SlideShare a Scribd company logo
A reinforcement learning
approach for designing artificial
autonomous intelligent agents
Damien Ernst – University of Li`ege
Email: dernst@ulg.ac.be
1
Artificial autonomous intelligent agent: formal definition
An agent is anything that is capable of acting upon information it
perceives.
An intelligent agent is an agent capable of making decisions about
how it acts based on experience, that is of learning decision from
experience.
An autonomous intelligent agent is an intelligent agent that is free
to choose between different actions.
An artificial autonomous intelligent agent is anything we create that
is capable of actions based on information it perceives, its own
experience, and its own decisions about which actions to perform.
Since “artificial autonomous intelligent agent” is quite mouthful, we
follow the convention of using “intelligent agent” or “autonomous
agent” for short.
2
Application of intelligent agents
Intelligent agents are applied in variety of areas: project
management, electronic commerce, robotics, information retrieval,
military, networking, planning and scheduling, etc.
Examples:
• A web search agent that may have the goal of obtaining web site
addresses that would match the query of history made by customer.
It could operate in the background and deliver recommendations to
the customer on a weekly basis.
• A robot agent that would learn to fulfill some specific tasks
through experience such as playing soccer, cleaning, etc.
• An intelligent flight control system
• An agent for allocating dynamically channels in networking
• Computer chess playing system that does not rely on some
predefined strategies for playing but that would learn them by
interacting with some opponents.
3
Machine learning and reinforcement learning: definitions
Machine learning is a broad subfield of artificial intelligence is
concerned with the development of algorithms and techniques that
allow computers to ”learn”.
Reinforcement Learning (RL in short) refers to a class of problems
in machine learning which postulate an autonomous agent exploring
an environment in which the agent perceives information about its
current state and takes actions. The environment, in return,
provides a reward signal (which can be positive or negative). The
agent has as objective to maximize the (expected) cumulative
reward signal over the course of the interaction.
4
The policy of an agent determines the way the agent selects its
action based on the information it has. A policy can be either
deterministic or stochastic.
Research in reinforcement learning aims at designing policies which
lead to large (expected) cumulative reward.
Where does the intelligence come from ? The policies process in an
“intelligent way” the information to select “good actions”.
5
An RL agent interacting with its environment
6
Some generic difficulties with designing intelligent agents
• Inference problem. The environment dynamics and the mechanism
behind the reward signal are (partially) unknown. The policies need
to be able to infer from the information the agent has gathered from
interaction with the system, “good control actions”.
• Computational complexity. The policy must be able to process the
history of the observation within limited amount of computing times
and memory.
• Tradeoff between exploration and exploitation.∗ To obtain a lot of
reward, a reinforcement learning agent must prefer actions that it
has tried in the past and found to be effective in producing reward.
But to discover such actions, it has to try actions that it has not
selected before.
∗May be seen as a subproblem of the general inference problem. This problem is
often referred to in the “classical control theory” as the dual control problem.
7
The agent has to exploit what it already knows in order to obtain
reward, but it also has to explore in order to make better action
selections in the future. The dilemma is that neither exploration nor
exploitation can be pursued exclusively without failing at the task.
The agent must try a variety of actions and progressively favor those
that appear to be best. On a stochastic task, each action must be
tried many times to gain a reliable estimate its expected reward.
• Exploring safely the environment. During an exploration phase
(more generally, any phase of the agent’s interaction with its
environment), the agent must avoid reaching unacceptable states
(e.g., states that may for example endanger its own integrity). By
associating rewards of −∞ to those states, exploring safely can be
assimilated to a problem of exploration-exploitation.
8
Different characterizations of RL problems
• Stochastic (e.g., xt+1 = f(xt, ut, wt) where the random disturbance
wt is drawn according to the conditional probability distribution
Pw(·|xt, ut)) versus deterministic (e.g., xt+1 = f(xt, ut))
• Partial observability versus full observability. The environment is
said to be partially (fully) observable if the signal st describes
partially (fully) the environment’s state xt at time t.
• Time-invariant (e.g., xt+1 = f(xt, ut, wt) with wt = Pw(·|xt, ut))
versus time-variant (e.g., xt+1 = f(xt, ut, wt, t)) dynamics.
• Continuous (e.g., ˙x = f(x, u, w)) versus discrete dynamics (e.g.,
xt+1 = f(xt, ut, wt)).
9
• Multi-agent framework versus single-agent framework. In a
multi-agent framework the environment may be itself composed of
(intelligent) agents. A multi-agent framework can often be
assimilated to a single-agent framework by considering that the
internal states of the other agents are unobservable variables. Game
theory and, more particularly, the theory of learning in games study
situations where various intelligent agents interact with each other.
• Finite time versus infinite time of interaction.
• Single state versus multi-state environment. In single state
environment, computation of an optimal policy for the agent is often
reduced to the computation of the maximum of a stochastic
function (e.g., find u∗ ∈ arg max
u∈U
E
w∼Pw(·|u)
[r(u, w)]).
10
• Multi-objective reinforcement learning agent (reinforcement
learning signal can be multi-dimensional) versus single-objective RL
agent.
• Risk-adverse reinforcement learning agent. The goal of the agent
is not anymore to maximize the expected cumulative reward but
maximize the lowest cumulative reward it could possibly obtain.
11
Characterization of the RL problem adopted in this class
• Dynamics of the environment:
xt+1 = f(xt, ut, wt) t = 0, 1, 2 . . .
where for all t, the state xt is an element of the state space X, the
action ut is an element of the action space U and the random
disturbance wt is an element of the disturbance space W.
Disturbance wt generated by the time-invariant conditional
probability distribution Pw(·|x, u).
• Reward signal:
The function r(x, u, w) is the so-called reward function supposed to
be bounded by a constant Br.
To the transition from t to t + 1 is associated a reward signal
γtrt = γtr(xt, ut, wt) where r(x, u, w) is a reward function supposed to
be bounded by a constant Br and γ ∈ [0, 1[ a decay factor.
12
• Cumulative reward signal:
Let ht ∈ H be the trajectory from instant time 0 to t in the
combined state, action, reward spaces:
ht = (x0, u0, r0, x1, u1, r1, . . . , ut−1, rt−1, xt). Let π ∈ Π be a stochastic
policy such that π : H × U → [0, 1] and let us denote by Jπ(x) the
expected return of a policy π (or expected cumulative reward signal)
when the system starts from x0 = x
Jπ(x) = lim
T→∞
E[
∞
t=0
γtr(xt, ut ∼ π(ht, .), wt)|x0 = x]
• Information available:
The agent does not know f, r and Pw. The only information it has
on these three elements is the information contained in ht.
13
Goal of reinforcement learning
• Le π∗ ∈ Π a policy such that ∀x ∈ X,
Jπ∗
(x) = max
π∈Π
Jπ(x) (I)
Under some mild assumptions∗ on f, r and Pw, such a policy π∗
indeed exists.
• In reinforcement learning, we want to build policies ˆπ∗ such that
Jˆπ∗
is as close as possible (according to specific metrics) to Jπ∗
.
• If f, r and Pw were known, we could, by putting aside the difficulty
of finding in Π the policy π∗, design the optimal agent by solving the
optimal control problem (I). However, Jπ depends on f, r and Pw
which are supposed to be unknown ⇒ How can we solve this
combined inference - optimization problem ?
∗We will suppose that these mild assumptions are always satisifed afterwards.
14
Dynamic Programming (DP) theory remind: optimality
of stationary policies
• A stationary control policy µ : X × U selects at time t the action
ut = µ(xt). Let Πµ denote the set of stationary policies.
• The expected return of a stationary policy when the system starts
from x0 = x is
Jµ(x) = lim
T→∞
E
w0,w1,...,wT
[
∞
t=0
γtr(xt, µ(xt), wt)|x0 = x]
• Le µ∗ be a policy such that Jµ∗
(x) = max
µ∈Πµ
Jµ(x) everywhere on X.
It can be shown that such a policy indeed exists. We name such a
policy an optimal stationary policy.
• From classical dynamic programming theory, we know
Jµ∗
(x) = Jπ∗
(x) everywhere ⇒ considering only stationary policies is
not suboptimal !
15
DP theory remind: QN-functions and µ∗
• We define the functions QN : X × U → R by the recurrence equation
QN(x, u) = E
w∼Pw(·|x,u)
[r(x, u, w) + γmax
u ∈U
QN−1(f(x, u, w), u )], ∀N ≥ 1
(1)
with Q0(x, u) ≡ 0. These QN-functions are also known as
state-action value functions.
• We denote by µ∗
N : X → U the stationary policy:
µ∗
N(x) ∈ arg max
u∈U
QN(x, u). (2)
• We define the Q-function as being the unique solution of the
Bellman equation:
Q(x, u) = E
w∼Pw(·|x,u)
[r(x, u, w) + γmax
u ∈U
Q(f(x, u, w), u )]. (3)
16
We have the following results:
• Convergence in infinite norm of the sequence of functions QN to
the Q-function, i.e. lim
N→∞
QN − Q ∞ → 0 (see Appendix I for the
proof)
• A control policy µ∗ is optimal if and only if
µ∗(x) ∈ arg max
u∈U
Q(x, u) (4)
• The following bound on the suboptimality of µ∗
N with respect to µ∗
holds:
Jµ∗
N − Jµ∗
∞
≤
2γNBr
(1 − γ)2
(5)
17
A pragmatic approach for designing (hopefully) good
policies ˆπ∗
We focus first on to the design of functions ˆπ∗ which realize
sequentially the following three tasks:
1. “System identification” phase. Estimation from ht of an
approximate system dynamics ˆf, an approximate probability
distribution ˆPw and an approximate reward function ˆr.
18
2. Resolution of the optimization problem:
Find in Πµ the policy ˆµ∗ such that ∀x ∈ X, Jˆµ∗
(x) = max
µ∈Πµ
ˆJµ(x)
where ˆJˆµ is defined similarly as function Jµ but with ˆf, ˆPw and ˆr
replacing f, Pw and r, respectively.
3. Afterwards, the policy ˆπ selects with a probability 1 − (ht)
actions according to the policy ˆµ∗ and with a probability 1 − (ht) at
random. Step 3 has been introduced to address the dilemma
between exploration and exploitation.∗
∗We won’t address further the design of the ’right function’ : H → [0, 1]. In many
applications, it is chosen equal to a small constant (say, 0.05) everywhere.
19
Some constructive algorithms for designing ˆπ∗ when
dealing with finite state-action spaces
• Until say otherwise, we consider the particular case of finite state
and action spaces (i.e., X × U finite).
• When X and U are finite, there exists a vast panel of
’well-working’ implementable RL algorithms.
• We focus first on approaches which solve separately Step 1. and
Step 2. and then on approaches which solve both steps together.
• The proposed algorithms infer ˆµ∗ from ht. They can be adapted in
a straigthforward way to episode-based reinforcement learning where
a model of µ∗ must be inferred from several trajectories ht1, ht2, . . .,
htm with ti ∈ N0.
20
Remind on Markov Decision Processes
• A Markov Decision Process (MDP) is defined through the
following objects: a state space X, an action space U, transition
probabilities p(x |x, u) ∀x, x ∈ X, u ∈ U and a reward function r(x, u).
• p(x |x, u) gives the probability of reaching state x after taking
action u while being in state x.
• We consider MDPs for which we want to find decision policies that
maximize the reward signal γtr(xt, ut) over an infinite time horizon.
• MDPs can be seen as a particular type of the discrete-time optimal
control problem introduced earlier where the system dynamics is
expressed under the form of transition probabilities and where the
reward function does not depend on the disturbance w anymore.
21
MDP structure definition from the system dynamics and
reward function
• We define∗
r(x, u) = E
w∼Pw(·|x,u)
[r(x, u, w)] ∀x ∈ X, u ∈ U (6)
p(x |x, u) = E
w∼Pw(·|x,u)
[I{x =f(x,u,w)}] ∀x, x ∈ X, u ∈ U (7)
• Equations (6) and (7) define the structure of an equivalent MDP
in the sense that the expected return of any policy applied to the
original optimal control problem is equal to its expected return for
the MDP.
• The recurrence equation defining the functions QN can be
rewritten:
QN(x, u) = r(x, u) + γ x ∈X p(x |x, u)max
u ∈U
QN−1(x , u ), ∀N ≥ 1 with
Q0(x, u) ≡ 0.
∗I{logical expression} = 1 if logical expression is true and 0 if logical expression is false.
22
Remind: Random variable and strong law of large
numbers
• A random variable is not a variable but rather a function that
maps outcomes (of an experiment) to numbers. Mathematically, a
random variable is defined as a measurable function from a
probability space to some measurable space. We consider here
random variables θ defined on the probability space (Ω, P).∗
• E
P
[θ] is the mean value of the random variable θ.
• Let θ1, θ2, . . ., θ2 be n values of the random variable θ which are
drawn independently. Suppose also that E
P
[|θ|] = Ω |θ|dP is smaller
than ∞. In such a case, the strong law of large number states that:
lim
n→∞
θ1 + θ2 + . . . + θn
n
P
→ E
P
[θ] (8)
∗For the sake of simplicity, we have considered here that (Ω, P) indeed defines a
probability space which is not rigorous.
23
Step 1. Identification by learning the structure of the
equivalent MPD
• The objective is to infer some ’good approximations’ of p(x |x, u)
and r(x, u) from:
ht = (x0, u0, r0, x1, u1, r1, . . . , ut−1, rt−1, xt)
Estimation of r(x, u):
Let A(x, u) = {k ∈ {0, 1, . . . , t − 1}|(xk, uk) = (x, u)}. Let k1, k2, . . .,
k#A(x,u) denote the elements of the set.∗ The values rk1
, rk2
, . . .,
rk#A(x,u)
are #A(x, u) values of the random variable r(x, u, w) which
are drawn independently. It follows therefore naturally that to
estimate its mean value r(x, u), we can use the following unbiased
estimator:
ˆr(x, u) =
k∈A(x,u) rk
#A(x, u)
(9)
∗If S is a set of elements, #S denote the cardinality of S.
24
Estimation of p(x |x, u):
The values I{x =xk1+1}, I{x =xk2+1}, . . ., I{x =xk#A(x,u)+1} are #A(x, u)
values of the random variable I{x =f(x,u,w)} which are drawn
independently. To estimate its mean value p(x |x, u), we can use the
unbiased estimator:
ˆp(x |x, u) =
k∈A(x,u) I{xk+1=x }
#A(x, u)
(10)
25
Step 2. Computation of ˆµ∗ dentification by learning the
structure of the equivalent MPD
• We compute the ˆQN-functions from the knowledge of ˆr and ˆp by
exploiting the recurrence equation:
ˆQN(x, u) = ˆr(x, u) + γ x ∈X ˆp(x |x, u)max
u ∈U
QN−1(x , u ), ∀N ≥ 1 with
ˆQ0(x, u) ≡ 0 and then take
ˆµ∗
N = arg max
u∈U
ˆQN(x, u) ∀x ∈ X (11)
as approximation of the optimal policy, with N ’large enough’ (e.g.,
right hand side of inequality (5) drops below ).
• One can show that if the estimated MDP structure lies in an
’ -neighborhood’ of the true structure, then, Jˆµ∗
is in a
’O( )-neighborhood’ of Jµ∗
where ˆµ∗(x) = lim
N→∞
arg max
u∈U
ˆQN(x, u).
26
The case of limited computational resources
• Number of operations to estimate the MDP structure grows
linearly with t. Memory requirements needed to store ht also grow
linearly with t ⇒ an agent having limited computational resources
will face problems after certain time of interaction.
• We describe an algorithm which requires at time t a number of
operations that does not depend on t to update the MDP structure
and for which the memory requirements do not grow with t:
At time 0, set N(x, u) = 0, N(x, u, x ) = 0, R(x, u) = 0, p(x |x, u) = 0,
∀x, x ∈ X and u ∈ U.
At time t = 0, do
1. N(xt−1, ut−1) ← N(xt−1, ut−1) + 1
2. N(xt−1, ut−1, xt) ← N(xt−1, ut−1, xt) + 1
3. R(xt−1, ut−1) ← R(xt−1, ut−1) + rt
4. r(xt−1, ut−1) ←
R(xt−1,ut−1)
N(xt−1,ut−1)
5. p(x|xt−1, ut−1) ←
N(xt−1,ut−1,x)
N(xt,ut)
∀x ∈ X
27
Merging Step 1. and 2. to learn directly the Q-function:
the Q-learning algorithm
The Q-learning algorithms is an algorithm that infers directly from
ht = (x0, u0, r0, x1, u1, r1, . . . , ut−1, rt−1, xt)
an approximate value of the Q-function, without identifying the
structure of a Markov Decision Process.
The algorithm can be described by the following steps:
1. Initialisation of ˆQ(x, u) to 0 everywhere. Set k = 0.
2. ˆQ(xk, uk) ← (1 − αk) ˆQ(xk, uk) + αk(rk + γmax
u∈U
ˆQk(xk+1, u))
3. k ← k + 1. If k = t, return ˆQ and stop. Otherwise, go back to 2.
28
Q-learning: some remarks
• Learning ratio αk: The learning ratio αk is often chosen constant
with k and equal to a small value (e.g., αk = 0.05, ∀k).
• Consistency of the Q-learning algorithm: Under some particular
conditions on the way αk decreases to zero ( lim
t→∞
t−1
k=0 αk → ∞ and
lim
t→∞
t−1
k=0 α2
k < ∞) and the history ht (when t → ∞, every
state-action pair needs to be visited an infinite number of times),
ˆQ → Q when t → ∞.
• Experience replay: At each iteration, the Q-learning algorihtm uses
a sample lk = (xk, uk, rk, xk+1) to update the function ˆQ. If rather
that to use the finite sequence of sample l0, l2, . . ., lt−1, we use the
infinite size sequence li1
, li2
, . . . to update in a similar way ˆQ, where
the ij are i.i.d. with uniform distribution on {0, 2, . . . , t − 1}, then ˆQ
converges to the approximate Q-function computed from the
estimated equivalent MDP structure.
