Shoichi Noguchi's research while affiliated with Nihon University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (63)
Rapid growth in networks and related services have resulted in demands for more effective, accessible, intelligent and scalable network management systems. Not only managers but also users need access to network management information. Traditional network management architectures are utterly inadequate to meet these requirements. In this work we de...
Circumscription, proposed by McCarthy, is a formalism of non-monotonic reasoning. Predicate completion is an approach, proposed by Clark, to closed world reasoning which assumes that given sufficient conditions on a predicate are also necessary. Reiter has shown that for clausal sentences which are Horn in a predicate p, the circumscription of p lo...
There have been a number of efforts, recently, towards developing default logic and circumscription, two important formalisms for non-monotonic reasoning. In this paper, we shall propose a partial translation of default logic to circumscription. We limit ourselves to an open default of the form, a(x):M(x)/(x), whose justification (x) contains no po...
As computer networks expand, there is a pressing need for management systems capable of handling errors. This article proposes an approach based on management proxies to improve the dependability of fault management systems. An effective MIB to implement the proxies is presented, which allows their deployment at virtually no cost. As an example, a...
Network configuration information can be very effectively used for network traffic optimization and improving network performance. Various approaches have been explored to provide a workable and scalable mechanism by which a user or an application can estimate the network cost factor corresponding to several servers. By choosing the server with the...
this paper we have utilised a novel MIB-based naming scheme. The premises on which this scheme is based are as follows:
While training neural network to represent distribution of a
sample set, generally two aspects are considered: its representation
capability to be able to describe the complex distribution of the sample
set and the ability to generalize so that novel samples could be mapped
correctly. The general conclusion is that, the smallest network capable
of...
Network fault management systems are mission-critical, for they are most needed during periods when part of the network is faulty. Distributed system-level diagnosis offers a practical and theoretically sound solution for fault-tolerant fault monitoring. It guarantees that faults don’t impair the fault management process. Recently, results from the...
In fully connected Multilayer perceptron (MLP), all the hidden units are activated by samples from the whole input space. For complex problems, due to interference and cross coupling of hidden units' activations, the network needs many hidden units to represent the problem and the error surface becomes highly non-linear. Searching for the minimum i...
Feedforward neural networks trained with a small set of noisy
samples are prone to overtraining and poor generalization. On the other
hand, a very small network could not be trained at all because it would
be biased by its own architecture. Thus, it is an old problem to
ascertain that a well trained network would also deliver good
generalization. T...
A feedforward network classifier trained with a finite set of
available samples tries to estimate properly the different class
boundaries in the input feature space. The aim is that the network would
then be able to classify unknown new samples with some confidence. For
problems of practical interest, due to the complexity of the class
boundaries,...
As a fundamental study of multiple image processing, the authors
have developed a new technique for the analysis of multispectral remote
sensing data. Though the basis of the authors' algorithm is similar to a
histogram analysis, they have proposed a novel way of the representation
of multidimensional image data, which facilitates a nonexpert to lo...
The task of any supervised classifier is to assign optimum boundaries in the input space, for the different class membership. This is done using informations from the available set of known samples. This mapping of sample position in the input space to sample class is further used to classify unknown samples. The available set of known sample is ge...
There is a need for a framework wherein the infrastructural and service related information about communication networks can be made accessible from all places and at all times in a reasonably efficient manner and with reasonable accuracy. The use of such a map is manifold. A Project (by AIC Systems Lab., Tohoku University Sendai, WIDE Internet Jap...
This paper describes a neural network scheduler for scheduling independent and nonpreemptable tasks with deadlines and resource requirements in critical real-time applications, in which a schedule is to be obtained within a short time span. The proposed neural network scheduler is an integrate model of two Hopfield-Tank neural network models. To co...
This paper explores the stability aspects of a multipacket heterogeneous slotted Aloha system by both the direct and the indirect methods due to Liapunov, and establishes the equivalence between them. With the identification of a Liapunov function in terms of the flow balance function, it is found that both of the approaches essentially converge to...
The authors discuss their idea of an intelligent network
management system. In order to simulate intelligence, the reasoning and
judgement of the human manager are modeled into a knowledge base. The
human managers' view of the network is limited to the Management
Information Base (MIB); thus, the MIB provides the starting point for
the design of th...
