Improving Sluggo through Hashing and Sub-branching 7.3 Adding Storage Techniques to the Hash Scheme to Make Sluggo Play Faster... 38 Appendix A: Induction Proof of (1-x) List of Figures List of Tables Title Improving Sluggo through Hashing and Sub-branching
نویسنده
چکیده
Go, a board game which originated from China, is now very popular in east Asia and gaining its popularity throughout the rest of the world. Due to its large board size (19×19) and complex life-and-death analysis, computer Go is still one of the toughest artificial intelligence problems faced by computer scientists. Even though it has been studied for more than 20 years, computer Go programs still remain at a very low level compared to human players. The SlugGo group at the University of California at Santa Cruz has been working on this problem. Based on GNU Go, the best open source program, a full-board lookahead scheme which simulates the strategy of human players has been implemented to improve the performance of GNU Go. The enhanced GNU Go is called SlugGo. In order to get better performance, SlugGo analyzes several choices provided by GNU Go. To find the best choice from the candidates, SlugGo looks ahead, finding possible responding moves to these choices, until reaching a predetermined depth. By applying this lookahead scheme, SlugGo can play better than GNU Go. In this thesis, two techniques, hashing and sub-branching, are used to further enhance SlugGo. To reduce the time, the hashing technique stores the already calculated board positions and applies them to later calculations. An overall of about 10% timing performance gain is achieved. The sub-branching technique, rather than branching at the top only, branches to the maximal depth in the game tree allowed by the available computing resources. It is expected that sub-branching can make SlugGo play stronger. However, the preliminary results in this thesis show that further research is needed to improve this scheme.
منابع مشابه
Image authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملCompressed Image Hashing using Minimum Magnitude CSLBP
Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...
متن کاملInvestigating the Use of Model-based Method for Improving the Quality of Natural Language Requirements: a Controlled Empirical Study
.................................................................................................................................. iii ACKNOWLEDGEMENTS ........................................................................................................... iv LIST OF TABLES ..........................................................................................................................
متن کاملAn Animated Guide © : Speed Merges : SAS V 9 . 1 Hashing
Hashing is one of the fastest table lookup techniques, not just in SAS®, but in any programming language. Figure 1 illustrates the concept of a table lookup and the speed advantage of SAS V9 Hashing over a format table lookup. If a programmer needs to select, from a large file, all subjects that are in a small file, hashing will likely save disk space and time. Hashing should be part of the too...
متن کاملA New Object Detection Technique Based on Geometric Hashing
This paper describes the modifications of Geometric Hashing pattern recognition scheme to fulfill the requirements of real-time industrial applications in recognizing general shapes with large numbers of feature points. The scheme is robust to variety of object transformations and partial occlusion. By decomposing the pattern into sub-patterns, using a plurality of hash tables to record the sub...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005