Journal Home > Volume 25 , Issue 6

In recent years, e-sports has rapidly developed, and the industry has produced large amounts of data with specifications, and these data are easily to be obtained. Due to the above characteristics, data mining and deep learning methods can be used to guide players and develop appropriate strategies to win games. As one of the world’s most famous e-sports events, Dota2 has a large audience base and a good game system. A victory in a game is often associated with a hero’s match, and players are often unable to pick the best lineup to compete. To solve this problem, in this paper, we present an improved bidirectional Long Short-Term Memory (LSTM) neural network model for Dota2 lineup recommendations. The model uses the Continuous Bag Of Words (CBOW) model in the Word2vec model to generate hero vectors. The CBOW model can predict the context of a word in a sentence. Accordingly, a word is transformed into a hero, a sentence into a lineup, and a word vector into a hero vector, the model applied in this article recommends the last hero according to the first four heroes selected first, thereby solving a series of recommendation problems.


menu
Abstract
Full text
Outline
About this article

Improved Dota2 Lineup Recommendation Model Based on a Bidirectional LSTM

Show Author's information Lei ZhangChenbo XuYihua GaoYi Han( )Xiaojiang DuZhihong Tian( )
Henan Key Laboratory of Big Data Analysis and Processing, Kaifeng 457004, China.
Institute of Data and Knowledge Engineering, Henan University, Kaifeng 475004, China
National Internet Emergency Center, Zhengzhou 450000, China.
Department of Computer and Information Sciences, Temple University, Philadelphia, PA 19122-6008, USA.
Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China.

Abstract

In recent years, e-sports has rapidly developed, and the industry has produced large amounts of data with specifications, and these data are easily to be obtained. Due to the above characteristics, data mining and deep learning methods can be used to guide players and develop appropriate strategies to win games. As one of the world’s most famous e-sports events, Dota2 has a large audience base and a good game system. A victory in a game is often associated with a hero’s match, and players are often unable to pick the best lineup to compete. To solve this problem, in this paper, we present an improved bidirectional Long Short-Term Memory (LSTM) neural network model for Dota2 lineup recommendations. The model uses the Continuous Bag Of Words (CBOW) model in the Word2vec model to generate hero vectors. The CBOW model can predict the context of a word in a sentence. Accordingly, a word is transformed into a hero, a sentence into a lineup, and a word vector into a hero vector, the model applied in this article recommends the last hero according to the first four heroes selected first, thereby solving a series of recommendation problems.

Keywords: Long Short-Term Memory (LSTM), Word2vec, mutiplayer online battle arena games, Continuous Bag Of Words (CBOW) model

References(30)

