Renju Presented by JungYun Lo National Dong Hwa University Department of Computer Science and Information Engineering Artificial Intelligence Laboratory.

Slides:



Advertisements
Similar presentations
DESCRIPTION: China, one of the world's oldest civilizations, consists of states and cultures dating back more than six millennia. This is an abstract.
Advertisements

Institute for Knowledge and Agent Technology 1 Entertainment and Computer Games Universiteit Maastricht / IKAT
Adversarial Search We have experience in search where we assume that we are the only intelligent being and we have explicit control over the “world”. Lets.
This Segment: Computational game theory Lecture 1: Game representations, solution concepts and complexity Tuomas Sandholm Computer Science Department Carnegie.
Techniques for Dealing with Hard Problems Backtrack: –Systematically enumerates all potential solutions by continually trying to extend a partial solution.
Game Playing (Tic-Tac-Toe), ANDOR graph By Chinmaya, Hanoosh,Rajkumar.
Tic Tac Toe Architecture CSE 5290 – Artificial Intelligence 06/13/2011 Christopher Hepler.
Games solved:Now and in the future H.jaap van den Herik, Jos W.H.M. Uiterwijk, Jack van Rijswijck Summarized by Seung-joon Yi.
Games as a Test Bed for Developing AI Applications (in Physics) Brains vs Computers Symposium of the “van der Waals” study association December 10, 2013.
Games CPSC 386 Artificial Intelligence Ellen Walker Hiram College.
Minimax and Alpha-Beta Reduction Borrows from Spring 2006 CS 440 Lecture Slides.
1 A Library of Eyes in Go Author: Thomas Wolf, Matthew Pratola Dept of Mathematics Brock University Presented by: Xiaozhen Niu.
Search for Transitive Connections Ling Zhao University of Alberta October 27, 2003 Author: T. Cazenave and B. Helmstetter published in JCIS'03.
This time: Outline Game playing The minimax algorithm
Progressive Strategies For Monte-Carlo Tree Search Presenter: Ling Zhao University of Alberta November 5, 2007 Authors: G.M.J.B. Chaslot, M.H.M. Winands,
November 10, 2009Introduction to Cognitive Science Lecture 17: Game-Playing Algorithms 1 Decision Trees Many classes of problems can be formalized as search.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering CSCE 580 Artificial Intelligence Ch.6: Adversarial Search Fall 2008 Marco Valtorta.
Intelligence for Games and Puzzles1 CN and PN Tree Search Algorithms Like B*, the “Conspiracy.
Playing Konane Mathematically with Combinatorial Game Theory
1 Solving Ponnuki-Go on Small Board Paper: Solving Ponnuki-Go on small board Authors: Erik van der Werf, Jos Uiterwijk, Jaap van den Herik Presented by:
THE RENJU GAME BY ABHISHEK JAIN, PRANSHU GUPTA & RHYTHM DAS PCLUB SUMMER PROJECT PRESENTATION JUNE, L7 IIT KANPUR MENTOR – SANIL JAIN.
An One-eye Solver Based on Proof and Disproof Numbers Akihiro Kishimoto
A Solution to the GHI Problem for Best-First Search D. M. Breuker, H. J. van den Herik, J. W. H. M. Uiterwijk, and L. V. Allis Surveyed by Akihiro Kishimoto.
Wei Qi, Baduk, Go a game of strategy
GAME PLAYING COMPUTERS & ARTIFICIAL INTELLIGENCE
Knowledge Acquisition from Game Records Takuya Kojima, Atsushi Yoshikawa Dept. of Computer Science and Information Engineering National Dong Hwa University.
Independence and Dependence 1 Krishna.V.Palem Kenneth and Audrey Kennedy Professor of Computing Department of Computer Science, Rice University.
CISC 235: Topic 6 Game Trees.
Lecture 5 Note: Some slides and/or pictures are adapted from Lecture slides / Books of Dr Zafar Alvi. Text Book - Aritificial Intelligence Illuminated.
1 Learning Agents Laboratory Computer Science Department George Mason University Prof. Gheorghe Tecuci 3. Rote Learning.
Computer Go : A Go player Rohit Gurjar CS365 Project Proposal, IIT Kanpur Guided By – Prof. Amitabha Mukerjee.
