The Cross-Platform Implementation

Size: px
Start display at page:

Download "The Cross-Platform Implementation"

Transcription

1 The Cross-Platform Implementation Of Draughts Game Valery Kirkizh State University of Aerospace Instrumentation Saint-Petersburg, Russia

2 Introduction Age-old Russian game Draughts; Cross-platform implementation, Qt; Artificial intelligence algorithms; The Cross-Platform Implementation Of Game Draughts 2/22

3 The program functionality Full game process; Artificial intelligence; GUI written on Qt4; Cross-platform working; The Cross-Platform Implementation Of Game Draughts 3/22

4 Implementation details C++ (productivity), Qt4 (cross-platform possibilities); MVC pattern: Model: the Board, the Game; Several Views; Two Players; The Cross-Platform Implementation Of Game Draughts 4/22

5 Model The Board: Do key game actions; Checking moves possibility; A draw tracking; The Game: Control the game position; Watches the game situation; Contains the Board and the two Players; The Cross-Platform Implementation Of Game Draughts 5/22

6 Views Several Views: Start game View; Board View; Information View; Finish game View; Observer pattern View is observer of the Game; Views are independent; The Cross-Platform Implementation Of Game Draughts 6/22

7 Start game interface The Cross-Platform Implementation Of Game Draughts 7/22

8 Board and information The Cross-Platform Implementation Of Game Draughts 8/22

9 Players Two kinds of players: Human player; Computer player (AI); Human player is a Board View; Computer player is based on abstract factory pattern different AI algorithms; The Cross-Platform Implementation Of Game Draughts 9/22

10 Platform differences Two main stumbling blocks Graphic user interface QT, not platform-dependent stuff; #ifdef instructions in confusing places; Multi-threading possibility is not supported in mobile linuxes; works only in PC version; The Cross-Platform Implementation Of Game Draughts 10/22

11 Artificial intelligence Algorithms: NegaMax; Alpha-beta prunning; NegaScout; Exhaustive search and its improving; The Cross-Platform Implementation Of Game Draughts 11/22

12 NegaMax algorithm (1) Creates the tree of moves: The Cross-Platform Implementation Of Game Draughts 12/22

13 NegaMax algorithm (2) Chooses the best move: looking depth Plr. 1 Plr. 2 SRF The Cross-Platform Implementation Of Game Draughts 13/22

14 Alpha-beta prunning Uses branch and bound method for cutting off unnecessary nodes of the tree: 6 3 2, 2, max min min 4 The Cross-Platform Implementation Of Game Draughts 14/22

15 Time control There is time control in real games; Each player gets a certain amount of time; Players are free to decide how to spend their time; Need to develop time control strategy for players; The Cross-Platform Implementation Of Game Draughts 15/22

16 We set following tasks: choose the fastest algorithm: NegaMax; AlphaBeta; NegaScout; choose the best time control strategy: Simple; Defensive; Aggressive; The Cross-Platform Implementation Of Game Draughts 16/22

17 Test bench Special program complex; Performance comparison Experiments tool (if time is not limited) NegaScout has the best performance, NegaMax the worth; Intelligence comparison Tournaments tool (if time is limited) NegaScout has the best intelligence (it can try a larger number of moves); The Cross-Platform Implementation Of Game Draughts 17/22

18 Program complex scheme Player 1 GUI Player 2 Game Model Tournaments Experiments AI Performance Configuration The Cross-Platform Implementation Of Game Draughts 18/22

19 Testing algorithms performance Move time (seconds) Calculation depth NegaMax AlphaBeta NegaScout The Cross-Platform Implementation Of Game Draughts 19/22

20 Testing algorithms intelligence 1,0 0,9 0,8 0,7 Intelligence 0,6 0,5 0,4 0,3 0,2 0,1 0, Tournament NegaScout AlphaBeta The Cross-Platform Implementation Of Game Draughts 20/22

21 Time control strategies The simple strategy uses strictly specific amount of time on the move; The defensive strategy saves time at the end of the game; The aggressive strategy leaves at the end of the game more time; The best strategy is Defensive because the comparisons were in quick tournaments due to lack of time; The Cross-Platform Implementation Of Game Draughts 21/22

22 Conclusion Results: Fully functional cross-platform game; Testing program complex; NegaScout has the best performance and the best intelligence among considered algorithms; Source: Future directions: AI improvment, neural network addition; Time control strategies extension; The Cross-Platform Implementation Of Game Draughts 22/22

Keywords-Chess gameregistration, Profile management, Rational rose, Activities management.