29
Inferring ˆµ∗ from ht when dealing with very large or
infinite state-action spaces
• Up to now, we have considered problems having discrete (and not
too large) state and action spaces ⇒ ˆµ∗ and the ˆQN-functions could
be represented in a tabular form.
• We consider now the case of very large or infinite state-action
spaces: functions approximators need to be used to represent ˆµ∗ and
the ˆQN-functions.
• These function approximators need to be used in a way that there
are able to ’well generalize’ over the whole state-action space the
information contained in ht.
• There is a vast literature on function approximators in
reinforcement learning. We focus on one single algorithm named
’fitted Q iteration’ which computes the functions ˆQN from ht by
solving a sequence of batch mode supervised learning problems.
30
Remind: Batch mode supervised learning
• A batch mode Supervised Learning (SL) algorithm infers from a
set of input-output (input = information state); (output = class
label, real number, graph, etc) a model which explains “at best”
these input-output pairs.
• A loose formalisation of the SL problem: Let I be the input space,
O the output space, Ξ the disturbance space. Let g : I × Ξ → O. Let
Pξ(·|i) a conditional probability distribution over the disturbance
space.
We assume that we have a training set T S = {(il, ol)}#T S
l=1 such that
ol has been generated from il by the following mechanism: draw
ξ ∈ Ξ according to Pξ(·|il) and then set ol = g(il, ξ).
From the sole knowledge of T S, supervised learning aims at finding
a function ˆg : I → O which is a ’good approximation’ of the function
g(i) = E
ξ∼Pξ(·)
[g(i, ξ)]
31
• Typical supervised learning methods are: kernel-based methods,
neural networks, tree-based methods.
• Supervised learning highly successful: state-of-the art SL
algorithms have been successfully applied to problems where the
input state was composed thousands of components.
32
The fitted Q iteration algorithm
• Fitted Q iteration computes from ht the functions ˆQ1, ˆQ2, . . ., ˆQN,
approximations of Q1, Q2, . . ., QN. At step N > 1, the algorithm
uses the function ˆQN−1 together with ht to compute a new training
set from which a SL algorithm outputs ˆQN. More precisely, this
iterative algorithm works as follows:
First iteration: the algorithm determines a model ˆQ1 of
Q1(x, u) = E
w∼Pw(·|x,u)
[r(x, u, w)] by running a SL algorithms on the
training set:
T S = {((xk, uk), rk)}t−1
k=0 (12)
Motivation: One can assimilate X × U to I, R to O, W to Ξ,
Pw(·|x, u) to Pi(·|x, u), r(x, u, w) to g(i, ξ) and Q1(x, u) to g. From
there, we can observe that a SL algorithm applied to the training set
described by equation (12) will produce a model of Q1.
33
Iteration N > 1: the algorithm outputs a model ˆQN of
QN(x, u) = E
w∼Pw(·|x,u)
[r(x, u, w) + γmax
u ∈U
QN−1(f(x, u, w), u )] by
running a SL algorithms on the training set:
T S = {((xk, uk), rk + γmax
u ∈U
ˆQN−1(xk+1, u )}t−1
k=0
Motivation: One can reasonably suppose that ˆQN−1 is a a
sufficiently good approximation of QN−1 to be consider to be equal
to this latter function. Assimilate X × U to I, R to O, W to Ξ,
Pw(·|x, u) to Pi(·|x, u), r(x, u, w) to g(i, ξ) and QN(x, u) to g. From
there, we observe that a SL algorithm applied to the training set
described by equation (13) will produce a model of QN.
• The algorithm stops when N is ’large enough’ and
ˆµ∗
N(x) ∈ arg max
u∈U
ˆQN(x, u) is taken as approximation of µ∗(x).
34
The fitted Q iteration algorithm: some remarks
• Performances of the algorithm depends on the supervised learning
(SL) method chosen.
• Excellent performances have been observed when combined with
supervised learning methods based on ensemble of regression trees.
• Fitted Q iteration algorithm can be used with any set of one-step
system transitions (xt, ut, rt, xt+1) where each one-step system
transition gives information about: a state, the action taken while
being in this state, the reward signal observed and the next state
reached.
• Consistency, that is convergence towards an optimal solution when
the number of one-step system transitions tends to infinity, can be
ensured under appropriate assumptions on the SL method, the
sampling process, the system dynamics and the reward function.
35
Computation of ˆµ∗: from an inference problem to a
problem of computational complexity
• When having at one’s disposal only a few one-step system
transitions, the main problem is a problem of inference.
• Computational complexity of the fitted Q iteration algorithm grows
with the number M of one-step system transitions (xk, uk, rk, xk+1)
(e.g., it grows as M log M when coupled with tree-based methods).
• Above a certain number of one-step system transitions, a problem
of computational complexity appears.
• Should we rely on algorithms having less inference capabilities than
the ’fitted Q iteration algorithm’ but which are also less
computationally demanding to mitigate this problem of
computational complexity ⇒ Open research question.
36
• There is a serious problem plaguing every reinforcement learning
algorithm known as the curse of dimensionality∗: whatever the
mechanism behind the generation of the trajectories and without any
restrictive assumptions on f(x, u, w), r(x, u, w), X and U, the number
of computer operations required to determine (close-to-) optimal
policies tends to grow exponentially with the dimensionality of X × U.
• This exponentional growth makes these techniques rapidly
computationally impractical when the size of the state-action space
increases.
• Many researchers in reinforcement learning/dynamic
programming/optimal control theory focus their effort on designing
algorithms able to break this curse of dimensionality. Challenges are
tremendous but this time ... (see next slide)
∗A term introduced by Richard Bellman (the founder of the DP theory) in the fifties.
37
Damien is on the right side ;)
Thanks for your attention !!!
38
Appendix I : Algorithmic models for computing the fixed
point of a contraction mapping and their application to
reinforcement learning.
39
Contraction mapping
Let B(E) be the set of all bounded real-valued functions defined on
an arbitrary set E. With every function R : E → R that belongs to
B(E), we associate the scalar :
R ∞ = sup
e∈E
|R(e)|. (13)
A mapping G : B(E) → B(E) is said to be a contraction mapping if
there exists a scalar ρ < 1 such that :
GR − GR ∞ ≤ ρ R − R ∞ ∀R, R ∈ B(E). (14)
40
Fixed point
R∗ ∈ B(E) is said to be a fixed point of a mapping G : B(E) → B(E)
if :
GR∗ = R∗. (15)
If G : B(E) → B(E) is a contraction mapping then there exists a
unique fixed point of G. Furthermore if R ∈ B(E), then
lim
k→∞
GkR − R∗
∞ = 0. (16)
From now on, we assume that:
1. E is finite and composed of n elements
2. G : B(E) → B(E) is a contraction mapping whose fixed point is
denoted by R∗
3. R ∈ B(E).
41
Algorithmic models for computing a fixed point
All elements of R are refreshed: Suppose have the algorithm that
updates at stage k (k ≥ 0) R as follows :
R ← GR. (17)
The value of R computed by this algorithm converges to the fixed
point R∗ of G. This is an immediate consequence of equation (16).
One element of R is refreshed: Suppose we have the algorithm that
selects at each stage k (k ≥ 0) an element e ∈ E and updates R(e)
as follows :
R(e) ← (GR)(e) (18)
leaving the other components of R unchanged. If each element e of
E is selected an infinite number of times then the value of R
computed by this algorithm converges to the fixed point R∗.
42
One element of R is refreshed and noise introduction: Let η ∈ R be a
noise factor and α ∈ R. Suppose we have the algorithm that selects
at stage k (k ≥ 0) an element e ∈ E and updates R(e) according to :
R(e) ← (1 − α)R(e) + α((GR)(e) + η) (19)
leaving the other components of R unchanged.
We denote by ek the element of E selected at stage k, by ηk the
noise value at stage k and by Rk the value of R at stage k and by αk
the value of α at stage k. In order to ease further notations we set
αk(e) = αk if e = ek and αk(e) = 0 otherwise.
With this notation equation (19) can be rewritten equivalently as
follows :
Rk+1(ek) = (1 − αk)Rk(ek) + αk((GRk)(ek) + ηk). (20)
43
We define the history Fk of the algorithm at stage k as being :
Fk = {R0, . . . , Rk, e0, . . . , ek, α0, . . . , αk, η0, . . . , ηk−1}. (21)
We assume moreover that the following conditions are satisfied:
1. For every k, we have
E[ηk|Fk] = 0. (22)
2. There exist two constants A and B such that ∀k
E[η2
k|Fk] ≤ A + B Rk
2
∞. (23)
3. The αk(e) are nonnegative and satisfy
∞
k=0
αk(e) = ∞,
∞
k=0
α2
k(e) < ∞. (24)
Then the algorithm converges with probability 1 to R∗.
44
The Q-function as a fixed point of a contraction mapping
We define the mapping H: B(X × U) → B(X × U) such that
(HK)(x, u) = E
w∼Pw(·|x,u)
[r(x, u, w) + γmax
u ∈U
K(f(x, u, w), u )] (25)
∀(x, u) ∈ X × U.
• The recurrence equation (1) for computing the QN-functions can
be rewritten QN = HQN−1 ∀N > 1, with Q0(x, u) ≡ 0.
