1 Recognizing safe territories Presented by: Xiaozhen Niu Date: 2003/09/22.

Slides:



Advertisements
Similar presentations
Development of the Best Tsume-Go Solver
Advertisements

Introduction to Absolute Value Expressions and Graphs.
Copyright 2003Curt Hill Hash indexes Are they better or worse than a B+Tree?
7-4 Lesson 7-4 Example 1 Use the bar graph “Championship Series” to compare data. How many runs did the Cougars score in Games 4 and 5 combined? Example.
Solve for x. 28 = 4(2x + 1) = 8x = 8x + 8 – 8 – 8 20 = 8x = x Distribute Combine Subtract Divide.
12 Pontoon1May Pontoon program CE : Fundamental Programming Techniques.
An ILP-based Automatic Bus Planner for Dense PCBs P. C. Wu, Q. Ma and M. D. F. Wong Department of Electrical and Computer Engineering, University of Illinois.
Life in the Game of Go David B. Benson Surveyed by Akihiro Kishimoto.
1 A Library of Eyes in Go Author: Thomas Wolf, Matthew Pratola Dept of Mathematics Brock University Presented by: Xiaozhen Niu.
Honte, a Go-Playing Program Using Neural Nets Frederik Dahl.
1 Evaluation of strings in computer Go using APC and Seki judgement Author: Hyun-Soo Park and Kyung-Woo Kang Presented by: Xiaozhen Niu.
Maximizing the Chance of Winning in Searching Go Game Trees Presenter: Ling Zhao March 16, 2005 Author: Keh-Hsun Chen Accepted by Information Sciences.
Combining Tactical Search and Monte-Carlo in the Game of Go Presenter: Ling Zhao University of Alberta November 1, 2005 by Tristan Cazenave & Bernard Helmstetter.
Decision Tree Algorithm
Homework Read Pages 327, , , , , Page 335: 17, 18, 57, 93 – 97 Page 344: 7, 12, 14, 39, 40, 43 Page 353: 5, 6, 10,
Shallow Blue Project 2 Due date: April 5 th. Introduction Second in series of three projects This project focuses on getting AI opponent Subsequent project.
© Copyright 1992–2004 by Deitel & Associates, Inc. and Pearson Education Inc. All Rights Reserved. Chapter 5 - Functions Outline 5.1Introduction 5.2Program.
Metarules To Improve Tactical Go Knowledge By Tristan Cazenave Presented by Leaf Wednesday, April 28 th, 2004.
1 Life-and-Death Problem Solver in Go Author: Byung-Doo Lee Dept of Computer Science, Univ. of Auckland Presented by: Xiaozhen Niu.
1 An Improved Safety Solver for Computer Go Presented by: Xiaozhen Niu Date: 2004/02/24.
Inside HARUKA Written by Ryuichi Kawa Surveyed by Akihiro Kishimto.
Go Meeting Talk1 Generation of Patterns with External Conditions for the Game of Go Paper presentation
1 Game Playing Chapter 6 (supplement) Various deterministic board games Additional references for the slides: Luger’s AI book (2005). Robert Wilensky’s.
1 Solving Ponnuki-Go on Small Board Paper: Solving Ponnuki-Go on small board Authors: Erik van der Werf, Jos Uiterwijk, Jaap van den Herik Presented by:
A Heuristic Search Algorithm for Capturing Problems in Go Authors: Keh-Hsun Chen and Peigang Zhang Presenter: Ling Zhao August 8, 2006.
Monte Carlo Go Has a Way to Go Haruhiro Yoshimoto (*1) Kazuki Yoshizoe (*1) Tomoyuki Kaneko (*1) Akihiro Kishimoto (*2) Kenjiro Taura (*1) (*1)University.
1 An Open Boundary Safety-of- Territory Solver for the Game of Go Author: Xiaozhen Niu, Martin Mueller Dept of Computing Science University of Alberta.
1 Influence Calculation in Go Paper: Semi-empirical Quantitative Theory of GO Part 1: Estimation of the Influence of a Wall ICGA Journal Vol.25 No.4 December.
Dynamic Decomposition Search for the One-Eye Problem Akihiro Kishimoto
1 An Efficient Algorithm for Eyespace Classification in Go Author: Peter Drake, Niku Schreiner Brett Tomlin, Loring Veenstra Presented by: Xiaozhen Niu.
New Mexico Computer Science For All Introduction to Algorithms Maureen Psaila-Dombrowski.
Buffer Overflow Attacks. Memory plays a key part in many computer system functions. It’s a critical component to many internal operations. From mother.
Introduction to Artificial Intelligence Lecture 2: Perception & Action
Saftey. What is safety? Safety is the freedom of harm or danger. This can be physically and emotionally.
Lists. Lists store information in a certain order. You can add, remove, or rearrange items in a list. You can also pick out information from a list.
Go An ancient Oriental board game Andrew Simons. Introduction 2 player game of skill. Popular in the Far East, growing in the West. Simple rules, extremely.
How to make a presentation (Oral and Poster) Dr. Bernard Chen Ph.D. University of Central Arkansas July 5 th Applied Research in Healthy Information.
CPSC 171 Introduction to Computer Science 3 Levels of Understanding Algorithms More Algorithm Discovery and Design.
Othello Artificial Intelligence With Machine Learning
Computer Go : A Go player Rohit Gurjar CS365 Project Proposal, IIT Kanpur Guided By – Prof. Amitabha Mukerjee.
Position Evaluation in Computer Go Martin Muller Dept. of Computer Science and Information Engineering National Dong Hwa University Reporter : Lo Jung-Yun.
Objective: Students will add integers using models and rules (11-3).
© 2004, D. J. Foreman 1 Memory Management. © 2004, D. J. Foreman 2 Building a Module -1  Compiler ■ generates references for function addresses may be.
1 2-Hardware Design Basics of Embedded Processors (cont.)
Intelligent Database Systems Lab Advisor : Dr. Hsu Graduate : Chien-Ming Hsiao Author : Bing Liu Yiyuan Xia Philp S. Yu 國立雲林科技大學 National Yunlin University.
Evaluating Network Security with Two-Layer Attack Graphs Anming Xie Zhuhua Cai Cong Tang Jianbin Hu Zhong Chen ACSAC (Dec., 2009) 2010/6/151.
Critical Thinking Lesson 8
An Efficient Linear Time Triple Patterning Solver Haitong Tian Hongbo Zhang Zigang Xiao Martin D.F. Wong ASP-DAC’15.
Category Independent Region Proposals Ian Endres and Derek Hoiem University of Illinois at Urbana-Champaign.
2008/09/30Computers and Games Cognitive Modeling of Knowledge-Guided Information Acquisition in Games Reijer Grimbergen Department of Informatics.
2.2 Subtracting Rational Numbers. 2.2 – Subtracting Rational #s Goals / “I can…” Subtract rational numbers Apply subtraction.
Learning to Play the Game of GO Lei Li Computer Science Department May 3, 2007.
Solving Tsumego on Computers M2 Hirokazu Ishii Chikayama & Taura Lab.
Artificial Intelligence in Game Design Influence Maps and Decision Making.
Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner,
Othello Artificial Intelligence With Machine Learning Computer Systems TJHSST Nick Sidawy.
Auditing Information Leakage for Distance Metrics Yikan Chen David Evans TexPoint fonts used in EMF. Read the TexPoint manual.
7 Wonders Agent: A Proposal Computer Science Thesis Proposal Fall 2012 Ben Gardiner Advisor: Prof. Haiyan Cheng.
Using Castle Maps for Guiding Opening and Middle Game Play in Shogi Reijer Grimbergen (Saga University) Jeff Rollason (Oxford Softworks)
Finite State Machines Logical and Artificial Intelligence in Games Lecture 3a.
ECE 448: Lab 4 VGA Display Snake Game. Flexibility in the Second Part of the Semester Lab 4: VGA display (2 weeks) – 8 points Lab 5: Computer Graphics.
1 Double-Patterning Aware DSA Template Guided Cut Redistribution for Advanced 1-D Gridded Designs Zhi-Wen Lin and Yao-Wen Chang National Taiwan University.
Conflict Resolution of Chinese Chess Endgame Knowledge Base Bo-Nian Chen, Pangfang Liu, Shun-Chin Hsu, Tsan-sheng Hsu.
Memory Management © 2004, D. J. Foreman.
Communication Knowledge Application Thinking Application Game
Goal-driven Mechanism in Interim.2 Go Program
Lesson 1.1 How can you analyze data?
Advanced System Security
Adding Like Terms Guided Notes
RANDOM NUMBERS SET # 1:
Presentation transcript:

1 Recognizing safe territories Presented by: Xiaozhen Niu Date: 2003/09/22

2 Outline n Introduction u Safety of Blocks and regions n Enhancements n Experimental Results n Future Work

3 Introduction n Recognizing whether territories are safe is a major task in Go evaluation. n Most cases need to be proven by using search, not static evaluation.

4 Safety of Blocks and Regions n Safety of blocks and regions are strongly related.

5 Result of the Example n The left graph shows that the write blocks and territory are all safe, the right graph shows that both are not safe.

6 Safe Blocks but Unsafe Regions n In some cases, Blocks can be safe even regions are not. For example:

7 Enhancements n 1. Recognizing external eyes for boundary blocks of a region. n 2. Merging regions when necessary to simplify the situation. n 3. Evaluation Function. n 3. Move ordering for local search.

8 External Eye Example n An external eye of the boundary block will be very helpful for evaluating region safety.

9 Merging regions n Previous program analyzes regions separately. However, in many cases, adjacent several regions should be treated as a combined region when evaluating.

10 Evaluation Function n Add more Go knowledge into the evaluation function, original values are only safe, unsafe and unknown. n Currently: u Value -= factor1* (Num of boundary blocks) u Value -= factor2* (Num of interior points)

11 Move Ordering n Also, original program generates random moves inside the region. Adding Go knowledge into move ordering should gain speedup in the search. n Adding knowledge such as cutting points, liberties of boundary blocks, liberties of inner attacker’s blocks to score all the points inside the region, then sort them by their scores.

12 Example n Score = f1*(self liberties) - f2*(opponent’s liberties) n Adjust a bit when changing players.

13 Experimental Results n Test sets: 31 games played by amateur dan players. n Step 1: adding external eyes. n Step 2: merging regions. n Step 3: evaluation function and move ordering. Original Step1Step2 Step3 34.9%36.2%41.2%???

14 Future Work n Recognizing saki.

15 Future Work n Decomposition large region to weakly depedant sub- regions, and implement local search for thoes sub- regions.

16 Reference n [1] M. Müller. Playing it safe: Recognizing secure territories in computer Go by using static rules and search. In H. Matsubara, editor, Game Programming Workshop in Japan '97, pages 80-86, Computer Shogi Association, Tokyo, Japan, 1997.