Keywords-Chess gameregistration, Profile management, Rational rose, Activities management. Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Online Chess

More information

Chess Algorithms Theory and Practice. Rune Djurhuus Chess Grandmaster runed@ifi.uio.no / runedj@microsoft.com September 23, 2014

Chess Algorithms Theory and Practice. Rune Djurhuus Chess Grandmaster runed@ifi.uio.no / runedj@microsoft.com September 23, 2014 Chess Algorithms Theory and Practice Rune Djurhuus Chess Grandmaster runed@ifi.uio.no / runedj@microsoft.com September 23, 2014 1 Content Complexity of a chess game Solving chess, is it a myth? History

More information

GUJARAT TECHNOLOGICAL UNIVERSITY Computer Engineering (07) BE 1st To 8th Semester Exam Scheme & Subject Code

GUJARAT TECHNOLOGICAL UNIVERSITY Computer Engineering (07) BE 1st To 8th Semester Exam Scheme & Subject Code GUJARAT TECHNOLOGICAL UNIVERSITY Computer Engineering (07) BE 1st To 8th Semester Scheme & EVALUATION SCHEME Continuous (Theory) (E) Evaluation Practical (I) (Practical) (E) Process(M) MAX MIN MAX MIN

More information

game development documentation game development documentation: concept document

game development documentation game development documentation: concept document topics: game design documents design document references: cisc3665 game design fall 2011 lecture # IV.1 game development documentation notes from: Game Design: Theory & Practice (2nd Edition), by Richard

More information

Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q...

Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q... Lecture 4 Scheduling 1 Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max structure of a schedule 0 Q 1100 11 00 11 000 111 0 0 1 1 00 11 00 11 00

More information

CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139

CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 CS91.543 MidTerm Exam 4/1/2004 Name: KEY Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 % INTRODUCTION, AI HISTORY AND AGENTS 1. [4 pts. ea.] Briefly describe the following important AI programs.

More information

Laboratory work in AI: First steps in Poker Playing Agents and Opponent Modeling

Laboratory work in AI: First steps in Poker Playing Agents and Opponent Modeling Laboratory work in AI: First steps in Poker Playing Agents and Opponent Modeling Avram Golbert 01574669 agolbert@gmail.com Abstract: While Artificial Intelligence research has shown great success in deterministic

More information

15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms

15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms 15-466 Computer Game Programming Intelligence I: Basic Decision-Making Mechanisms Maxim Likhachev Robotics Institute Carnegie Mellon University AI Architecture from Artificial Intelligence for Games by

More information

CURRICULUM VITAE EDUCATION:

CURRICULUM VITAE EDUCATION: CURRICULUM VITAE Jose Antonio Lozano Computer Science and Software Development / Game and Simulation Programming Program Chair 1902 N. Loop 499 Harlingen, TX 78550 Computer Sciences Building Office Phone:

More information

Chess Algorithms Theory and Practice. Rune Djurhuus Chess Grandmaster runed@ifi.uio.no / runedj@microsoft.com October 3, 2012

Chess Algorithms Theory and Practice. Rune Djurhuus Chess Grandmaster runed@ifi.uio.no / runedj@microsoft.com October 3, 2012 Chess Algorithms Theory and Practice Rune Djurhuus Chess Grandmaster runed@ifi.uio.no / runedj@microsoft.com October 3, 2012 1 Content Complexity of a chess game History of computer chess Search trees

More information

Associative Way of Data Storage

Associative Way of Data Storage Associative Way of Data Storage Valery Kirkizh Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia vkirkizh@vu.spb.ru Vitaly Petrov Tampere University of Technology

More information

FIRST EXPERIMENTAL RESULTS OF PROBCUT APPLIED TO CHESS

FIRST EXPERIMENTAL RESULTS OF PROBCUT APPLIED TO CHESS FIRST EXPERIMENTAL RESULTS OF PROBCUT APPLIED TO CHESS A.X. Jiang Department of Computer Science, University of British Columbia, Vancouver, Canada albertjiang@yahoo.com M. Buro Department of Computing

More information

APPLICATIONS OF LINUX-BASED QT-CUDA PARALLEL ARCHITECTURE

APPLICATIONS OF LINUX-BASED QT-CUDA PARALLEL ARCHITECTURE APPLICATIONS OF LINUX-BASED QT-CUDA PARALLEL ARCHITECTURE Tuyou Peng 1, Jun Peng 2 1 Electronics and information Technology Department Jiangmen Polytechnic, Jiangmen, Guangdong, China, typeng2001@yahoo.com

