SlideShare une entreprise Scribd logo
1  sur  30
Multiuser Detection Algorithms for CDMA based on the Message Passing Algorithms Waseda University, Japan Shunsuke Horii Tota Suko Toshiyasu Matsushima
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Contents
[object Object],[object Object],[object Object],[object Object],1. Introduction detection problem can be regarded as   a  probabilistic inference problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[Kabashima, 2003] [Tonosaki et al., 2004]
[object Object],1. Introduction
2 . Synchronous DS CDMA Channel Model with K users ,[object Object],[object Object],【information bit】 【signature sequence】 : number of chips : chip cycle 【modulated signal】
2 . Synchronous DS CDMA Channel Model with K users Channel receiver Gaussian noise The signals of all users are multiplexed. Gaussian noise is added.
[object Object],[object Object],【 MPM (Maximum Posterior Marginal) detector 】 Uniform Prior: Gaussian Channel: 3 . MPM detector
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3 . MPM detector Computational Complexity Problem
[object Object],[object Object],[object Object],4 . The Belief Propagation and the Concave Convex    Procedure Ex. [Kschischang et al. 01]
[object Object],[object Object],[object Object],[object Object],[object Object],4 . The Belief Propagation and the Concave Convex    Procedure [Yedidia et al. 2005] [Yuille, 2002 ]
[object Object],neighboring nodes of  【 factor node->variable node 】 arguments of  neighboring nodes of  【 variable node->factor node 】 【 belief 】 approximation to marginal probability function normalization constant  4 . The Belief Propagation and the Concave Convex    Procedure computational complexity increases exponentially with the number of variable nodes which are connecting to a factor node
[object Object],[object Object],the number of neighboring factor nodes of the variable node  convergent value of  in the inner loop  ,[object Object],4 . The Belief Propagation and the Concave Convex    Procedure After the enough number of the updates in the inner loop, the convergent value of the λ ai  is used for the updates in the outer loop. computational complexity increases exponentially with the number of variable nodes which are connecting to a factor node
[object Object],5 . Approximate BP Detector and   Approximate CCCP Detector Factor graph Ⅰ [Kabashima, 2003] [Tonosaki et al., 2004]
[object Object],5 . Approximate BP Detector and   Approximate CCCP Detector ,[object Object],Update rule for the message of the BP Update rule for the inner loop of the CCCP
[object Object],[object Object],5 . Approximate BP Detector and   Approximate CCCP Detector
[object Object],[object Object],5 . Proposed BP Detector and   Proposed CCCP Detector Point There are many ways to factorize. Point in our proposition
5 . Proposed BP Detector and   Proposed CCCP Detector ,[object Object],Sufficient statistics Cross correlations
5 . Proposed BP Detector and   Proposed CCCP Detector ,[object Object],Factor graph Ⅱ(proposed)
5 . Proposed BP Detector and   Proposed CCCP Detector ,[object Object],[object Object],Factor graph Ⅱ(proposed)
6 . Simulations Simulation Conditions Ⅰ . Comparison of the detectors with the bit error rate ※  assumption to approximate
6 . Simulations The performance of the BP for the Factor Graph Ⅱis not good. The performance of the CCCP for the Factor Graph Ⅱis near to the MPM detector’s performance
The performance of the BP for the Factor graph Ⅱ is improved. The performance of the approx. CCCP for the FG Ⅰ is not good. 6 . Simulations ※Absolute values of the cross correlations tends to take small values when the length of the signature sequence is large.
6 . Simulations Simulation Conditions Ⅱ . Comparison of the approx. CCCP for the FGⅠ and the CCCP for the FGⅡ
6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰ doesn’t decrease for the increase in the number of updates in the outer loop.
6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰdecreases for the increase in the number of updates in the outer loop. imply The approx. CCCP for the  Factor Graph Ⅰ needs more  number of updates in the  Inner loop.
7 . Discussions ,[object Object],[object Object],Reason It seems to me that the fact that “the strengths of functions are strong, the BP tends to not converge” is one of reasons.   Ref.[Welling and Teh, 2001] ※
7 . Discussions ,[object Object],[object Object],Reason It seems to me, the number of edges effects on the necessary number of updates for the CCCP to converge. The number of edges is reduced in the Factor graph Ⅱ.
[object Object],8 . Conclusion ,[object Object]
Appendix A
Appendix B