In this paper, we discuss to the intermedia synchronization problems for high speed multimedia communication. Especially, we described how software synchronization can be operated, and estimated the skew bound in CNV when considering the network delay. And we applied CNV to the intermedia synchronization and a hybrid model (HSM) is proposed. Furthe...
The authors examine the structural relationship between load and
blocking probability for a fully connected homogeneous nonhierarchical
network when blocked messages cause retrial and when different alternate
routing strategies are employed to overcome congestion. The model
employed for analysis is based on the flow approximation. It is found
that...
Radial basis functions are used in approximation and interpolation problems and in artificial neural networks. Nonlinear radial basis functions at the single layer hidden units are effective in generating complex nonlinear mapping and, at the same time, facilitate fast linear learning. A model and an algorithm are proposed to arrive at a near optim...
A behavioral characterization of nonhierarchical alternate routing
schemes in which a certain number of trunks are reserved for direct
routed traffic is presented. It is found that the fundamental behavioral
characteristic of the schemes with trunk reservation control is the same
as that of the schemes without reservation. A sufficient condition,
w...
The advent of space-technology and multispectral sensors on satellites made available enormous amount of remote sensing data, the supervised classification of which is rather impossible, and is equally unrealistic to obtain a suitable training set. Application of Unsupervised Neural Network (NN) in this field is till now unexplored. In this paper w...
The behavior of a node under alternate routing scheme in a homogeneous non-hierarchical network is modeled with respect to the equilibrium states. Under high load intensities, there exist two equilibrium states: one stable and the other unstable. The blocking probability at the stable equilibrium state is higher than that at the unstable one. The e...
The authors expand on their experience in a practical network
management system by using the simple network management protocol (SNMP)
in the context of a large-scale open systems interconnection (OSI)-based
campus-network. Various aspects of network management are examined and
the importance of time is shown. The network management infrastructure...
The authors examine the design issues of a practical network
management system using the simple network management protocol (SNMP) in
the context of a large-scale open systems interconnection (OSI)-based
campus-network called TAINS. Various design aspects are examined and the
importance of time-management is examined. In the proposed design,
intell...
A numerical method is suggested for estimating the performance
parameters of a node with input buffer limiting, throughout the range of
blocking probabilities. Congestion is attributed to the sudden increase
in the effective service time when the input rate increases. This sudden
increase, resulting in the thrashing of the throughput rate, can be
r...
The authors attempted to identify fog using image-processing data
from the US National Oceanic and Atmospheric Administration (NOAA)
Advanced Very High Resolution Radiometer (AVHRR). AVHRR sensors measure
radiation at visible, near-infrared, and infrared wavelengths. Attention
is confined to daytime data from channel 1 (CH1), channel 3 (CH3), and
c...
The development of the NOAA satellite Advanced Very High
Resolution Radiometer (AVHRR) three-dimensional analysis system, in
which the problem of drawing a three-dimensional histogram on a
two-dimensional CRT was encountered, is discussed. In this case there
are two factors: one is the coordinate position given by the brightness
level of the three...
This paper models and analyzes the stability of a slotted-ALOHA network hosting heterogeneous users. The scheme is modeled by dividing the total user-population into groups of homogeneous users. The behavior of the system is represented by state equations. The stability analysis is carried out by Liapunov's indirect method, in association with the...
The analysis of stability in the communication system is a very basic problem in the design of the system. However, the analysis is, in general, complex and difficult.
This paper discusses a simple and direct method of analysis for the stability of the communication system, and the result is applied to the computer network with a random access sche...
Store-and-forward techniques in computer communication networks
are addressed. The performance estimation and the stability aspects of
an input buffer limiting (IBL) scheme are presented. The model is
formulated with respect to the state-dependent effective input rate and
effective service rate. The computation of the performance parameters
with re...
An attempt is made to design a user-friendly software environment
for protocol synthesis based on the FSM (finite state machine), and to
show the validity of applying AI (artificial intelligence) techniques to
the construction of such a system. For that purpose, the authors have
first designed a user-friendly software environment, named SEPS, using...
This paper considers the specification described in LOTOS, which is the formal description language for the communication system. A decision method is proposed for the equivalence between two arbitrary systems (between definition of service and the protocol specifications, for example). In this paper, based on the definition of the weak bisimulatio...
Recently, there are many efforts towards developing default logic and circumscription, two important formalisms for non-monotonic reasoning. In this paper, we propose a partial translation of default logic to circumscription. We limit ourselves to an open default of the form α(x):Mβ(x)/γ(x) whose justification β(x) contains no positive occurrences...
TAINS (Tohoku University Academic Information Network System) is an open systems interconnection (OSI)-based large-scale information network. A very large number of the users of TAINS are using personal computers (PCs). Few of them, however, have any sort of network interface, therefore PCs are connected to TAINS via a communication adaptor called...
The combined random/reservation access method is one of the access schemes in satellite packet communication networks which exhibits a desirable performance in adapting to the load variation. In the analysis of the system performance up to the present, however, the stability of the system has not been discussed fully. This paper considers the AA/TD...
The stability of a slotted ALOHA system with capture effect is
investigated under a general communication environment where terminals
are divided into two groups (low-power and high-power) and the capture
effect is modeled by capture probabilities. An approximate analysis is
developed using catastrophe theory in which the effects of system and
user...
This paper proposes an approach, called “the Harmonic Design Method”, to achieve an approximately ideal language that simultaneously serves the purposes or requirements of software specification, verification, implementation and so on. This approach is based on two important concepts—partitioning and unification. In the Harmonic Design Method, the...
An intelligent support system, designed to make the development of
protocols and communication software easy and user-friendly, is
described. The support system is outlined and its accessories (the
knowledge-based specification editor, the validation expert system, the
software generation expert system, the conformance-testing expert
system, and th...
A knowledge-based system for protocol synthesis named KSPS is
presented. The aim of KSPS is to help the protocol designer design a
protocol without logical errors, such as unspecified receptions and
state deadlocks. KSPS consists of three major components: a knowledge
base, a user interface, and an inference engine. The construction of the
knowledg...
An interactive synthesis algorithm, to construct two communicating finite-state machines (protocols), is presented. The machines exchange messages over two unidirectional FIFI (first-in first-out) channels when the function of the protocol has been given. The synthesis algorithm first constructs the global state transition graph (GSTG) of a protoco...
AMLOG is an equational logic programming language based on the concept introduced by Fribourg. In this language, an amalgamation of logic programming and equational programming is achieved by combining, in the computation procedure, the capability of inferring solutions by means of goal reduction as in logic programming and the term rewriting featu...
The system performance is affected by interprocessor communication, which should be enough to support various types of permutation functions for mapping purposes. But if there are many types of manipulations, it becomes necessary to have a rearrangeable IN like the Benes Interconnection Network so that we can increase the number of stages of 2n-1,...
In the last few years, substantial efforts have been made towards developing equational programming languages and logic programming languages: the so-called descriptive languages. The languages of both types are based on mathematical systems and to a certain extent resemble each other. This is a clue to the possibility of program transformation fro...
The authors study the fundamental characteristics of the congestion caused by the alternate routing technique in a homogeneous computer network. They develop an approximate method for the analysis of the computer network in general environment. The model is based on the use of the input-output flow balance argument of a network node. The system beh...
Effect of propagation delays on the steady state behavior in ALOHA systems is investigated. The basic model of ALOHA systems with propagation delays is introduced and analyzed in line with the catastrophe theory. The bifurcation set, which shows the necessary and sufficient condition that the system is either monostable or bistable, is given explic...
A new approach to congestion-control policy for the interconnected networks system, called “FCP”, is proposed. The main purpose of the FCP policy is to avoid the congestion of a network as well as to guarantee the performance of each network up to the desired value. In FCP policy, the traffic that arrives at aateway is restricted by that gateway in...
The steady state behavior of computer networks employing random access schemes is analyzed in a unified manner. The basic model of computer networks is introduced and analyzed in line with the catastrophe theory. The global behavior of the system is determined by the cusp catastrophe. Stability can be considered from an analysis of the bifurcation...
We develop a new tool for performance evaluation of a multiaccess communication system. We give an explicit detailed analytic description of a cusp catastrophe in a computer communication system. An approximate model is formulated for a slotted Aloha system assuming a single buffer, based on the Markovian model studied by Lam [2] and Carleial [3]....
Computer networks using satellite communication and random access schemes exhibit sudden changes in throughput and response time and an interesting phenomenon called 'bistable behavior' is observed. In order to clarify the behavior of such a system, we model a computer network as a dynamical system and propose an analysis method based on catastroph...
Store-and-forward communication networks with no effective means of flow control are subject to congestion under heavy load conditions. In this paper a distributed congestion control policy, called PF-C, with nodal buffer management strategy based on traffic priorities is proposed and analyzed. The limited number of buffers (limit value) at any nod...
In the last few years, substantial efforts have been made towards developing equational programming languages and logic programming languages: the so-called descriptive languages. The languages of both types are based on mathematical systems and to a certain extent resemble each other. This is a clue to the possibility of program transformation fro...
An abstract is not available.
In this computer network using telephone lines, network control functions are concentrated into front end processors, each of which is put between a telephone network and host computers. Several kinds of user level protocol processors for a single user, single line and single host environment have been simply implemented using only half man year ma...
Citations
... Models that seek to generate network topologies that are more suited to learning a given problem are classified as adaptive learning algorithms (Anderson & Martinez, 1995; Anderson & Martinez, 1996; Fahlman, & Lebiere, 1990). Partially connected static architectures are also considered in (Chakraborty, Sawada, & Noguchi, 1997). These networks have fewer parameters and are therefore simpler and more efficient than fully connected networks yet are able to perform equally well. ...
Reference: Classification-based objective functions
... Additionally, the advancement of hardware and software technologies enables neural networks to be applied to exploding NP-complete problems [34]. In one study [35], two neural network models are integrated to solve multiprocessor (parallel resources) deadline problems. Feng et al. applied generic neural networks to solve independent and non-preemptive tasks with deadline requirements for real time scheduling problems [36]. ...
... An attempt to do a NOAA classification with an AI was also done by (Chakraborty et al, 1993). Their research in classification of The NOAA Satellite Image Data by Unsupervised Neural Network was successful. ...
... Nevertheless when there is no reply from the tested node, it is impossible for the tester to determine whether it is the link or the node that has failed or is slow. The test in an arbitrary topology network is thus said to be ambiguous [13]. If a node i sends a test request to node j and times out on the reply, then it is impossible for node i to determine if node j has crashed or alternatively if link ði; jÞ is faulty. ...
... In spite of an abundance of possible applications and an increasing interest in non-Horn logic programming [14] and non-Horn databases [20], extensions of predicate completion (in the sense of a completion taking the form of firstorder clauses) beyond universally reductive predicative Horn clauses are scarce. Reiter [16] and later Togashi et al. [18] proved that predicate completion is possible for non-Horn clauses where every predicate occurs only positively or only negatively and where no two positive atom occurrences in the same clause are unifiable. I showed [9] how to extend predicate completion in a different direction by for the first time allowing non-predicative elements, namely ultimate periodicity equations of the form s n (x)s m (x), which includes reasoning about quotients of the naturals. ...
... As prior work, bistability on S-ALOHA systems has been investigated in [12]- [19]. An analytical framework based on catastrophe theory has been established in [13], where new packet arrival rate and retransmission probabilities (or rate) are identified as two parameters of causing bistability. Based on this framework, the effects of propagation delay and capture, various multipacket reception channels on bistability have been investigated in [14]- [16]. ...
... There are some previous works on the learning of functions and the induction of functional programs, usually combining very dierent techniques (evolutionary programming, MDL principle, folding) to synthesize recursive Standard ML programs as in [24], attening the logic program with function symbols to transform it into an equivalent program without functions [30], using extensions of the least general generalization technique used in ILP (see for instance [1,16,20]) or a similar approach to Shapiros MIS [31] for inducing term rewriting systems [35]. Also, there are some early works on the induction of LISP programs in the seventies (see [33] for a survey), although we do not consider them much related to our approach because they learn from execution traces. ...
... Diagnosis algorithms for arbitrary topology networks, on the other hand, usually rely on periodic tests or heartbeats, which could lead to battery depletion in sensor nodes. This family is represented by algorithms such as [13], [14], [15], [16], [17], [18]. ...
Reference: System-level diagnosis for WSN: A heuristic
... Untimed bisimulation equivalence is used for checking whether two systems are equivalent in spite of the di erent time constraints. If the corresponding LTS's are nite, we can easily check the two bisimulation equivalences by the algorithms in KS90,SKTN90]. ...
... This is a well-known idea going back at least to [51]. Some more examples of this approach may be found in [3, 39, 40, 48]. By regarding function definitions as syntactical sugar that is transformed away the problem of giving a computational model suitable for both functions and predicates is avoided. ...