Computational Intelligence - February 2017 - 45
GA Is Applied in
Niches Defined
by [M ]
Subsumption
GA
Explore
Environment
Input
Feature
Vector
Executed
Action
Random
[P ]
Current
Classifier
Population
Form Matchset
[M ]
Select Action
Set of Classifiers
Matching Current
Input
Covering
Exploit
Covering Operator
Creates New Matching
Rules When [M ] Is Empty
Form Actionset
[A ]
Reward
Signal
Prediction
Array
Set of Classifiers
Advocating
Selected Action
Parameter
Update
[A ]-1
Last
Actionset
XCS Operation
Figure 2 Working of XCS in reinforcement learning tasks. The gray-shaded boxes represent different classifier sets used in the system and the
blue-shaded ellipsoids represent different processes that take place in the system.
alternate between a random action
selection, encouraging exploration, and
action selection based on the prediction
strength of the matching classifiers, to
exploit current knowledge. Finally, the
fitness of all rules in the [M] is updated
based on the reward (e.g., 1000 for a
win, -1000 for losing a game, and 0 otherwise) received from the environment
for the selected action. A GA cycle is
applied on the classifier population in
either [M] or [A] based on the average
experience of classifiers in either set.
In Pittsburgh-style LCS, a complete
rule set constitutes a classifier. Hence, the
system works on a population of variable-length rule sets using a generational
GA, in which each rule set is considered
a potential solution to the problem. The
rule evaluation is performed in a batchmode over the entire data set (or a sufficiently large number of examples), and
the genetic operators are applied at the
rule set level at the completion of a rule
evaluation cycle. In other words, the GA
in these systems works more traditionally as an optimization heuristic to
evolve the best solution in the form of a
complete rule set. Since in this set-up
the solutions require longer evaluation
trials to measure their quality, these systems are more suitable for offline tasks
and often are applied to concept learning problems using a supervised
approach. Incremental variants of these
systems which are potentially better candidates for use in computer games, have
appeared recently [46]. However, this
area is largely unexplored.
the relationship between game theory
and computer games [47], [48] have
been acknowledged in the literature.
Moreover, as the use of computer games
expands beyond recreation (e.g., in education [49] and management [2], [3] sectors), game-theoretic models could play
an even greater role in game design. For
these reasons, we included LCS-based
game-theoretic studies in this review.
Overall, this review has been organized
into four types or categories of games,
which are discussed below.
A. Video Games
IV. Types of Games
Broadly, the LCS approaches included in
this survey can be categorized as those
related strictly to computer games and
to game theory. Computer games, such
as video and board games, are modeled
and played in-silico. Game-theoretic
studies are generally not categorized as
computer games because of their mostly
non-recreational applications. However,
A variety of video game genres exist
[50]. This section provides an overview
of the famous genres, with a focus on
the types relevant to the LCS work in
games. Among these, action games are
one of the earliest and well-known
types of video games, with a human
player generally controlling and maneuvering a character in a given environment. Some of the famous action game
FEbruary 2017 | IEEE ComputatIonal IntEllIgEnCE magazInE
45
Table of Contents for the Digital Edition of Computational Intelligence - February 2017
Computational Intelligence - February 2017 - Cover1
Computational Intelligence - February 2017 - Cover2
Computational Intelligence - February 2017 - 1
Computational Intelligence - February 2017 - 2
Computational Intelligence - February 2017 - 3
Computational Intelligence - February 2017 - 4
Computational Intelligence - February 2017 - 5
Computational Intelligence - February 2017 - 6
Computational Intelligence - February 2017 - 7
Computational Intelligence - February 2017 - 8
Computational Intelligence - February 2017 - 9
Computational Intelligence - February 2017 - 10
Computational Intelligence - February 2017 - 11
Computational Intelligence - February 2017 - 12
Computational Intelligence - February 2017 - 13
Computational Intelligence - February 2017 - 14
Computational Intelligence - February 2017 - 15
Computational Intelligence - February 2017 - 16
Computational Intelligence - February 2017 - 17
Computational Intelligence - February 2017 - 18
Computational Intelligence - February 2017 - 19
Computational Intelligence - February 2017 - 20
Computational Intelligence - February 2017 - 21
Computational Intelligence - February 2017 - 22
Computational Intelligence - February 2017 - 23
Computational Intelligence - February 2017 - 24
Computational Intelligence - February 2017 - 25
Computational Intelligence - February 2017 - 26
Computational Intelligence - February 2017 - 27
Computational Intelligence - February 2017 - 28
Computational Intelligence - February 2017 - 29
Computational Intelligence - February 2017 - 30
Computational Intelligence - February 2017 - 31
Computational Intelligence - February 2017 - 32
Computational Intelligence - February 2017 - 33
Computational Intelligence - February 2017 - 34
Computational Intelligence - February 2017 - 35
Computational Intelligence - February 2017 - 36
Computational Intelligence - February 2017 - 37
Computational Intelligence - February 2017 - 38
Computational Intelligence - February 2017 - 39
Computational Intelligence - February 2017 - 40
Computational Intelligence - February 2017 - 41
Computational Intelligence - February 2017 - 42
Computational Intelligence - February 2017 - 43
Computational Intelligence - February 2017 - 44
Computational Intelligence - February 2017 - 45
Computational Intelligence - February 2017 - 46
Computational Intelligence - February 2017 - 47
Computational Intelligence - February 2017 - 48
Computational Intelligence - February 2017 - 49
Computational Intelligence - February 2017 - 50
Computational Intelligence - February 2017 - 51
Computational Intelligence - February 2017 - 52
Computational Intelligence - February 2017 - 53
Computational Intelligence - February 2017 - 54
Computational Intelligence - February 2017 - 55
Computational Intelligence - February 2017 - 56
Computational Intelligence - February 2017 - Cover3
Computational Intelligence - February 2017 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com