• We prove afterwards that H is a convergence mapping. As
immediate consequence, we have, by virtue of the properties
algorithmic model (17), that the sequence of QN-functions
converges to the unique solution of the Bellman equation (3) which
can be rewritten: Q = HQ. Afterwards, we proof, by using the
properties of the algorithmic model (20), the convergence of the
Q-learning algorithm.
45
H is a contraction mapping
This H mapping is a contraction mapping. Indeed, we have for any
functions K, K ∈ B(X × U) :
HK − HK ∞ = γ max
(x,u)∈X×U
| E
w∼Pw(·|x,u)
[max
u ∈U
K(f(x, u, w), u ) −
max
u ∈U
K(f(x, u, w), u )]|
≤ γ max
(x,u)∈X×U
| E
w∼Pw(·|x,u)
[max
u ∈U
|K(f(x, u, w), u ) −
K(f(x, u, w), u )|]|
≤ γmax
x∈X
max
u∈U
|K(x, u) − K(x, u)|
= γ K − K ∞
46
Q-learning convergence proof
The Q-learning algorithm updates Q at stage k in the following way∗
Qk+1(xk, uk) = (1 − αk)Qk(xk, uk) + αk(r(xk, uk, wk) + (26)
γmax
u∈U
Qk(f(xk, uk, wk), u)), (27)
Qk representing the estimate of the Q-function at stage k. wk is
drawn independently according to Pw(·|xk, uk).
By using the H mapping definition (equation (25)), equation (27)
can be rewritten as follows :
Qk+1(xk, uk) = (1 − αk)Qk(xk, uk) + αk((HQk)(xk, uk) + ηk) (28)
∗The element (xk, uk, rk, xk+1) used to refresh the Q-function at iteration k of the
Q-learning algorithm is “replaced” here by (xk, uk, r(xk, uk, wk), f(xk, uk, wk)).
47
with
ηk = r(xk, uk, wk) + γmax
u∈U
Qk(f(xk, uk, wk), u) − (HQk)(xk, uk)
= r(xk, uk, wk) + γmax
u∈U
Qk(f(xk, uk, wk), u) −
E
w∼Pw(·|x,u)
[r(xk, uk, w) + γmax
u∈U
Qk(f(xk, uk, w), u)]
which has exactly the same form as equation (20) (Qk corresponding
to Rk, H to G, (xk, uk) to ek and X × U to E).
We know that H is a contraction mapping. If the αk(xk, uk) terms
satisfy expression (24), we still have to verify that ηk satisfies
expressions (22) and (23), where
Fk = {Q0, . . . , Qk, (x0, u0), . . . , (xk, uk), α0, . . . , αk, η0, . . . , ηk−1}, (29)
in order to ensure the convergence of the Q-learning algorithm.
We have :
E[ηk|Fk] = E
wk∼Pw(·|xk,uk)
[r(xk, uk, wk) + γmax
u∈U
Qk(f(xk, uk, wk), u) −
E
w∼Pw(·|xk,uk)
[r(xk, uk, w) + γmax
u∈U
Qk(f(xk, uk, w), u)]|Fk]
= 0
and expression (22) is indeed satisfied.
48
In order to prove that expression (23) is satisfied, one can first note
that :
|ηk| ≤ 2Br + 2γ max
(x,u)∈X×U
Qk(x, u) (30)
where Br is the bound on the rewards. Therefore we have :
η2
k ≤ 4B2
r + 4γ2( max
(x,u)∈X×U
Qk(x, u))2 + 8Brγ max
(x,u)∈X×U
Qk(x, u) (31)
By noting that
8Brγ max
(x,u)∈X×U
Qk(x, u) < 8Brγ + 8Brγ( max
(x,u)∈X×U
Qk(x, u))2 (32)
and by choosing A = 8Brγ + 4B2
r and B = 8Brγ + 4γ2 we can write
η2
k ≤ A + B Qk
2
∞ (33)
and expression (23) is satisfied. QED
49
Additional readings
Leslie Kaelbling, Michael Littman, Andrew Moore. Reinforcement
learning: a survey. Journal of Artificial Intelligence Research 4:
237-285, 1996 (Available at:
http://www.cs.cmu.edu/afs/cs/project/jair/pub/volume4/kaelbling96a.pdf)
Richard Sutton and Andrew Barto. Reinforcement Learning. MIT
Press, 1998. ISBN 0262193981 (Available at:
http://www.cs.ualberta.ca/∼sutton/book/ebook/node6.html)
Dimitri P. Bertsekas and John Tsitsiklis. Neuro-Dynamic
Programming. Athena Scientific, 1996, ISBN 1886529108.
Damien Ernst, Pierre Geurts, Louis Wehenkel. Tree-based batch
mode reinforcement learning. Journal of Machine Learning Research.
Journal of Machine Learning Research 6:503-556, 2005 (Available
at: http://jmlr.csail.mit.edu/papers/v6/ernst05a.html)
50

More Related Content

PPT
Reinforcement learning
PDF
Computing near-optimal policies from trajectories by solving a sequence of st...
PDF
Clinical data based optimal STI strategies for HIV: a reinforcement learning ...
PDF
Reinforcement Learning
PPTX
An efficient use of temporal difference technique in Computer Game Learning
PPT
Reinforcement learning 7313
PPTX
Reinforcement Learning : A Beginners Tutorial
PDF
Reinforcement learning
Reinforcement learning
Computing near-optimal policies from trajectories by solving a sequence of st...
Clinical data based optimal STI strategies for HIV: a reinforcement learning ...
Reinforcement Learning
An efficient use of temporal difference technique in Computer Game Learning
Reinforcement learning 7313
Reinforcement Learning : A Beginners Tutorial
Reinforcement learning

What's hot (20)

PPTX
An introduction to reinforcement learning (rl)
PDF
Generalized Reinforcement Learning
PPT
Reinforcement Learning Q-Learning
PDF
Markov decision process
PDF
Deep Reinforcement Learning Through Policy Optimization, John Schulman, OpenAI
PPTX
Reinforcement Learning
PPTX
An Introduction to Reinforcement Learning - The Doors to AGI
PPTX
Deep Reinforcement Learning
PDF
Deep Reinforcement Learning
PPTX
Reinforcement Learning and Artificial Neural Nets
PDF
Deep Q-Learning
PDF
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
PDF
Reinfrocement Learning
PPTX
Markov decision process
PDF
Distributed Deep Q-Learning
PDF
REINFORCEMENT LEARNING
PPTX
効率的反実仮想学習
PPTX
Metaheuristics
PDF
CS799_FinalReport
PDF
Playing Atari with Deep Reinforcement Learning
An introduction to reinforcement learning (rl)
Generalized Reinforcement Learning
Reinforcement Learning Q-Learning
Markov decision process
Deep Reinforcement Learning Through Policy Optimization, John Schulman, OpenAI
Reinforcement Learning
An Introduction to Reinforcement Learning - The Doors to AGI
Deep Reinforcement Learning
Deep Reinforcement Learning
Reinforcement Learning and Artificial Neural Nets
Deep Q-Learning
ADVANCED OPTIMIZATION TECHNIQUES META-HEURISTIC ALGORITHMS FOR ENGINEERING AP...
Reinfrocement Learning
Markov decision process
Distributed Deep Q-Learning
REINFORCEMENT LEARNING
効率的反実仮想学習
Metaheuristics
CS799_FinalReport
Playing Atari with Deep Reinforcement Learning
Ad

Viewers also liked (18)

PPTX
D2L Intelligent Agents
PPTX
Artificial Intelligent Agents
PPTX
Introduction to artificial intelligence lecture 1
PPT
Artificail Intelligent lec-1
PDF
Multiobjective optimization and trade offs using pareto optimality
PPTX
Artificial Intelligence
PDF
Lecture1 - Machine Learning
PPTX
Intelligent Agent Perception
PPTX
Intelligence Agent - Artificial Intelligent (AI)
PPTX
presentation on Artificial intelligence by prince kumar kushwaha from rustamj...
PPTX
Intelligent agent
PPT
Artificial Intelligence Chapter two agents
PDF
Introduction to agents and multi-agent systems
PDF
245 gantuz - fe ey-e
PPTX
Soal Pilihan Ganda Elektrolisis dan Korosi
PPTX
Ppt ict
PPT
Dr Kathy Rowe - Understanding ME/CFS in young people
PPTX
D2L Intelligent Agents
Artificial Intelligent Agents
Introduction to artificial intelligence lecture 1
Artificail Intelligent lec-1
Multiobjective optimization and trade offs using pareto optimality
Artificial Intelligence
Lecture1 - Machine Learning
Intelligent Agent Perception
Intelligence Agent - Artificial Intelligent (AI)
presentation on Artificial intelligence by prince kumar kushwaha from rustamj...
Intelligent agent
Artificial Intelligence Chapter two agents
Introduction to agents and multi-agent systems
245 gantuz - fe ey-e
Soal Pilihan Ganda Elektrolisis dan Korosi
Ppt ict
Dr Kathy Rowe - Understanding ME/CFS in young people
Ad

Similar to A reinforcement learning approach for designing artificial autonomous intelligent agents (20)

PDF
Reinforcement learning for data-driven optimisation
PDF
Shanghai deep learning meetup 4
PDF
Deep Reinforcement Learning: MDP & DQN - Xavier Giro-i-Nieto - UPC Barcelona ...
