CN109718545B - Object control device and method - Google Patents

Object control device and method Download PDF

Info

Publication number
CN109718545B
CN109718545B CN201711040866.5A CN201711040866A CN109718545B CN 109718545 B CN109718545 B CN 109718545B CN 201711040866 A CN201711040866 A CN 201711040866A CN 109718545 B CN109718545 B CN 109718545B
Authority
CN
China
Prior art keywords
pattern
attack
matrix
objects
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711040866.5A
Other languages
Chinese (zh)
Other versions
CN109718545A (en
Inventor
宋永维
陈瑶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shanghai Co Ltd
Original Assignee
Tencent Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shanghai Co Ltd filed Critical Tencent Technology Shanghai Co Ltd
Priority to CN201711040866.5A priority Critical patent/CN109718545B/en
Priority to PCT/CN2018/112102 priority patent/WO2019085832A1/en
Publication of CN109718545A publication Critical patent/CN109718545A/en
Application granted granted Critical
Publication of CN109718545B publication Critical patent/CN109718545B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/45Controlling the progress of the video game
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/50Controlling the output signals based on the game progress
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/80Special adaptations for executing a specific game genre or game mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses an object control device and method, and belongs to the field of human-computer interaction. The device comprises: a memory, a processor, and a screen; a memory to store instructions; a processor to execute instructions to implement: displaying a matrix of a predetermined size on a user interface of a screen, each matrix element being for displaying a pattern object, the matrix including a predetermined path; receiving a pattern object exchange instruction on a screen, and exchanging positions of a first pattern object and a second pattern object; after the positions are exchanged, detecting whether a preset number of pattern objects of the same type exist in the matrix and are connected; when the pattern object exists, determining an attack range according to the positions of the connected pattern objects; detecting whether an attack object exists in an attack range; when present, the connected pattern objects are eliminated and the current life value of the attack object is subtracted by the first attack value. The problem that the misoperation rate is improved due to the fact that the pattern object is reduced is solved, and the effect of reducing the misoperation rate is achieved.

