AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (1.1 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Improved Dota2 Lineup Recommendation Model Based on a Bidirectional LSTM

Henan Key Laboratory of Big Data Analysis and Processing, Kaifeng 457004, China.
Institute of Data and Knowledge Engineering, Henan University, Kaifeng 475004, China
National Internet Emergency Center, Zhengzhou 450000, China.
Department of Computer and Information Sciences, Temple University, Philadelphia, PA 19122-6008, USA.
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China.
Show Author Information

Abstract

In recent years, e-sports has rapidly developed, and the industry has produced large amounts of data with specifications, and these data are easily to be obtained. Due to the above characteristics, data mining and deep learning methods can be used to guide players and develop appropriate strategies to win games. As one of the world’s most famous e-sports events, Dota2 has a large audience base and a good game system. A victory in a game is often associated with a hero’s match, and players are often unable to pick the best lineup to compete. To solve this problem, in this paper, we present an improved bidirectional Long Short-Term Memory (LSTM) neural network model for Dota2 lineup recommendations. The model uses the Continuous Bag Of Words (CBOW) model in the Word2vec model to generate hero vectors. The CBOW model can predict the context of a word in a sentence. Accordingly, a word is transformed into a hero, a sentence into a lineup, and a word vector into a hero vector, the model applied in this article recommends the last hero according to the first four heroes selected first, thereby solving a series of recommendation problems.

