Q-Value Based Particle Swarm Optimization for Reinforcement Neuro-Fuzzy System Design
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 10
Abstract
This paper proposes a combination of particle swarm optimization (PSO) and Q-value based safe reinforcement learning scheme for neuro-fuzzy systems (NFS). The proposed Q-value based particle swarm optimization (QPSO) fulfills PSO-based NFS with reinforcement learning; that is, it provides PSO-based NFS an alternative to learn optimal control policies under environments where only weak reinforcement signals are available. The reinforcement learning scheme is designed by Lyapunov principles and enjoys a number of practical benefits, including the ability of maintaining a system's state in a desired operating range and efficient learning. In the QPSO, parameters on a NFS are encoded in a particle evaluated by Q-value. The Q-value cumulates the reward received during a learning trial and is used as the fitness function for PSO evolution. During the trail, one particle is selected from the swarm; meanwhile, a corresponding NFS is built and applied to the environment with an immediate feedback reward. The applicability of QPSO is shown through simulations in single-link and double-link inverted pendulum system.
Authors and Affiliations
Yi-Chang Cheng , Sheng-Fuu Lin , Chi-Yao Hsu
Simulation and Analysis of Digital Video Watermarking Using MPEG-2
Quantization Index Modulation (QIM) is an important method for embedding digital watermark signal with information. This technique achieves very efficient tradeoffs among watermark embedding rate, the amount of embedding...
Reclaiming Individuality of Mysterious Passage
Authorship attribution, the science of inferring characteristics of author from characteristics of documents written by that author become an urgent need to find the original author of anonymous text. In this paper, a no...
Music Controller based on Hand Gestures using Webcam
Interaction of human beings with computers can be done without any physical interface and this can be done using gestures. The paper addresses a solution to access the music player in the computer via the webcam. This pa...
A New Encryption Method for Secure Transmission of Images
In this paper, a novel approach is designed for transmitting images securely using a technique called Gödelization followed by the public key encryption. The image which is to be transmitted is transformed into a sequenc...
An Efficient Approach for Image Recognition using Data Mining
Skin region detection plays an important role in a variety of applications such as face detection, adult image filtering and gesture recognition. We present some definitions about digital imaging or numerical imaging and...