Building and using a model of insurgent behavior to avoid IEDS in an online video game

dc.contributor.authorRogers-Ostema, Patrick J.
dc.date.accessioned2010-05-10T17:28:52Z
dc.date.available2010-05-10T17:28:52Z
dc.date.graduationmonthMay
dc.date.issued2010-05-10T17:28:52Z
dc.date.published2010
dc.description.abstractIEDs are a prevailing threat to today’s armed forces and civilians. With some IEDs being well concealed and planted sometimes days or weeks prior to detonation, it is extremely difficult to detect their presence. Remotely triggered IEDs do offer an indirect method of detection as an insurgent must monitor the IED’s kill zone and detonate the device once the intended target is in range. Within the safe confines of a video game we can model the behavior of an insurgent using remotely triggered IEDs. Specifically, we can build a model of the sequence of actions an insurgent goes through immediately prior to detonating an IED. Using this insurgent model, we can recognize the behavior an insurgent would exhibit before detonating an IED. Once the danger level reaches a certain threshold, we can then react by changing our original course to a new one that does not cross the area we believe an IED to be in. We can show proof of concept of this by having human players take on the role of an insurgent in an online video game in which they try to destroy an autonomous agent. Successful tactics used by the autonomous agent should then be good tactics in the real world as well.
dc.description.advisorDavid A. Gustafson
dc.description.degreeMaster of Science
dc.description.departmentDepartment of Computing and Information Sciences
dc.description.levelMasters
dc.identifier.urihttp://hdl.handle.net/2097/4112
dc.language.isoen_US
dc.publisherKansas State University
dc.rights© the author. This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subjectLearning
dc.subjectFuzzy logic
dc.subjectAdaptive strategies
dc.subjectHuman behavior analysis
dc.subjectVirtual world
dc.subjectOnline game
dc.subject.umiComputer Science (0984)
dc.titleBuilding and using a model of insurgent behavior to avoid IEDS in an online video game
dc.typeThesis

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
PatrickRogers-Ostema2010.pdf
Size:
696.41 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.7 KB
Format:
Item-specific license agreed upon to submission
Description: