xosofox / IPAS

Ingress Portal Attack Simulator
30 stars 5 forks source link

Simulate shield destruction #33

Open tonyndory opened 11 years ago

tonyndory commented 11 years ago

When attacking a portal in game, there is a chance of destroying the shields with each XMP used. Is it possible to incorporate this into the simulator? Testing would need to be done to discover the percentage chance bursters have for destroying shields, but this would be incredibly useful.

xosofox commented 11 years ago

Gathering data like hell to find out what is the logic behind...

tonyndory commented 11 years ago

May I assist? It feels like a 10% chance with L6s from the edge. On Jun 20, 2013 3:27 AM, "Peter Dietrich" notifications@github.com wrote:

Gathering data like hell to find out what is the logic behind...

— Reply to this email directly or view it on GitHubhttps://github.com/Xosofox/IPAS/issues/33#issuecomment-19734911 .

xosofox commented 11 years ago

"It feels like" is unfortunately not really enough. I need to find a way to really graph it and deduce a percentage...

2013/6/20 tonyndory notifications@github.com

May I assist? It feels like a 10% chance with L6s from the edge. On Jun 20, 2013 3:27 AM, "Peter Dietrich" notifications@github.com wrote:

Gathering data like hell to find out what is the logic behind...

— Reply to this email directly or view it on GitHub< https://github.com/Xosofox/IPAS/issues/33#issuecomment-19734911> .

— Reply to this email directly or view it on GitHubhttps://github.com/Xosofox/IPAS/issues/33#issuecomment-19750073 .

tonyndory commented 11 years ago

I will try to record some data. On Jun 26, 2013 7:25 AM, "Peter Dietrich" notifications@github.com wrote:

"It feels like" is unfortunately not really enough. I need to find a way to really graph it and deduce a percentage...

2013/6/20 tonyndory notifications@github.com

May I assist? It feels like a 10% chance with L6s from the edge. On Jun 20, 2013 3:27 AM, "Peter Dietrich" notifications@github.com wrote:

Gathering data like hell to find out what is the logic behind...

— Reply to this email directly or view it on GitHub< https://github.com/Xosofox/IPAS/issues/33#issuecomment-19734911> .

— Reply to this email directly or view it on GitHub< https://github.com/Xosofox/IPAS/issues/33#issuecomment-19750073> .

— Reply to this email directly or view it on GitHubhttps://github.com/Xosofox/IPAS/issues/33#issuecomment-20040634 .

Hackswell commented 9 years ago

Any progress on data collection for XMPs and US?

tonyndory commented 9 years ago

No, I have basically been using my subjective experience as my guide. On Apr 1, 2015 9:53 AM, "Sir Woody Hackswell" notifications@github.com wrote:

Any progress on data collection for XMPs and US?

— Reply to this email directly or view it on GitHub https://github.com/Xosofox/IPAS/issues/33#issuecomment-88488115.

Hackswell commented 9 years ago

Xosofox, how does one get accurate numbers in order to help you with this?

xosofox commented 9 years ago

The only "reliable" way is to intercept the traffic between client and server and store and then evaluate the results - which of course nobody would do as this most likely violates the ToS

2015-04-01 19:00 GMT+02:00 Sir Woody Hackswell notifications@github.com:

Xosofox, how does one get accurate numbers in order to help you with this?

— Reply to this email directly or view it on GitHub https://github.com/Xosofox/IPAS/issues/33#issuecomment-88545684.

lablua commented 9 years ago

It's really not that hard to do - configure your Android device to talk to a common SSL MITM proxy like Charles, and you can spy on the client/server communication. It'll somewhat increase your server lag, but otherwise have no negative effects.

I'm not sure it would violate the ToS - at least reading it, I cannot see any paragraph it would clearly violate, but IANAL. It doesn't seem like the needed information is within the definition of "Content", but if it is then you would run afoul of paragraph 2(d).

Paragraph 2(c) is hard to say either way, as it is phrased so broadly one could argue Project Loon is the only compliant way to use Ingress, since all the cell networks involve access through technology not provided by Google. I don't see how using a proxy server you own is any worse than using your own wifi hotspot.

xosofox commented 9 years ago

It's really not that hard to do I never said it would be. Collecting the data is not the problem if you have time and determination.

But reverse-engineering the algorithm that calculates the shield-pop-probability is another story

lablua commented 9 years ago

Hard to know how tough that is until you have the data, and run it through some statistical analysis. Unless someone has tried and failed, we just don't know. If they have, I'd like to see the anonymized data published so more people can try to analyze it.

It could be a simple probability calculated in an obvious manner from the "stickiness" property of a shield, or it could be something far more complex like shields accumulating damage over the lifetime the mod is on the portal. If it's the former, a few hundred samples per weapon and shield combination could be enough to figure it out. If it's the latter, it might require controlled experiments with viruses and multiple agents firing to get the necessary data.

P.S. I did try collecting the data myself manually for awhile, but I discovered I'm a little too lazy to write it down often enough to be useful, and then they changed the stickiness rules in the middle of my data collection, so I gave up.