Contenu connexe

Tendances

Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
IJECEIAES
 
Iaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generator
Iaetsd Iaetsd
 
TurnerBottoneStanekNIPS2013
TurnerBottoneStanekNIPS2013TurnerBottoneStanekNIPS2013
TurnerBottoneStanekNIPS2013
Clay Stanek
 
A multi path routing algorithm for ip
A multi path routing algorithm for ipA multi path routing algorithm for ip
A multi path routing algorithm for ip
Alvianus Dengen
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05
Wayne Jones Jnr
 

Tendances (19)

Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
 
Iaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generator
 
NS2 IEEE projects 2014
NS2 IEEE projects 2014NS2 IEEE projects 2014
NS2 IEEE projects 2014
 
TurnerBottoneStanekNIPS2013
TurnerBottoneStanekNIPS2013TurnerBottoneStanekNIPS2013
TurnerBottoneStanekNIPS2013
 
Frame Synchronization for OFDMA mode of WMAN
Frame Synchronization for OFDMA mode of WMANFrame Synchronization for OFDMA mode of WMAN
Frame Synchronization for OFDMA mode of WMAN
 
EE402B Radio Systems and Personal Communication Networks notes
EE402B Radio Systems and Personal Communication Networks notesEE402B Radio Systems and Personal Communication Networks notes
EE402B Radio Systems and Personal Communication Networks notes
 
R04605106110
R04605106110R04605106110
R04605106110
 
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMDESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
 
A multi path routing algorithm for ip
A multi path routing algorithm for ipA multi path routing algorithm for ip
A multi path routing algorithm for ip
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05
 
Chapter 5 analog transmission computer_network
Chapter 5 analog transmission  computer_networkChapter 5 analog transmission  computer_network
Chapter 5 analog transmission computer_network
 
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsAn Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
 
Enhanced Payload Data Reduction Approach for Cluster Head (CH) Nodes
Enhanced Payload Data Reduction Approach for Cluster Head (CH) NodesEnhanced Payload Data Reduction Approach for Cluster Head (CH) Nodes
Enhanced Payload Data Reduction Approach for Cluster Head (CH) Nodes
 
Cn mid feb 2014
Cn mid feb 2014Cn mid feb 2014
Cn mid feb 2014
 
Kc3418141820
Kc3418141820Kc3418141820
Kc3418141820
 
Graph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate designGraph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate design
 
Energy efficient resources allocations for wireless communication systems
Energy efficient resources allocations for wireless communication systemsEnergy efficient resources allocations for wireless communication systems
Energy efficient resources allocations for wireless communication systems
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
 
A downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksA downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networks
 

Similaire à ma112006id337

Xevgenis_Michael_CI7110_ Data_Communications.DOC
Xevgenis_Michael_CI7110_ Data_Communications.DOCXevgenis_Michael_CI7110_ Data_Communications.DOC
Xevgenis_Michael_CI7110_ Data_Communications.DOC
Michael Xevgenis
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd Iaetsd
 
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesImplementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
IOSRJVSP
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Iaetsd gmsk modulation implementation for gsm in dsp
Iaetsd gmsk modulation implementation for gsm in dspIaetsd gmsk modulation implementation for gsm in dsp
Iaetsd gmsk modulation implementation for gsm in dsp
Iaetsd Iaetsd
 

Similaire à ma112006id337 (20)

ma112008id371
ma112008id371ma112008id371
ma112008id371
 
Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...
 
Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...
 
