Shoichi Noguchi's research while affiliated with Nihon University and other places

Publications (63)

Chapter
Full-text available
Rapid growth in networks and related services have resulted in demands for more effective, accessible, intelligent and scalable network management systems. Not only managers but also users need access to network management information. Traditional network management architectures are utterly inadequate to meet these requirements. In this work we de...
Chapter
Circumscription, proposed by McCarthy, is a formalism of non-monotonic reasoning. Predicate completion is an approach, proposed by Clark, to closed world reasoning which assumes that given sufficient conditions on a predicate are also necessary. Reiter has shown that for clausal sentences which are Horn in a predicate p, the circumscription of p lo...
Chapter
There have been a number of efforts, recently, towards developing default logic and circumscription, two important formalisms for non-monotonic reasoning. In this paper, we shall propose a partial translation of default logic to circumscription. We limit ourselves to an open default of the form, a(x):M(x)/(x), whose justification (x) contains no po...
Article
As computer networks expand, there is a pressing need for management systems capable of handling errors. This article proposes an approach based on management proxies to improve the dependability of fault management systems. An effective MIB to implement the proxies is presented, which allows their deployment at virtually no cost. As an example, a...
Article
Network configuration information can be very effectively used for network traffic optimization and improving network performance. Various approaches have been explored to provide a workable and scalable mechanism by which a user or an application can estimate the network cost factor corresponding to several servers. By choosing the server with the...
Article
this paper we have utilised a novel MIB-based naming scheme. The premises on which this scheme is based are as follows:
Conference Paper
While training neural network to represent distribution of a sample set, generally two aspects are considered: its representation capability to be able to describe the complex distribution of the sample set and the ability to generalize so that novel samples could be mapped correctly. The general conclusion is that, the smallest network capable of...
Conference Paper
Full-text available
Network fault management systems are mission-critical, for they are most needed during periods when part of the network is faulty. Distributed system-level diagnosis offers a practical and theoretically sound solution for fault-tolerant fault monitoring. It guarantees that faults don’t impair the fault management process. Recently, results from the...
Article
In fully connected Multilayer perceptron (MLP), all the hidden units are activated by samples from the whole input space. For complex problems, due to interference and cross coupling of hidden units' activations, the network needs many hidden units to represent the problem and the error surface becomes highly non-linear. Searching for the minimum i...
Conference Paper
Feedforward neural networks trained with a small set of noisy samples are prone to overtraining and poor generalization. On the other hand, a very small network could not be trained at all because it would be biased by its own architecture. Thus, it is an old problem to ascertain that a well trained network would also deliver good generalization. T...
Conference Paper
A feedforward network classifier trained with a finite set of available samples tries to estimate properly the different class boundaries in the input feature space. The aim is that the network would then be able to classify unknown new samples with some confidence. For problems of practical interest, due to the complexity of the class boundaries,...
Article
Full-text available
As a fundamental study of multiple image processing, the authors have developed a new technique for the analysis of multispectral remote sensing data. Though the basis of the authors' algorithm is similar to a histogram analysis, they have proposed a novel way of the representation of multidimensional image data, which facilitates a nonexpert to lo...
Conference Paper
The task of any supervised classifier is to assign optimum boundaries in the input space, for the different class membership. This is done using informations from the available set of known samples. This mapping of sample position in the input space to sample class is further used to classify unknown samples. The available set of known sample is ge...
Article
There is a need for a framework wherein the infrastructural and service related information about communication networks can be made accessible from all places and at all times in a reasonably efficient manner and with reasonable accuracy. The use of such a map is manifold. A Project (by AIC Systems Lab., Tohoku University Sendai, WIDE Internet Jap...
Article
This paper describes a neural network scheduler for scheduling independent and nonpreemptable tasks with deadlines and resource requirements in critical real-time applications, in which a schedule is to be obtained within a short time span. The proposed neural network scheduler is an integrate model of two Hopfield-Tank neural network models. To co...
Article
This paper explores the stability aspects of a multipacket heterogeneous slotted Aloha system by both the direct and the indirect methods due to Liapunov, and establishes the equivalence between them. With the identification of a Liapunov function in terms of the flow balance function, it is found that both of the approaches essentially converge to...
Conference Paper
The authors discuss their idea of an intelligent network management system. In order to simulate intelligence, the reasoning and judgement of the human manager are modeled into a knowledge base. The human managers' view of the network is limited to the Management Information Base (MIB); thus, the MIB provides the starting point for the design of th...