More information

Treemaps for Search-Tree Visualization

Treemaps for Search-Tree Visualization Treemaps for Search-Tree Visualization Rémi Coulom July, 2002 Abstract Large Alpha-Beta search trees generated by game-playing programs are hard to represent graphically. This paper describes how treemaps

More information

10/13/11 Solution: Minimax with Alpha-Beta Pruning and Progressive Deepening

10/13/11 Solution: Minimax with Alpha-Beta Pruning and Progressive Deepening 10/1/11 Solution: Minimax with Alpha-Beta Pruning and Progressive Deepening When answering the question in Parts C.1 and C. below, assume you have already applied minimax with alpha-beta pruning and progressive

More information

Improving Depth-first PN-Search: 1 + ε Trick

Improving Depth-first PN-Search: 1 + ε Trick Improving Depth-first PN-Search: 1 + ε Trick Jakub Pawlewicz, Łukasz Lew {pan,lew}@mimuw.edu.pl Institute of Informatics, Warsaw University Banacha 2, 02-097 Warsaw, Poland Abstract. Various efficient

More information

Best-First and Depth-First Minimax Search in Practice

Best-First and Depth-First Minimax Search in Practice Best-First and Depth-First Minimax Search in Practice Aske Plaat, Erasmus University, plaat@theory.lcs.mit.edu Jonathan Schaeffer, University of Alberta, jonathan@cs.ualberta.ca Wim Pijls, Erasmus University,

More information

2IOE0 Interactive Intelligent Systems

2IOE0 Interactive Intelligent Systems 2IOE0 Interactive Intelligent Systems Erik de Vink, Huub van de Wetering TU/e 2015-2016 Erik de Vink, Huub van de Wetering (TU/e) 2IOE0 Interactive Intelligent Systems 2015-2016 1 / 19 Introduction Course

More information

Computer Science. College of Engineering

Computer Science. College of Engineering Computer Science College of Engineering EDUCATION MAKE AN IMPACT As part of Kansas State University s College of Engineering, the Computer Science department is committed to offering high quality degree

More information

Find-The-Number. 1 Find-The-Number With Comps

Find-The-Number. 1 Find-The-Number With Comps Find-The-Number 1 Find-The-Number With Comps Consider the following two-person game, which we call Find-The-Number with Comps. Player A (for answerer) has a number x between 1 and 1000. Player Q (for questioner)

More information

Generalized Widening

Generalized Widening Generalized Widening Tristan Cazenave Abstract. We present a new threat based search algorithm that outperforms other threat based search algorithms and selective knowledge-based for open life and death

More information

Informix on IBM PowerLinux Comparing Power7 and Power8

Informix on IBM PowerLinux Comparing Power7 and Power8 Informix on IBM PowerLinux Comparing Power7 and Power8 Eric Vercelletto eric.vercelletto@begooden-it.com CELEBRATING 20 YEARS 1 Just in case: who am I? I dedicated the major part of my life to Informix

More information

Using computing resources with IBM ILOG CPLEX CO@W2015

Using computing resources with IBM ILOG CPLEX CO@W2015 CPLEX Optimization IBM Germany 2015-10-06 Using computing resources with IBM ILOG CPLEX CO@W2015 Hardware resources Multiple cores/threads Multiple machines No machines Software resources Interfacing with

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence ICS461 Fall 2010 1 Lecture #12B More Representations Outline Logics Rules Frames Nancy E. Reed nreed@hawaii.edu 2 Representation Agents deal with knowledge (data) Facts (believe

More information

Seminar Künstliche Intelligenz

Seminar Künstliche Intelligenz Seminar Künstliche Intelligenz Games Ruth Janning Information Systems and Machine Learning Lab, Stiftung Universität Hildesheim Sommersemester 2013 Seminar Künstliche Intelligenz Contents Games Themen

More information

Introduction Solvability Rules Computer Solution Implementation. Connect Four. March 9, 2010. Connect Four

Introduction Solvability Rules Computer Solution Implementation. Connect Four. March 9, 2010. Connect Four March 9, 2010 is a tic-tac-toe like game in which two players drop discs into a 7x6 board. The first player to get four in a row (either vertically, horizontally, or diagonally) wins. The game was first

More information

A Beam Search Heuristic for Multi-Mode Single Resource Constrained Project Scheduling