Description

Object control device and method
Technical Field
The embodiment of the application relates to the field of human-computer interaction, in particular to an object control device and method.
Background
With the development of the gaming industry, there is an increasing number of game types. Among them, the tower defense type game and the sanxiao type game are two common games.
To increase the interest of the game, different types of games can be combined to achieve a new play. With reference to fig. 1, for the combination of the tower defense type game and the three-elimination type game, the game interface 10 is generally split into two parts, the upper half interface 11 displays the travel path 110, the attack object 120 and the defense object 130 in the tower defense type game, the attack object starts from the starting point 111 of the travel path and moves along the travel path 110 to the ending point 112, the defense object 130 is arranged at the ending point, the attack object 120 corresponds to the initial life value, and the defense object 130 corresponds to the initial defense value; the lower half interface 12 displays a pattern matrix of the sanxiao type game, each matrix element in the pattern matrix 140 corresponds to one pattern object 141, and the player can eliminate three or more than three identical pattern objects 141 by exchanging the positions of two adjacent pattern objects 141, and then randomly drop a new pattern object 141 to fill the blank position generated by the elimination. Subtracting the predetermined life value from the current life value of the attack object 120 while the pattern object 141 is eliminated, attacking the defense object 130 by the attack object 120 when the attack object 120 moves to the end point, subtracting the predetermined defense value from the current defense value of the defense object 130, and failing the game if the defense value of the defense object 130 falls to 0; if all the attack objects 120 are destroyed before the defense value of the defense object 130 is reduced to 0, the game is won.
Since the pattern objects in the sanxiao type game need to reach a certain number to meet the game requirements, after the game interface is split, half of the game interface is used for displaying the pattern matrix, the area occupied by the pattern matrix is reduced, the size of the pattern objects needs to be reduced in order to ensure the number of the pattern objects, and when a player moves the pattern objects, wrong pattern objects are easily triggered, so that the probability of misoperation is improved.
Disclosure of Invention
In order to solve the problem that when a tower defense type game and a sanxiao type game are combined, only half of a game interface is used for displaying a pattern object, the size of the pattern object needs to be reduced, and when a player moves the pattern object, an error pattern object is easily triggered, so that the probability of misoperation is improved, the embodiment of the application provides an object control device and an object control method. The technical scheme is as follows:
in a first aspect, there is provided an object control apparatus, the apparatus comprising: a memory, a processor, and a screen; the memory to store at least one instruction; the processor is configured to load and execute the at least one instruction to implement the following steps:
displaying a matrix with a preset size on a user interface of the screen, wherein each matrix element in the matrix is used for displaying a pattern object, the matrix further comprises a preset path for an attack object to travel, and the attack object corresponds to a preset initial life value;
receiving a pattern object exchange instruction on the screen, the pattern object exchange instruction being generated according to a sliding operation acting on adjacent first and second pattern objects;
exchanging positions of the first pattern object and the second pattern object according to the pattern object exchange instruction;
after the first pattern object and the second pattern object are exchanged, if a preset number of same pattern objects are connected, eliminating the connected pattern objects;
determining an attack range according to the positions of the connected pattern objects;
when the attack object exists in the attack range, subtracting a first attack value from the current life value of the attack object, wherein the first attack value is preset or determined according to the type of the pattern object.
In a second aspect, there is provided an object control method, the method comprising:
displaying a matrix with a preset size on a user interface, wherein each matrix element in the matrix is used for displaying a pattern object, the matrix further comprises a preset path for an attack object to travel, and the attack object corresponds to a preset initial life value;
receiving a pattern object exchange instruction generated according to a sliding operation acting on adjacent first and second pattern objects;
exchanging positions of the first pattern object and the second pattern object according to the pattern object exchange instruction;
after the first pattern object and the second pattern object are exchanged, if a preset number of same pattern objects are connected, eliminating the connected pattern objects;
determining an attack range according to the positions of the connected pattern objects;
and when the attack object exists in the attack range, subtracting a first attack value from the current life value of the attack object, wherein the first attack value is preset or determined according to the type of the pattern object.
In a third aspect, there is provided an object control apparatus, the apparatus comprising:
the system comprises a display module, a pattern object display module and a pattern object display module, wherein the display module is used for displaying a matrix with a preset size on a user interface, each matrix element in the matrix is used for displaying the pattern object, the matrix further comprises a preset path for an attack object to travel, and the attack object corresponds to a preset initial life value;
a receiving module for receiving a pattern object exchange instruction generated according to a sliding operation acting on adjacent first and second pattern objects;
an exchanging module for exchanging positions of the first pattern object and the second pattern object according to the pattern object exchanging instruction received by the receiving module;
an elimination module for eliminating the connected pattern objects when there are a predetermined number of the same pattern objects connected when the exchange module exchanges positions of the first pattern object and the second pattern object;
the determining module is used for determining an attack range according to the positions of the connected pattern objects;
and the attack module is used for subtracting a first attack value from the current life value of the attack object when the attack object exists in the attack range, wherein the first attack value is preset or determined according to the type of the pattern object.
In a fourth aspect, there is provided a computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the object control method according to the second aspect.
The technical scheme provided by the embodiment of the application can bring the following beneficial effects:
by displaying the matrix with the preset size on the user interface, wherein the matrix comprises the preset path, the attack object moves from the starting point to the end point along the preset path, so that the path in the tower defense type game is combined with the matrix in the three-elimination type game, the traveling path of the attack object can be displayed, and the matrix can be displayed on the user interface as large as possible, so that the size reduction of the pattern object is avoided, the problem that the probability of misoperation is improved due to the fact that a player mistakenly triggers the wrong pattern object when moving the pattern object is solved, and the effect of reducing the probability of misoperation on the pattern object is achieved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic illustration of a combination of a defense-tower type game and a sanxiao type game as provided in one embodiment of the present application;
FIG. 2 is a flowchart of a method of object control provided in one embodiment of the present application;
FIG. 3 is a flow chart of a method of object control provided in another embodiment of the present application;
FIG. 4 is a schematic illustration of a user interface provided by one embodiment of the present application;
FIG. 5 is a schematic view of a user interface provided by another embodiment of the present application;
FIG. 6 is a schematic illustration of a sliding operation provided by one embodiment of the present application;
FIG. 7 is a schematic illustration of a vital value of an attacking object provided by an embodiment of the present application;
FIG. 8 is a schematic diagram illustrating an attack object provided by one embodiment of the present application;
FIG. 9 is a schematic diagram of a display attack object provided by another embodiment of the present application;
FIG. 10 is a flowchart of a method of object control provided by yet another embodiment of the present application;
FIG. 11 is a schematic illustration of a user interface provided by yet another embodiment of the present application;
fig. 12 is a block diagram illustrating a structure of an object control apparatus according to an embodiment of the present application;
fig. 13 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The object control method in the embodiments of the present application is applied to a terminal including a screen, and optionally, the terminal is a smart phone, a tablet computer, a desktop computer, a portable notebook computer, or the like.
Fig. 2 is a flowchart of a method of controlling an object, which is illustrated in a terminal including a screen according to an embodiment of the present application. As shown in fig. 2, the object control method may include the steps of:
step 201, displaying a matrix with a preset size on the user interface, wherein each matrix element in the matrix corresponds to one of the pattern object and the attack object, and the matrix also comprises a preset path for the attack object to travel.
The terminal has a user interface displayed on its screen, which is divided into a matrix of predetermined sizes, such as: a rectangular user interface comprises 10 × 7 squares, each square corresponds to a matrix element, and all the squares form a matrix.
Illustratively, a predetermined path is preset from one matrix element in the first row to one matrix element in the last row in the matrix, the predetermined path is composed of a plurality of interconnected squares, and the relative position of two adjacent squares in the predetermined path is vertical or horizontal.
Alternatively, the starting point of the predetermined path may be any one of the matrix elements in the first row, the last row, the first column and the last column in the matrix, and the ending point of the predetermined path may be any one of the matrix elements in the first row, the last row, the first column and the last column in the matrix. Typically, the start and end points of the predetermined path will not be the same.
Optionally, each square is in an area for displaying a pattern object. The tiles located on the predetermined path are used not only to display the pattern object but also to display the attack object. The attack object moves along a starting point to an ending point of a predetermined path.
