Downloads: 7 | Views: 414 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper | Computer Science & Engineering | India | Volume 11 Issue 12, December 2022 | Popularity: 5.4 / 10
Minimax Algorithm and Alpha-Beta Pruning for Game Development Using Blockchain
Sumit S Shevtekar, Rutuja Kulkarni
Abstract: Blockchain has promise as an approach to developing various systems, games for a number of applications, domains. In Blockchain technology systems, data and authority can be distributed; all transactions are transparent and reliable. Some of the key advantages of Blockchain for cybersecurity applications are in conflict with privacy properties for game development. The platforms that are now accessible use centralized technologies. They lack transparency, scalability, and security. All those problems must be solved. Decentralization can help to tackle, secured these problems. Decentralization is provided through blockchain. In any search algorithm, searching best possible solution from the pool of every possibility known can lead to the construction of the whole state search space popularly called as minimax algorithm. The recursive backtracking algorithm known as Minimax is used to select the next action in a game of strategy for two players; the blockchain technology helps to improve security. The algorithm works well because it anticipates that your adversary will play well as well. However, as the tree's depth increases, we observe that minimax frequently investigates repetitive and unlikely situations. We'll also look at the Alpha-Beta Pruning approach, which serves as a minimax extension and stops us from looking at states that won't be chosen. We will also look into several traditional methods for solving two-player games, including adversarial search and other methods based on machine learning.
Keywords: Blockchain, Decentralized Systems, Minimax algorithm, Alpha-beta pruning, Two-Player games, Blockchain, Smart-contracts, Ethereum, Game Theory, Game Tree Search Algorithms
Edition: Volume 11 Issue 12, December 2022
Pages: 21 - 24
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 114
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2832 - 2834A Novel Game-Theoretic Method for Detecting Malware in Delay-Tolerant Networks
Jayalekshmi. S, Jebakumari. M
Downloads: 115
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 1951 - 1957Energy Efficient Cluster Based Technique for Resource Allocation in MANET
R. Preethi, Dr. R. Anbuselvi
Downloads: 116
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1955 - 1959Cloud Partitioning Based Load Balancing Model for Performance Enhancement in Public Cloud
Neha Gohar Khan, Prof. V. B. Bhagat Mate
Downloads: 123
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1999 - 2003Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory
Suchita S. Potdar, Dr. Mallikarjun
Downloads: 126
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1427 - 1431Real Time Game Theoretic Load Balancing With Cluster Based Load Classification for Private and Public Virtual Cloud
Srikant Bagewadi, Rekha Patil