Identifying critical positions based on conspiracy numbers

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Research in two-player perfect information games has been one of the focuses of computer-game related studies in the domain of artificial intelligence. However, focus on an effective search program is insufficient to give the “taste” of actual entertainment in the gaming industry. Instead of focusing on effective search algorithm, we dedicate our study in realizing the possibility of applying strategy changing technique. However, quantifying and determining this possibility is the main challenge imposed in this study. For this purpose, the Conspiracy Number Search algorithm is considered where the maximum and minimum conspiracy numbers are recorded in the test bed of simple Tic-Tac-Toe and Othello game application. We analysed these numbers as the measures of critical position identifier which determines the right moment for possibility of applying strategy changing technique. For Tic-Tac-Toe game, the conspiracy numbers are analysed through operators formally defined in this article as ↑ tactic and ↓ tactic while variance of the conspiracy numbers are analysed in Othello game. Interesting results are obtained with convincing evidences but future works are still needed in order to further strengthen our hypothesis.

Author supplied keywords

Cite

CITATION STYLE

APA

Khalid, M. N. A., Ang, E. M., Yusof, U. K., Iida, H., & Ishitobi, T. (2015). Identifying critical positions based on conspiracy numbers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9494, pp. 100–127). Springer Verlag. https://doi.org/10.1007/978-3-319-27947-3_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free