Paper Title:
Technologies Analysis of Connect6 Computer Game
  Abstract

Connect6 is an emerging chess game in recent years. It evolves from Renju or Go-Moku. Because of large board, the search space and the state space are very large and the efficiency of searching algorithm is higher than Renju or Go-Moku’s. This paper mainly introduces key technologies of Connect6, such as board representation, move generation, searching technology and evaluation function, etc. Machine learning is used in the Connect6 computer game program. Hot topics and tasks are also proposed in the end.

  Info
Periodical
Advanced Materials Research (Volumes 171-172)
Edited by
Zhihua Xu, Gang Shen and Sally Lin
Pages
679-682
DOI
10.4028/www.scientific.net/AMR.171-172.679
Citation
Z. H. Qiao, M. Yang, Z. J. Wang, "Technologies Analysis of Connect6 Computer Game", Advanced Materials Research, Vols. 171-172, pp. 679-682, 2011
Online since
December 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Zheng Hong Xiao, Zhi Gang Chen, Xiao Heng Deng
Chapter 7: Computer Application in Design and Manufacturing (1)
Abstract:Based on the principle that the same class is adjacent, an anomaly intrusion detection method based on K-means and Support Vector Machine...
3745
Authors: Hai Jun Chen, Xi Juan Lou, Jie Liu
Chapter 8: Signal Processing
Abstract:In this paper, we present two methods to estimate the parameters of the GM (1,1)model under. The criterion of the minimization of mean...
1447
Authors: Qiu Hong Huang, De Xin Cao
Chapter 5: Information Processing and Computational Science
Abstract:A numerical method is proposed for solving a sort of constrained continuous minimax problem, in which both the objective function and the...
1011
Authors: Jian Fang, Jian Chi, Hong Yi Jian
Chapter 4: Computation Methods and Algorithms for Modeling, Simulation and Optimization, Data Mining and Data Processing
Abstract:In this paper, we propose an improved alpha-beta search algorithm, named trappy alpha-beta (simply), for game-tree in order to identify and...
1621
Authors: Wen Fen Liu, Shu Wei Zhang
Chapter 9: Information Technologies, WEB and Networks Engineering, Information Security and Software Application
Abstract:Network security risk assessment is an important means of acquiring and mastering the current and future state of network, which is of great...
5893