Computational Intelligence - February 2013 - 9

Publication
Spotlight

Derong Liu, Chin-Teng Lin,
Garry Greenwood, Simon Lucas,
and Zhengyou Zhang

CIS Publication Spotlight

IEEE Transactions on Neural
Networks and Learning Systems

Neural-Fitted TD-Leaf Learning for Playing Othello with Structured Neural Networks, by S. van den Dries and M.A.
Wiering, IEEE Transactions on Neural
Networks and Learning Systems, Vol. 23,
No. 11, Nov. 2012, pp. 1701-1713.
Digital Object Identifier: 10.1109/
TNNLS.2012.2210559
"A methodology for quickly learning to play games at a strong level is
developed. The methodology consists
of a novel combination of three techniques, and a variety of experiments on
the game of Othello demonstrates their
usefulness. Structures or topologies in
neural network connectivity patterns
are used to decrease the number of
learning parameters and to deal more
effectively with the structural credit
assignment problem, which is to
change individual network weights
based on the obtained feedback.
Furthermore, the structured neural
networks are trained with the novel
neural-fitted temporal difference (TD)
learning algorithm to create a system
that can exploit most of the training
exper iences and enhance learning
speed and performance. Finally, the
neural-fitted TD-leaf algorithm is used
to learn more effectively when lookahead search is perfor med by the

Digital Object Identifier 10.1109/MCI.2012.2228582
Date of publication: 14 January 2013

game-playing program. Extensive
experimental study indicated that the
proposed method outperforms linear
networks and fully connected neural
networks or evaluation functions
evolved with evolutionary algorithms."
Nonnegative Blind Source Separation by
Sparse Component Analysis Based on
Determinant Measure, by Zuyuan
Yang, Yong Xiang, Shengli Xie,
Shuxue Ding, and Yue Rong, IEEE
Transactions on Neural Networks and
Learning Systems,Vol. 23, No. 10, Oct.
2012, pp. 1601-1610.
Digital Object Identifier: 10.1109/
TNNLS.2012.2208476
"The problem of nonnegative blind
source separation (NBSS) is studied,
where both the sources and the mixing
matrix are nonnegative and sparse
component analysis is employed.
A determinant-based sparseness measure, named D-measure, is introduced
to gauge the temporal and spatial
sparseness of signals. Based on this measure, a new NBSS model is derived,
and an iterative sparseness maximization (ISM) approach is proposed for
this model. In the ISM approach, the
NBSS problem is solved by row-torow optimizations with respect to the
unmixing matrix, and then the quadratic programming (QP) technique is
used to optimize each row. Furthermore, the source identifiability and the
computational complexity of the proposed ISM-QP method are analyzed.
The new method requires relatively

© photodisc

weak conditions on the sources and the
mixing matrix, has high computational
efficiency, and is easy to implement.
Simulation results demonstrate the
effectiveness of the method."
IEEE Transactions
on Fuzzy Systems

On the Fundamental Differences Between
Interval Type-2 and Type-1 Fuzzy Logic
Controllers, by Wu D., IEEE Transactions
on Fuzzy Systems, Vol. 20, No. 5, Oct.
2012, pp. 832-848.
Digital Object Identifier: 10.1109/
TFUZZ.2012.2186818
"Interval type-2 fuzzy logic controllers (IT2 FLCs) have recently been
attracting a lot of research attention
and many reported results have shown
that IT2 FLCs are better able to handle uncertainties than their type-1
(T1) counterparts. Consequently, the
Author provides two fundamental differences between IT2 and T1 FLCs:
(1) Adaptiveness, meaning that the
embedded T1 fuzzy sets is used to
compute the bounds of the typereduced interval change as input

February 2013 | Ieee ComputatIonal IntellIgenCe magazIne

9



Table of Contents for the Digital Edition of Computational Intelligence - February 2013

Computational Intelligence - February 2013 - Cover1
Computational Intelligence - February 2013 - Cover2
Computational Intelligence - February 2013 - 1
Computational Intelligence - February 2013 - 2
Computational Intelligence - February 2013 - 3
Computational Intelligence - February 2013 - 4
Computational Intelligence - February 2013 - 5
Computational Intelligence - February 2013 - 6
Computational Intelligence - February 2013 - 7
Computational Intelligence - February 2013 - 8
Computational Intelligence - February 2013 - 9
Computational Intelligence - February 2013 - 10
Computational Intelligence - February 2013 - 11
Computational Intelligence - February 2013 - 12
Computational Intelligence - February 2013 - 13
Computational Intelligence - February 2013 - 14
Computational Intelligence - February 2013 - 15
Computational Intelligence - February 2013 - 16
Computational Intelligence - February 2013 - 17
Computational Intelligence - February 2013 - 18
Computational Intelligence - February 2013 - 19
Computational Intelligence - February 2013 - 20
Computational Intelligence - February 2013 - 21
Computational Intelligence - February 2013 - 22
Computational Intelligence - February 2013 - 23
Computational Intelligence - February 2013 - 24
Computational Intelligence - February 2013 - 25
Computational Intelligence - February 2013 - 26
Computational Intelligence - February 2013 - 27
Computational Intelligence - February 2013 - 28
Computational Intelligence - February 2013 - 29
Computational Intelligence - February 2013 - 30
Computational Intelligence - February 2013 - 31
Computational Intelligence - February 2013 - 32
Computational Intelligence - February 2013 - 33
Computational Intelligence - February 2013 - 34
Computational Intelligence - February 2013 - 35
Computational Intelligence - February 2013 - 36
Computational Intelligence - February 2013 - 37
Computational Intelligence - February 2013 - 38
Computational Intelligence - February 2013 - 39
Computational Intelligence - February 2013 - 40
Computational Intelligence - February 2013 - 41
Computational Intelligence - February 2013 - 42
Computational Intelligence - February 2013 - 43
Computational Intelligence - February 2013 - 44
Computational Intelligence - February 2013 - 45
Computational Intelligence - February 2013 - 46
Computational Intelligence - February 2013 - 47
Computational Intelligence - February 2013 - 48
Computational Intelligence - February 2013 - 49
Computational Intelligence - February 2013 - 50
Computational Intelligence - February 2013 - 51
Computational Intelligence - February 2013 - 52
Computational Intelligence - February 2013 - 53
Computational Intelligence - February 2013 - 54
Computational Intelligence - February 2013 - 55
Computational Intelligence - February 2013 - 56
Computational Intelligence - February 2013 - 57
Computational Intelligence - February 2013 - 58
Computational Intelligence - February 2013 - 59
Computational Intelligence - February 2013 - 60
Computational Intelligence - February 2013 - 61
Computational Intelligence - February 2013 - 62
Computational Intelligence - February 2013 - 63
Computational Intelligence - February 2013 - 64
Computational Intelligence - February 2013 - 65
Computational Intelligence - February 2013 - 66
Computational Intelligence - February 2013 - 67
Computational Intelligence - February 2013 - 68
Computational Intelligence - February 2013 - 69
Computational Intelligence - February 2013 - 70
Computational Intelligence - February 2013 - 71
Computational Intelligence - February 2013 - 72
Computational Intelligence - February 2013 - 73
Computational Intelligence - February 2013 - 74
Computational Intelligence - February 2013 - 75
Computational Intelligence - February 2013 - 76
Computational Intelligence - February 2013 - 77
Computational Intelligence - February 2013 - 78
Computational Intelligence - February 2013 - 79
Computational Intelligence - February 2013 - 80
Computational Intelligence - February 2013 - Cover3
Computational Intelligence - February 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com