Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 101-104,125.

• Intelligent Computing • Previous Articles     Next Articles

Research on Multi-units Control Method in RTS Games Based on PAGA

YANG Zhen, ZHANG Wan-peng, LIU Hong-fu, WEI Zhan-yang   

  1. College of Intelligence Science and Engineering,National University of Defense Technology,Changsha 410000,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: Unit control in real-time strategy games (RTS) is a challenging issue in the field of artificial intelligence (AI).Such games are constrained in real time,and have a large state and action space,which make intelligent algorithms do not solve this type of problem.By controlling the multi-units in the battle scene by searching strategy in the script space,it is possible to effectively overcome the adverse effects caused by the huge branching factor.This paper used adaptive genetic algorithm to search in scripting space to provid a good sequence of actions for multi-units in the battle scene and control the unit.Experiments show that the proposed PAGA (Portable Adaptive Genetic Algorithm) is feasible and effective,and its performance is superior to the current algorithms in large-scale unit control.

Key words: RTS game, AI, Adaptive genetic algorithm, Multi-units control

CLC Number: 

  • TP273+.2
[1]MISHRA K,SUGANDH N,RAM A.Case-Based Planning and Execution for Real-Time Strategy Games[C]∥International Conference on Case-Based Reasoning:Case-Based Reasoning Research and Development.Springer-Verlag,2007:164-178.
[2]SYNNAEVE G,BESSIERE P.A Bayesian Model for Opening Prediction in RTS Games with Application to StarCraft[J].Proceedings of IEEE Cig Seoul South Korea,2011,32(14):281-288.
[3]FOERSTER J,NARDELLI N,FARQUHAR G,et al.Stabili-sing Experience Replay for Deep Multi-Agent Reinforcement Learning[J].arXiv:1702.08887,2017.
[4]BARRIGA N A,STANESCU M,BURO M.Puppet Search:Enhancing Scripted Behavior by Look-Ahead Search with Applications to Real-Time Strategy Games[C]∥AIIDE.2015.
[5]CHURCHILL D,BURO M.Portfolio greedy search and simulation for large-scale combat in starcraft[C]∥Computational Intelligence in Games.IEEE,2013:1-8.
[6]JUSTESEN N,TILLMAN B,TOGELIUS J,et al.Script- and cluster-based UCT for StarCraft[C]∥Computational Intelligence and Games.IEEE,2014:1-8.
[7]WANG C,CHEN P,LI Y,et al.Portfolio online evolution in Star Craft[C]∥AAAI Conference on Artificial Intelligence and InteractiveDigital Entertainment.2016:114-120.
[8]USUNIER N,SYNNAEVE G,LIN Z,et al.Episodic Exploration for Deep Deterministic Policies:An Application to StarCraft Micromanagement Tasks[J].arXiv:1609.02993,2016.
[9]CHURCHILL D,BURO M.Portfolio greedy search and simulation for large-scale combat in starcraft[C]∥Computational Intelligence in Games.IEEE,2013:1-8.
[10]JUSTESEN N,RISI S.Continual online evolutionary planning for in-game build order adaptation in StarCraft[C]∥the Genetic and Evolutionary Computation Conference.2017:187-194.
[11]Holland J H.Adaptation in natural and artificial systems[M].MIT Press,1992.
[12]沐阿华,周绍磊,于晓丽.一种快速自适应遗传算法及其仿真研究[J].系统仿真学报,2004,16(1):122-125.
[13]姜昌华.遗传算法在物流系统优化中的应用研究[D].中山:华东师范大学,2007.
[14]SRINIVAS M,PATNAIKL M.Adaptive probabilities of crossover and mutation in genetic algorithms[J].IEEE Transactions on Systems Man & Cybernetics,2002,24(4):656-667.
[15]KOVARSKY A,BURO M.Heuristic Search Applied to Ab-stract Combat Games[M]∥Advances in Artificial Intelligence.Berlin:Springer,2005:66-78.
[1] ZHANG Zhao, LI Hai-long, HU Lei, DONG Si-qi. Service Function Load Balancing Based on SDN-SFC [J]. Computer Science, 2019, 46(9): 130-136.
[2] QIN Yue, DING Shi-fei. Survey of Semi-supervised Clustering [J]. Computer Science, 2019, 46(9): 15-21.
[3] LV Xiao-hu, HAN Xiao-dong, GONG Jiang-lei, WANG Zhi-jie, LIU Xiao-kun. Systemic Muti-factors Based Verification Method for Safety-critical Software [J]. Computer Science, 2019, 46(9): 156-161.
[4] WANG Tong, MA Wen-ping, LUO Wei. Information Sharing and Secure Multi-party Computing Model Based on Blockchain [J]. Computer Science, 2019, 46(9): 162-168.
[5] ZHAO Zhi-wei, NI Gui-qiang. Automatic Recognition Algorithm for Unconstrained Multi-pose Face Key Features under Unqualified Conditions [J]. Computer Science, 2019, 46(9): 250-253.
[6] YAN Sheng-long, YU Juan, ZHOU Hou-pan. IIVMM:An Improved Interactive Voting-based Map Matching Algorithm for Low-sampling-rate GPS Trajectories [J]. Computer Science, 2019, 46(9): 325-332.
[7] ZHONG Feng-yan, WANG Yan, LI Nian-shuang. Node Selection Scheme for Data Repair in Heterogeneous Distributed Storage Systems [J]. Computer Science, 2019, 46(8): 35-41.
[8] GENG Hai-jun, YIN Xia. Efficient Intra-domain Routing Protection Algorithm Based on i-SPF [J]. Computer Science, 2019, 46(8): 116-120.
[9] ZHANG Yan-hong, ZHANG Chun-guang, ZHOU Xiang-zhen, WANG Yi-ou. Diverse Video Recommender Algorithm Based on Multi-property Fuzzy Aggregate of Items [J]. Computer Science, 2019, 46(8): 78-83.
[10] XIA Nu-nu, YANG Jin-ji, ZHAO Gan-sen, MO Xiao-shan. Formal Verification of Cloud-aided Lightweight Certificateless Authentication Protocol Based on Probabilistic Model [J]. Computer Science, 2019, 46(8): 206-211.
[11] CHENG Zhi-hao, PAN Xiang, ZHENG He-rong. Consistent Correspondence of 3D Dynamic Surface Based on Space-Time Constraints [J]. Computer Science, 2019, 46(8): 303-309.
[12] GENG Hai-jun,ZHANG Shuang,YIN Xia. Overview of Routing Availability in Intra-domain Routing Networks [J]. Computer Science, 2019, 46(7): 1-6.
[13] ZHANG Na,TENG Sai-na,WU Biao,BAO Xiao-an. Test Case Generation Method Based on Particle Swarm Optimization Algorithm [J]. Computer Science, 2019, 46(7): 146-150.
[14] SONG Xin,ZHU Zong-liang,GAO Yin-ping,CHANG Dao-fang. Vessel AIS Trajectory Online Compression Algorithm Combining Dynamic Thresholding and Global Optimization [J]. Computer Science, 2019, 46(7): 333-338.
[15] ZHANG Yu-qian,GU Dong-yun. Review of Computer Aided Diagnosis for Parkinson’s Tremor and Essential Tremor [J]. Computer Science, 2019, 46(7): 22-29.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .