Supercharge Your Innovation With Domain-Expert AI Agents!

Safe shunting uplink transmission time optimization method based on linear search mode

A technology of transmission time and linear search, applied in the field of communication, can solve problems such as security overflow and malicious eavesdropping of smart devices

Active Publication Date: 2019-08-23
ZHEJIANG UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to realize data shunting, some smart devices are easily eavesdropped maliciously, leading to security overflow problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe shunting uplink transmission time optimization method based on linear search mode
  • Safe shunting uplink transmission time optimization method based on linear search mode
  • Safe shunting uplink transmission time optimization method based on linear search mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The present invention will be further described below in conjunction with the accompanying drawings.

[0075] refer to figure 1 , a method for optimizing the uplink transmission time of security offloading based on linear search. The implementation of this method can minimize the uplink time of security offloading under the condition of ensuring that all computing tasks of smart devices are completed at the same time, and ensure the security performance of the entire system. At the same time, the wireless network experience quality of the entire system is improved. The present invention can be applied to wireless networks, such as figure 1 In the scenario shown, the optimization method for designing the problem for this goal includes the following steps:

[0076] (1) There is a total of 1 smart device under the coverage of the edge server, and the smart device uses a set Indicates that the total amount of computing tasks that smart device i needs to perform is repre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe shunting uplink transmission time optimization method based on a linear search mode. The method comprises the following steps: (1) there are a total of 1 mobile users under the coverage of the base station, which satisfies the mobile subscriber's quality of service and ensures the user's transmission information security while the uplink transmission time of amobileuser is minored, wherein the optimization method is a non-convex optimization problem; (2) a P1Sub-UP problem is equivalently converted to a P1Sub-UP-E problem, the P1Sub-UP-E problem is equivalent toa P1Sub-UP-E-Bot bottom-level problem and a P1Sub-UP-E-Top top-level problem; (3) a P1Sub-UP-E-Bot-althorigm of the P1Sub-UP-E-Bot problem is solved. In order to determine whether the P1Sub-UP-E-Botproblem is viable or not in the condition that iB is belonged, a P1Sub-UP-E-Top problem is proposed. Based on a linear search method, overall wireless resource consumption is optimized under the condition that the upload amount of a mobile user is given. The present invention minimizes uplink transmission time.totally I mobile users exist in the coverage range of a base station, the service quality of the mobile users is met, the uplink transmission time of the mobile users is minimized while the transmission information security of the users is ensured, and an optimization problem is described as a non-convex optimization problem; (2) carrying out P1Sub-treatment on P1Sub- Equivalent conversion of UP problem to p1Sub- UP E, performing problem treatment on P1Sub- UP E problem is equivalent to P1Sub- UP E Bot underlying problem, P1Sub- UP E Top top layer problem; (3) solving P1Sub- UP E Algorithm P1Subb-for Boot Problems UP E Bot Algorithm, in order to judge P1Sub-under the condition that a given value belongs to iB, uP E Proposing whether the Boot problem is feasible or not, and proposing P1Sub- UP E Top problem; based on a linear search method, the overall wirelessresource consumption is optimized under the condition that the uploading amount of the mobile user is given. The present invention minimizes uplink transmission time.

Description

technical field [0001] The invention belongs to the field of communication, and relates to a method for optimizing the time of uplink transmission of safe offloading based on linear search. Background technique [0002] The massive growth of smart devices poses a huge challenge to future Internet of Things (IoT) systems. The emergence of edge computing technology makes it possible to offload the computing tasks of smart devices, thereby reducing the pressure on the wireless access network. In order to achieve data shunting, some smart devices are easily eavesdropped maliciously, resulting in security overflow problems. Contents of the invention [0003] In order to overcome the shortcoming of long uplink transmission time in the prior art and meet the safety performance requirements of smart devices, the present invention provides a linear search-based safe shunt uplink transmission that minimizes uplink transmission time on the premise of meeting safety performance requi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00H04L29/08H04W28/06
CPCH04L1/0018H04W28/06H04L67/51
Inventor 吴远潘伟建汪道航钱丽萍黄亮孟利民
Owner ZHEJIANG UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More