Development of a Machine-Learning-Based AI For Go By Justin Park.
Position Evaluation in Computer Go Martin Muller Dept. of Computer Science and Information Engineering National Dong Hwa University Reporter : Lo Jung-Yun.
 Summary  How to Play Go  Project Details  Demo  Results  Conclusions.
You are going to work in pairs to produce a Maths board game.
Game Playing Chapter 5. Game playing §Search applied to a problem against an adversary l some actions are not under the control of the problem-solver.
October 3, 2012Introduction to Artificial Intelligence Lecture 9: Two-Player Games 1 Iterative Deepening A* Algorithm A* has memory demands that increase.
Dr.Abeer Mahmoud ARTIFICIAL INTELLIGENCE (CS 461D) Dr. Abeer Mahmoud Computer science Department Princess Nora University Faculty of Computer & Information.
Game Playing. Towards Intelligence? Many researchers attacked “intelligent behavior” by looking to strategy games involving deep thought. Many researchers.
Games, computers, and artificial intelligence NDHU CSIE AI Lab 羅仲耘.
Problem Reduction Search: AND/OR Graphs & Game Trees Department of Computer Science & Engineering Indian Institute of Technology Kharagpur.
1 CSE 4705 Artificial Intelligence Jinbo Bi Department of Computer Science & Engineering
 2003, G.Tecuci, Learning Agents Laboratory 1 Learning Agents Laboratory Computer Science Department George Mason University Prof. Gheorghe Tecuci 2.
Artificial Intelligence in Game Design N-Grams and Decision Tree Learning.
Senior Project Poster Day 2007, CIS Dept. University of Pennsylvania Reversi Meng Tran Faculty Advisor: Dr. Barry Silverman Strategies: l Corners t Corners.
Computer Science: A Structured Programming Approach Using C Trees Trees are used extensively in computer science to represent algebraic formulas;
Randomized Parallel Proof-Number Search ACG 12, Pamplona, May 2009.
Formatting of Game © Candace R. Black, Al rights reserved. Concentration!
GAME PLAYING 1. There were two reasons that games appeared to be a good domain in which to explore machine intelligence: 1.They provide a structured task.
How to Play Chess. Name of Each Piece The relative values of the chess pieces 9 points 5 points 3+ points 3 points 1 point.
Lecture 2: 11/4/1435 Problem Solving Agents Lecturer/ Kawther Abas 363CS – Artificial Intelligence.
Today’s Topics Playing Deterministic (no Dice, etc) Games –Mini-max –  -  pruning –ML and games? 1997: Computer Chess Player (IBM’s Deep Blue) Beat Human.
1 CSE 4705 Artificial Intelligence Jinbo Bi Department of Computer Science & Engineering
Learning to Play the Game of GO Lei Li Computer Science Department May 3, 2007.
Solving Tsumego on Computers M2 Hirokazu Ishii Chikayama & Taura Lab.
ARTIFICIAL INTELLIGENCE (CS 461D) Princess Nora University Faculty of Computer & Information Systems.
Pigeon Problems Revisited Pigeons (Columba livia) as Trainable Observers of Pathology and Radiology Breast Cancer Images.
The Standard Genetic Algorithm Start with a “population” of “individuals” Rank these individuals according to their “fitness” Select pairs of individuals.
Adversarial Search 2 (Game Playing)
February 25, 2016Introduction to Artificial Intelligence Lecture 10: Two-Player Games II 1 The Alpha-Beta Procedure Can we estimate the efficiency benefit.
1 Evaluation Function for Computer Go. 2 Game Objective Surrounding most area on the boardSurrounding most area on the board.
Distributive Property Review 2(x + 4) 2(x) + 2(4) 2x + 8.
Influence of Search Depth on Position Evaluation
Iterative Deepening A*
Intro to Computer Science II
Mastering the game of Go with deep neural network and tree search
AlphaGo with Deep RL Alpha GO.
Alyce Brady CS 470: Data Structures CS 510: Computer Algorithms
A General Backtracking Algorithm
PN, PN2 and PN* in Lines of Action
Presentation transcript:

Renju Presented by JungYun Lo National Dong Hwa University Department of Computer Science and Information Engineering Artificial Intelligence Laboratory 2004/12/02

Renju2 Outline The rules of Renju Threat-Space Search Proof-Number Search Reference

Renju3 The rules of Renju (1) Opening –the players are preliminary black and preliminary white –The player who is preliminary black puts three stones on the board - two black ones and one white stone. This start of the game is called the opening

Renju4 The rules of Renju (2) The first move is always in the centre (marked on the board) with the black stone! The second stone is white put in the 3x3 square around the first move. The third stone is again black and put in the area of 5x5 intersections around the first move. Direct openings Indirect openings

Renju5 The rules of Renju (3) When the first player has put all the three stones on the board, the second player can choose the color of the stones she wants to play with. When the fifth move. The player with black stones puts two fifth moves on the points, which she/he considers as the best ones. White player takes one of the moves away and makes a move in his/her turn.

Renju6 The rules of Renju (4) The forbidden moves for black –Double threes –Double fours –Overlines

Renju7 The rules of Renju (5) How could black win? –Four-three

Renju8 Proof-Number Search Proving the true value of the root Using two criteria to expand next node –The potential range of subtree values –The number of nodes which must conspire to prove or disprove that range of potential values Enable pn-search to treat efficiently game trees with a non-uniform branching factor.

Renju9 Threat-Space Search (1) A winning threat sequence consists of threats. –Reducing the size –More efficient After a four, one defensive is possible After a three, two or three are possible

Renju10 Threat-Space Search (2) Definitions –The gain square of a threat is the square played by the attacker –The cost squares of a threat are the squares played by the defender, in response to the threat –The rest squares of a threat are the squares containing a threat possibility; the gain square expected –Threat A is dependency on threat B, if a rest square of A is the gain square of B

Renju11 Threat-Space Search (3) a b c d e f g h i j k l m n o e15 is a gain square with e15: cost square is d15 rest squares are a15, b15 and c15 After the moves e15 and d15 playing i11 creates a four (rest square e15,f14 and g13) thus the gain square i11 is dependent on gain square e15

Renju12 Threat-Space Search (4) Definitions –The dependency tree of a threat A is the three with root A and consisting of dependent nodes only –Two dependency trees P and Q are conflict, if within dependency tree P a threat A exists and within dependency tree Q a threat B, in such a way that The gain square of A is cost square in B Vice versa A cost square in A is also cost square in B

Renju13 Threat-Space Search (5) a b c d e f g h i j k l m n o The dependency tree of threat i11 is the four with gain square i11. It also the only child of root of dependency tree of threat e15. Threat with gain square e15 ( cost square d15) and threat with gain square d15 ( cost square e15) are conflict

Renju14 Threat-Space Search (6) a b c d e f g h i j k l m n o

Renju15 Reference Renju International Federation – Go-moku and Threat-Space Search (1993) –L.V. Allis, H.J. van den Herik, M.P.H. Huntjens –Report CS 93-02, Department of Computer Science, Faculty of General Science, University of Limburg. Maastricht, The Netherlands Solving Renju (2001) –Janos Wagner, Istvan Virag –ICGA march 2001 Combining Proof-Number Search with Alpha-Beta Search (2001) –Mark H.M. Winands, Jos W.H.M. Uiterwijk – Proof-number search (1994) –L. V. Allis, Maarten van der Meulen and H. J. van den Herik –Artificial Intelligence vol.66 Issue.1 pp

Renju16 Thanks for your attention!