IEEE Computational Intelligence Magazine - November 2019 - 9

the scope and properties of the datasets.
In this sense, new proposals on the topic
often focus on a given context, aiming at
improving the related state-of-the-art
approaches. Data complexity metrics
have been traditionally used to determine
the inner characteristics of datasets. This
way, researchers are able to categorize the
problems in different scenarios. Then, this
taxonomy can be applied to determine
inner characteristics of the datasets in
order to determine intervals of good and
bad behavior for a given classifier. In this
paper, the authors will take advantage of
the data complexity metrics in order to
design a fuzzy metaclassifier. The final
goal is to create decision rules based on
the inner characteristics of the data to
apply a different version of the fuzzy classifier for a given problem. To do so, the
authors will make use of the FARC-HD
classifier, an evolutionary fuzzy system
that has led to different extensions in the
specialized literature. Experimental results
show the goodness of this novel approach
as it is able to outperform all versions of
FARC-HD on a wide set of problems,
and obtain competitive results (in terms
of performance and interpretability)
versus two selected state-of-the-art
rule-based classification system, C4.5
and FURIA."
A Constrained Representation Theorem
for Well-Shaped Interval Type-2 Fuzzy
Sets, and the Corresponding Constrained
Uncertainty Measures, by D. Wu, H.-T.
Zhang, and J. Huang, IEEE Transactions on Fuzzy Systems, Vol. 27, No.
6, June 2019, pp. 1237-1251.
Digital Object Identifier: 10.1109/
TFUZZ.2018.2874018
"The representation theorem for
interval type-2 fuzzy sets (IT2 FSs),
proposed by Mendel and John, states
that an IT2 FS is a combination of all
its embedded type-1 (T1) FSs, which
can be nonconvex and/or subnormal.
These nonconvex and/or subnormal
embedded T1 FSs are included in
developing many theoretical results for
IT2 FSs, including uncertainty measures, the linguistic weighted averages
(LWAs), the ordered LWAs (OLWAs),

the linguistic weighted power means
(LWPMs), etc. However, convex and
normal T1 FSs are used in most fuzzy
logic applications, particularly computing with words. In this paper, the
authors propose a constrained representation theorem (CRT) for well-shaped
IT2 FSs using only its convex and normal embedded T1 FSs, and show that
IT2 FSs generated from three word
encoding approaches and four computing with words engines (LWAs, OLWAs,
LWPMs, and perceptual reasoning) are
all well-shaped IT2 FSs. The authors
also compute five constrained uncertainty measures (centroid, cardinality,
fuzziness, variance, and skewness) for
well-shaped IT2 FSs using the CRT.
The CRT and the associated constrained uncertainty measures can be
useful in computing with words, IT2
fuzzy logic system design using the
principles of uncertainty, and measuring
the similarity between two well-shaped
IT2 FSs.
IEEE Transactions on
Evolutionary Computation

Data-Driven Evolutionary Optimization: An Overview and Case Studies, by
Y. Jin, H. Wang, T. Chugh, D. Guo,
and K. Miettinen, IEEE Transactions
on Evolutionary Computation, Vol. 23,
No. 3, June 2019, pp. 442-458.
Digital Object Identifier: 10.1109/
TEVC.2018.2869001
"Most evolutionary optimization
algorithms assume that the evaluation of
the objective and constraint functions is
straightforward. In solving many realworld optimization problems, however,
such objective functions may not exist.
Instead, computationally expensive numerical simulations or costly physical
experiments must be performed for fitness evaluations. In more extreme cases,
only historical data are available for performing optimization and no new data
can be generated during optimization.
Solving evolutionary optimization
problems driven by data collected in
simulations, physical experiments, production processes, or daily life are

termed data-driven evolutionary optimization. In this paper, the authors provide a taxonomy of different data
driven evolutionary optimization problems, discuss main challenges in datadriven evolutionary optimization with
respect to the nature and amount of
data, and the availability of new data
during optimization. Real-world application examples are given to illustrate
different model management strategies
for different categories of data-driven
optimization problems."
IEEE Transactions on Games