A Beam Search Heuristic for Multi-Mode Single Resource Constrained Project Scheduling A Beam Search Heuristic for Multi-Mode Single Resource Constrained Project Scheduling Chuda Basnet Department of Management Systems The University of Waikato Private Bag 3105 Hamilton chuda@waikato.ac.nz

More information

A SHORT NOTE ON RELIABILITY OF SECURITY SYSTEMS

A SHORT NOTE ON RELIABILITY OF SECURITY SYSTEMS A SHORT NOTE ON RELIABILITY OF SECURITY SYSTEMS Jóźwiak Ireneusz J., Laskowski Wojciech Wroclaw University of Technology, Wroclaw, Poland Keywords computer security, reliability, computer incidents Abstract

More information

Teaching Scheme. Theory Practical Course Code L T P Credits Max. Min. Max. Min. ISE 10. -- -- 1MA201 Linear Algebra 3 1-4

Teaching Scheme. Theory Practical Course Code L T P Credits Max. Min. Max. Min. ISE 10. -- -- 1MA201 Linear Algebra 3 1-4 Teaching and for Second Year B.Tech Program in Information Technology I Semester With Effective from 201213 Theory Practical Scheme Marks Marks L T P Credits Max. Min. Max. Min. 1MA201 Linear Algebra 3

More information

Game Design From Concepts To Implementation

Game Design From Concepts To Implementation Game Design From Concepts To Implementation Overview of a Game Engine What is a Game Engine? (Really) Technical description of game: A Soft real-time interactive agent-based computer simulation A game

More information

LOGISTIQUE ET PRODUCTION SUPPLY CHAIN & OPERATIONS MANAGEMENT

LOGISTIQUE ET PRODUCTION SUPPLY CHAIN & OPERATIONS MANAGEMENT LOGISTIQUE ET PRODUCTION SUPPLY CHAIN & OPERATIONS MANAGEMENT CURSUS CONTENTS 1) Introduction 2) Human resources functions 3) A new factory 4) Products 5) Services management 6) Methods 7) Planification

More information

SOFTWARE ENGINEER. For Online (front end) Java, Javascript, Flash For Online (back end) Web frameworks, relational databases, REST/SOAP, Java/Scala

SOFTWARE ENGINEER. For Online (front end) Java, Javascript, Flash For Online (back end) Web frameworks, relational databases, REST/SOAP, Java/Scala SOFTWARE ENGINEER Video Game Engineering is intellectually demanding work. Our software engineers are faced with daily challenges that involve physics (from collision detection to complex physical reactions),

More information

MS Terminal Server Cracking

MS Terminal Server Cracking MS Terminal Server Cracking If you want to do any MS Terminal Server cracking you basically have your choice of three tools that can do it for you; TSgrinder, TScrack, and a patched version of RDesktop.

More information

Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux

Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux Using Red Hat Enterprise Linux with Georgia Tech's RHN Satellite Server Installing Red Hat Enterprise Linux NOTE: If you need more information regarding the installation process for other distributions

More information

Load Balancing. Load Balancing 1 / 24

Load Balancing. Load Balancing 1 / 24 Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait

More information

CSC340S Asst3 Information System Design Detailed Marking Scheme

CSC340S Asst3 Information System Design Detailed Marking Scheme CSC340S Asst3 Information System Design Detailed Marking Scheme Marker: Team: Total Marks: /101 Marks for this assignment depend on the factors listed below. A: Global Architecture (20%). Description and

More information

Artificial intelligence (AI) specialists in Games design and programming

Artificial intelligence (AI) specialists in Games design and programming Artificial intelligence (AI) specialists in Games design and programming For more information about being a games developer please refer to the Prospects profile which has more detailed information about

More information

CS 378: Computer Game Technology

CS 378: Computer Game Technology CS 378: Computer Game Technology http://www.cs.utexas.edu/~fussell/courses/cs378/ Spring 2013 University of Texas at Austin CS 378 Game Technology Don Fussell Instructor and TAs! Instructor: Don Fussell!

More information

A Least-Certainty Heuristic for Selective Search 1

A Least-Certainty Heuristic for Selective Search 1 A Least-Certainty Heuristic for Selective Search 1 Paul E. Utgoff utgoff@cs.umass.edu Department of Computer and Information Science, University of Massachusetts, Amherst, MA 01003 Richard P. Cochran cochran@cs.umass.edu

More information

Classification/Decision Trees (II)

Classification/Decision Trees (II) Classification/Decision Trees (II) Department of Statistics The Pennsylvania State University Email: jiali@stat.psu.edu Right Sized Trees Let the expected misclassification rate of a tree T be R (T ).