Optionally, the grid corresponding to the predetermined path is displayed separately from other grids except for the predetermined path. In one example, the area where each square is located is displayed with a background, and the square corresponding to the predetermined path is distinguished from other squares except the predetermined path by different backgrounds. For example, by different background colors, background patterns or background graphics. In another example, a frame is displayed in the area where each square is located, and the square corresponding to the predetermined path is distinguished from other squares except the predetermined path by different frames. For example, by different border colors, border patterns, or border patterns.
The attack object in the matrix is used to move from the starting point to the end point according to a predetermined path. The attack object also corresponds to a preset initial life value.
In step 202, a pattern object exchange command is received, the pattern object exchange command being generated according to a sliding operation acting on adjacent first and second pattern objects.
The first pattern object is a pattern object displayed in a cell where the start position of the sliding operation is located, and the second pattern object is a pattern object displayed in a cell where the end position of the sliding operation is located.
Optionally, the screen of the terminal is a touch screen, and a user can trigger the terminal to generate a corresponding control instruction through touch operation on the touch screen. Such as: the terminal is a smart phone, a user slides from the position of the first pattern object to the position of the second pattern object on the touch screen, and the terminal generates a pattern object exchange instruction according to the sliding operation.
Optionally, the screen of the terminal is a display screen, the terminal further includes an input device, and the user triggers the terminal to generate a corresponding control instruction by operating the input device. Such as: the terminal is a desktop computer, a mouse corresponds to an operation control on a screen, a user interface is displayed on the screen, the user controls the operation control to move to the position of a first pattern object by moving the mouse, then clicks the mouse to control the operation control to select the first pattern object, presses the mouse and drags the mouse, so that the operation control moves to the position of a second pattern object under the state that the first pattern object is selected, and when the user releases the mouse, the terminal generates a pattern object exchange instruction.
It should be noted that the pattern object responds to a touch or click operation of the user; the attack object does not respond to a touch or click operation by the user.
The positions of the first pattern object and the second pattern object are exchanged according to the pattern object exchange instruction, step 203.
That is, the terminal moves the first pattern object from the square where the first pattern object originally exists to the square where the second pattern object originally exists, and moves the second pattern object from the square where the second pattern object originally exists to the square where the first pattern object originally exists.
Step 204, after the exchange positions of the first pattern object and the second pattern object, if a preset number of same pattern objects are connected, eliminating the connected pattern objects;
the connection is transverse connection or longitudinal connection.
In practice, when typically 3 or more than 3 identical pattern objects are connected, the several connected pattern objects are eliminated.
Optionally, the predetermined number comprises 3, 4 and 5. Of course, in practical applications, a predetermined number of values may be set according to actual requirements, which is not limited in the embodiment of the present invention.
Step 205, determining the attack range according to the positions of the connected pattern objects.
Optionally, the position of each pattern object where the surrounding 8 matrix elements are located when the pattern object is eliminated is an attack range. The attack ranges of adjacent pattern objects usually overlap, and the attack range determined from the positions of the connected pattern objects is the union of the attack ranges of each pattern object.
In step 206, when the attack object exists in the attack range, subtracting a first attack value from the current life value of the attack object, wherein the first attack value is preset or determined according to the type of the pattern object.
Since the attack object in the attack range is attacked during pattern removal and the pattern object in the attack range is not affected, it is necessary to detect whether the attack object exists in the attack range.
If the generated attack values are the same when the pattern objects of different types are eliminated, the first attack value is preset.
Optionally, each pattern object corresponds to a preset attack value, and the first attack value is obtained by multiplying the preset attack value by the number of the eliminated pattern objects.
Optionally, the preset attack values corresponding to different types of pattern objects are different, and the first attack value is obtained by summing the preset attack value according to the type of the eliminated pattern object multiplied by the number of the eliminated pattern objects.
In summary, according to the object control method provided by the embodiment of the present application, by displaying the matrix with the predetermined size on the user interface, where the matrix includes the predetermined path, the attack object moves from the starting point to the ending point along the predetermined path, so that the path in the tower defense type game is combined with the matrix in the sanxiao type game, and the travel path of the attack object can be displayed, and the matrix can be displayed on the user interface as large as possible, thereby avoiding reducing the size of the pattern object, solving the problem that a player mistakenly triggers a wrong pattern object when moving the pattern object, which results in an increase in the probability of misoperation, and achieving the effect of reducing the probability of misoperation on the pattern object.
Fig. 3 is a flowchart of a method of controlling an object, which is illustrated in a terminal including a screen according to another embodiment of the present application. As shown in fig. 3, the object control method may include the steps of:
step 301, displaying a matrix of a predetermined size on the user interface, each matrix element in the matrix being used for displaying a pattern object, the matrix including a predetermined path for an attack object to travel.
The terminal has a user interface displayed on its screen, which is divided into a matrix of predetermined sizes, such as: a rectangular user interface includes 10 × 8 squares, each square corresponding to a matrix element, and all the squares form a matrix.
Illustratively, a predetermined path is preset from one matrix element in the first row to one matrix element in the last row in the matrix, the predetermined path is composed of a plurality of interconnected squares, and the relative position of two adjacent squares in the predetermined path is vertical or horizontal.
Alternatively, in other possible embodiments, the starting point of the predetermined path may also be set to one of the first column of matrix elements (excluding the first and last matrix elements) or one of the last column of matrix elements (excluding the first and last matrix elements) of the matrix. Because the probability that pattern objects located in the head-to-tail matrix elements are eliminated is small.
Alternatively, the starting point of the predetermined path may be any one of the matrix elements in the first row, the last row, the first column and the last column in the matrix, and the ending point of the predetermined path may be any one of the matrix elements in the first row, the last row, the first column and the last column in the matrix. Typically, the start and end points of the predetermined path will not be the same.
Optionally, each square is in an area for displaying a pattern object. The tiles located on the predetermined path are used not only to display the pattern object but also to display the attack object. The attack object moves along a starting point to an ending point of a predetermined path.
Optionally, the grid corresponding to the predetermined path is displayed separately from other grids except for the predetermined path. Such as by a background, border, etc.
The attack object is used to move from a start point to an end point according to a predetermined path. The attack object also corresponds to a preset initial life value.
Referring collectively to fig. 4, matrix 400 is comprised of 10 by 8 squares, each square displaying either a pattern object 410 or an attack object 420, matrix 400 including a predetermined path 430, predetermined path 430 being comprised of a portion of matrix elements (squares) in matrix 400, attack object 420 moving along predetermined path 430 from a start point 431 to an end point 432.
Illustratively, the predetermined path 430 in fig. 4 is distinguished from other squares than the predetermined path by a background color.
And 302, displaying a defense object on the user interface, wherein the defense object corresponds to a preset initial defense value and is connected with the end point of the preset path.
Referring to fig. 5 in combination, a defense object 440 is shown below the matrix 400, and the defense object 440 is exemplarily a city wall, and in actual implementation, the defense object 440 may also be in other forms.
Optionally, an initial defense value 441 and a current defense value 442 are displayed next to the defensive object 440.
Optionally, the width of the defending object 440 in fig. 5 is the same as the width of the matrix 400, and in practical implementation, the width of the defending object 440 can also be set to correspond to the end point 432 of the predetermined path, such as: the width of the defended object 440 is the same as the width of one square of the matrix 400.
It should be noted that the displaying of the matrix in step 301 and the displaying of the defense object in step 302 may be performed simultaneously.
Step 303, receiving a pattern object exchange command, wherein the pattern object exchange command is generated according to the sliding operation acted on the connected first pattern object and the second pattern object.
The first pattern object is a pattern object displayed in a cell where the start position of the sliding operation is located, and the second pattern object is a pattern object displayed in a cell where the end position of the sliding operation is located.
Optionally, the screen of the terminal is a touch screen, and a user can trigger the terminal to generate a corresponding control instruction through touch operation on the touch screen. Such as: the terminal is a smart phone, a user slides from the position of the first pattern object to the position of the second pattern object on the touch screen, and the terminal generates a pattern object exchange instruction according to the sliding operation.
Optionally, the screen of the terminal is a display screen, the terminal further includes an input device, and the user triggers the terminal to generate a corresponding control instruction by operating the input device. Such as: the terminal is a desktop computer, a mouse corresponds to an operation control on a screen, a user interface is displayed on the screen, the user controls the operation control to move to the position of a first pattern object by moving the mouse, then clicks the mouse to control the operation control to select the first pattern object, presses the mouse and drags the mouse, so that the operation control moves to the position of a second pattern object under the state that the first pattern object is selected, and when the user releases the mouse, the terminal generates a pattern object exchange instruction.