Building a Planner: A Survey of Planning Systems Used in Commercial Video
Games, by X. Neufeld, S. Mostaghim,
D. L. Sancho-Pradel, and S. Brand,
IEEE Transactions on Games, Vol. 11,
No. 2, June 2019, pp. 91-108.
Digital Object Identifier: 10.1109/
TG.2017.2782846
"In the last decade, many commercial video games have used planners
instead of classical behavior trees or
finite state machines to define agent
behaviors. Planners allow looking ahead
in time and can prevent some problems
of purely reactive systems. Furthermore,
some of them allow coordination of
multiple agents. However, implementing
a planner for highly dynamic environments such as video games is a difficult
task. This paper aims to provide an overview of different elements of planners
and the problems that developers might
have when dealing with them. We identify the major areas of plan creation and
execution, trying to guide developers
through the process of implementing a
planner and discuss possible solutions for
problems that may arise in the following
areas: environment, planning domain,
goals, agents, actions, plan creation, and
plan execution processes. Giving insights
into multiple commercial games, we
show different possibilities of solving
such problems and discuss which solutions are better suited under specific circumstances, and why some academic
approaches find a limited application in
the context of commercial titles."

NOVEMBER 2019 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE

9



IEEE Computational Intelligence Magazine - November 2019

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - November 2019

Contents
IEEE Computational Intelligence Magazine - November 2019 - Cover1
IEEE Computational Intelligence Magazine - November 2019 - Cover2
IEEE Computational Intelligence Magazine - November 2019 - Contents
IEEE Computational Intelligence Magazine - November 2019 - 2
IEEE Computational Intelligence Magazine - November 2019 - 3
IEEE Computational Intelligence Magazine - November 2019 - 4
IEEE Computational Intelligence Magazine - November 2019 - 5
IEEE Computational Intelligence Magazine - November 2019 - 6
IEEE Computational Intelligence Magazine - November 2019 - 7
IEEE Computational Intelligence Magazine - November 2019 - 8
IEEE Computational Intelligence Magazine - November 2019 - 9
IEEE Computational Intelligence Magazine - November 2019 - 10
IEEE Computational Intelligence Magazine - November 2019 - 11
IEEE Computational Intelligence Magazine - November 2019 - 12
IEEE Computational Intelligence Magazine - November 2019 - 13
IEEE Computational Intelligence Magazine - November 2019 - 14
IEEE Computational Intelligence Magazine - November 2019 - 15
IEEE Computational Intelligence Magazine - November 2019 - 16
IEEE Computational Intelligence Magazine - November 2019 - 17
IEEE Computational Intelligence Magazine - November 2019 - 18
IEEE Computational Intelligence Magazine - November 2019 - 19
IEEE Computational Intelligence Magazine - November 2019 - 20
IEEE Computational Intelligence Magazine - November 2019 - 21
IEEE Computational Intelligence Magazine - November 2019 - 22
IEEE Computational Intelligence Magazine - November 2019 - 23
IEEE Computational Intelligence Magazine - November 2019 - 24
IEEE Computational Intelligence Magazine - November 2019 - 25
IEEE Computational Intelligence Magazine - November 2019 - 26
IEEE Computational Intelligence Magazine - November 2019 - 27
IEEE Computational Intelligence Magazine - November 2019 - 28
IEEE Computational Intelligence Magazine - November 2019 - 29
IEEE Computational Intelligence Magazine - November 2019 - 30
IEEE Computational Intelligence Magazine - November 2019 - 31
IEEE Computational Intelligence Magazine - November 2019 - 32
IEEE Computational Intelligence Magazine - November 2019 - 33
