Computational Intelligence - August 2014 - 69

Notice that the belief space can be
viewed as a network of interacting
knowledge sources as shown in Figure 7.
Next, knowledge from the belief
space is allowed to influence the selection of individuals for the next generation of the population through the
influence() function. These two functions provide a feedback loop that allows
each of the two components to evolve
in parallel with the other. This works to
create a dual inheritance system in
which both components can evolve in
conjunction with each other. The Cultural Algorithm then repeats this process
for each generation until the pre-specified termination condition is met. In
this way, the population component and
the belief space interact with, and support each other, in a manner analogous
to the evolution of human culture.
There are a number of knowledge
categories which represent the behavioral patterns of individuals from the
population space that can be represented
in the belief space. Currently there are
five basic categories of knowledge that
can be stored in the belief space but
others are possible. These categories are
as follows [5]:
1) Situational knowledge: Situational
knowledge keeps track of the best
individuals who make the best
accumulative behaviors at each generation and stores them [6].
2) Domain knowledge: The domain
knowledge consists of the functional
relationships between various system objects and variables [7], [8].
This knowledge can be in the form
of equations, constraints, and other
symbolic methods used to represent
inter- and intra-object interaction.
3) Normative knowledge: Normative
knowledge provides standards or
norms for individual and group
behavior. It is often represented as a
set of intervals where each interval
is viewed as a promising range for
currently acceptable solutions for a
problem parameter [6].
4) History knowledge: History knowledge is used whenever search landscapes may change dynamically over
time in response to continuously

operating processes or discrete temporal spatial events. For example, it
is often used to keep information
about the sequences of environmental changes or social events over
time [7], [8].
5) Topographical knowledge: Topographical knowledge keeps a multidimensional grid or other logical
representation of the performance
landscape [7], [8]. This is often done
in terms of a geographical information system based upon a grid or
other network structures.
The actual implementation of each of
these knowledge sources in the Cultural
Algorithm used here will be discussed in
the subsequent sections.
D. Outline

In Section II the example site of Monte
Albán, is discussed. While the urban
center exhibited several occupational
phases we will focus on the first occupational phase, Ia, in order to identify
the early structural and functional urban
patterns that served to shape subsequent
phases. In Section III the data mining
activities used to initialize the belief
space in the Cultural Algorithm at each
of three different spatial scales are discussed. Data mining at the macro scale
produces the rules that determine what
terraces are occupied during that time
period. At the meso scale the functional
components of the city emerge: craft
production, residential, and elite residential. At the micro scale the basic
functional clusters of terraces are produced relative to these functional
classes. These will be the building blocks
that a population of planners in the
Cultural Algor ithm will combine
together to produce an abstract city
plan. Section IV then describes the
Cultural Algorithm configuration used
here. The agents in the Cultural Algorithm represent planners. These planners
will build regional models of the site
using the belief space knowledge as a
guide. Section V gives the results of the
evolutionary based planning process.
Section VI compares the results with a
model produced manually by a domain
expert and presents the conclusions.

Table 1 The early occupational phases
within the Valley of Oaxaca. Those
phases subsequent to the Rosario
phase are labeled by the
corresponding Monte Albán
occupation.
Period

aPProximaTe daTe

Tierras Largas

1400-1150 B.C.

san Jose

1150-850 B.C.

guadaLupe

850-700 B.C.

rosario

700-500 B.C.

MonTe aLBán ia

500-300 B.C.

MonTe aLBán ic

300-150/100 B.C.

MonTe aLBán ii

150/100 B.C.-a.d. 200

MonTe aLBán iiia

a.d. 200-500

MonTe aLBán iiib

a.d. 500-700/
750-1000

MonTe aLBán iV

a.d. 700/750

MonTe aLBán V

a.d. 1000-1521

II. The Site of Monte Albán

Given the urban models presented in the
previous section, to what extent does the
structural functional organization of this
early site relate to those of other modern
and ancient sites? What are the similarities
and the differences? Can these similarities
and differences be used to identify the
aspects of site formation here? In order to
answer these questions, we will look at a
particular city that emerged around 500
B.C., Monte Albán, located in the Oaxaca
valley of Mexico. Monte Albán is an
archaic urban center of over 300 hectares,
of which 70 hectares were densely occupied. It had an estimated 30,000 to
60,000 inhabitants in A.D. 600 [9].
The archaeological site of Monte
Albán is situated in Mexico's Valley of
Oaxaca, located in Central Mexico. Table
1 gives all of the relevant periods of social
evolution in the valley relative to the
emergence and occupation of Monte
Albán [9]. The Tierras Largas phase marks
the beginning of early village settlement in
the valley. The site of Monte Albán
emerged during Monte Albán Ia. The valley came under control of a state centered
at Monte Albán by Monte Albán II.
Monte Albán IIIa signaled the decline of
the state and its succession by a collection
of city-states localized in different parts of
the valley. The phases as described in the

august 2014 | IEEE ComputatIonal IntEllIgEnCE magazInE

69



Table of Contents for the Digital Edition of Computational Intelligence - August 2014

Computational Intelligence - August 2014 - Cover1
Computational Intelligence - August 2014 - Cover2
Computational Intelligence - August 2014 - 1
Computational Intelligence - August 2014 - 2
Computational Intelligence - August 2014 - 3
Computational Intelligence - August 2014 - 4
Computational Intelligence - August 2014 - 5
Computational Intelligence - August 2014 - 6
Computational Intelligence - August 2014 - 7
Computational Intelligence - August 2014 - 8
Computational Intelligence - August 2014 - 9
Computational Intelligence - August 2014 - 10
Computational Intelligence - August 2014 - 11
Computational Intelligence - August 2014 - 12
Computational Intelligence - August 2014 - 13
Computational Intelligence - August 2014 - 14
Computational Intelligence - August 2014 - 15
Computational Intelligence - August 2014 - 16
Computational Intelligence - August 2014 - 17
Computational Intelligence - August 2014 - 18
Computational Intelligence - August 2014 - 19
Computational Intelligence - August 2014 - 20
Computational Intelligence - August 2014 - 21
Computational Intelligence - August 2014 - 22
Computational Intelligence - August 2014 - 23
Computational Intelligence - August 2014 - 24
Computational Intelligence - August 2014 - 25
Computational Intelligence - August 2014 - 26
Computational Intelligence - August 2014 - 27
Computational Intelligence - August 2014 - 28
Computational Intelligence - August 2014 - 29
Computational Intelligence - August 2014 - 30
Computational Intelligence - August 2014 - 31
Computational Intelligence - August 2014 - 32
Computational Intelligence - August 2014 - 33
Computational Intelligence - August 2014 - 34
Computational Intelligence - August 2014 - 35
Computational Intelligence - August 2014 - 36
Computational Intelligence - August 2014 - 37
Computational Intelligence - August 2014 - 38
Computational Intelligence - August 2014 - 39
Computational Intelligence - August 2014 - 40
Computational Intelligence - August 2014 - 41
Computational Intelligence - August 2014 - 42
Computational Intelligence - August 2014 - 43
Computational Intelligence - August 2014 - 44
Computational Intelligence - August 2014 - 45
Computational Intelligence - August 2014 - 46
Computational Intelligence - August 2014 - 47
Computational Intelligence - August 2014 - 48
Computational Intelligence - August 2014 - 49
Computational Intelligence - August 2014 - 50
Computational Intelligence - August 2014 - 51
Computational Intelligence - August 2014 - 52
Computational Intelligence - August 2014 - 53
Computational Intelligence - August 2014 - 54
Computational Intelligence - August 2014 - 55
Computational Intelligence - August 2014 - 56
Computational Intelligence - August 2014 - 57
Computational Intelligence - August 2014 - 58
Computational Intelligence - August 2014 - 59
Computational Intelligence - August 2014 - 60
Computational Intelligence - August 2014 - 61
Computational Intelligence - August 2014 - 62
Computational Intelligence - August 2014 - 63
Computational Intelligence - August 2014 - 64
Computational Intelligence - August 2014 - 65
Computational Intelligence - August 2014 - 66
Computational Intelligence - August 2014 - 67
Computational Intelligence - August 2014 - 68
Computational Intelligence - August 2014 - 69
Computational Intelligence - August 2014 - 70
Computational Intelligence - August 2014 - 71
Computational Intelligence - August 2014 - 72
Computational Intelligence - August 2014 - 73
Computational Intelligence - August 2014 - 74
Computational Intelligence - August 2014 - 75
Computational Intelligence - August 2014 - 76
Computational Intelligence - August 2014 - 77
Computational Intelligence - August 2014 - 78
Computational Intelligence - August 2014 - 79
Computational Intelligence - August 2014 - 80
Computational Intelligence - August 2014 - 81
Computational Intelligence - August 2014 - 82
Computational Intelligence - August 2014 - 83
Computational Intelligence - August 2014 - 84
Computational Intelligence - August 2014 - 85
Computational Intelligence - August 2014 - 86
Computational Intelligence - August 2014 - 87
Computational Intelligence - August 2014 - 88
Computational Intelligence - August 2014 - Cover3
Computational Intelligence - August 2014 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com