It should be noted that the pattern object responds to a touch or click operation of the user; the attack object does not respond to a touch or click operation by the user, and moves forward passively only after the pattern object generation instruction is generated.
Referring to fig. 6 in conjunction, the terminal generates a pattern object exchange instruction for exchanging the positions of the first pattern object 411 and the second pattern object 412 by sliding the hand from the position of the first pattern object 411 to the position of the second pattern object 412.
The positions of the first pattern object and the second pattern object are exchanged according to the pattern object exchange instruction, step 304.
That is, the terminal moves the first pattern object from the square where the first pattern object originally exists to the square where the second pattern object originally exists, and moves the second pattern object from the square where the second pattern object originally exists to the square where the first pattern object originally exists.
Referring collectively to fig. 6, a schematic diagram after the first pattern object 411 and the second pattern object 412 are exchanged is illustratively shown.
Step 305, after the first pattern object and the second pattern object are exchanged, detecting whether a predetermined number of identical pattern objects exist in the matrix and are connected with each other in a transverse or longitudinal mode.
In practical applications, it is usually eliminated if 3 or more than 3 identical pattern objects are connected, and therefore, the predetermined number includes 3, 4, and 5. Of course, in practical applications, a predetermined number of values may be set according to actual requirements, which is not limited in the embodiment of the present invention.
Step 306, when a preset number of pattern objects of the same type are connected, eliminating connected pattern elements;
when a plurality of pattern objects of the same type are connected, the terminal eliminates the connected blob elements.
In a possible embodiment, the positions of the first pattern object and the second pattern object are restored, i.e. the first pattern object and the second pattern object are restored to the positions before the exchange, when there is no predetermined number of identical pattern objects connected.
And if the user mistakenly operates so that the first pattern object and the second pattern object are not connected after the positions are exchanged, restoring the positions of the first pattern object and the second pattern object.
Step 307, determining an attack range according to the positions of the connected pattern objects, and detecting whether an attack object exists in the attack range.
Optionally, the position of each pattern object where the surrounding 8 matrix elements are located when the pattern object is eliminated is an attack range. The attack ranges of adjacent pattern objects usually overlap, and the attack range determined according to the positions of the connected pattern objects is the union of the attack ranges of each pattern object.
For example, as shown in fig. 6, the second pattern object 412 is an arrow, and after the second pattern object 412 is exchanged with the first pattern object 411, three identical arrow patterns are connected, and the attack range when the three arrow patterns are eliminated is 12 surrounding squares.
Since the attack object in the attack range is attacked during pattern removal and the pattern object in the attack range is not affected, it is necessary to detect whether the attack object exists in the attack range.
Step 308, when there is an attack object in the attack range, subtracting a first attack value from the current life value of the attack object, where the first attack value is preset or determined according to the type of the pattern object.
Referring to fig. 6 in combination, after three identical bow and arrow patterns are connected, an attack object 420 exists in the attack range of the connected bow and arrow patterns.
The attack object corresponds to a preset initial life value. Referring to fig. 7 in combination, life values are displayed above attack objects 420, each attack object 420 corresponding to an initial life value 423, and after attack object 420 is attacked, initial life value 423 and current life value 424 are displayed above attack object 420, illustratively, initial life value 423 is represented by a white bar, and current life value 424 is represented by a black bar.
If the generated attack values are the same when the pattern objects of different types are eliminated, the first attack value is preset.
Optionally, each pattern object corresponds to the same preset attack value, and the first attack value is obtained by multiplying the preset attack value by the number of eliminated pattern objects.
Optionally, the preset attack values corresponding to different types of pattern objects are different, and the first attack value is obtained by multiplying the preset attack value corresponding to the type of the eliminated pattern object by the number of the eliminated pattern objects.
Optionally, as another branch of step 307, if there is no attack object in the attack range, only the connected pattern objects are eliminated.
Step 309, keeping the position of the attack object above the elimination position unchanged according to the elimination position corresponding to the pattern object.
When the same pattern object is eliminated, blank squares after elimination appear, and in order to ensure that no blank squares exist in the matrix, other pattern objects are needed to fill the blank squares.
In order to ensure the difficulty balance of the game, after the pattern object is eliminated, the position of the attack object is not changed, the pattern object above the eliminated position is translated to the eliminated position, and the newly generated pattern object fills the blank position after translation.
In step 310, the pattern objects above the removal locations are all translated downward to fill the removal locations.
In practical applications, since there may be an attack object above the elimination location, the number of different pattern object translations above the elimination location may be different since the position of the attack object is not changed. Such as: three pattern objects in the same row are eliminated, no attack object is arranged right above a first pattern object, an attack object is arranged right above a second pattern object, two attack objects are arranged right above a third pattern object, the pattern object right above the first pattern object needs to be translated by one grid, the pattern object right above the second pattern object needs to be translated by two grids, and the pattern object right above the third pattern object needs to be translated by three grids.
Step 311, fill in the shifted blank position by the newly generated pattern object.
After the existing pattern objects in the matrix are translated, blank positions with the same number as the eliminated pattern objects are still left in the matrix, and in order to ensure the number of the pattern objects in the matrix, the terminal can generate new pattern objects to fill the blank positions.
Optionally, step 309, step 310, and step 311 are executed simultaneously.
And step 312, controlling the attacking object to attack the defending object when the attacking object meets the preset condition.
The number of times of movement of the attack object is proportional to the number of times of generation of the pattern object exchange instruction.
Optionally, the number of movements of different types of attack objects is different, such as: one type of attack object moves one cell when the pattern object exchange instruction is generated once, another type of attack object moves one cell every time the pattern object exchange instruction is generated twice, and yet another type of attack object moves two cells when the pattern object exchange instruction is generated once. Optionally, in practical application, other specific proportional relationships may be set between the moving times of the attack object and the generation times of the pattern object generation instruction, and this embodiment does not limit this.
Optionally, the terminal displays the pattern object in the predetermined path, and when the attack object moves, the display mode of the pattern object includes:
and S1, when the attack object moves to the target position in the preset path, converting the pattern object at the target position into an implicit display, and displaying the attack object at the target position.
The implicit display means that the pattern object which is not visible to the user does not respond to the sliding operation.
Referring collectively to fig. 8, when attack object 420 moves to target location 433, the pattern object originally displayed on target location 433 transitions to an implicit display.
S2, restoring the pattern object at the target position to the explicit display when the attack object disappears from the target position.
Explicit display means visible to the user.
Optionally, the attack object disappears from the target position, including moving from the target position to another position or being destroyed at the target position (the current life value is less than or equal to 0).
Referring collectively to FIG. 8, when attack object 420 is removed from target location 433, the pattern object at target location 433 resumes display.
Referring collectively to FIG. 9, after attack object 420 is destroyed, attack object 420 automatically disappears from target location 433 and the pattern object on target location 433 resumes explicit display.
Alternatively, if the attack objects include a first type of attack object and a second type of attack object, step 312 may be replaced with step 312a and/or step 312b shown in FIG. 10.
And step 312a, when the first type of attack object reaches the end position, controlling the first type of attack object to attack the defense object.
And step 312b, when the distance between the second type of attack object and the defense object is equal to or less than the preset distance, controlling the second type of attack object to attack the defense object.
Referring collectively to FIG. 5, a first type of attack object 421 and a second type of attack object 422 are displayed on the user interface. The first type of attack object 421 is also called a short-range attack object, and needs to move to the end point 432 of the predetermined path to attack the defending object 440; the second class of attack objects 422 is also referred to as remote attack objects, and attacks against the defended object 440 when the distance from the defended object 440 is less than or equal to a predetermined distance, for example, 5 grids.
The number of attacks attacking the object is proportional to the number of generation of the pattern object exchange instruction.
Optionally, the number of attacks on different types of attack objects is different, such as: one type of attack object attacks once when the pattern object exchange instruction is generated once, another type of attack object attacks once when the pattern object exchange instruction is generated twice, and yet another type of attack object attacks twice when the pattern object exchange instruction is generated once. Optionally, in practical application, other specific proportional relationships may be set between the number of times of attacking the object and the number of times of generating the pattern object generating instruction, which is not limited in this embodiment.
Optionally, the terminal displays a boundary object on the user interface, and a distance between the boundary object and the defense object is equal to a predetermined distance. After the second type of attack object crosses the boundary object, the terminal controls the second type of attack object to attack the defense object.
Optionally, when a bounding line object is displayed on the user interface, the start point of the predetermined path is disposed above the bounding line object.
Referring collectively to FIG. 5, a bounded line object 450 is displayed on the user interface, illustratively, bounded line object 450 is 5 grids away from defensive object 440. The second class of attack objects 422 may attack the defended object 440 after crossing the border object 450.
And 313, subtracting a second attack value from the current defense value of the defense object, wherein the second attack value is preset or determined according to the type of the attack object.
If the second attack values generated by different types of attack objects are the same when the attack objects attack, the second attack values are preset.
If the second attack values generated by different types of attack objects during attack are different, the second attack values correspond to the types of the attack objects, such as: the second attack value for the first type of attack object is 10 and the second attack value for the second type of attack object is 20.
Optionally, steps 312 to 313 are executed simultaneously with steps 308 to 311.
Alternatively, steps 312 to 313 are not necessarily performed automatically after step 311 in the case where the attack object satisfies the preset condition.
Alternatively, in the case where the attack object satisfies the preset condition, steps 312 to 313 are performed according to a relationship between the number of times of attack by the attack object and the number of times of generation of the pattern object generation instruction.
And step 314, when all the attack objects are eliminated and the defense value of the defense object is greater than 0, displaying a judgment object for representing winning on the user interface.
Generally, a terminal presets a preset number of attack objects in each game, when all the attack objects in the preset number are eliminated, the defense value of the defense object is greater than 0, the game wins, and the terminal displays pictures or animations of the game wins on a user interface.
The attack object disappears when the current life value is less than or equal to 0.
The attack object is attacked once, the first attack value is subtracted from the current life value of the attack object, and if the life value of the attack object is an integral multiple of the first attack value, the life value of the attack object is reduced to 0 after a predetermined number of attacks; if the life value of the attack object is not an integer multiple of the first attack value, the life value of the attack object is reduced to 0 after a predetermined number of attacks, and the last attack causes the current life value of the attack object to be less than 0.
Optionally, when the current life value of the attack object is less than 0, the current life value of the attack object displayed on the user interface is 0, and a negative number is not displayed.
In step 315, when the defense value of the defense object is less than or equal to 0, a judgment object for indicating failure is displayed on the user interface.
Optionally, in other possible implementations, a skill control is further included on the user interface, and when the skill control is triggered, the terminal triggers a skill corresponding to the skill control. Referring collectively to FIG. 11, a skills control 460 is displayed underneath the defending object. In practical applications, skill control 460 may be designed to correspond to different types of skills, such as: the skill control 461 is used for freezing all the attack objects displayed on the user interface for 3 rounds, wherein freezing means that the positions of the attack objects are kept unchanged, and one round means that the pattern object exchange instruction is generated once; skill control 462 is used to clear all attack objects displayed on the user interface; the skills control 463 is used to rearrange all pattern objects displayed on the user interface.
Optionally, after the skill control 460 is triggered, cooling is required for a predetermined period of time, and when the skill control 460 is within the cooling time, the skill control does not respond to the triggering operation.
Optionally, the pattern object further includes a functional pattern object, and the functional pattern object triggers a corresponding predetermined function when eliminated. Increasing a defensive value of the defensive object by a predetermined value when the type of the eliminated pattern object is a first pattern type; and/or, when the type of the eliminated pattern object is the second pattern type, stopping the movement of the attack object for a predetermined time period; and/or when the type of the eliminated pattern object is a third pattern type, increasing the experience value of the current login account; and/or, when the type of pattern object being ablated is a fourth pattern type, reducing a cooling time of a predetermined skill, the predetermined skill being a skill for controlling an attacking object. Referring to fig. 11 in conjunction, illustratively, 4 types of function pattern objects are included in the user interface, the first type of function pattern object 413 is displayed as a clock pattern, and when the first type of function pattern object 413 is eliminated, the triggered function is to shorten the cooling time period of the skill control 460; the second type of functional pattern object 414 is displayed as an ice-cube pattern, and when the second type of functional pattern object 414 is eliminated, the function triggered is to freeze the attack object for one round; the third type of functional pattern object 415 is displayed as a stone pattern, and when the third type of functional pattern object 415 is eliminated, a function of triggering is to increase a current defense value of the defense object by a predetermined value; the fourth type of functional pattern object 416 is displayed as an experience pattern, and when the fourth type of functional pattern object 417 is eliminated, the function triggered is to increase the experience value of the player, the experience value is used to raise the player level, and as the level rises, the defense property of the defense object and the attack value at the time of pattern elimination rise. The player may be identified with the current login account number.
Optionally, the game includes a plurality of levels, and as the number of game levels increases, the attributes such as attack value of an attack object in the game increase, or more skill controls are opened. The player will obtain the corresponding experience value after each game is finished.
In addition, when the terminal generates a new pattern object, the terminal may design the generation rule of the pattern object according to the difficulty level of the level, such as: traversing the pattern objects displayed in the user interface, combining the difficulty degrees according to the proportion of the pattern objects of different types, wherein the lower the difficulty degree, the higher the proportion of the pattern objects is, the higher the probability of the pattern objects is generated, and the higher the difficulty degree is, the lower the probability of the pattern objects with the higher proportion of the pattern objects is.
It should be noted that the design form of the predetermined path, the design form of the pattern object, the design form of the attack object, the relationship between the elimination of the pattern object and the movement of the attack object, the relationship between the elimination of the pattern object and the attack of the attack object, the generation of the pattern object, and the like described in this embodiment are all exemplarily described, and in practical application, other design forms and corresponding relationships may be adopted, which is not limited in this embodiment.
In summary, according to the object control method provided in the embodiment of the present application, by displaying the matrix with the predetermined size on the user interface, where the matrix includes the predetermined path, the attack object moves from the starting point to the ending point along the predetermined path, so that the path in the tower defense type game is combined with the matrix in the sanxiao type game, and the matrix can be completely displayed on the user interface, thereby not only displaying the traveling path of the attack object, but also avoiding reducing the size of the pattern object, and improving the probability of misoperation due to false triggering of the wrong pattern object when the player moves the pattern object, and achieving the effect of reducing the probability of misoperation on the pattern object.
With respect to step 312b, by displaying the boundary object on the user interface, since the distance between the boundary object and the defense object is a predetermined distance, and the second type of attack object attacks the defense object when the distance between the boundary object and the defense object is less than or equal to the predetermined distance, the second type of attack object attacks the defense object after crossing the boundary object, so that the player can intuitively know when the second type of attack object attacks, so as to adopt a corresponding game strategy.
With respect to steps S1 through S2, by displaying pattern objects on a predetermined path, the pattern objects at the target position are converted into an implicit display when the attack object moves to the target position, and the pattern objects at the target position are converted into an explicit display when the attack object disappears from the target position, so that under the condition that the predetermined path is set in the matrix, the pattern objects are still displayed at positions other than the position of the attack object in the predetermined path, thereby ensuring the number of pattern objects.
With respect to steps 309 to 311, after the pattern object is eliminated, the position of the attack object is kept unchanged, and the pattern object is translated downwards to fill the eliminated position, so that the movement of the attack object is not affected by the elimination behavior of the pattern object, and the difficulty of the game is controllable; in addition, the shifted blank positions are filled in by generating new pattern objects, so that there are always enough pattern objects in the matrix for the player to eliminate.
Fig. 12 is a block diagram illustrating a structure of an object control apparatus according to an embodiment of the present application, which is applied to a terminal including a screen. As shown in fig. 12, the object control device may include: a display module 510, a receiving module 520, a switching module 530, a first detection module 540, a determination module 550, a second detection module 560, and a cancellation module 570.
A display module 510, configured to implement the above steps 201, 301, 302, 312, S1, S2, 312a, 312b, 314, 315, and any other implicit or public display related functions.
A receiving module 520, configured to implement the foregoing step 202, step 303, and any other implicit or public receiving-related functions.
A switching module 530 for implementing the above-mentioned step 203, step 304 and any other implicit or public switching related functions.
A first detection module 540 for implementing the above step 305 and any other implicit or disclosed detection related functions.
A determination module 550 for implementing the above-mentioned steps 205, 307, 313 and any other implicit or disclosed determination-related functions.
A second detection module 560, for implementing the above-mentioned step 206, step 307 and any other implicit or public detection related functions.
A removal module 570 for implementing the above-mentioned steps 204, 306, 309, 310, 311 and any other implicit or disclosed functionality related to removing the pattern object.
The modules can be freely combined on the premise of realizing the realization. For example, the first detection module 540 and the second detection module 560 in the apparatus are optional, or two detection modules are combined into one detection module, which is not limited in this embodiment.