PPTX
Reinforcement Learning: An Introduction.pptx
PPTX
What is Reinforcement Algorithms and how worked.pptx
PDF
anintroductiontoreinforcementlearning-180912151720.pdf
PPTX
An introduction to reinforcement learning
PDF
Reinforcement Learning for Financial Markets
PPTX
reinforcement-learning-141009013546-conversion-gate02.pptx
PDF
Deep Reinforcement learning
PPTX
Reinforcement Learning
PPTX
How to formulate reinforcement learning in illustrative ways
PPTX
lecture_21.pptx - PowerPoint Presentation
PDF
Deep reinforcement learning from scratch
PDF
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
PDF
Continuous control with deep reinforcement learning (DDPG)
PDF
Reinforcement Learning (DLAI D7L2 2017 UPC Deep Learning for Artificial Intel...
PDF
Reinforcement learning
PDF
reinforcement-learning-141009013546-conversion-gate02.pdf
PPTX
Demystifying deep reinforement learning
Reinforcement learning for data-driven optimisation
Shanghai deep learning meetup 4
Deep Reinforcement Learning: MDP & DQN - Xavier Giro-i-Nieto - UPC Barcelona ...
Reinforcement Learning: An Introduction.pptx
What is Reinforcement Algorithms and how worked.pptx
anintroductiontoreinforcementlearning-180912151720.pdf
An introduction to reinforcement learning
Reinforcement Learning for Financial Markets
reinforcement-learning-141009013546-conversion-gate02.pptx
Deep Reinforcement learning
Reinforcement Learning
How to formulate reinforcement learning in illustrative ways
lecture_21.pptx - PowerPoint Presentation
Deep reinforcement learning from scratch
Reinforcement Learning (Reloaded) - Xavier Giró-i-Nieto - UPC Barcelona 2018
Continuous control with deep reinforcement learning (DDPG)
Reinforcement Learning (DLAI D7L2 2017 UPC Deep Learning for Artificial Intel...
Reinforcement learning
reinforcement-learning-141009013546-conversion-gate02.pdf
Demystifying deep reinforement learning

More from Université de Liège (ULg) (20)

PDF
Reinforcement learning for electrical markets and the energy transition
PDF
Algorithms for the control and sizing of renewable energy communities
PDF
AI for energy: a bright and uncertain future ahead
PDF
Extreme engineering for fighting climate change and the Katabata project
PDF
Ex-post allocation of electricity and real-time control strategy for renewabl...
PDF
Big infrastructures for fighting climate change
PDF
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
PDF
Décret favorisant le développement des communautés d’énergie renouvelable
PDF
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
PDF
Reinforcement learning, energy systems and deep neural nets
PDF
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
PDF
Electricity retailing in Europe: remarkable events (with a special focus on B...
PDF
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNST
PPTX
Belgian offshore wind potential
PDF
Time to make a choice between a fully liberal or fully regulated model for th...
PDF
Electrification and the Democratic Republic of the Congo
PDF
Energy: the clash of nations
PDF
Smart Grids Versus Microgrids
PDF
Uber-like Models for the Electrical Industry
PDF
Analyse du projet de décret relatif à la méthodologie tarifaire applicable a...
Reinforcement learning for electrical markets and the energy transition
Algorithms for the control and sizing of renewable energy communities
AI for energy: a bright and uncertain future ahead
Extreme engineering for fighting climate change and the Katabata project
Ex-post allocation of electricity and real-time control strategy for renewabl...
Big infrastructures for fighting climate change
Harvesting wind energy in Greenland: a project for Europe and a huge step tow...
Décret favorisant le développement des communautés d’énergie renouvelable
Harnessing the Potential of Power-to-Gas Technologies. Insights from a prelim...
Reinforcement learning, energy systems and deep neural nets
Soirée des Grands Prix SEE - A glimpse at the research work of the laureate o...
Electricity retailing in Europe: remarkable events (with a special focus on B...
Projet de décret « GRD »: quelques remarques du Prof. Damien ERNST
Belgian offshore wind potential
Time to make a choice between a fully liberal or fully regulated model for th...
Electrification and the Democratic Republic of the Congo
Energy: the clash of nations
Smart Grids Versus Microgrids
Uber-like Models for the Electrical Industry
Analyse du projet de décret relatif à la méthodologie tarifaire applicable a...

Recently uploaded (20)

PPT
Project quality management in manufacturing
PPTX
CH1 Production IntroductoryConcepts.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
web development for engineering and engineering
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Welding lecture in detail for understanding
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Construction Project Organization Group 2.pptx
Project quality management in manufacturing
CH1 Production IntroductoryConcepts.pptx
573137875-Attendance-Management-System-original
UNIT 4 Total Quality Management .pptx
additive manufacturing of ss316l using mig welding
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Internet of Things (IOT) - A guide to understanding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Operating System & Kernel Study Guide-1 - converted.pdf
web development for engineering and engineering
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Welding lecture in detail for understanding
Foundation to blockchain - A guide to Blockchain Tech
Model Code of Practice - Construction Work - 21102022 .pdf
Construction Project Organization Group 2.pptx

A reinforcement learning approach for designing artificial autonomous intelligent agents

  • 1. A reinforcement learning approach for designing artificial autonomous intelligent agents Damien Ernst – University of Li`ege Email: dernst@ulg.ac.be 1
  • 2. Artificial autonomous intelligent agent: formal definition An agent is anything that is capable of acting upon information it perceives. An intelligent agent is an agent capable of making decisions about how it acts based on experience, that is of learning decision from experience. An autonomous intelligent agent is an intelligent agent that is free to choose between different actions. An artificial autonomous intelligent agent is anything we create that is capable of actions based on information it perceives, its own experience, and its own decisions about which actions to perform. Since “artificial autonomous intelligent agent” is quite mouthful, we follow the convention of using “intelligent agent” or “autonomous agent” for short. 2
  • 3. Application of intelligent agents Intelligent agents are applied in variety of areas: project management, electronic commerce, robotics, information retrieval, military, networking, planning and scheduling, etc. Examples: • A web search agent that may have the goal of obtaining web site addresses that would match the query of history made by customer. It could operate in the background and deliver recommendations to the customer on a weekly basis. • A robot agent that would learn to fulfill some specific tasks through experience such as playing soccer, cleaning, etc. • An intelligent flight control system • An agent for allocating dynamically channels in networking • Computer chess playing system that does not rely on some predefined strategies for playing but that would learn them by interacting with some opponents. 3
  • 4. Machine learning and reinforcement learning: definitions Machine learning is a broad subfield of artificial intelligence is concerned with the development of algorithms and techniques that allow computers to ”learn”. Reinforcement Learning (RL in short) refers to a class of problems in machine learning which postulate an autonomous agent exploring an environment in which the agent perceives information about its current state and takes actions. The environment, in return, provides a reward signal (which can be positive or negative). The agent has as objective to maximize the (expected) cumulative reward signal over the course of the interaction. 4
  • 5. The policy of an agent determines the way the agent selects its action based on the information it has. A policy can be either deterministic or stochastic. Research in reinforcement learning aims at designing policies which lead to large (expected) cumulative reward. Where does the intelligence come from ? The policies process in an “intelligent way” the information to select “good actions”. 5
  • 6. An RL agent interacting with its environment 6
  • 7. Some generic difficulties with designing intelligent agents • Inference problem. The environment dynamics and the mechanism behind the reward signal are (partially) unknown. The policies need to be able to infer from the information the agent has gathered from interaction with the system, “good control actions”. • Computational complexity. The policy must be able to process the history of the observation within limited amount of computing times and memory. • Tradeoff between exploration and exploitation.∗ To obtain a lot of reward, a reinforcement learning agent must prefer actions that it has tried in the past and found to be effective in producing reward. But to discover such actions, it has to try actions that it has not selected before. ∗May be seen as a subproblem of the general inference problem. This problem is often referred to in the “classical control theory” as the dual control problem. 7