More information

Homework Assignment #1: Answer Key

Homework Assignment #1: Answer Key Econ 497 Economics of the Financial Crisis Professor Ickes Spring 2012 Homework Assignment #1: Answer Key 1. Consider a firm that has future payoff.supposethefirm is unlevered, call the firm and its shares

More information

The Methodology of Application Development for Hybrid Architectures

The Methodology of Application Development for Hybrid Architectures Computer Technology and Application 4 (2013) 543-547 D DAVID PUBLISHING The Methodology of Application Development for Hybrid Architectures Vladimir Orekhov, Alexander Bogdanov and Vladimir Gaiduchok Department

More information

Interdisciplinary Master s study program in Computer Science and Mathematics

Interdisciplinary Master s study program in Computer Science and Mathematics Interdisciplinary Master s study program in Computer Science and Mathematics Study program cycle: Second cycle study program. Anticipated academic title: Master Engineer in Computer Science and Mathematics.

More information

Quick Installation Guide

Quick Installation Guide Quick Installation Guide MegaPBX Version 2.1 Quick Installation Guide v2.1 www.allo.com 2 Table of Contents Initial Setup of MegaPBX... 4 Notification LEDs (On the Front Panel of the Gateway)... 5 Create

More information

Information Security Attack Tree Modeling for Enhancing Student Learning

Information Security Attack Tree Modeling for Enhancing Student Learning Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department

More information

A.I. in health informatics lecture 1 introduction & stuff kevin small & byron wallace

A.I. in health informatics lecture 1 introduction & stuff kevin small & byron wallace A.I. in health informatics lecture 1 introduction & stuff kevin small & byron wallace what is this class about? health informatics managing and making sense of biomedical information but mostly from an

More information

EDA ad hoc B program. CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC

EDA ad hoc B program. CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC EDA ad hoc B program CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC Learning algorithms for power and frequency allocation in clustered ad hoc networks Luca ROSE,

More information

CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team

CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team Lecture Summary In this lecture, we learned about the ADT Priority Queue. A

More information

An Easier Way for Cross-Platform Data Acquisition Application Development

An Easier Way for Cross-Platform Data Acquisition Application Development An Easier Way for Cross-Platform Data Acquisition Application Development For industrial automation and measurement system developers, software technology continues making rapid progress. Software engineers

More information

Enhancing Wireless Security with Physical Layer Network Cooperation

Enhancing Wireless Security with Physical Layer Network Cooperation Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory

More information

The Intelligent Resource Managment For Local Area Networks

The Intelligent Resource Managment For Local Area Networks Intelligent Resource Management for Local Area Networks: Approach and Evolution 1 Roger Meike Martin Marietta Denver Aerospace Space Station Program P.O. Box 179 (MS 01744) Denver, Co. 80201 Abstract The

More information

Master of Science in Computer Science Information Systems

Master of Science in Computer Science Information Systems Master of Science in Computer Science Information Systems 1. General Admission Requirements. Admission to Graduate Studies (see graduate admission requirements). 2. Program Admission. In addition to meeting

More information

Running COMSOL in parallel

Running COMSOL in parallel Running COMSOL in parallel COMSOL can run a job on many cores in parallel (Shared-memory processing or multithreading) COMSOL can run a job run on many physical nodes (cluster computing) Both parallel

More information

Clustering. 15-381 Artificial Intelligence Henry Lin. Organizing data into clusters such that there is

Clustering. 15-381 Artificial Intelligence Henry Lin. Organizing data into clusters such that there is Clustering 15-381 Artificial Intelligence Henry Lin Modified from excellent slides of Eamonn Keogh, Ziv Bar-Joseph, and Andrew Moore What is Clustering? Organizing data into clusters such that there is

More information

Stream Processing on GPUs Using Distributed Multimedia Middleware

Stream Processing on GPUs Using Distributed Multimedia Middleware Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research

More information

User Studies of an Interdependency-Based Interface for Acquiring Problem-Solving Knowledge

User Studies of an Interdependency-Based Interface for Acquiring Problem-Solving Knowledge User Studies of an Interdependency-Based Interface for Acquiring Problem-Solving Knowledge Jihie Kim and Yolanda Gil USC/Information Sciences Institute 4676 Admiralty Way Marina del Rey, CA 99 {jihie,gil}@isi.edu

More information

AxiomONE vsphere Plug-In. Please Review Create Datastores Topics

AxiomONE vsphere Plug-In. Please Review Create Datastores Topics AxiomONE vsphere Plug-In Please Review Create Datastores Topics Table of Contents Create a Datastore Mapped to an Existing LUN.... 3 Create a Datastore Mapped to a New LUN.... 5 Index.... 7 2 Create a

More information

Games Development Education to Industry. Dr. Catherine French Academic Group Leader Games Programming, Software Engineering and Mobile Systems

Games Development Education to Industry. Dr. Catherine French Academic Group Leader Games Programming, Software Engineering and Mobile Systems Games Development Education to Industry Dr. Catherine French Academic Group Leader Games Programming, Software Engineering and Mobile Systems How do they get from inspiration to destination? Where do they

More information

The UCT Algorithm Applied to Games with Imperfect Information

The UCT Algorithm Applied to Games with Imperfect Information Otto-von-Guericke-Universität Magdeburg Fakultät für Informatik Institut für Simulation und Graphik Diploma Thesis The UCT Algorithm Applied to Games with Imperfect Information Author: Jan Schäfer July

More information

Computer Science Introduction

Computer Science Introduction Computer Science Introduction Computer science (CS) is the scientific and practical approach to computation and its applications. CS is a fast-moving field that brings together many disciplines, including

More information

Optimize Online Game Traffic Using Bigfoot Networks Killer Xeno Pro and NETGEAR Routers

Optimize Online Game Traffic Using Bigfoot Networks Killer Xeno Pro and NETGEAR Routers Optimize Online Game Traffic Using Bigfoot Networks Killer Xeno Pro and NETGEAR Routers INTRODUCTION You can build a better network for online gaming by optimizing the path for your game data on your PC

More information

SARTRE: System Overview

SARTRE: System Overview SARTRE: System Overview A Case-Based Agent for Two-Player Texas Hold em Jonathan Rubin and Ian Watson Department of Computer Science University of Auckland, New Zealand jrub001@aucklanduni.ac.nz, ian@cs.auckland.ac.nz

More information

AI Techniques Used in Computer Go

AI Techniques Used in Computer Go AI Techniques Used in Computer Go Jay Burmeister and Janet Wiles Schools of Information Technology and Psychology The University of Queensland, Australia jay@it.uq.edu.au http://www.psy.uq.edu.au/~jay/

More information

Evolutionary Algorithms Software

Evolutionary Algorithms Software Evolutionary Algorithms Software Prof. Dr. Rudolf Kruse Pascal Held {kruse,pheld}@iws.cs.uni-magdeburg.de Otto-von-Guericke-Universität Magdeburg Fakultät für Informatik Institut für Wissens- und Sprachverarbeitung

More information

Alternative Biometric as Method of Information Security of Healthcare Systems

Alternative Biometric as Method of Information Security of Healthcare Systems Alternative Biometric as Method of Information Security of Healthcare Systems Ekaterina Andreeva Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia eandreeva89@gmail.com

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

DM810 Computer Game Programming II: AI. Lecture 11. Decision Making. Marco Chiarandini

DM810 Computer Game Programming II: AI. Lecture 11. Decision Making. Marco Chiarandini DM810 Computer Game Programming II: AI Lecture 11 Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Resume Decision trees State Machines Behavior trees Fuzzy

More information

Computer and Information Sciences

Computer and Information Sciences Computer and Information Sciences Dr. John S. Eickmeyer, Chairperson Computers are no longer huge machines hidden away in protected rooms and accessible to only a few highly-trained individuals. Instead,

More information

From Last Time: Remove (Delete) Operation

From Last Time: Remove (Delete) Operation CSE 32 Lecture : More on Search Trees Today s Topics: Lazy Operations Run Time Analysis of Binary Search Tree Operations Balanced Search Trees AVL Trees and Rotations Covered in Chapter of the text From

More information

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline

More information

MAXIMUMSOFT. Mobile Application Development and Web Integration. www.maximumsoft.ru. +7.499.553.09.42 hello@maximumsoft.ru

MAXIMUMSOFT. Mobile Application Development and Web Integration. www.maximumsoft.ru. +7.499.553.09.42 hello@maximumsoft.ru MAXIMUMSOFT Mobile Application Development and Web Integration +7.499.553.09.42 hello@maximumsoft.ru www.maximumsoft.ru About Us MaximumSoft is a Full Service Mobile Software and Web Development Company

More information

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access 4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows

More information

I. General Information II. Class Rules III. Goal of the course. IV. Informational Interviewing

I. General Information II. Class Rules III. Goal of the course. IV. Informational Interviewing M. Meyer Fall 2010 I. General Information II. Class Rules III. Goal of the course So you want to be a game programmer. Facts about game programmers Education Our problem Our solution Class final IV. Informational

More information

Optimization in ICT and Physical Systems

Optimization in ICT and Physical Systems 27. OKTOBER 2010 in ICT and Physical Systems @ Aarhus University, Course outline, formal stuff Prerequisite Lectures Homework Textbook, Homepage and CampusNet, http://kurser.iha.dk/ee-ict-master/tiopti/

More information

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997 1 Swirl Multiplayer Gaming Simplified CS4512 Systems Analysis and Design Assignment 1 2010 Marque Browne 0814547 Manuel Honegger - 0837997 Kieran O' Brien 0866946 2 BLANK MARKING SCHEME 3 TABLE OF CONTENTS

More information

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci 1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks

More information

Dynamic programming formulation

Dynamic programming formulation 1.24 Lecture 14 Dynamic programming: Job scheduling Dynamic programming formulation To formulate a problem as a dynamic program: Sort by a criterion that will allow infeasible combinations to be eli minated

More information

An Early Attempt at Applying Deep Reinforcement Learning to the Game 2048

An Early Attempt at Applying Deep Reinforcement Learning to the Game 2048 An Early Attempt at Applying Deep Reinforcement Learning to the Game 2048 Hong Gui, Tinghan Wei, Ching-Bo Huang, I-Chen Wu 1 1 Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan

More information

Data Mining and Neural Networks in Stata

Data Mining and Neural Networks in Stata Data Mining and Neural Networks in Stata 2 nd Italian Stata Users Group Meeting Milano, 10 October 2005 Mario Lucchini e Maurizo Pisati Università di Milano-Bicocca mario.lucchini@unimib.it maurizio.pisati@unimib.it

More information

The RoboCup Soccer Simulator

The RoboCup Soccer Simulator Short presentation At the University of the Basque Country - Computer Science Faculty - TAIA (German Rigau) 1 Richard Hertel: KIT University of the State of Baden-Württemberg and National Large-scale Research

More information

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic

More information

Online Trading System Project Specifications Distributed Objects CSPP 51024

Online Trading System Project Specifications Distributed Objects CSPP 51024 Online Trading System Project Specifications Distributed Objects CSPP 51024 Overview An online trading system refers is a electronic marketplace where clients can connect and post orders to buy and sell

More information

SIMRACING 101 JOINING A RACE. The most common way to get into races with other SimRacers is online via the Internet as described in the steps below.

SIMRACING 101 JOINING A RACE. The most common way to get into races with other SimRacers is online via the Internet as described in the steps below. SIMRACING 101 The ability to compete against other real drivers in top level motorsports such as NASCAR is beyond the reach of most people. In the real world, racing is an expensive and dangerous sport

More information

Articles IEEE have removed from their database

Articles IEEE have removed from their database Articles IEEE have removed from their database Application of Game-Theoretic and Virtual Algorithms in Information Retrieval System 2008 International Conference on MultiMedia and Information Technology

More information

Mastering Quoridor. Lisa Glendenning THESIS. Submitted in Partial Fulfillment of the Requirements for the Degree of

Mastering Quoridor. Lisa Glendenning THESIS. Submitted in Partial Fulfillment of the Requirements for the Degree of Mastering Quoridor by Lisa Glendenning THESIS Submitted in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science Computer Science The University of New Mexico Albuquerque, New Mexico

More information

Mizu Callcenter Platform Tutorial

Mizu Callcenter Platform Tutorial Mizu Callcenter Platform Tutorial About This is a quick introduction for understanding the Mizu Callcenter platform. The Mizu Callcenter is based on the MizuManage with the addition of the following functionalities

More information

Machine Learning CS 6830. Lecture 01. Razvan C. Bunescu School of Electrical Engineering and Computer Science bunescu@ohio.edu

Machine Learning CS 6830. Lecture 01. Razvan C. Bunescu School of Electrical Engineering and Computer Science bunescu@ohio.edu Machine Learning CS 6830 Razvan C. Bunescu School of Electrical Engineering and Computer Science bunescu@ohio.edu What is Learning? Merriam-Webster: learn = to acquire knowledge, understanding, or skill