References

[1]
Z. H. Tian, X. S. Gao, S. Su, J. Qiu, X. J. Du, and M. Guizani, Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory, IEEE Transactions on Vehicular Technology, vol. 68, no. 6, pp. 5971-5980, 2019.
[2]
Z. H. Tian, S. Su, W. Shi, X. J. Du, M. Guizani, and X. Yu, A data-driven method for future internet route decision modeling, Future Generation Computer Systems, vol. 95, pp. 212-220, 2019.
[3]
Y. Xiao, X. J. Du, J. Y. Zhang, and S. Guizani, Internet protocol television (IPTV): The killer application for the next-generation internet, IEEE Communications Magazine, vol. 45, no. 11, pp. 126-134, 2007.
[4]
X. J. Du, Y. Xiao, M. Guizani, and H. H. Chen, An effective key management scheme for heterogeneous sensor networks, Ad Hoc Networks, vol. 5, no. 1, pp. 24-34, 2007.
[5]
X. J. Du and H. H. Chen, Security in wireless sensor networks, IEEE Wireless Communications, vol. 15, no. 4, pp. 60-66, 2008.
[6]
Z. H. Tian, M. H. Li, M. K. Qiu, Y. B. Sun, and S. Su, Block-DEF: A secure digital evidence framework using blockchain, Information Sciences, vol. 491, pp. 151-165, 2019.
[7]
Q. F. Tan, Y. Gao, J. Q. Shi, X. B. Wang, B. X. Fang, and Z. H. Tian, Toward a comprehensive insight into the eclipse attacks of tor hidden services, IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1584-1593, 2019.
[8]
Y. Xiao, V. K. Rayi, B. Sun, X. J. Du, F. Hu, and M. Galloway, A survey of key management schemes in wireless sensor networks, Computer Communications, vol. 30, no. 11–12, pp. 2314-2341, 2007.
[9]
X. J. Du, M. Guizani, Y. Xiao, and H. H. Chen, Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1223-1229, 2009.
[10]
Z. H. Tian, W. Shi, Y. H. Wang, C. S. Zhu, X. J. Du, S. Su, Y. B. Sun, and N. Guizani, Real-time lateral movement detection based on evidence reasoning network for edge computing environment, IEEE Transactions on Industrial Informatics, vol. 15, pp. 7, pp. 4285-4294, 2019.
[11]
Z. H. Tian, Y. Cui, L. An, S. Su, X. X. Yin, L. H. Yin, and X. Cui, A real-time correlation of host-level events in cyber range service for smart campus, IEEE Access, vol. 6, pp. 35355-35364, 2018.
[12]
A. Agarwala and M. Pearce, Learning Dota2 Team Compositions. Stanford, CA, USA: Stanford University, 2014.
[13]
K. Conley and D. Perry, How does he saw me? A recommendation engine for picking heroes in dota 2, http://cs229.stanford.edu.cn/projects2013.html, 2013.
[14]
P. S. Cempaka and J. Haryatmoko, Hyperreality among defense of the ancients 2’s players, Jurnal Komunikasi Indonesia, vol. VII, no. 3, pp. 225-234, 2018.
[15]
S. Mukherjee, Y. Huang, J. Neidhardt, B. Uzzi, and N. Contractor, Prior shared success predicts victory in team competitions, Nature Human Behaviour, vol. 3, no. 1, pp. 74-81, 2019.
[16]
A. Koulouri, F. Kuonen, and O. Gaide, Artificial intelligence and the skin specialist, Revue Medicale Suisse, vol. 15, no. 644, pp. 687-691, 2019.
[17]
Pijie Feifei, DotA2 five games exclusive hero, E-sports, no. 16, pp. 14-15, 2014.
[18]
N. Z. Wang, L. Li, L. L. Xiao, G. C. Yang, and Y. Zhou, Outcome prediction of DOTA2 using machine learning methods, in Proc. 2018 Int. Conf. Mathematics and Artificial Intelligence, Chengdu, China, 2018, pp. 61-67.
[19]
K. X. Wang and W. Q. Shang, Outcome prediction of DOTA2 based on Naïve Bayes classifier, presented at 2017 IEEE/ACIS 16th Int. Conf. Computer and Information Science (ICIS), Wuhan, China, 2017, pp. 591-593.
[20]
A. H. Mirza and S. Cosan, Computer network intrusion detection using sequential LSTM neural networks autoencoders, presented at 2018 26th Signal Processing and Communications Applications Conf. (SIU), Izmir, Turkey, 2018, pp. 1-4.
[21]
X. Chen, J. Y. Yu, and Y. Y. Zhao, Research on text processing model based on CNN and B-LSTM, (in Chinese), Journal of Light Industry, vol. 33, no. 5, pp. 103-108, 2018.
[22]
Z. H. Tian, C. C. Luo, J. Qiu, X. J. Du, and M. Guizani, A distributed deep learning system for web attack detection on edge devices, IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1963-1971, 2020.
[23]
Z. H. Tian, X. S. Gao, S. Su, and J. Qiu, Vcash: A novel reputation framework for identifying denial of traffic service in internet of connected vehicles, IEEE Internet of Things Journal, .
[24]
J. Qiu, L. Du, D. W. Zhang, S. Su, and Z. H. Tian, Nei-TTE: Intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city, IEEE Transactions on Industrial Informatics, vol. 16, no. 4, pp. 2659-2666, 2020.
[25]
T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, Distributed representations of words and phrases and their compositionality, presented at Advances in Neural Information Processing Systems, Lake Tahoe, NV, USA, 2013, pp. 3111-3119.
[26]
R. Collobert, J. Weston, L. Bottou, M. Karlen, K. Kavukcuoglu, and P. Kuksa, Natural language processing (almost) from scratch, Journal of Machine Learning Research, vol. 12, pp. 2493-2537, 2011.
[27]
B. Perozzi, R. Al-Rfou, and S. Skiena, DeepWalk: Online learning of social representations, in Proc. 20th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, New York, NY, USA, 2014, pp. 701-710.
[29]
[30]
OpenDota, https://www.opendota.com/, 2019.
Tsinghua Science and Technology
Pages 712-720
Cite this article:
Zhang L, Xu C, Gao Y, et al. Improved Dota2 Lineup Recommendation Model Based on a Bidirectional LSTM. Tsinghua Science and Technology, 2020, 25(6): 712-720. https://doi.org/10.26599/TST.2019.9010065

926

Views

78

Downloads

61

Crossref

N/A

Web of Science

66

Scopus

4

CSCD

Altmetrics

Received: 02 November 2019
Accepted: 04 November 2019
Published: 07 May 2020
© The author(s) 2020

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return