IPAS icon indicating copy to clipboard operation
IPAS copied to clipboard

Simulate shield destruction

Open tonyndory opened this issue 11 years ago • 11 comments

When attacking a portal in game, there is a chance of destroying the shields with each XMP used. Is it possible to incorporate this into the simulator? Testing would need to be done to discover the percentage chance bursters have for destroying shields, but this would be incredibly useful.

tonyndory avatar Jun 19 '13 15:06 tonyndory

Gathering data like hell to find out what is the logic behind...

xosofox avatar Jun 20 '13 07:06 xosofox

May I assist? It feels like a 10% chance with L6s from the edge. On Jun 20, 2013 3:27 AM, "Peter Dietrich" [email protected] wrote:

Gathering data like hell to find out what is the logic behind...

— Reply to this email directly or view it on GitHubhttps://github.com/Xosofox/IPAS/issues/33#issuecomment-19734911 .

tonyndory avatar Jun 20 '13 12:06 tonyndory

"It feels like" is unfortunately not really enough. I need to find a way to really graph it and deduce a percentage...

2013/6/20 tonyndory [email protected]

May I assist? It feels like a 10% chance with L6s from the edge. On Jun 20, 2013 3:27 AM, "Peter Dietrich" [email protected] wrote:

Gathering data like hell to find out what is the logic behind...

— Reply to this email directly or view it on GitHub< https://github.com/Xosofox/IPAS/issues/33#issuecomment-19734911> .

— Reply to this email directly or view it on GitHubhttps://github.com/Xosofox/IPAS/issues/33#issuecomment-19750073 .

xosofox avatar Jun 26 '13 11:06 xosofox

I will try to record some data. On Jun 26, 2013 7:25 AM, "Peter Dietrich" [email protected] wrote:

"It feels like" is unfortunately not really enough. I need to find a way to really graph it and deduce a percentage...

2013/6/20 tonyndory [email protected]

May I assist? It feels like a 10% chance with L6s from the edge. On Jun 20, 2013 3:27 AM, "Peter Dietrich" [email protected] wrote:

Gathering data like hell to find out what is the logic behind...

— Reply to this email directly or view it on GitHub< https://github.com/Xosofox/IPAS/issues/33#issuecomment-19734911> .

— Reply to this email directly or view it on GitHub< https://github.com/Xosofox/IPAS/issues/33#issuecomment-19750073> .

— Reply to this email directly or view it on GitHubhttps://github.com/Xosofox/IPAS/issues/33#issuecomment-20040634 .

tonyndory avatar Jun 26 '13 14:06 tonyndory

Any progress on data collection for XMPs and US?

Hackswell avatar Apr 01 '15 13:04 Hackswell

No, I have basically been using my subjective experience as my guide. On Apr 1, 2015 9:53 AM, "Sir Woody Hackswell" [email protected] wrote:

Any progress on data collection for XMPs and US?

— Reply to this email directly or view it on GitHub https://github.com/Xosofox/IPAS/issues/33#issuecomment-88488115.

tonyndory avatar Apr 01 '15 15:04 tonyndory

Xosofox, how does one get accurate numbers in order to help you with this?

Hackswell avatar Apr 01 '15 16:04 Hackswell

The only "reliable" way is to intercept the traffic between client and server and store and then evaluate the results - which of course nobody would do as this most likely violates the ToS

2015-04-01 19:00 GMT+02:00 Sir Woody Hackswell [email protected]:

Xosofox, how does one get accurate numbers in order to help you with this?

— Reply to this email directly or view it on GitHub https://github.com/Xosofox/IPAS/issues/33#issuecomment-88545684.

xosofox avatar Jun 09 '15 19:06 xosofox

It's really not that hard to do - configure your Android device to talk to a common SSL MITM proxy like Charles, and you can spy on the client/server communication. It'll somewhat increase your server lag, but otherwise have no negative effects.

I'm not sure it would violate the ToS - at least reading it, I cannot see any paragraph it would clearly violate, but IANAL. It doesn't seem like the needed information is within the definition of "Content", but if it is then you would run afoul of paragraph 2(d).

Paragraph 2(c) is hard to say either way, as it is phrased so broadly one could argue Project Loon is the only compliant way to use Ingress, since all the cell networks involve access through technology not provided by Google. I don't see how using a proxy server you own is any worse than using your own wifi hotspot.

lablua avatar Jun 09 '15 19:06 lablua

It's really not that hard to do I never said it would be. Collecting the data is not the problem if you have time and determination.

But reverse-engineering the algorithm that calculates the shield-pop-probability is another story

xosofox avatar Jun 09 '15 19:06 xosofox

Hard to know how tough that is until you have the data, and run it through some statistical analysis. Unless someone has tried and failed, we just don't know. If they have, I'd like to see the anonymized data published so more people can try to analyze it.

It could be a simple probability calculated in an obvious manner from the "stickiness" property of a shield, or it could be something far more complex like shields accumulating damage over the lifetime the mod is on the portal. If it's the former, a few hundred samples per weapon and shield combination could be enough to figure it out. If it's the latter, it might require controlled experiments with viruses and multiple agents firing to get the necessary data.

P.S. I did try collecting the data myself manually for awhile, but I discovered I'm a little too lazy to write it down often enough to be useful, and then they changed the stickiness rules in the middle of my data collection, so I gave up.

lablua avatar Jun 09 '15 20:06 lablua