Exploration and exploitation in the RL algorithms