Generalized Parallel CRC Computation
Generalized Parallel CRC ComputationGeneralized Parallel CRC Computation
Generalized Parallel CRC Computation
 
Xevgenis_Michael_CI7110_ Data_Communications.DOC
Xevgenis_Michael_CI7110_ Data_Communications.DOCXevgenis_Michael_CI7110_ Data_Communications.DOC
Xevgenis_Michael_CI7110_ Data_Communications.DOC
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
 
Fpga implementation of 4 bit parallel cyclic redundancy code
Fpga implementation of 4 bit parallel cyclic redundancy codeFpga implementation of 4 bit parallel cyclic redundancy code
Fpga implementation of 4 bit parallel cyclic redundancy code
 
IRJET- The RTL Model of a Reconfigurable Pipelined MCM
IRJET- The RTL Model of a Reconfigurable Pipelined MCMIRJET- The RTL Model of a Reconfigurable Pipelined MCM
IRJET- The RTL Model of a Reconfigurable Pipelined MCM
 
Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...
 
vorlage
vorlagevorlage
vorlage
 
StateKeeper Report
StateKeeper ReportStateKeeper Report
StateKeeper Report
 
Masters Thesis
Masters ThesisMasters Thesis
Masters Thesis
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...
 
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesImplementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
 
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...
THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...
THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...
 
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
 
Iaetsd gmsk modulation implementation for gsm in dsp
Iaetsd gmsk modulation implementation for gsm in dspIaetsd gmsk modulation implementation for gsm in dsp
Iaetsd gmsk modulation implementation for gsm in dsp
 

Plus de matsushimalab (20)

ma99992012id537
ma99992012id537ma99992012id537
ma99992012id537
 
ma12012id536
ma12012id536ma12012id536
ma12012id536
 
ma112011id535
ma112011id535ma112011id535
ma112011id535
 
ma99992011id513
ma99992011id513ma99992011id513
ma99992011id513
 
ma99992010id512
ma99992010id512ma99992010id512
ma99992010id512
 
ma99992010id510
ma99992010id510ma99992010id510
ma99992010id510
 
ma99992011id509
ma99992011id509ma99992011id509
ma99992011id509
 
ma99992011id508
ma99992011id508ma99992011id508
ma99992011id508
 
ma99992010id497
ma99992010id497ma99992010id497
ma99992010id497
 
ma99992010id464
ma99992010id464ma99992010id464
ma99992010id464
 
ma92010id461
ma92010id461ma92010id461
ma92010id461
 
ma112010id450
ma112010id450ma112010id450
ma112010id450
 
ma112009id434
ma112009id434ma112009id434
ma112009id434
 
ma52009id421
ma52009id421ma52009id421
ma52009id421
 
ma52009id420
ma52009id420ma52009id420
ma52009id420
 
ma52009id419
ma52009id419ma52009id419
ma52009id419
 
ma112007id414
ma112007id414ma112007id414
ma112007id414
 
ma112007id413
ma112007id413ma112007id413
ma112007id413
 
ma22006id411
ma22006id411ma22006id411
ma22006id411
 
ma92007id395
ma92007id395ma92007id395
ma92007id395
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

ma112006id337

  • 1. Multiuser Detection Algorithms for CDMA based on the Message Passing Algorithms Waseda University, Japan Shunsuke Horii Tota Suko Toshiyasu Matsushima
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. 2 . Synchronous DS CDMA Channel Model with K users Channel receiver Gaussian noise The signals of all users are multiplexed. Gaussian noise is added.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. 6 . Simulations Simulation Conditions Ⅰ . Comparison of the detectors with the bit error rate ※ assumption to approximate
  • 21. 6 . Simulations The performance of the BP for the Factor Graph Ⅱis not good. The performance of the CCCP for the Factor Graph Ⅱis near to the MPM detector’s performance
  • 22. The performance of the BP for the Factor graph Ⅱ is improved. The performance of the approx. CCCP for the FG Ⅰ is not good. 6 . Simulations ※Absolute values of the cross correlations tends to take small values when the length of the signature sequence is large.
  • 23. 6 . Simulations Simulation Conditions Ⅱ . Comparison of the approx. CCCP for the FGⅠ and the CCCP for the FGⅡ
  • 24. 6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰ doesn’t decrease for the increase in the number of updates in the outer loop.
  • 25. 6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰdecreases for the increase in the number of updates in the outer loop. imply The approx. CCCP for the Factor Graph Ⅰ needs more number of updates in the Inner loop.
  • 26.
  • 27.
  • 28.