Article
In this paper, we discuss to the intermedia synchronization problems for high speed multimedia communication. Especially, we described how software synchronization can be operated, and estimated the skew bound in CNV when considering the network delay. And we applied CNV to the intermedia synchronization and a hybrid model (HSM) is proposed. Furthe...
Conference Paper
The authors examine the structural relationship between load and blocking probability for a fully connected homogeneous nonhierarchical network when blocked messages cause retrial and when different alternate routing strategies are employed to overcome congestion. The model employed for analysis is based on the flow approximation. It is found that...
Conference Paper
Radial basis functions are used in approximation and interpolation problems and in artificial neural networks. Nonlinear radial basis functions at the single layer hidden units are effective in generating complex nonlinear mapping and, at the same time, facilitate fast linear learning. A model and an algorithm are proposed to arrive at a near optim...
Conference Paper
A behavioral characterization of nonhierarchical alternate routing schemes in which a certain number of trunks are reserved for direct routed traffic is presented. It is found that the fundamental behavioral characteristic of the schemes with trunk reservation control is the same as that of the schemes without reservation. A sufficient condition, w...
Article
Full-text available
The advent of space-technology and multispectral sensors on satellites made available enormous amount of remote sensing data, the supervised classification of which is rather impossible, and is equally unrealistic to obtain a suitable training set. Application of Unsupervised Neural Network (NN) in this field is till now unexplored. In this paper w...
Article
The behavior of a node under alternate routing scheme in a homogeneous non-hierarchical network is modeled with respect to the equilibrium states. Under high load intensities, there exist two equilibrium states: one stable and the other unstable. The blocking probability at the stable equilibrium state is higher than that at the unstable one. The e...
Conference Paper
The authors expand on their experience in a practical network management system by using the simple network management protocol (SNMP) in the context of a large-scale open systems interconnection (OSI)-based campus-network. Various aspects of network management are examined and the importance of time is shown. The network management infrastructure...
Conference Paper
The authors examine the design issues of a practical network management system using the simple network management protocol (SNMP) in the context of a large-scale open systems interconnection (OSI)-based campus-network called TAINS. Various design aspects are examined and the importance of time-management is examined. In the proposed design, intell...
Article
A numerical method is suggested for estimating the performance parameters of a node with input buffer limiting, throughout the range of blocking probabilities. Congestion is attributed to the sudden increase in the effective service time when the input rate increases. This sudden increase, resulting in the thrashing of the throughput rate, can be r...
Article
Full-text available
The authors attempted to identify fog using image-processing data from the US National Oceanic and Atmospheric Administration (NOAA) Advanced Very High Resolution Radiometer (AVHRR). AVHRR sensors measure radiation at visible, near-infrared, and infrared wavelengths. Attention is confined to daytime data from channel 1 (CH1), channel 3 (CH3), and c...
Article
Full-text available
The development of the NOAA satellite Advanced Very High Resolution Radiometer (AVHRR) three-dimensional analysis system, in which the problem of drawing a three-dimensional histogram on a two-dimensional CRT was encountered, is discussed. In this case there are two factors: one is the coordinate position given by the brightness level of the three...
Article
This paper models and analyzes the stability of a slotted-ALOHA network hosting heterogeneous users. The scheme is modeled by dividing the total user-population into groups of homogeneous users. The behavior of the system is represented by state equations. The stability analysis is carried out by Liapunov's indirect method, in association with the...
Article
The analysis of stability in the communication system is a very basic problem in the design of the system. However, the analysis is, in general, complex and difficult. This paper discusses a simple and direct method of analysis for the stability of the communication system, and the result is applied to the computer network with a random access sche...
Conference Paper
Store-and-forward techniques in computer communication networks are addressed. The performance estimation and the stability aspects of an input buffer limiting (IBL) scheme are presented. The model is formulated with respect to the state-dependent effective input rate and effective service rate. The computation of the performance parameters with re...
Article
An attempt is made to design a user-friendly software environment for protocol synthesis based on the FSM (finite state machine), and to show the validity of applying AI (artificial intelligence) techniques to the construction of such a system. For that purpose, the authors have first designed a user-friendly software environment, named SEPS, using...
Article
This paper considers the specification described in LOTOS, which is the formal description language for the communication system. A decision method is proposed for the equivalence between two arbitrary systems (between definition of service and the protocol specifications, for example). In this paper, based on the definition of the weak bisimulatio...
Article
Recently, there are many efforts towards developing default logic and circumscription, two important formalisms for non-monotonic reasoning. In this paper, we propose a partial translation of default logic to circumscription. We limit ourselves to an open default of the form α(x):Mβ(x)/γ(x) whose justification β(x) contains no positive occurrences...
Conference Paper
TAINS (Tohoku University Academic Information Network System) is an open systems interconnection (OSI)-based large-scale information network. A very large number of the users of TAINS are using personal computers (PCs). Few of them, however, have any sort of network interface, therefore PCs are connected to TAINS via a communication adaptor called...
Article
The combined random/reservation access method is one of the access schemes in satellite packet communication networks which exhibits a desirable performance in adapting to the load variation. In the analysis of the system performance up to the present, however, the stability of the system has not been discussed fully. This paper considers the AA/TD...
Article
The stability of a slotted ALOHA system with capture effect is investigated under a general communication environment where terminals are divided into two groups (low-power and high-power) and the capture effect is modeled by capture probabilities. An approximate analysis is developed using catastrophe theory in which the effects of system and user...
Article
This paper proposes an approach, called “the Harmonic Design Method”, to achieve an approximately ideal language that simultaneously serves the purposes or requirements of software specification, verification, implementation and so on. This approach is based on two important concepts—partitioning and unification. In the Harmonic Design Method, the...
Article
An intelligent support system, designed to make the development of protocols and communication software easy and user-friendly, is described. The support system is outlined and its accessories (the knowledge-based specification editor, the validation expert system, the software generation expert system, the conformance-testing expert system, and th...
Article
A knowledge-based system for protocol synthesis named KSPS is presented. The aim of KSPS is to help the protocol designer design a protocol without logical errors, such as unspecified receptions and state deadlocks. KSPS consists of three major components: a knowledge base, a user interface, and an inference engine. The construction of the knowledg...
Article
An interactive synthesis algorithm, to construct two communicating finite-state machines (protocols), is presented. The machines exchange messages over two unidirectional FIFI (first-in first-out) channels when the function of the protocol has been given. The synthesis algorithm first constructs the global state transition graph (GSTG) of a protoco...
Article
AMLOG is an equational logic programming language based on the concept introduced by Fribourg. In this language, an amalgamation of logic programming and equational programming is achieved by combining, in the computation procedure, the capability of inferring solutions by means of goal reduction as in logic programming and the term rewriting featu...
Article
The system performance is affected by interprocessor communication, which should be enough to support various types of permutation functions for mapping purposes. But if there are many types of manipulations, it becomes necessary to have a rearrangeable IN like the Benes Interconnection Network so that we can increase the number of stages of 2n-1,...
Article
In the last few years, substantial efforts have been made towards developing equational programming languages and logic programming languages: the so-called descriptive languages. The languages of both types are based on mathematical systems and to a certain extent resemble each other. This is a clue to the possibility of program transformation fro...
Article
The authors study the fundamental characteristics of the congestion caused by the alternate routing technique in a homogeneous computer network. They develop an approximate method for the analysis of the computer network in general environment. The model is based on the use of the input-output flow balance argument of a network node. The system beh...
Article
Effect of propagation delays on the steady state behavior in ALOHA systems is investigated. The basic model of ALOHA systems with propagation delays is introduced and analyzed in line with the catastrophe theory. The bifurcation set, which shows the necessary and sufficient condition that the system is either monostable or bistable, is given explic...
Article
A new approach to congestion-control policy for the interconnected networks system, called “FCP”, is proposed. The main purpose of the FCP policy is to avoid the congestion of a network as well as to guarantee the performance of each network up to the desired value. In FCP policy, the traffic that arrives at aateway is restricted by that gateway in...
Article
The steady state behavior of computer networks employing random access schemes is analyzed in a unified manner. The basic model of computer networks is introduced and analyzed in line with the catastrophe theory. The global behavior of the system is determined by the cusp catastrophe. Stability can be considered from an analysis of the bifurcation...
Article
We develop a new tool for performance evaluation of a multiaccess communication system. We give an explicit detailed analytic description of a cusp catastrophe in a computer communication system. An approximate model is formulated for a slotted Aloha system assuming a single buffer, based on the Markovian model studied by Lam [2] and Carleial [3]....
Article
Computer networks using satellite communication and random access schemes exhibit sudden changes in throughput and response time and an interesting phenomenon called 'bistable behavior' is observed. In order to clarify the behavior of such a system, we model a computer network as a dynamical system and propose an analysis method based on catastroph...