More information

USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE

USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE USING BACKTRACKING TO SOLVE THE SCRAMBLE SQUARES PUZZLE Keith Brandt, Kevin R. Burger, Jason Downing, Stuart Kilzer Mathematics, Computer Science, and Physics Rockhurst University, 1100 Rockhurst Road,

More information

Acknowledgements I would like to thank both Dr. Carsten Furhmann, and Dr. Daniel Richardson for providing me with wonderful supervision throughout my

Acknowledgements I would like to thank both Dr. Carsten Furhmann, and Dr. Daniel Richardson for providing me with wonderful supervision throughout my Abstract Game orientated application programming interfaces (API), built using Java, are intended to ease the development of Java games, on multiple platforms. Existing Java game APIs, tend to focus on

More information

Binary Heaps. CSE 373 Data Structures

Binary Heaps. CSE 373 Data Structures Binary Heaps CSE Data Structures Readings Chapter Section. Binary Heaps BST implementation of a Priority Queue Worst case (degenerate tree) FindMin, DeleteMin and Insert (k) are all O(n) Best case (completely

More information

Game Development. What is a game?

Game Development. What is a game? Game Development Doron Nussbaum COMP 3501 - Game Development 1 What is a game? Doron Nussbaum COMP 3501 - Game Development 2 Books/Movie vs. Game Good books have Place Era Plot Characters Relationships

More information

Neural Networks and Support Vector Machines

Neural Networks and Support Vector Machines INF5390 - Kunstig intelligens Neural Networks and Support Vector Machines Roar Fjellheim INF5390-13 Neural Networks and SVM 1 Outline Neural networks Perceptrons Neural networks Support vector machines

More information

Welcome. Recently we have also developed gamification projects and we are expanding in this area using our gaming experience.

Welcome. Recently we have also developed gamification projects and we are expanding in this area using our gaming experience. Welcome Wastelands Interactive is an independent game development studio from Poland. We are a dedicated team of artists, storytellers, programmers, designers and true gamers working together for several

More information

CISC 2540: Intro to Video Game Design

CISC 2540: Intro to Video Game Design : Overview, cont d Fordham University Department of Computer and Information Sciences , cont d What is this course? An EP-3 seminar (a core requirement for class of 2013 and later) An introduction to concepts

More information

SOFTWARE UNIT 1 PART B C O M P U T E R T E C H N O L O G Y ( S 1 O B J 2 2-3 A N D O B J 3-2)

SOFTWARE UNIT 1 PART B C O M P U T E R T E C H N O L O G Y ( S 1 O B J 2 2-3 A N D O B J 3-2) SOFTWARE UNIT 1 PART B C O M P U T E R T E C H N O L O G Y ( S 1 O B J 2 2-3 A N D O B J 3-2) SOFTWARE CATEGORIES There are two main type of software categories Operating Systems Software Application Software

More information

Information Brokering over the Information Highway: An Internet-Based Database Navigation System

Information Brokering over the Information Highway: An Internet-Based Database Navigation System In Proc. of The Joint Pacific Asian Conference on Expert Systems, Singapore, 1997 Information Brokering over the Information Highway: An Internet-Based Database Navigation System Syed Sibte Raza ABIDI

More information

Application Note 3: TrendView Recorder Smart Logging

Application Note 3: TrendView Recorder Smart Logging Application Note : TrendView Recorder Smart Logging Logging Intelligently with the TrendView Recorders The advanced features of the TrendView recorders allow the user to gather tremendous amounts of data.

More information

6.090, IAP 2005 Lecture 8

6.090, IAP 2005 Lecture 8 1 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.090 Building Programming Experience IAP 2005 Lecture 8 Tags ; professor abstraction (define (make professor

More information

MAHATMA GANDHI UNIVERSITY

MAHATMA GANDHI UNIVERSITY MAHATMA GANDHI UNIVERSITY MASTER OF COMPUTER APPLICATIONS REGULATIONS and SCHEME for AFFILIATED COLLEGES and SCHOOL OF TECHNOLOGY AND APPLIED SCIENCES (From 2011 admission onwards) 1. Conditions for Admission

More information

WebFOCUS RStat. RStat. Predict the Future and Make Effective Decisions Today. WebFOCUS RStat

WebFOCUS RStat. RStat. Predict the Future and Make Effective Decisions Today. WebFOCUS RStat Information Builders enables agile information solutions with business intelligence (BI) and integration technologies. WebFOCUS the most widely utilized business intelligence platform connects to any enterprise

More information