In summary, the object control device provided in the embodiment of the present application displays the matrix with the predetermined size on the user interface, where the matrix includes the predetermined path, and the attack object moves from the starting point to the end point along the predetermined path, so that the path in the tower defense type game is combined with the matrix in the sanxiao type game, and the travel path of the attack object can be displayed, and the matrix can be displayed on the user interface as large as possible, thereby avoiding reducing the size of the pattern object, solving the problem that a player mistakenly triggers a wrong pattern object when moving the pattern object, resulting in an increase in the probability of misoperation, and achieving the effect of reducing the probability of misoperation on the pattern object.
By displaying the boundary object on the user interface, because the distance between the boundary object and the defense object is a predetermined distance, and the second type of attack object attacks the defense object when the distance between the boundary object and the defense object is less than or equal to the predetermined distance, the second type of attack object attacks the defense object after crossing the boundary object, so that a player can intuitively know when the second type of attack object attacks, and therefore a corresponding game strategy can be adopted.
By displaying the pattern objects on the preset path, the pattern objects on the target position are converted into implicit display when the attack object moves to the target position, and the pattern objects on the target position are converted into explicit display when the attack object disappears from the target position, so that under the condition that the preset path is arranged in the matrix, the pattern objects are still displayed at other positions except the position where the attack object is located in the preset path, and the number of the pattern objects is ensured.
After the pattern object is eliminated, the position of the attack object is kept unchanged, and the pattern object is translated downwards to fill the eliminated position, so that the movement of the attack object is not influenced by the elimination behavior of the pattern object, and the difficulty of the game is controllable; in addition, the shifted blank positions are filled in by generating new pattern objects, so that there are always enough pattern objects in the matrix for the player to eliminate.
It should be noted that: in the object control device provided in the foregoing embodiment, when controlling an object, only the division of each function module is illustrated, and in practical applications, the function distribution may be completed by different function modules as needed, that is, the internal structure of the terminal is divided into different function modules to complete all or part of the functions described above. In addition, the object control apparatus and the object control method provided in the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments and are not described herein again.
In an exemplary embodiment, a computer readable storage medium is also provided, having at least one instruction, at least one program, set of codes, or set of instructions stored therein, which is loaded and executed by a processor to implement the object control methods as described in fig. 2, 3, and 10.
Referring to fig. 13, a block diagram of a terminal provided in some embodiments of the present application is shown. The terminal 600 is used for implementing the object control method provided by the above-described embodiment. The terminal 600 in the present application may include one or more of the following components: a processor for executing computer program instructions to perform various processes and methods, a Random Access Memory (RAM) and a read-only memory (ROM) for storing information and program instructions, a memory for storing data and information, I/O devices, interfaces, antennas, and the like. Specifically, the method comprises the following steps:
the terminal 600 may include a Radio Frequency (RF) circuit 610, a memory 620, an input unit 630, a display unit 640, a sensor 650, an audio circuit 660, a wireless fidelity (WiFi) module 670, a processor 680, a power supply 682, a camera 690, and the like. Those skilled in the art will appreciate that the terminal structure shown in fig. 13 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes the various components of the terminal 600 in detail with reference to fig. 13:
the RF circuit 610 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 680; in addition, data for designing uplink is transmitted to the base station. In general, the RF circuit includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 610 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Message Service (SMS), etc.
The memory 620 may be used to store software programs and modules, and the processor 680 may execute various functional applications and data processing of the terminal 600 by operating the software programs and modules stored in the memory 620. The memory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal 600, and the like. Further, the memory 620 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 630 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal 600. Specifically, the input unit 630 may include a touch panel 631 and other input devices 632. The touch panel 631, also referred to as a screen, may collect touch operations of a user (e.g., operations of the user on the touch panel 631 or near the touch panel 631 by using any suitable object or accessory such as a finger or a stylus) thereon or nearby, and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 631 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 680, and can receive and execute commands sent by the processor 680. In addition, the touch panel 631 may be implemented by various types such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 630 may include other input devices 632 in addition to the touch panel 631. In particular, other input devices 632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 640 may be used to display information input by the user or information provided to the user and various menus of the terminal 600. The Display unit 640 may include a Display panel 641, and optionally, the Display panel 641 may be configured by a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 631 can cover the display panel 641, and when the touch panel 631 detects a touch operation thereon or nearby, the touch panel is transmitted to the processor 680 to determine the type of the touch event, and then the processor 680 provides a corresponding visual output on the display panel 641 according to the type of the touch event. Although in fig. 13, the touch panel 631 and the display panel 641 are two separate components to implement the input and output functions of the terminal 600, in some embodiments, the touch panel 631 and the display panel 641 may be integrated to implement the input and output functions of the terminal 600.
The terminal 600 may also include at least one sensor 650, such as a gyroscope sensor, a magnetic induction sensor, an optical sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 641 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 641 and/or the backlight when the terminal 600 is moved to the ear. As one type of motion sensor, the acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the terminal posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer, tapping), and the like; as for other sensors such as barometer, hygrometer, thermometer, infrared sensor, etc. that can be configured in the terminal 600, they will not be described in detail herein.
Audio circuit 660, speaker 661, and microphone 662 can provide an audio interface between a user and terminal 600. The audio circuit 660 may transmit the electrical signal converted from the received audio data to the speaker 661, and convert the electrical signal into an audio signal through the speaker 661 for output; on the other hand, the microphone 662 converts the collected sound signal into an electrical signal, which is received by the audio circuit 660 and converted into audio data, which is then processed by the audio data output processor 680 and then sent to another terminal, for example, via the RF circuit 610, or the audio data is output to the memory 620 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the terminal 600 can help the user send and receive e-mails, browse web pages, access streaming media, etc. through the WiFi module 670, and it provides wireless broadband internet access for the user. Although fig. 13 shows the WiFi module 670, it is understood that it does not belong to the essential constitution of the terminal 600, and may be omitted entirely within the scope not changing the essence of the disclosure as needed.
The processor 680 is a control center of the terminal 600, connects various parts of the entire terminal using various interfaces and lines, performs various functions of the terminal 600 and processes data by operating or executing software programs and/or modules stored in the memory 620 and calling data stored in the memory 620, thereby monitoring the entire terminal. Optionally, processor 680 may include one or more processing units; preferably, the processor 680 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 680.
The terminal 600 also includes a power supply 682 (e.g., a battery) for supplying power to the various components, which may preferably be logically connected to the processor 680 through a power management system that provides management of charging, discharging, and power consumption.
The camera 690 generally includes a lens, an image sensor, an interface, a digital signal processor, a Central Processing Unit (CPU), and a display screen. The lens is fixed above the image sensor, and the focusing can be changed by manually adjusting the lens; the image sensor is equivalent to the 'film' of a traditional camera and is the heart of a camera for acquiring images; the interface is used for connecting the camera with the terminal mainboard in a flat cable, board-to-board connector and spring connection mode and sending the acquired image to the memory 620; the digital signal processor processes the acquired image through a mathematical operation, converts the acquired analog image into a digital image, and transmits the digital image to the memory 620 through the interface.
Although not shown, the terminal 600 may further include a bluetooth module or the like, which will not be described in detail herein. The memory 620 is used for storing at least one instruction, and the processor 680 is used for executing the at least one instruction in the memory 620, so as to execute the object control method.
The embodiment of the present application further provides a computer-readable storage medium, which may be a computer-readable storage medium contained in the memory in the foregoing embodiment; or it may be a separate computer-readable storage medium not incorporated into the terminal. The computer readable storage medium has stored thereon at least one instruction, at least one program, set of codes, or set of instructions for use by one or more processors in performing the subject control method.
The embodiment of the present application further provides a computer program product, which may be a computer program product contained in the memory in the foregoing embodiment; or it may be a computer program product that exists separately and is not assembled into the terminal. The computer program product stores at least one instruction, at least one program, set of codes, or set of instructions for use by one or more processors to perform the object control method described above.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (18)

1. An object control apparatus, characterized in that the apparatus comprises: a memory, a processor, and a screen; the memory to store at least one instruction; the processor is configured to load and execute the at least one instruction to implement the following steps:
generating a matrix, and presenting the matrix in an interactive interface of the screen;
rendering image objects in matrix elements of the matrix;
determining a target subset of matrix elements in the matrix, and displaying the target subset and matrix elements in the matrix except the target subset in a distinguishing way, wherein the matrix elements in the target subset form a predetermined path communicated from a first position of the matrix to a second position of the matrix;
in response to receiving a first instruction for an adjacent pattern object in the matrix, exchanging the position of the adjacent pattern;
detecting whether a predetermined number of pattern objects having continuous positions exist in the matrix after each execution of the exchanging of the positions of the adjacent patterns;
when detecting that a preset number of pattern objects with continuous positions exist, executing a first preset operation on the matrix elements where the preset number of pattern objects are located, wherein the first preset operation comprises the following steps: deleting the predetermined number of pattern objects in the matrix;
generating a moving object and associating the moving object with a matrix element at a first position in the target subset;
when the first instruction is received every time and the first instruction received this time does not trigger the first preset operation, adjusting the matrix elements associated with the mobile object in the target subset, and displaying the mobile object at the adjusted associated matrix elements;
detecting whether the adjusted position of the moving object is overlapped with the position of one pattern object in the matrix, and hiding the pattern object at the overlapped position when the position overlapping is detected until no moving object exists at the overlapped position;
when the first preset operation is executed, determining matrix elements externally connected with each matrix element corresponding to the pattern object deleted by the first preset operation;
determining a union set of the matrix elements externally connected with the matrix elements;
and determining whether a moving object exists in the union concentration matrix elements, and executing a second preset operation when the moving object exists, wherein the second preset operation is an adjustment operation on the attribute value of the moving object.
2. The apparatus of claim 1, wherein the processor is further configured to:
setting the moving object as an attack object, wherein the attack object comprises a first class of attack object and a second class of attack object, the attack object moves from a first position to a second position along the predetermined path, and the attack object corresponds to a preset initial life value;
dividing the matrix into a first region including a first position and a second region including a second position, and displaying a boundary object at a boundary between the first region and the second region;
displaying a defense object on a user interface of the screen, wherein the defense object is connected with the end point of the preset path and corresponds to a preset defense initial value;
when the first type of attack object reaches the second position, controlling the first type of attack object to attack the defense object;
and after the attack object passes through the boundary object and enters the second area, controlling the second class of attack object to attack the defense object.
3. The apparatus of claim 1, wherein the second predetermined operation comprises: subtracting a first attack value from a current life value of the moving object, the first attack value being preset or determined according to a type of the pattern object.
4. The apparatus of claim 2, wherein the number of movements of the attack object is proportional to the number of generations of the first instruction; the number of attacks on the attack object is proportional to the number of generation times of the first instruction.
5. The apparatus of claim 2, wherein the processor is further configured to cause the hidden pattern object to be unresponsive to the first instruction; restoring a hidden pattern object to an explicit display when no moving object is present at the location of the hidden pattern object.
6. The apparatus of claim 1, wherein the processor is further configured to, after deleting the predetermined number of pattern objects, keep the position of the moving object above the deletion position unchanged according to the deletion position corresponding to the pattern object; translating all pattern objects above the deletion position downwards to fill the deletion position; filling the shifted blank positions with the newly generated pattern object.
7. The apparatus of claim 2, wherein the processor is further configured to display a determination object representing a victory on the user interface of the screen when the attack objects are all exterminated and the defense value of the defense object is greater than 0, the attack objects disappearing when the current life value is less than or equal to 0; displaying a determination object indicating a failure on a user interface of the screen when a defense value of the defense object is less than or equal to 0.
8. The apparatus of claim 2, wherein the processor is further configured to:
increasing a defensive value of the defensive object by a predetermined value when the type of the deleted pattern object is a first pattern type;
and/or the presence of a gas in the gas,
stopping movement of the attack object for a predetermined length of time when the type of the deleted pattern object is a second pattern type;
and/or the presence of a gas in the gas,
when the type of the deleted pattern object is a third pattern type, increasing the experience value of the current login account;
and/or the presence of a gas in the gas,
when the type of the pattern object deleted is a fourth pattern type, reducing a cooling time of a predetermined skill, the predetermined skill being a skill for controlling the attack object.
9. An object control method, characterized in that the method comprises:
generating a matrix, and presenting the matrix in an interactive interface of the screen;
rendering image objects in matrix elements of the matrix;
determining a target subset of matrix elements in the matrix, and displaying the target subset and matrix elements in the matrix except the target subset in a distinguishing way, wherein the matrix elements in the target subset form a predetermined path communicated from a first position of the matrix to a second position of the matrix;
in response to receiving a first instruction for a neighboring pattern object in the matrix, swapping locations of the neighboring pattern;
detecting whether a predetermined number of pattern objects having continuous positions exist in the matrix after each execution of the exchanging of the positions of the adjacent patterns;
when detecting that a preset number of pattern objects with continuous positions exist, executing a first preset operation on the matrix elements where the preset number of pattern objects are located, wherein the first preset operation comprises the following steps: deleting the predetermined number of pattern objects in the matrix;
generating a moving object and associating the moving object with a matrix element at a first position in the target subset;
when the first instruction is received every time and the first instruction received this time does not trigger the first preset operation, adjusting the matrix elements associated with the mobile object in the target subset, and displaying the mobile object at the adjusted associated matrix elements;
detecting whether the adjusted position of the moving object is overlapped with the position of one pattern object in the matrix, and hiding the pattern object at the overlapped position when the position overlapping is detected until no moving object exists at the overlapped position;
when the first preset operation is executed, determining matrix elements externally connected with the matrix elements corresponding to the pattern object deleted by the first preset operation;
determining a union set of the matrix elements externally connected with the matrix elements;
and determining whether a moving object exists in the union concentration matrix elements, and executing a second preset operation when the moving object exists, wherein the second preset operation is an adjustment operation on the attribute value of the moving object.
10. The method of claim 9, further comprising:
setting the moving object as an attack object, wherein the attack object comprises a first class of attack object and a second class of attack object, the attack object moves from a first position to a second position along the predetermined path, and the attack object corresponds to a preset initial life value;
dividing the matrix into a first region including a first position and a second region including a second position, and displaying a boundary object at a boundary between the first region and the second region;
displaying a defense object on a user interface of the screen, wherein the defense object is connected with the end point of the preset path and corresponds to a preset defense initial value;
when the first type of attack object reaches the second position, controlling the first type of attack object to attack the defense object;
and after the attack object passes through the boundary object and enters the second area, controlling the second class of attack object to attack the defense object.
11. The method of claim 9, wherein the second predetermined operation comprises: subtracting a first attack value from a current life value of the moving object, the first attack value being preset or determined according to a type of the pattern object.
12. The method of claim 10, wherein the number of movements of the attack object is proportional to the number of generations of the first instruction; the number of attacks of the attack object is proportional to the number of generation of the pattern object exchange instruction.
13. The method of claim 10, further comprising:
causing the hidden pattern object to not respond to the first instruction;
restoring a hidden pattern object to an explicit display when no moving object is present at the location of the hidden pattern object.
14. The method according to claim 9, wherein after the deleting the predetermined number of pattern objects, further comprising:
according to the deletion position corresponding to the pattern object, keeping the position of the moving object above the deletion position unchanged;
translating all pattern objects above the deletion position downwards to fill the deletion position;
filling the shifted blank positions with the newly generated pattern object.
15. The method of claim 10, further comprising:
displaying a determination object for representing a victory on the user interface when the attack objects are all exterminated and a defense value of the defense object is greater than 0, the attack objects disappearing when a current life value is less than or equal to 0;
displaying a decision object for indicating a failure on the user interface when the defense value of the defense object is less than or equal to 0.
16. The method of claim 10, further comprising:
increasing a defensive value of the defensive object by a predetermined value when the type of the pattern object being eliminated is a first pattern type;
and/or the presence of a gas in the gas,
stopping the movement of the attack object for a predetermined length of time when the type of the deleted pattern object is a second pattern type;
and/or the presence of a gas in the gas,
when the type of the deleted pattern object is a third pattern type, increasing the experience value of the current login account;
and/or the presence of a gas in the atmosphere,
when the type of the pattern object deleted is a fourth pattern type, reducing a cooling time of a predetermined skill, the predetermined skill being a skill for controlling the attack object.
17. An object control apparatus, characterized in that the apparatus comprises:
the display module is used for generating a matrix and presenting the matrix in the interactive interface of the screen; rendering image objects in matrix elements of the matrix; determining a target subset of matrix elements in the matrix, and displaying the target subset and matrix elements in the matrix except the target subset in a distinguishing way, wherein the matrix elements in the target subset form a predetermined path communicated from a first position of the matrix to a second position of the matrix;
a switching module for switching the position of the adjacent pattern in response to receiving a first instruction for an adjacent pattern object in the matrix;
a deleting module, configured to detect whether a predetermined number of pattern objects with consecutive positions exist in the matrix after performing the exchanging of the positions of the adjacent patterns each time; when detecting that a preset number of pattern objects with continuous positions exist, executing a first preset operation on the matrix elements where the preset number of pattern objects are located, wherein the first preset operation comprises the following steps: deleting the predetermined number of pattern objects in the matrix;
a determination module to:
generating a moving object and associating the moving object with a matrix element at a first position in the target subset;
when the first instruction is received every time and the first instruction received this time does not trigger the first preset operation, adjusting the matrix elements associated with the mobile object in the target subset, and displaying the mobile object at the adjusted associated matrix elements;
detecting whether the adjusted position of the moving object is overlapped with the position of one pattern object in the matrix, and hiding the pattern object at the overlapped position when the position overlapping is detected until no moving object exists at the overlapped position;
when the first preset operation is executed, determining matrix elements externally connected with the matrix elements corresponding to the pattern object deleted by the first preset operation;
determining a union set of matrix elements externally connected with the matrix elements;
and determining whether a moving object exists in the union concentration matrix elements, and executing a second preset operation when the moving object exists, wherein the second preset operation is an adjustment operation on the attribute value of the moving object.
18. A computer-readable storage medium having stored therein at least one instruction which is loaded and executed by a processor to implement the object control method of any one of claims 9 to 16.
CN201711040866.5A 2017-10-31 2017-10-31 Object control device and method Active CN109718545B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711040866.5A CN109718545B (en) 2017-10-31 2017-10-31 Object control device and method
PCT/CN2018/112102 WO2019085832A1 (en) 2017-10-31 2018-10-26 Object control apparatus and method, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711040866.5A CN109718545B (en) 2017-10-31 2017-10-31 Object control device and method