Article
Store-and-forward communication networks with no effective means of flow control are subject to congestion under heavy load conditions. In this paper a distributed congestion control policy, called PF-C, with nodal buffer management strategy based on traffic priorities is proposed and analyzed. The limited number of buffers (limit value) at any nod...
Conference Paper
In the last few years, substantial efforts have been made towards developing equational programming languages and logic programming languages: the so-called descriptive languages. The languages of both types are based on mathematical systems and to a certain extent resemble each other. This is a clue to the possibility of program transformation fro...
Article
In this computer network using telephone lines, network control functions are concentrated into front end processors, each of which is put between a telephone network and host computers. Several kinds of user level protocol processors for a single user, single line and single host environment have been simply implemented using only half man year ma...

Citations

... Models that seek to generate network topologies that are more suited to learning a given problem are classified as adaptive learning algorithms (Anderson & Martinez, 1995; Anderson & Martinez, 1996; Fahlman, & Lebiere, 1990). Partially connected static architectures are also considered in (Chakraborty, Sawada, & Noguchi, 1997). These networks have fewer parameters and are therefore simpler and more efficient than fully connected networks yet are able to perform equally well. ...
... Additionally, the advancement of hardware and software technologies enables neural networks to be applied to exploding NP-complete problems [34]. In one study [35], two neural network models are integrated to solve multiprocessor (parallel resources) deadline problems. Feng et al. applied generic neural networks to solve independent and non-preemptive tasks with deadline requirements for real time scheduling problems [36]. ...
... An attempt to do a NOAA classification with an AI was also done by (Chakraborty et al, 1993). Their research in classification of The NOAA Satellite Image Data by Unsupervised Neural Network was successful. ...
... Nevertheless when there is no reply from the tested node, it is impossible for the tester to determine whether it is the link or the node that has failed or is slow. The test in an arbitrary topology network is thus said to be ambiguous [13]. If a node i sends a test request to node j and times out on the reply, then it is impossible for node i to determine if node j has crashed or alternatively if link ði; jÞ is faulty. ...
... In spite of an abundance of possible applications and an increasing interest in non-Horn logic programming [14] and non-Horn databases [20], extensions of predicate completion (in the sense of a completion taking the form of firstorder clauses) beyond universally reductive predicative Horn clauses are scarce. Reiter [16] and later Togashi et al. [18] proved that predicate completion is possible for non-Horn clauses where every predicate occurs only positively or only negatively and where no two positive atom occurrences in the same clause are unifiable. I showed [9] how to extend predicate completion in a different direction by for the first time allowing non-predicative elements, namely ultimate periodicity equations of the form s n (x)s m (x), which includes reasoning about quotients of the naturals. ...
... As prior work, bistability on S-ALOHA systems has been investigated in [12]- [19]. An analytical framework based on catastrophe theory has been established in [13], where new packet arrival rate and retransmission probabilities (or rate) are identified as two parameters of causing bistability. Based on this framework, the effects of propagation delay and capture, various multipacket reception channels on bistability have been investigated in [14]- [16]. ...
... There are some previous works on the learning of functions and the induction of functional programs, usually combining very dierent techniques (evolutionary programming, MDL principle, folding) to synthesize recursive Standard ML programs as in [24], attening the logic program with function symbols to transform it into an equivalent program without functions [30], using extensions of the least general generalization technique used in ILP (see for instance [1,16,20]) or a similar approach to Shapiros MIS [31] for inducing term rewriting systems [35]. Also, there are some early works on the induction of LISP programs in the seventies (see [33] for a survey), although we do not consider them much related to our approach because they learn from execution traces. ...
... Diagnosis algorithms for arbitrary topology networks, on the other hand, usually rely on periodic tests or heartbeats, which could lead to battery depletion in sensor nodes. This family is represented by algorithms such as [13], [14], [15], [16], [17], [18]. ...
... Untimed bisimulation equivalence is used for checking whether two systems are equivalent in spite of the di erent time constraints. If the corresponding LTS's are nite, we can easily check the two bisimulation equivalences by the algorithms in KS90,SKTN90]. ...
... This is a well-known idea going back at least to [51]. Some more examples of this approach may be found in [3, 39, 40, 48]. By regarding function definitions as syntactical sugar that is transformed away the problem of giving a computational model suitable for both functions and predicates is avoided. ...