[1]
Z. H. Tian, X. S. Gao, S. Su, J. Qiu, X. J. Du, and M. Guizani, Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory, IEEE Transactions on Vehicular Technology, vol. 68, no. 6, pp. 5971-5980, 2019.
[2]
Z. H. Tian, S. Su, W. Shi, X. J. Du, M. Guizani, and X. Yu, A data-driven method for future internet route decision modeling, Future Generation Computer Systems, vol. 95, pp. 212-220, 2019.
[3]
Y. Xiao, X. J. Du, J. Y. Zhang, and S. Guizani, Internet protocol television (IPTV): The killer application for the next-generation internet, IEEE Communications Magazine, vol. 45, no. 11, pp. 126-134, 2007.
[4]
X. J. Du, Y. Xiao, M. Guizani, and H. H. Chen, An effective key management scheme for heterogeneous sensor networks, Ad Hoc Networks, vol. 5, no. 1, pp. 24-34, 2007.
[5]
X. J. Du and H. H. Chen, Security in wireless sensor networks, IEEE Wireless Communications, vol. 15, no. 4, pp. 60-66, 2008.
[6]
Z. H. Tian, M. H. Li, M. K. Qiu, Y. B. Sun, and S. Su, Block-DEF: A secure digital evidence framework using blockchain, Information Sciences, vol. 491, pp. 151-165, 2019.
[7]
Q. F. Tan, Y. Gao, J. Q. Shi, X. B. Wang, B. X. Fang, and Z. H. Tian, Toward a comprehensive insight into the eclipse attacks of tor hidden services, IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1584-1593, 2019.
[8]
Y. Xiao, V. K. Rayi, B. Sun, X. J. Du, F. Hu, and M. Galloway, A survey of key management schemes in wireless sensor networks, Computer Communications, vol. 30, no. 11–12, pp. 2314-2341, 2007.
[9]
X. J. Du, M. Guizani, Y. Xiao, and H. H. Chen, Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Transactions on Wireless Communications, vol. 8, no. 3, pp. 1223-1229, 2009.
[10]
Z. H. Tian, W. Shi, Y. H. Wang, C. S. Zhu, X. J. Du, S. Su, Y. B. Sun, and N. Guizani, Real-time lateral movement detection based on evidence reasoning network for edge computing environment, IEEE Transactions on Industrial Informatics, vol. 15, pp. 7, pp. 4285-4294, 2019.
[11]
Z. H. Tian, Y. Cui, L. An, S. Su, X. X. Yin, L. H. Yin, and X. Cui, A real-time correlation of host-level events in cyber range service for smart campus, IEEE Access, vol. 6, pp. 35355-35364, 2018.
[12]
A. Agarwala and M. Pearce, Learning Dota2 Team Compositions. Stanford, CA, USA: Stanford University, 2014.
[13]
K. Conley and D. Perry, How does he saw me? A recommendation engine for picking heroes in dota 2, http://cs229.stanford.edu.cn/projects2013.html, 2013.
[14]
P. S. Cempaka and J. Haryatmoko, Hyperreality among defense of the ancients 2’s players, Jurnal Komunikasi Indonesia, vol. VII, no. 3, pp. 225-234, 2018.
[15]
S. Mukherjee, Y. Huang, J. Neidhardt, B. Uzzi, and N. Contractor, Prior shared success predicts victory in team competitions, Nature Human Behaviour, vol. 3, no. 1, pp. 74-81, 2019.
[16]
A. Koulouri, F. Kuonen, and O. Gaide, Artificial intelligence and the skin specialist, Revue Medicale Suisse, vol. 15, no. 644, pp. 687-691, 2019.
[17]
Pijie Feifei, DotA2 five games exclusive hero, E-sports, no. 16, pp. 14-15, 2014.
[18]
N. Z. Wang, L. Li, L. L. Xiao, G. C. Yang, and Y. Zhou, Outcome prediction of DOTA2 using machine learning methods, in Proc. 2018 Int. Conf. Mathematics and Artificial Intelligence, Chengdu, China, 2018, pp. 61-67.
DOI
[19]
K. X. Wang and W. Q. Shang, Outcome prediction of DOTA2 based on Naïve Bayes classifier, presented at 2017 IEEE/ACIS 16th Int. Conf. Computer and Information Science (ICIS), Wuhan, China, 2017, pp. 591-593.
DOI
[20]
A. H. Mirza and S. Cosan, Computer network intrusion detection using sequential LSTM neural networks autoencoders, presented at 2018 26th Signal Processing and Communications Applications Conf. (SIU), Izmir, Turkey, 2018, pp. 1-4.
DOI
[21]
X. Chen, J. Y. Yu, and Y. Y. Zhao, Research on text processing model based on CNN and B-LSTM, (in Chinese), Journal of Light Industry, vol. 33, no. 5, pp. 103-108, 2018.
[22]
Z. H. Tian, C. C. Luo, J. Qiu, X. J. Du, and M. Guizani, A distributed deep learning system for web attack detection on edge devices, IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1963-1971, 2020.
[23]
Z. H. Tian, X. S. Gao, S. Su, and J. Qiu, Vcash: A novel reputation framework for identifying denial of traffic service in internet of connected vehicles, IEEE Internet of Things Journal, .
[24]
J. Qiu, L. Du, D. W. Zhang, S. Su, and Z. H. Tian, Nei-TTE: Intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city, IEEE Transactions on Industrial Informatics, vol. 16, no. 4, pp. 2659-2666, 2020.
[25]
T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, Distributed representations of words and phrases and their compositionality, presented at Advances in Neural Information Processing Systems, Lake Tahoe, NV, USA, 2013, pp. 3111-3119.
[26]
R. Collobert, J. Weston, L. Bottou, M. Karlen, K. Kavukcuoglu, and P. Kuksa, Natural language processing (almost) from scratch, Journal of Machine Learning Research, vol. 12, pp. 2493-2537, 2011.
[27]
B. Perozzi, R. Al-Rfou, and S. Skiena, DeepWalk: Online learning of social representations, in Proc. 20th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, New York, NY, USA, 2014, pp. 701-710.
DOI
[28]
[29]
[30]
OpenDota, https://www.opendota.com/, 2019.
Publication history
Copyright
Acknowledgements
Rights and permissions

Publication history

Received: 02 November 2019
Accepted: 04 November 2019
Published: 07 May 2020
Issue date: December 2020

Copyright

© The author(s) 2020

Acknowledgements

This study was partly supported by the Guangdong Province Key Research and Development Plan (No. 2019B010137004), the National Natural Science Foundation of China (Nos. 61402149 and 61871140), the Scientific and Technological Project of Henan Province (Nos. 182102110065, 182102210238, and 202102310340), the Natural Science Foundation of Henan Educational Committee (No. 17B520006), Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme (2019), and Foundation of University Young Key Teacher of Henan Province (No. 2019GGJS040).

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return