SlideShare une entreprise Scribd logo
1  sur  30
Multiuser Detection Algorithms for CDMA based on the Message Passing Algorithms Waseda University, Japan Shunsuke Horii Tota Suko Toshiyasu Matsushima
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Contents
[object Object],[object Object],[object Object],[object Object],1. Introduction detection problem can be regarded as   a  probabilistic inference problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[Kabashima, 2003] [Tonosaki et al., 2004]
[object Object],1. Introduction
2 . Synchronous DS CDMA Channel Model with K users ,[object Object],[object Object],【information bit】 【signature sequence】 : number of chips : chip cycle 【modulated signal】
2 . Synchronous DS CDMA Channel Model with K users Channel receiver Gaussian noise The signals of all users are multiplexed. Gaussian noise is added.
[object Object],[object Object],【 MPM (Maximum Posterior Marginal) detector 】 Uniform Prior: Gaussian Channel: 3 . MPM detector
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],3 . MPM detector Computational Complexity Problem
[object Object],[object Object],[object Object],4 . The Belief Propagation and the Concave Convex    Procedure Ex. [Kschischang et al. 01]
[object Object],[object Object],[object Object],[object Object],[object Object],4 . The Belief Propagation and the Concave Convex    Procedure [Yedidia et al. 2005] [Yuille, 2002 ]
[object Object],neighboring nodes of  【 factor node->variable node 】 arguments of  neighboring nodes of  【 variable node->factor node 】 【 belief 】 approximation to marginal probability function normalization constant  4 . The Belief Propagation and the Concave Convex    Procedure computational complexity increases exponentially with the number of variable nodes which are connecting to a factor node
[object Object],[object Object],the number of neighboring factor nodes of the variable node  convergent value of  in the inner loop  ,[object Object],4 . The Belief Propagation and the Concave Convex    Procedure After the enough number of the updates in the inner loop, the convergent value of the λ ai  is used for the updates in the outer loop. computational complexity increases exponentially with the number of variable nodes which are connecting to a factor node
[object Object],5 . Approximate BP Detector and   Approximate CCCP Detector Factor graph Ⅰ [Kabashima, 2003] [Tonosaki et al., 2004]
[object Object],5 . Approximate BP Detector and   Approximate CCCP Detector ,[object Object],Update rule for the message of the BP Update rule for the inner loop of the CCCP
[object Object],[object Object],5 . Approximate BP Detector and   Approximate CCCP Detector
[object Object],[object Object],5 . Proposed BP Detector and   Proposed CCCP Detector Point There are many ways to factorize. Point in our proposition
5 . Proposed BP Detector and   Proposed CCCP Detector ,[object Object],Sufficient statistics Cross correlations
5 . Proposed BP Detector and   Proposed CCCP Detector ,[object Object],Factor graph Ⅱ(proposed)
5 . Proposed BP Detector and   Proposed CCCP Detector ,[object Object],[object Object],Factor graph Ⅱ(proposed)
6 . Simulations Simulation Conditions Ⅰ . Comparison of the detectors with the bit error rate ※  assumption to approximate
6 . Simulations The performance of the BP for the Factor Graph Ⅱis not good. The performance of the CCCP for the Factor Graph Ⅱis near to the MPM detector’s performance
The performance of the BP for the Factor graph Ⅱ is improved. The performance of the approx. CCCP for the FG Ⅰ is not good. 6 . Simulations ※Absolute values of the cross correlations tends to take small values when the length of the signature sequence is large.
6 . Simulations Simulation Conditions Ⅱ . Comparison of the approx. CCCP for the FGⅠ and the CCCP for the FGⅡ
6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰ doesn’t decrease for the increase in the number of updates in the outer loop.
6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰdecreases for the increase in the number of updates in the outer loop. imply The approx. CCCP for the  Factor Graph Ⅰ needs more  number of updates in the  Inner loop.
7 . Discussions ,[object Object],[object Object],Reason It seems to me that the fact that “the strengths of functions are strong, the BP tends to not converge” is one of reasons.   Ref.[Welling and Teh, 2001] ※
7 . Discussions ,[object Object],[object Object],Reason It seems to me, the number of edges effects on the necessary number of updates for the CCCP to converge. The number of edges is reduced in the Factor graph Ⅱ.
[object Object],8 . Conclusion ,[object Object]
Appendix A
Appendix B