  • 8. The agent has to exploit what it already knows in order to obtain reward, but it also has to explore in order to make better action selections in the future. The dilemma is that neither exploration nor exploitation can be pursued exclusively without failing at the task. The agent must try a variety of actions and progressively favor those that appear to be best. On a stochastic task, each action must be tried many times to gain a reliable estimate its expected reward. • Exploring safely the environment. During an exploration phase (more generally, any phase of the agent’s interaction with its environment), the agent must avoid reaching unacceptable states (e.g., states that may for example endanger its own integrity). By associating rewards of −∞ to those states, exploring safely can be assimilated to a problem of exploration-exploitation. 8
  • 9. Different characterizations of RL problems • Stochastic (e.g., xt+1 = f(xt, ut, wt) where the random disturbance wt is drawn according to the conditional probability distribution Pw(·|xt, ut)) versus deterministic (e.g., xt+1 = f(xt, ut)) • Partial observability versus full observability. The environment is said to be partially (fully) observable if the signal st describes partially (fully) the environment’s state xt at time t. • Time-invariant (e.g., xt+1 = f(xt, ut, wt) with wt = Pw(·|xt, ut)) versus time-variant (e.g., xt+1 = f(xt, ut, wt, t)) dynamics. • Continuous (e.g., ˙x = f(x, u, w)) versus discrete dynamics (e.g., xt+1 = f(xt, ut, wt)). 9
  • 10. • Multi-agent framework versus single-agent framework. In a multi-agent framework the environment may be itself composed of (intelligent) agents. A multi-agent framework can often be assimilated to a single-agent framework by considering that the internal states of the other agents are unobservable variables. Game theory and, more particularly, the theory of learning in games study situations where various intelligent agents interact with each other. • Finite time versus infinite time of interaction. • Single state versus multi-state environment. In single state environment, computation of an optimal policy for the agent is often reduced to the computation of the maximum of a stochastic function (e.g., find u∗ ∈ arg max u∈U E w∼Pw(·|u) [r(u, w)]). 10
  • 11. • Multi-objective reinforcement learning agent (reinforcement learning signal can be multi-dimensional) versus single-objective RL agent. • Risk-adverse reinforcement learning agent. The goal of the agent is not anymore to maximize the expected cumulative reward but maximize the lowest cumulative reward it could possibly obtain. 11
  • 12. Characterization of the RL problem adopted in this class • Dynamics of the environment: xt+1 = f(xt, ut, wt) t = 0, 1, 2 . . . where for all t, the state xt is an element of the state space X, the action ut is an element of the action space U and the random disturbance wt is an element of the disturbance space W. Disturbance wt generated by the time-invariant conditional probability distribution Pw(·|x, u). • Reward signal: The function r(x, u, w) is the so-called reward function supposed to be bounded by a constant Br. To the transition from t to t + 1 is associated a reward signal γtrt = γtr(xt, ut, wt) where r(x, u, w) is a reward function supposed to be bounded by a constant Br and γ ∈ [0, 1[ a decay factor. 12
  • 13. • Cumulative reward signal: Let ht ∈ H be the trajectory from instant time 0 to t in the combined state, action, reward spaces: ht = (x0, u0, r0, x1, u1, r1, . . . , ut−1, rt−1, xt). Let π ∈ Π be a stochastic policy such that π : H × U → [0, 1] and let us denote by Jπ(x) the expected return of a policy π (or expected cumulative reward signal) when the system starts from x0 = x Jπ(x) = lim T→∞ E[ ∞ t=0 γtr(xt, ut ∼ π(ht, .), wt)|x0 = x] • Information available: The agent does not know f, r and Pw. The only information it has on these three elements is the information contained in ht. 13
  • 14. Goal of reinforcement learning • Le π∗ ∈ Π a policy such that ∀x ∈ X, Jπ∗ (x) = max π∈Π Jπ(x) (I) Under some mild assumptions∗ on f, r and Pw, such a policy π∗ indeed exists. • In reinforcement learning, we want to build policies ˆπ∗ such that Jˆπ∗ is as close as possible (according to specific metrics) to Jπ∗ . • If f, r and Pw were known, we could, by putting aside the difficulty of finding in Π the policy π∗, design the optimal agent by solving the optimal control problem (I). However, Jπ depends on f, r and Pw which are supposed to be unknown ⇒ How can we solve this combined inference - optimization problem ? ∗We will suppose that these mild assumptions are always satisifed afterwards. 14
  • 15. Dynamic Programming (DP) theory remind: optimality of stationary policies • A stationary control policy µ : X × U selects at time t the action ut = µ(xt). Let Πµ denote the set of stationary policies. • The expected return of a stationary policy when the system starts from x0 = x is Jµ(x) = lim T→∞ E w0,w1,...,wT [ ∞ t=0 γtr(xt, µ(xt), wt)|x0 = x] • Le µ∗ be a policy such that Jµ∗ (x) = max µ∈Πµ Jµ(x) everywhere on X. It can be shown that such a policy indeed exists. We name such a policy an optimal stationary policy. • From classical dynamic programming theory, we know Jµ∗ (x) = Jπ∗ (x) everywhere ⇒ considering only stationary policies is not suboptimal ! 15
  • 16. DP theory remind: QN-functions and µ∗ • We define the functions QN : X × U → R by the recurrence equation QN(x, u) = E w∼Pw(·|x,u) [r(x, u, w) + γmax u ∈U QN−1(f(x, u, w), u )], ∀N ≥ 1 (1) with Q0(x, u) ≡ 0. These QN-functions are also known as state-action value functions. • We denote by µ∗ N : X → U the stationary policy: µ∗ N(x) ∈ arg max u∈U QN(x, u). (2) • We define the Q-function as being the unique solution of the Bellman equation: Q(x, u) = E w∼Pw(·|x,u) [r(x, u, w) + γmax u ∈U Q(f(x, u, w), u )]. (3) 16
  • 17. We have the following results: • Convergence in infinite norm of the sequence of functions QN to the Q-function, i.e. lim N→∞ QN − Q ∞ → 0 (see Appendix I for the proof) • A control policy µ∗ is optimal if and only if µ∗(x) ∈ arg max u∈U Q(x, u) (4) • The following bound on the suboptimality of µ∗ N with respect to µ∗ holds: Jµ∗ N − Jµ∗ ∞ ≤ 2γNBr (1 − γ)2 (5) 17
  • 18. A pragmatic approach for designing (hopefully) good policies ˆπ∗ We focus first on to the design of functions ˆπ∗ which realize sequentially the following three tasks: 1. “System identification” phase. Estimation from ht of an approximate system dynamics ˆf, an approximate probability distribution ˆPw and an approximate reward function ˆr. 18
  • 19. 2. Resolution of the optimization problem: Find in Πµ the policy ˆµ∗ such that ∀x ∈ X, Jˆµ∗ (x) = max µ∈Πµ ˆJµ(x) where ˆJˆµ is defined similarly as function Jµ but with ˆf, ˆPw and ˆr replacing f, Pw and r, respectively. 3. Afterwards, the policy ˆπ selects with a probability 1 − (ht) actions according to the policy ˆµ∗ and with a probability 1 − (ht) at random. Step 3 has been introduced to address the dilemma between exploration and exploitation.∗ ∗We won’t address further the design of the ’right function’ : H → [0, 1]. In many applications, it is chosen equal to a small constant (say, 0.05) everywhere. 19
  • 20. Some constructive algorithms for designing ˆπ∗ when dealing with finite state-action spaces • Until say otherwise, we consider the particular case of finite state and action spaces (i.e., X × U finite). • When X and U are finite, there exists a vast panel of ’well-working’ implementable RL algorithms. • We focus first on approaches which solve separately Step 1. and Step 2. and then on approaches which solve both steps together. • The proposed algorithms infer ˆµ∗ from ht. They can be adapted in a straigthforward way to episode-based reinforcement learning where a model of µ∗ must be inferred from several trajectories ht1, ht2, . . ., htm with ti ∈ N0. 20
  • 21. Remind on Markov Decision Processes • A Markov Decision Process (MDP) is defined through the following objects: a state space X, an action space U, transition probabilities p(x |x, u) ∀x, x ∈ X, u ∈ U and a reward function r(x, u). • p(x |x, u) gives the probability of reaching state x after taking action u while being in state x. • We consider MDPs for which we want to find decision policies that maximize the reward signal γtr(xt, ut) over an infinite time horizon. • MDPs can be seen as a particular type of the discrete-time optimal control problem introduced earlier where the system dynamics is expressed under the form of transition probabilities and where the reward function does not depend on the disturbance w anymore. 21
