参数设置上,三个限制条件(5-3)、(5-4)、(1-3)产生了一个关于piA的可行区间,即 The constraints (5-3) and (5-4) in the P2-E problem are both linearly related to p iA , so in the parameter setting, the three constraints (5-3), (5-4), ( 1-3) Generate a feasible interval about p iA , namely
(6)P2-E问题看成是一个凸性优化问题,对P2-E中的目标函数进行一阶求导,得到其一阶导数表达式如下:(6) The P2-E problem is regarded as a convex optimization problem, and the first-order derivation is performed on the objective function in P2-E, and the expression of the first-order derivative is obtained as follows:
通过分析知道是关于piA的递增函数;know by analysis is an increasing function about p iA ;
(7)在给定和的情况下,根据P2-E问题中目标函数的一阶导数的单调性求解该问题的算法SolP2E如下;(7) In the given and In the case of , the algorithm SolP2E to solve the problem according to the monotonicity of the first derivative of the objective function in the P2-E problem is as follows;
步骤7.1:设置计算误差的容忍值为γ,flag=1;Step 7.1: Set the tolerance value of the calculation error to γ, flag=1;
步骤7.2:如果成立,那么执行步骤7.6;如果成立,那么执行步骤7.6,否则执行步骤7.3;Step 7.2: If established, then Go to step 7.6; if established, then Go to step 7.6, otherwise go to step 7.3;
步骤7.3设置 Step 7.3 Setup
步骤7.4:当flag=1时,得到如果成立,那么同时设置flag=0,执行步骤7.6;Step 7.4: When flag=1, get if established, then Set flag=0 at the same time, execute step 7.6;
步骤7.5:如果成立,当满足时,更新返回步骤7.4;当满足时,更新返回步骤7.4;Step 7.5: If established when satisfied when, update Return to step 7.4; when satisfied when, update Return to step 7.4;
步骤7.6:结束循环;Step 7.6: end the loop;
步骤7.7:输出P2-E问题的当前最优解为 Step 7.7: Output the current optimal solution of the P2-E problem as
(8)在算法SolP2E中,是在给定piA的上界与下界的情况下计算的,所以要对piA的上界与下界进行求解,需要考虑多种情况下的和定义两个新的参量K和L,其表达式如下所示:(8) In the algorithm SolP2E, it is the upper bound of the given p iA with the nether The case is calculated, so the upper bound of p iA with the nether To solve it, it is necessary to consider various situations and Define two new parameters K and L whose expressions are as follows:
通过参量K和L,(5-3)和(5-4)转化为如下表达式:Through parameters K and L, (5-3) and (5-4) are transformed into the following expressions:
基于以上(8-3)和(8-4)两式来得到和需要考虑不同情况下的K和L,首先通过分析(8-3),得到两种不同的情况,即CaseⅠ:KL≥1;CaseⅡ:KL<1;Based on the above two formulas (8-3) and (8-4) to get and It is necessary to consider K and L in different situations. First, through the analysis (8-3), two different situations are obtained, namely CaseⅠ: KL≥1; CaseⅡ: KL<1;
CaseⅠ是在KL≥1下的情况,在这种情况下,满足WBlog2(1+piBmaxgiBnB≥Rireq,表示BS能满足MU的全部流量需求,不需要AP进行数据分流;相反,CaseⅡ在KL<1下的情况下,BS不能满足MU全部的数据流量需求,因此,P2-E问题在CaseⅡ情况下可能是不可行的;Case I is the situation under KL ≥ 1. In this case, W B log 2 (1+piBmaxgiBnB ≥ Rireq is satisfied, which means that BS can meet all traffic demands of MU, and AP does not need data offloading; on the contrary, Case II is in KL In the case of <1, the BS cannot meet all the data flow requirements of the MU, therefore, the P2-E problem may not be feasible in the case of Case II;
若KL≥1,即为CaseⅠ,通过分析得到两种子情况,如下:If KL≥1, it is Case I. Through analysis, two sub-cases are obtained, as follows:
CaseⅠ.1:当时,得到 CaseⅠ.1: when when, get
CaseⅠ.2:当时,得到 CaseⅠ.2: when when, get
若KL<1,即为CaseⅡ,通过分析得到五种子情况,如下:If KL<1, it is Case II. Five sub-cases are obtained through analysis, as follows:
CaseⅡ.1:当P2-E问题不可行;CaseⅡ.1: When The P2-E problem is infeasible;
CaseⅡ.2a:当且时,得到CaseⅡ.2a: when and when, get
CaseⅡ.2b:当且时,P2-E问题不可行;CaseⅡ.2b: when and When , the P2-E problem is infeasible;
CaseⅡ.3a:当且时,得到 CaseⅡ.3a: when and when, get
CaseⅡ.3b:当且时,P2-E问题不可行;CaseⅡ.3b: when and When , the P2-E problem is infeasible;
最终得到以下各情况:Eventually the following situations are obtained:
CaseⅠ.1 Case I.1
Casecase
Ⅰ.2 I.2
CaseⅡ.1P2-E问题不可行;Case II.1 The P2-E problem is infeasible;
CaseⅡ.2a(且): Case II.2a( and ):
CaseⅡ.2b(且):P2-E问题不可行;CaseⅡ.3a(且):Case II.2b( and ): P2-E problem is infeasible; CaseⅡ.3a( and ):
CaseⅡ.3b(且):Case II.3b( and ):
P2-E问题不可行;The P2-E problem is infeasible;
