AI soccer: covering an opponent not in possession of the ball

Bachelor Thesis (2021)
Author(s)

T.S. van den Hurk (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

Rafael Bidarra – Mentor (TU Delft - Intelligent Systems)

Kushal Prakash – Mentor (Student TU Delft)

S. Picek – Graduation committee member (TU Delft - Cyber Security)

Faculty
Electrical Engineering, Mathematics and Computer Science
Copyright
© 2021 Tobias van den Hurk
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Tobias van den Hurk
Graduation Date
01-07-2021
Awarding Institution
Delft University of Technology
Project
['CSE3000 Research Project']
Programme
['Computer Science and Engineering']
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Virtual robot soccer competitions have been rising in popularity in recent years, due to their easier accessibility than physical robot soccer. This is also the reason these virtual competitions were created. The goal is to compete in the AI world cup, one of the virtual soccer competitions. A coach-based framework has already been built, and the aim is to create strong defensive capabilities for the robot team. This paper in particular focuses on covering opponents without the ball. The marking strategy and specific opponent covering that have been devised for this are explained. Both are completely rule-based, and opponent covering has been thoroughly tested with an in-house developed batch-runner. In short, opponent covering consists of standing at the optimal position between the passer and receiver, and when the ball is passed going to the closest intercept point. This optimal position is learned with the batch-runner. Opponent covering performs well in the generated test cases. Some specific algorithms counter attacking strategies which have not been implemented yet, therefore it was not possible to evaluate those algorithms. They are theoretically optimal however.

Files

Research_paper_1.pdf
(pdf | 0.875 Mb)
License info not available