  • 22. MDP structure definition from the system dynamics and reward function • We define∗ r(x, u) = E w∼Pw(·|x,u) [r(x, u, w)] ∀x ∈ X, u ∈ U (6) p(x |x, u) = E w∼Pw(·|x,u) [I{x =f(x,u,w)}] ∀x, x ∈ X, u ∈ U (7) • Equations (6) and (7) define the structure of an equivalent MDP in the sense that the expected return of any policy applied to the original optimal control problem is equal to its expected return for the MDP. • The recurrence equation defining the functions QN can be rewritten: QN(x, u) = r(x, u) + γ x ∈X p(x |x, u)max u ∈U QN−1(x , u ), ∀N ≥ 1 with Q0(x, u) ≡ 0. ∗I{logical expression} = 1 if logical expression is true and 0 if logical expression is false. 22
  • 23. Remind: Random variable and strong law of large numbers • A random variable is not a variable but rather a function that maps outcomes (of an experiment) to numbers. Mathematically, a random variable is defined as a measurable function from a probability space to some measurable space. We consider here random variables θ defined on the probability space (Ω, P).∗ • E P [θ] is the mean value of the random variable θ. • Let θ1, θ2, . . ., θ2 be n values of the random variable θ which are drawn independently. Suppose also that E P [|θ|] = Ω |θ|dP is smaller than ∞. In such a case, the strong law of large number states that: lim n→∞ θ1 + θ2 + . . . + θn n P → E P [θ] (8) ∗For the sake of simplicity, we have considered here that (Ω, P) indeed defines a probability space which is not rigorous. 23
  • 24. Step 1. Identification by learning the structure of the equivalent MPD • The objective is to infer some ’good approximations’ of p(x |x, u) and r(x, u) from: ht = (x0, u0, r0, x1, u1, r1, . . . , ut−1, rt−1, xt) Estimation of r(x, u): Let A(x, u) = {k ∈ {0, 1, . . . , t − 1}|(xk, uk) = (x, u)}. Let k1, k2, . . ., k#A(x,u) denote the elements of the set.∗ The values rk1 , rk2 , . . ., rk#A(x,u) are #A(x, u) values of the random variable r(x, u, w) which are drawn independently. It follows therefore naturally that to estimate its mean value r(x, u), we can use the following unbiased estimator: ˆr(x, u) = k∈A(x,u) rk #A(x, u) (9) ∗If S is a set of elements, #S denote the cardinality of S. 24
  • 25. Estimation of p(x |x, u): The values I{x =xk1+1}, I{x =xk2+1}, . . ., I{x =xk#A(x,u)+1} are #A(x, u) values of the random variable I{x =f(x,u,w)} which are drawn independently. To estimate its mean value p(x |x, u), we can use the unbiased estimator: ˆp(x |x, u) = k∈A(x,u) I{xk+1=x } #A(x, u) (10) 25
  • 26. Step 2. Computation of ˆµ∗ dentification by learning the structure of the equivalent MPD • We compute the ˆQN-functions from the knowledge of ˆr and ˆp by exploiting the recurrence equation: ˆQN(x, u) = ˆr(x, u) + γ x ∈X ˆp(x |x, u)max u ∈U QN−1(x , u ), ∀N ≥ 1 with ˆQ0(x, u) ≡ 0 and then take ˆµ∗ N = arg max u∈U ˆQN(x, u) ∀x ∈ X (11) as approximation of the optimal policy, with N ’large enough’ (e.g., right hand side of inequality (5) drops below ). • One can show that if the estimated MDP structure lies in an ’ -neighborhood’ of the true structure, then, Jˆµ∗ is in a ’O( )-neighborhood’ of Jµ∗ where ˆµ∗(x) = lim N→∞ arg max u∈U ˆQN(x, u). 26
  • 27. The case of limited computational resources • Number of operations to estimate the MDP structure grows linearly with t. Memory requirements needed to store ht also grow linearly with t ⇒ an agent having limited computational resources will face problems after certain time of interaction. • We describe an algorithm which requires at time t a number of operations that does not depend on t to update the MDP structure and for which the memory requirements do not grow with t: At time 0, set N(x, u) = 0, N(x, u, x ) = 0, R(x, u) = 0, p(x |x, u) = 0, ∀x, x ∈ X and u ∈ U. At time t = 0, do 1. N(xt−1, ut−1) ← N(xt−1, ut−1) + 1 2. N(xt−1, ut−1, xt) ← N(xt−1, ut−1, xt) + 1 3. R(xt−1, ut−1) ← R(xt−1, ut−1) + rt 4. r(xt−1, ut−1) ← R(xt−1,ut−1) N(xt−1,ut−1) 5. p(x|xt−1, ut−1) ← N(xt−1,ut−1,x) N(xt,ut) ∀x ∈ X 27
  • 28. Merging Step 1. and 2. to learn directly the Q-function: the Q-learning algorithm The Q-learning algorithms is an algorithm that infers directly from ht = (x0, u0, r0, x1, u1, r1, . . . , ut−1, rt−1, xt) an approximate value of the Q-function, without identifying the structure of a Markov Decision Process. The algorithm can be described by the following steps: 1. Initialisation of ˆQ(x, u) to 0 everywhere. Set k = 0. 2. ˆQ(xk, uk) ← (1 − αk) ˆQ(xk, uk) + αk(rk + γmax u∈U ˆQk(xk+1, u)) 3. k ← k + 1. If k = t, return ˆQ and stop. Otherwise, go back to 2. 28
  • 29. Q-learning: some remarks • Learning ratio αk: The learning ratio αk is often chosen constant with k and equal to a small value (e.g., αk = 0.05, ∀k). • Consistency of the Q-learning algorithm: Under some particular conditions on the way αk decreases to zero ( lim t→∞ t−1 k=0 αk → ∞ and lim t→∞ t−1 k=0 α2 k < ∞) and the history ht (when t → ∞, every state-action pair needs to be visited an infinite number of times), ˆQ → Q when t → ∞. • Experience replay: At each iteration, the Q-learning algorihtm uses a sample lk = (xk, uk, rk, xk+1) to update the function ˆQ. If rather that to use the finite sequence of sample l0, l2, . . ., lt−1, we use the infinite size sequence li1 , li2 , . . . to update in a similar way ˆQ, where the ij are i.i.d. with uniform distribution on {0, 2, . . . , t − 1}, then ˆQ converges to the approximate Q-function computed from the estimated equivalent MDP structure. 29
  • 30. Inferring ˆµ∗ from ht when dealing with very large or infinite state-action spaces • Up to now, we have considered problems having discrete (and not too large) state and action spaces ⇒ ˆµ∗ and the ˆQN-functions could be represented in a tabular form. • We consider now the case of very large or infinite state-action spaces: functions approximators need to be used to represent ˆµ∗ and the ˆQN-functions. • These function approximators need to be used in a way that there are able to ’well generalize’ over the whole state-action space the information contained in ht. • There is a vast literature on function approximators in reinforcement learning. We focus on one single algorithm named ’fitted Q iteration’ which computes the functions ˆQN from ht by solving a sequence of batch mode supervised learning problems. 30
  • 31. Remind: Batch mode supervised learning • A batch mode Supervised Learning (SL) algorithm infers from a set of input-output (input = information state); (output = class label, real number, graph, etc) a model which explains “at best” these input-output pairs. • A loose formalisation of the SL problem: Let I be the input space, O the output space, Ξ the disturbance space. Let g : I × Ξ → O. Let Pξ(·|i) a conditional probability distribution over the disturbance space. We assume that we have a training set T S = {(il, ol)}#T S l=1 such that ol has been generated from il by the following mechanism: draw ξ ∈ Ξ according to Pξ(·|il) and then set ol = g(il, ξ). From the sole knowledge of T S, supervised learning aims at finding a function ˆg : I → O which is a ’good approximation’ of the function g(i) = E ξ∼Pξ(·) [g(i, ξ)] 31
  • 32. • Typical supervised learning methods are: kernel-based methods, neural networks, tree-based methods. • Supervised learning highly successful: state-of-the art SL algorithms have been successfully applied to problems where the input state was composed thousands of components. 32
  • 33. The fitted Q iteration algorithm • Fitted Q iteration computes from ht the functions ˆQ1, ˆQ2, . . ., ˆQN, approximations of Q1, Q2, . . ., QN. At step N > 1, the algorithm uses the function ˆQN−1 together with ht to compute a new training set from which a SL algorithm outputs ˆQN. More precisely, this iterative algorithm works as follows: First iteration: the algorithm determines a model ˆQ1 of Q1(x, u) = E w∼Pw(·|x,u) [r(x, u, w)] by running a SL algorithms on the training set: T S = {((xk, uk), rk)}t−1 k=0 (12) Motivation: One can assimilate X × U to I, R to O, W to Ξ, Pw(·|x, u) to Pi(·|x, u), r(x, u, w) to g(i, ξ) and Q1(x, u) to g. From there, we can observe that a SL algorithm applied to the training set described by equation (12) will produce a model of Q1. 33
  • 34. Iteration N > 1: the algorithm outputs a model ˆQN of QN(x, u) = E w∼Pw(·|x,u) [r(x, u, w) + γmax u ∈U QN−1(f(x, u, w), u )] by running a SL algorithms on the training set: T S = {((xk, uk), rk + γmax u ∈U ˆQN−1(xk+1, u )}t−1 k=0 Motivation: One can reasonably suppose that ˆQN−1 is a a sufficiently good approximation of QN−1 to be consider to be equal to this latter function. Assimilate X × U to I, R to O, W to Ξ, Pw(·|x, u) to Pi(·|x, u), r(x, u, w) to g(i, ξ) and QN(x, u) to g. From there, we observe that a SL algorithm applied to the training set described by equation (13) will produce a model of QN. • The algorithm stops when N is ’large enough’ and ˆµ∗ N(x) ∈ arg max u∈U ˆQN(x, u) is taken as approximation of µ∗(x). 34