通过以上过程得到和代入算法SolP2E得到最优解通过得到的最优解得到P2-E问题相应的其他三个最优解 如下:Obtained through the above process and Substitute into the algorithm SolP2E to get the optimal solution The optimal solution obtained by Get the other three optimal solutions corresponding to the P2-E problem as follows:
以上为P2-E问题的最优解,即为P1-Sub问题中,MU在AP侧消耗能量的最优解MU在AP侧数据分流需求最优解MU在BS侧消耗能量的最优解MU在BS侧数据需求的最优解 The above is the optimal solution of the P2-E problem, that is, the optimal solution of the energy consumed by the MU on the AP side in the P1-Sub problem Optimal solution for MU's data distribution requirements on the AP side The Optimal Solution of Energy Consumption by MU on the BS Side Optimal Solution of MU's Data Requirements on BS Side
(9)顶层问题P1-Top的优化求解,通过对底层子问题的分析,顶层问题P1-Top表示如下所示:(9) The optimal solution of the top-level problem P1-Top. Through the analysis of the bottom-level sub-problems, the top-level problem P1-Top is expressed as follows:
限制条件: limitation factor:
控制变量:∈i Control variable: ∈ i
根据∈i在可行范围内的线性搜索法来求解P1-Top的算法SolP1Top如下所示:The algorithm SolP1Top to solve P1-Top according to the linear search method of ∈ i in the feasible range is as follows:
步骤9.1:设置当前最优解CBS为空集,当前最优能量消耗值CBV=∞,同时设置∈i的初值为Δ,步长也为Δ;Step 9.1: Set the current optimal solution CBS as an empty set, the current optimal energy consumption value CBV = ∞, and set the initial value of ∈ i to Δ, and the step size to Δ;
步骤9.2:如果∈i满足则执行步骤9.3;否则执行步骤9.6;Step 9.2: If ∈ i satisfies Then go to step 9.3; otherwise go to step 9.6;
步骤9.3:将∈i带入顶层问题P1-Top的目标函数中,判断所得到的V(∈i)是否小于当前最优能量消耗值CBV;Step 9.3: Bring ∈ i into the objective function of the top-level problem P1-Top, and judge whether the obtained V(∈ i ) is less than the current optimal energy consumption value CBV;
步骤9.4:如果V(∈i)≥CBV成立,那么更新∈i=∈i+Δ,返回步骤9.2;Step 9.4: If V(∈ i )≥CBV is established, then update ∈i=∈ i +Δ, return to step 9.2;
步骤9.5:如果V(∈i)<CBV成立,那么更新当前最优解当前最优能量消耗值为V*(∈i),同时更新∈i=∈i+Δ,返回步骤9.2;Step 9.5: If V(∈ i )<CBV holds, then update the current optimal solution The current optimal energy consumption value is V * (∈ i ), while updating ∈ i =∈ i +Δ, return to step 9.2;
步骤9.6:结束循环;Step 9.6: end the loop;
步骤9.7:如果当前最优能量消耗值CBV为∞,那么P1问题不可行,否则输出当前最优解当前最优能量消耗值为V*(∈i);Step 9.7: If the current optimal energy consumption value CBV is ∞, then the P1 problem is not feasible, otherwise output the current optimal solution The current optimal energy consumption value is V * (∈ i );
(10)通过对P1问题的分层求解,得到MU在AP侧消耗能量的最优解MU在AP侧数据分流需求最优解MU在BS侧消耗能量的最优解MU在BS侧数据需求的最优解MU的保密性程度最优解MU的最优能量消耗值为V*(∈i)。(10) Through the hierarchical solution to the P1 problem, the optimal solution of the energy consumed by the MU on the AP side is obtained Optimal solution for MU's data distribution requirements on the AP side The Optimal Solution of Energy Consumption by MU on the BS Side Optimal Solution of MU's Data Requirements on BS Side Optimal Solution of MU's Secrecy Degree The optimal energy consumption value of MU is V * (∈ i ).
在本实施例中,图1是本发明考虑的无线网络中包含一个宏基站BS、一个用户MU、一个小基站AP以及一个窃听者的系统。在该系统中,主要考虑的不包括干扰,但是会考虑到1.用户MU与小基站AP之间的信道环境、用户MU与宏基站BS之间的信道环境以及用户MU与窃听者之间的信道环境;2.用户MU的保密性需求;3.用户MU在不同情况下的总能耗。为了使得MU获得一个满足保密性需求同时能耗最小的目标,提出发明实现对于该问题的解决。In this embodiment, FIG. 1 is a system in which a wireless network considered in the present invention includes a macro base station BS, a user MU, a small base station AP, and an eavesdropper. In this system, the main consideration does not include interference, but it will consider 1. The channel environment between the user MU and the small base station AP, the channel environment between the user MU and the macro base station BS, and the communication between the user MU and the eavesdropper Channel environment; 2. Confidentiality requirement of user MU; 3. Total energy consumption of user MU in different situations. In order to make MU achieve a goal of meeting the confidentiality requirement while minimizing energy consumption, an invention is proposed to solve this problem.