Contenu connexe

Tendances

Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...IJECEIAES
 
Iaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd Iaetsd
 
NS2 IEEE projects 2014
NS2 IEEE projects 2014NS2 IEEE projects 2014
NS2 IEEE projects 2014Senthilvel S
 
TurnerBottoneStanekNIPS2013
TurnerBottoneStanekNIPS2013TurnerBottoneStanekNIPS2013
TurnerBottoneStanekNIPS2013Clay Stanek
 
Frame Synchronization for OFDMA mode of WMAN
Frame Synchronization for OFDMA mode of WMANFrame Synchronization for OFDMA mode of WMAN
Frame Synchronization for OFDMA mode of WMANPushpa Kotipalli
 
EE402B Radio Systems and Personal Communication Networks notes
EE402B Radio Systems and Personal Communication Networks notesEE402B Radio Systems and Personal Communication Networks notes
EE402B Radio Systems and Personal Communication Networks notesHaris Hassan
 
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMDESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMsipij
 
A multi path routing algorithm for ip
A multi path routing algorithm for ipA multi path routing algorithm for ip
A multi path routing algorithm for ipAlvianus Dengen
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05Wayne Jones Jnr
 
Chapter 5 analog transmission computer_network
Chapter 5 analog transmission  computer_networkChapter 5 analog transmission  computer_network
Chapter 5 analog transmission computer_networkDhairya Joshi
 
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsAn Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsEM Legacy
 
Enhanced Payload Data Reduction Approach for Cluster Head (CH) Nodes
Enhanced Payload Data Reduction Approach for Cluster Head (CH) NodesEnhanced Payload Data Reduction Approach for Cluster Head (CH) Nodes
Enhanced Payload Data Reduction Approach for Cluster Head (CH) NodesTELKOMNIKA JOURNAL
 
Graph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate designGraph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate designjpstudcorner
 
Energy efficient resources allocations for wireless communication systems
Energy efficient resources allocations for wireless communication systemsEnergy efficient resources allocations for wireless communication systems
Energy efficient resources allocations for wireless communication systemsTELKOMNIKA JOURNAL
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...jpstudcorner
 
A downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksA downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksUniversity of Piraeus
 

Tendances (19)

Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...
 
Iaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generator
 
NS2 IEEE projects 2014
NS2 IEEE projects 2014NS2 IEEE projects 2014
NS2 IEEE projects 2014
 
TurnerBottoneStanekNIPS2013
TurnerBottoneStanekNIPS2013TurnerBottoneStanekNIPS2013
TurnerBottoneStanekNIPS2013
 
Frame Synchronization for OFDMA mode of WMAN
Frame Synchronization for OFDMA mode of WMANFrame Synchronization for OFDMA mode of WMAN
Frame Synchronization for OFDMA mode of WMAN
 
EE402B Radio Systems and Personal Communication Networks notes
EE402B Radio Systems and Personal Communication Networks notesEE402B Radio Systems and Personal Communication Networks notes
EE402B Radio Systems and Personal Communication Networks notes
 
R04605106110
R04605106110R04605106110
R04605106110
 
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMDESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
 
A multi path routing algorithm for ip
A multi path routing algorithm for ipA multi path routing algorithm for ip
A multi path routing algorithm for ip
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05
 
Chapter 5 analog transmission computer_network
Chapter 5 analog transmission  computer_networkChapter 5 analog transmission  computer_network
Chapter 5 analog transmission computer_network
 
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP ConstraintsAn Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
An Offline Hybrid IGP/MPLS Traffic Engineering Approach under LSP Constraints
 
Enhanced Payload Data Reduction Approach for Cluster Head (CH) Nodes
Enhanced Payload Data Reduction Approach for Cluster Head (CH) NodesEnhanced Payload Data Reduction Approach for Cluster Head (CH) Nodes
Enhanced Payload Data Reduction Approach for Cluster Head (CH) Nodes
 
Cn mid feb 2014
Cn mid feb 2014Cn mid feb 2014
Cn mid feb 2014
 
Kc3418141820
Kc3418141820Kc3418141820
Kc3418141820
 
Graph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate designGraph based transistor network generation method for supergate design
Graph based transistor network generation method for supergate design
 
Energy efficient resources allocations for wireless communication systems
Energy efficient resources allocations for wireless communication systemsEnergy efficient resources allocations for wireless communication systems
Energy efficient resources allocations for wireless communication systems
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
 
A downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksA downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networks
 

Similaire à ma112006id337

Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...VLSICS Design
 
Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...Zac Darcy
 
Generalized Parallel CRC Computation
Generalized Parallel CRC ComputationGeneralized Parallel CRC Computation
Generalized Parallel CRC ComputationIJMTST Journal
 
Xevgenis_Michael_CI7110_ Data_Communications.DOC
Xevgenis_Michael_CI7110_ Data_Communications.DOCXevgenis_Michael_CI7110_ Data_Communications.DOC
Xevgenis_Michael_CI7110_ Data_Communications.DOCMichael Xevgenis
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd Iaetsd
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
 
Fpga implementation of 4 bit parallel cyclic redundancy code
Fpga implementation of 4 bit parallel cyclic redundancy codeFpga implementation of 4 bit parallel cyclic redundancy code
Fpga implementation of 4 bit parallel cyclic redundancy codeeSAT Journals
 
IRJET- The RTL Model of a Reconfigurable Pipelined MCM
IRJET- The RTL Model of a Reconfigurable Pipelined MCMIRJET- The RTL Model of a Reconfigurable Pipelined MCM
IRJET- The RTL Model of a Reconfigurable Pipelined MCMIRJET Journal
 
Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...Zac Darcy
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...eSAT Publishing House
 
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesImplementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesIOSRJVSP
 
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Filip Krikava
 
Iaetsd gmsk modulation implementation for gsm in dsp
Iaetsd gmsk modulation implementation for gsm in dspIaetsd gmsk modulation implementation for gsm in dsp
Iaetsd gmsk modulation implementation for gsm in dspIaetsd Iaetsd
 

Similaire à ma112006id337 (20)

ma112008id371
ma112008id371ma112008id371
ma112008id371
 
Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...Fpga based efficient multiplier for image processing applications using recur...
Fpga based efficient multiplier for image processing applications using recur...
 
Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...
 
Generalized Parallel CRC Computation
Generalized Parallel CRC ComputationGeneralized Parallel CRC Computation
Generalized Parallel CRC Computation
 
Xevgenis_Michael_CI7110_ Data_Communications.DOC
Xevgenis_Michael_CI7110_ Data_Communications.DOCXevgenis_Michael_CI7110_ Data_Communications.DOC
Xevgenis_Michael_CI7110_ Data_Communications.DOC
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
 
Fpga implementation of 4 bit parallel cyclic redundancy code
Fpga implementation of 4 bit parallel cyclic redundancy codeFpga implementation of 4 bit parallel cyclic redundancy code
Fpga implementation of 4 bit parallel cyclic redundancy code
 
IRJET- The RTL Model of a Reconfigurable Pipelined MCM
IRJET- The RTL Model of a Reconfigurable Pipelined MCMIRJET- The RTL Model of a Reconfigurable Pipelined MCM
IRJET- The RTL Model of a Reconfigurable Pipelined MCM
 
Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...Application of a merit function based interior point method to linear model p...
Application of a merit function based interior point method to linear model p...
 
vorlage
vorlagevorlage
vorlage
 
StateKeeper Report
StateKeeper ReportStateKeeper Report
StateKeeper Report
 
Masters Thesis
Masters ThesisMasters Thesis
Masters Thesis
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...
 
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesImplementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
 
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
High Speed and Area Efficient Booth Multiplier Using SQRT CSLA with Zero Find...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...
THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...
THROUGHPUT ANALYSIS OF MOBILE WIMAX NETWORK UNDER MULTIPATH RICIAN FADING CHA...
 
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
 
Iaetsd gmsk modulation implementation for gsm in dsp
Iaetsd gmsk modulation implementation for gsm in dspIaetsd gmsk modulation implementation for gsm in dsp
Iaetsd gmsk modulation implementation for gsm in dsp
 

Plus de matsushimalab (20)

ma99992012id537
ma99992012id537ma99992012id537
ma99992012id537
 
ma12012id536
ma12012id536ma12012id536
ma12012id536
 
ma112011id535
ma112011id535ma112011id535
ma112011id535
 
ma99992011id513
ma99992011id513ma99992011id513
ma99992011id513
 
ma99992010id512
ma99992010id512ma99992010id512
ma99992010id512
 
ma99992010id510
ma99992010id510ma99992010id510
ma99992010id510
 
ma99992011id509
ma99992011id509ma99992011id509
ma99992011id509
 
ma99992011id508
ma99992011id508ma99992011id508
ma99992011id508
 
ma99992010id497
ma99992010id497ma99992010id497
ma99992010id497
 
ma99992010id464
ma99992010id464ma99992010id464
ma99992010id464
 
ma92010id461
ma92010id461ma92010id461
ma92010id461
 
ma112010id450
ma112010id450ma112010id450
ma112010id450
 
ma112009id434
ma112009id434ma112009id434
ma112009id434
 
ma52009id421
ma52009id421ma52009id421
ma52009id421
 
ma52009id420
ma52009id420ma52009id420
ma52009id420
 
ma52009id419
ma52009id419ma52009id419
ma52009id419
 
ma112007id414
ma112007id414ma112007id414
ma112007id414
 
ma112007id413
ma112007id413ma112007id413
ma112007id413
 
ma22006id411
ma22006id411ma22006id411
ma22006id411
 
ma92007id395
ma92007id395ma92007id395
ma92007id395
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

ma112006id337

  • 1. Multiuser Detection Algorithms for CDMA based on the Message Passing Algorithms Waseda University, Japan Shunsuke Horii Tota Suko Toshiyasu Matsushima
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. 2 . Synchronous DS CDMA Channel Model with K users Channel receiver Gaussian noise The signals of all users are multiplexed. Gaussian noise is added.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. 6 . Simulations Simulation Conditions Ⅰ . Comparison of the detectors with the bit error rate ※ assumption to approximate
  • 21. 6 . Simulations The performance of the BP for the Factor Graph Ⅱis not good. The performance of the CCCP for the Factor Graph Ⅱis near to the MPM detector’s performance
  • 22. The performance of the BP for the Factor graph Ⅱ is improved. The performance of the approx. CCCP for the FG Ⅰ is not good. 6 . Simulations ※Absolute values of the cross correlations tends to take small values when the length of the signature sequence is large.
  • 23. 6 . Simulations Simulation Conditions Ⅱ . Comparison of the approx. CCCP for the FGⅠ and the CCCP for the FGⅡ
  • 24. 6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰ doesn’t decrease for the increase in the number of updates in the outer loop.
  • 25. 6 . Simulations The bit error rate of the approx. CCCP for the Factor Graph Ⅰdecreases for the increase in the number of updates in the outer loop. imply The approx. CCCP for the Factor Graph Ⅰ needs more number of updates in the Inner loop.
  • 26.
  • 27.
  • 28.