  • 35. The fitted Q iteration algorithm: some remarks • Performances of the algorithm depends on the supervised learning (SL) method chosen. • Excellent performances have been observed when combined with supervised learning methods based on ensemble of regression trees. • Fitted Q iteration algorithm can be used with any set of one-step system transitions (xt, ut, rt, xt+1) where each one-step system transition gives information about: a state, the action taken while being in this state, the reward signal observed and the next state reached. • Consistency, that is convergence towards an optimal solution when the number of one-step system transitions tends to infinity, can be ensured under appropriate assumptions on the SL method, the sampling process, the system dynamics and the reward function. 35
  • 36. Computation of ˆµ∗: from an inference problem to a problem of computational complexity • When having at one’s disposal only a few one-step system transitions, the main problem is a problem of inference. • Computational complexity of the fitted Q iteration algorithm grows with the number M of one-step system transitions (xk, uk, rk, xk+1) (e.g., it grows as M log M when coupled with tree-based methods). • Above a certain number of one-step system transitions, a problem of computational complexity appears. • Should we rely on algorithms having less inference capabilities than the ’fitted Q iteration algorithm’ but which are also less computationally demanding to mitigate this problem of computational complexity ⇒ Open research question. 36
  • 37. • There is a serious problem plaguing every reinforcement learning algorithm known as the curse of dimensionality∗: whatever the mechanism behind the generation of the trajectories and without any restrictive assumptions on f(x, u, w), r(x, u, w), X and U, the number of computer operations required to determine (close-to-) optimal policies tends to grow exponentially with the dimensionality of X × U. • This exponentional growth makes these techniques rapidly computationally impractical when the size of the state-action space increases. • Many researchers in reinforcement learning/dynamic programming/optimal control theory focus their effort on designing algorithms able to break this curse of dimensionality. Challenges are tremendous but this time ... (see next slide) ∗A term introduced by Richard Bellman (the founder of the DP theory) in the fifties. 37
  • 38. Damien is on the right side ;) Thanks for your attention !!! 38
  • 39. Appendix I : Algorithmic models for computing the fixed point of a contraction mapping and their application to reinforcement learning. 39
  • 40. Contraction mapping Let B(E) be the set of all bounded real-valued functions defined on an arbitrary set E. With every function R : E → R that belongs to B(E), we associate the scalar : R ∞ = sup e∈E |R(e)|. (13) A mapping G : B(E) → B(E) is said to be a contraction mapping if there exists a scalar ρ < 1 such that : GR − GR ∞ ≤ ρ R − R ∞ ∀R, R ∈ B(E). (14) 40
  • 41. Fixed point R∗ ∈ B(E) is said to be a fixed point of a mapping G : B(E) → B(E) if : GR∗ = R∗. (15) If G : B(E) → B(E) is a contraction mapping then there exists a unique fixed point of G. Furthermore if R ∈ B(E), then lim k→∞ GkR − R∗ ∞ = 0. (16) From now on, we assume that: 1. E is finite and composed of n elements 2. G : B(E) → B(E) is a contraction mapping whose fixed point is denoted by R∗ 3. R ∈ B(E). 41
  • 42. Algorithmic models for computing a fixed point All elements of R are refreshed: Suppose have the algorithm that updates at stage k (k ≥ 0) R as follows : R ← GR. (17) The value of R computed by this algorithm converges to the fixed point R∗ of G. This is an immediate consequence of equation (16). One element of R is refreshed: Suppose we have the algorithm that selects at each stage k (k ≥ 0) an element e ∈ E and updates R(e) as follows : R(e) ← (GR)(e) (18) leaving the other components of R unchanged. If each element e of E is selected an infinite number of times then the value of R computed by this algorithm converges to the fixed point R∗. 42
  • 43. One element of R is refreshed and noise introduction: Let η ∈ R be a noise factor and α ∈ R. Suppose we have the algorithm that selects at stage k (k ≥ 0) an element e ∈ E and updates R(e) according to : R(e) ← (1 − α)R(e) + α((GR)(e) + η) (19) leaving the other components of R unchanged. We denote by ek the element of E selected at stage k, by ηk the noise value at stage k and by Rk the value of R at stage k and by αk the value of α at stage k. In order to ease further notations we set αk(e) = αk if e = ek and αk(e) = 0 otherwise. With this notation equation (19) can be rewritten equivalently as follows : Rk+1(ek) = (1 − αk)Rk(ek) + αk((GRk)(ek) + ηk). (20) 43
  • 44. We define the history Fk of the algorithm at stage k as being : Fk = {R0, . . . , Rk, e0, . . . , ek, α0, . . . , αk, η0, . . . , ηk−1}. (21) We assume moreover that the following conditions are satisfied: 1. For every k, we have E[ηk|Fk] = 0. (22) 2. There exist two constants A and B such that ∀k E[η2 k|Fk] ≤ A + B Rk 2 ∞. (23) 3. The αk(e) are nonnegative and satisfy ∞ k=0 αk(e) = ∞, ∞ k=0 α2 k(e) < ∞. (24) Then the algorithm converges with probability 1 to R∗. 44
  • 45. The Q-function as a fixed point of a contraction mapping We define the mapping H: B(X × U) → B(X × U) such that (HK)(x, u) = E w∼Pw(·|x,u) [r(x, u, w) + γmax u ∈U K(f(x, u, w), u )] (25) ∀(x, u) ∈ X × U. • The recurrence equation (1) for computing the QN-functions can be rewritten QN = HQN−1 ∀N > 1, with Q0(x, u) ≡ 0. • We prove afterwards that H is a convergence mapping. As immediate consequence, we have, by virtue of the properties algorithmic model (17), that the sequence of QN-functions converges to the unique solution of the Bellman equation (3) which can be rewritten: Q = HQ. Afterwards, we proof, by using the properties of the algorithmic model (20), the convergence of the Q-learning algorithm. 45
  • 46. H is a contraction mapping This H mapping is a contraction mapping. Indeed, we have for any functions K, K ∈ B(X × U) : HK − HK ∞ = γ max (x,u)∈X×U | E w∼Pw(·|x,u) [max u ∈U K(f(x, u, w), u ) − max u ∈U K(f(x, u, w), u )]| ≤ γ max (x,u)∈X×U | E w∼Pw(·|x,u) [max u ∈U |K(f(x, u, w), u ) − K(f(x, u, w), u )|]| ≤ γmax x∈X max u∈U |K(x, u) − K(x, u)| = γ K − K ∞ 46
  • 47. Q-learning convergence proof The Q-learning algorithm updates Q at stage k in the following way∗ Qk+1(xk, uk) = (1 − αk)Qk(xk, uk) + αk(r(xk, uk, wk) + (26) γmax u∈U Qk(f(xk, uk, wk), u)), (27) Qk representing the estimate of the Q-function at stage k. wk is drawn independently according to Pw(·|xk, uk). By using the H mapping definition (equation (25)), equation (27) can be rewritten as follows : Qk+1(xk, uk) = (1 − αk)Qk(xk, uk) + αk((HQk)(xk, uk) + ηk) (28) ∗The element (xk, uk, rk, xk+1) used to refresh the Q-function at iteration k of the Q-learning algorithm is “replaced” here by (xk, uk, r(xk, uk, wk), f(xk, uk, wk)). 47
  • 48. with ηk = r(xk, uk, wk) + γmax u∈U Qk(f(xk, uk, wk), u) − (HQk)(xk, uk) = r(xk, uk, wk) + γmax u∈U Qk(f(xk, uk, wk), u) − E w∼Pw(·|x,u) [r(xk, uk, w) + γmax u∈U Qk(f(xk, uk, w), u)] which has exactly the same form as equation (20) (Qk corresponding to Rk, H to G, (xk, uk) to ek and X × U to E).
  • 49. We know that H is a contraction mapping. If the αk(xk, uk) terms satisfy expression (24), we still have to verify that ηk satisfies expressions (22) and (23), where Fk = {Q0, . . . , Qk, (x0, u0), . . . , (xk, uk), α0, . . . , αk, η0, . . . , ηk−1}, (29) in order to ensure the convergence of the Q-learning algorithm. We have : E[ηk|Fk] = E wk∼Pw(·|xk,uk) [r(xk, uk, wk) + γmax u∈U Qk(f(xk, uk, wk), u) − E w∼Pw(·|xk,uk) [r(xk, uk, w) + γmax u∈U Qk(f(xk, uk, w), u)]|Fk] = 0 and expression (22) is indeed satisfied. 48
  • 50. In order to prove that expression (23) is satisfied, one can first note that : |ηk| ≤ 2Br + 2γ max (x,u)∈X×U Qk(x, u) (30) where Br is the bound on the rewards. Therefore we have : η2 k ≤ 4B2 r + 4γ2( max (x,u)∈X×U Qk(x, u))2 + 8Brγ max (x,u)∈X×U Qk(x, u) (31) By noting that 8Brγ max (x,u)∈X×U Qk(x, u) < 8Brγ + 8Brγ( max (x,u)∈X×U Qk(x, u))2 (32) and by choosing A = 8Brγ + 4B2 r and B = 8Brγ + 4γ2 we can write η2 k ≤ A + B Qk 2 ∞ (33) and expression (23) is satisfied. QED 49
  • 51. Additional readings Leslie Kaelbling, Michael Littman, Andrew Moore. Reinforcement learning: a survey. Journal of Artificial Intelligence Research 4: 237-285, 1996 (Available at: http://www.cs.cmu.edu/afs/cs/project/jair/pub/volume4/kaelbling96a.pdf) Richard Sutton and Andrew Barto. Reinforcement Learning. MIT Press, 1998. ISBN 0262193981 (Available at: http://www.cs.ualberta.ca/∼sutton/book/ebook/node6.html) Dimitri P. Bertsekas and John Tsitsiklis. Neuro-Dynamic Programming. Athena Scientific, 1996, ISBN 1886529108. Damien Ernst, Pierre Geurts, Louis Wehenkel. Tree-based batch mode reinforcement learning. Journal of Machine Learning Research. Journal of Machine Learning Research 6:503-556, 2005 (Available at: http://jmlr.csail.mit.edu/papers/v6/ernst05a.html) 50