本实施案例着眼于满足用户MU适当的保密性需求的前提下,最小化在双连接下的MU的总能耗,联合保密程度和功率消耗优化,提高无线资源利用率以及能量利用率。本发明的实行过程中,得益于问题的有效转换以及优化算法对于计算复杂度的减少。This implementation case focuses on minimizing the total energy consumption of the MU under dual connectivity under the premise of meeting the appropriate confidentiality requirements of the user MU, jointly optimizing the degree of confidentiality and power consumption, and improving the utilization rate of wireless resources and energy utilization. In the implementation process of the present invention, it benefits from the effective transformation of the problem and the reduction of the computational complexity of the optimization algorithm.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810364696.4A CN108810885A (en) | 2018-04-23 | 2018-04-23 | Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810364696.4A CN108810885A (en) | 2018-04-23 | 2018-04-23 | Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108810885A true CN108810885A (en) | 2018-11-13 |
Family
ID=64093728
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810364696.4A Pending CN108810885A (en) | 2018-04-23 | 2018-04-23 | Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108810885A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170265150A1 (en) * | 2013-08-21 | 2017-09-14 | Intel Corporation | User equipment and method for enhanced uplink power control |
CN107466069A (en) * | 2017-07-17 | 2017-12-12 | 浙江工业大学 | Efficiency optimization method based on dual link and non-orthogonal multiple access in wireless network |
-
2018
- 2018-04-23 CN CN201810364696.4A patent/CN108810885A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170265150A1 (en) * | 2013-08-21 | 2017-09-14 | Intel Corporation | User equipment and method for enhanced uplink power control |
CN107466069A (en) * | 2017-07-17 | 2017-12-12 | 浙江工业大学 | Efficiency optimization method based on dual link and non-orthogonal multiple access in wireless network |
Non-Patent Citations (2)
Title |
---|
YUAN WU 等: "Joint Traffic Scheduling and Resource Allocations for Traffic Offloading With Secrecy Provisioning", 《IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY》 * |
YUAN WU 等: "Secrecy-Based Energy-Efficient Data Offloading via Dual Connectivity Over Unlicensed Spectrums", 《IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Feng et al. | BOOST: Base station on-off switching strategy for energy efficient massive MIMO HetNets | |
CN103716869B (en) | A kind of distributed power control method optimized based on efficiency in D2D communication | |
CN107466069A (en) | Efficiency optimization method based on dual link and non-orthogonal multiple access in wireless network | |
CN108040364A (en) | Channel width and the linear search method of power joint distribution in non-orthogonal multiple link | |
CN108600999B (en) | FD-D2D joint optimization method based on channel allocation and power control | |
CN110213822B (en) | A data security-based optimization method for downlink linear search power allocation in non-orthogonal multiple access systems | |
CN105188089A (en) | Load balancing method based on integral optimization of user connection and interference management in ultra-dense heterogeneous network | |
CN105959234A (en) | Load balance resource optimization method under safety perceptive cloud radio access network | |
CN107026684A (en) | A kind of cognitive communications safety of physical layer efficiency optimization method based on man made noise | |
CN108965009A (en) | A kind of load known users correlating method based on gesture game | |
CN109526040A (en) | The mobile edge calculations linear search formula time delay optimization method based on non-orthogonal multiple access in more base station scenes | |
CN106304111A (en) | Isomery cellular network power allocation method based on energy acquisition relay station | |
CN105813189B (en) | A D2D distributed power optimization method in cellular network | |
CN107343268A (en) | Nonopiate multicast and unicast transmission beam shaping method and system | |
CN104869646A (en) | Energy-efficient resource allocation method for use in heterogeneous wireless network | |
Chen et al. | Resource allocation for energy harvesting-powered D2D communications underlaying NOMA-based networks | |
CN105142224B (en) | D2D power distribution rapid optimizing algorithms in the case of single channel phone user | |
CN108449737B (en) | D2D-based downlink energy-efficient power distribution method in distributed antenna system | |
CN106413098B (en) | A Resource Allocation Method Based on Outage Probability in D2D Network | |
CN110248403A (en) | A kind of resource management-control method of the maximization D2D connection number based on non-orthogonal multiple | |
CN108810885A (en) | Uplink dual-connection data distribution method based on joint confidentiality degree and power consumption optimization | |
CN108513292A (en) | Uplink dual-connection data distribution method based on confidentiality and energy efficiency optimization | |
CN107613565B (en) | Wireless resource management method in full-duplex ultra-dense network | |
CN105101381B (en) | D2D power distribution fast Optimization in the case of multichannel phone user | |
Li et al. | User cooperation and link selection in hybrid VLC/RF systems with NOMA |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181113 |
|
RJ01 | Rejection of invention patent application after publication |