IEEE Computational Intelligence Magazine - November 2019 - 34
IEEE Computational Intelligence Magazine - November 2019 - 35
IEEE Computational Intelligence Magazine - November 2019 - 36
IEEE Computational Intelligence Magazine - November 2019 - 37
IEEE Computational Intelligence Magazine - November 2019 - 38
IEEE Computational Intelligence Magazine - November 2019 - 39
IEEE Computational Intelligence Magazine - November 2019 - 40
IEEE Computational Intelligence Magazine - November 2019 - 41
IEEE Computational Intelligence Magazine - November 2019 - 42
IEEE Computational Intelligence Magazine - November 2019 - 43
IEEE Computational Intelligence Magazine - November 2019 - 44
IEEE Computational Intelligence Magazine - November 2019 - 45
IEEE Computational Intelligence Magazine - November 2019 - 46
IEEE Computational Intelligence Magazine - November 2019 - 47
IEEE Computational Intelligence Magazine - November 2019 - 48
IEEE Computational Intelligence Magazine - November 2019 - 49
IEEE Computational Intelligence Magazine - November 2019 - 50
IEEE Computational Intelligence Magazine - November 2019 - 51
IEEE Computational Intelligence Magazine - November 2019 - 52
IEEE Computational Intelligence Magazine - November 2019 - 53
IEEE Computational Intelligence Magazine - November 2019 - 54
IEEE Computational Intelligence Magazine - November 2019 - 55
IEEE Computational Intelligence Magazine - November 2019 - 56
IEEE Computational Intelligence Magazine - November 2019 - 57
IEEE Computational Intelligence Magazine - November 2019 - 58
IEEE Computational Intelligence Magazine - November 2019 - 59
IEEE Computational Intelligence Magazine - November 2019 - 60
IEEE Computational Intelligence Magazine - November 2019 - 61
IEEE Computational Intelligence Magazine - November 2019 - 62
IEEE Computational Intelligence Magazine - November 2019 - 63
IEEE Computational Intelligence Magazine - November 2019 - 64
IEEE Computational Intelligence Magazine - November 2019 - 65
IEEE Computational Intelligence Magazine - November 2019 - 66
IEEE Computational Intelligence Magazine - November 2019 - 67
IEEE Computational Intelligence Magazine - November 2019 - 68
IEEE Computational Intelligence Magazine - November 2019 - 69
IEEE Computational Intelligence Magazine - November 2019 - 70
IEEE Computational Intelligence Magazine - November 2019 - 71
IEEE Computational Intelligence Magazine - November 2019 - 72
IEEE Computational Intelligence Magazine - November 2019 - 73
IEEE Computational Intelligence Magazine - November 2019 - 74
IEEE Computational Intelligence Magazine - November 2019 - 75
IEEE Computational Intelligence Magazine - November 2019 - 76
IEEE Computational Intelligence Magazine - November 2019 - 77
IEEE Computational Intelligence Magazine - November 2019 - 78
IEEE Computational Intelligence Magazine - November 2019 - 79
IEEE Computational Intelligence Magazine - November 2019 - 80
IEEE Computational Intelligence Magazine - November 2019 - 81
IEEE Computational Intelligence Magazine - November 2019 - 82
IEEE Computational Intelligence Magazine - November 2019 - 83
IEEE Computational Intelligence Magazine - November 2019 - 84
IEEE Computational Intelligence Magazine - November 2019 - 85
IEEE Computational Intelligence Magazine - November 2019 - 86
IEEE Computational Intelligence Magazine - November 2019 - 87
IEEE Computational Intelligence Magazine - November 2019 - 88
IEEE Computational Intelligence Magazine - November 2019 - 89
IEEE Computational Intelligence Magazine - November 2019 - 90
IEEE Computational Intelligence Magazine - November 2019 - 91
IEEE Computational Intelligence Magazine - November 2019 - 92
IEEE Computational Intelligence Magazine - November 2019 - Cover3
IEEE Computational Intelligence Magazine - November 2019 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com