Publications (2)

Publication Number Publication Date
CN109718545A CN109718545A (en) 2019-05-07
CN109718545B true CN109718545B (en) 2022-09-02

Family

ID=66293038

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711040866.5A Active CN109718545B (en) 2017-10-31 2017-10-31 Object control device and method

Country Status (2)

Country Link
CN (1) CN109718545B (en)
WO (1) WO2019085832A1 (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110876849B (en) * 2019-11-14 2022-09-20 腾讯科技(深圳)有限公司 Virtual vehicle control method, device, equipment and storage medium
CN111346374B (en) * 2020-03-10 2023-07-14 腾讯科技(深圳)有限公司 Interaction method and related device
CN111589118B (en) * 2020-04-30 2021-12-31 腾讯科技(深圳)有限公司 User interface display method, device, equipment and storage medium
CN112817584B (en) * 2021-01-29 2023-09-22 北京华如科技股份有限公司 Non-programming visual chess rule design editing system based on script
CN113476855A (en) * 2021-07-20 2021-10-08 成都酷狗创业孵化器管理有限公司 Operation execution method and device, storage medium and electronic equipment
US12042731B2 (en) 2021-08-26 2024-07-23 Shanghai Yiyu Network Technology Co., Ltd. Swapping game with player and enemy characters
CN113730904A (en) * 2021-08-26 2021-12-03 上海硬通网络科技有限公司 Virtual object control method and device, electronic equipment and storage medium
CN113827956B (en) * 2021-08-27 2024-06-07 上海易娱网络科技有限公司 Game control method, game control device, electronic equipment and computer readable storage medium
WO2023024079A1 (en) * 2021-08-27 2023-03-02 上海硬通网络科技有限公司 Game control method and apparatus, and electronic device and computer-readable storage medium
CN113908536A (en) * 2021-09-08 2022-01-11 上海硬通网络科技有限公司 Object grouping array type switching method and device, electronic equipment and storage medium
CN116351063B (en) * 2023-03-31 2024-02-09 广州三七极耀网络科技有限公司 Skill release processing method and device, electronic equipment and storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007151571A (en) * 2005-11-30 2007-06-21 Aruze Corp Game machine
AU2008227722A1 (en) * 2007-03-19 2008-09-25 Konami Digital Entertainment Co., Ltd. Game macine and its computer program
CN201871227U (en) * 2010-08-17 2011-06-22 胡瑞球 Novel brick game
WO2014041205A1 (en) * 2012-09-17 2014-03-20 King.Com Limited A method for implementing a computer game
US20140342791A1 (en) * 2013-03-29 2014-11-20 Rekkener Llc Interactive electronic game of pattern matching
CN106163625B (en) * 2014-01-31 2020-05-01 金.Com有限公司 User interface for controlling a computer device
US10456691B2 (en) * 2015-05-27 2019-10-29 King.Com Ltd. User communication
CN104932880A (en) * 2015-05-29 2015-09-23 广东小天才科技有限公司 Path construction method and device in application
JP6378224B2 (en) * 2016-02-26 2018-08-22 グリー株式会社 Control program, control method, and information processing apparatus

Also Published As

Publication number Publication date
CN109718545A (en) 2019-05-07
WO2019085832A1 (en) 2019-05-09

Similar Documents

Publication Publication Date Title
CN109718545B (en) Object control device and method
CN111773696B (en) Virtual object display method, related device and storage medium
US10870053B2 (en) Perspective mode switching method and terminal
CN109598777B (en) Image rendering method, device and equipment and storage medium
US12090405B2 (en) Virtual object interaction method and related apparatus
US11260300B2 (en) Image processing method and apparatus
CN106547599B (en) Method and terminal for dynamically loading resources
US20230076343A1 (en) Virtual item selection interface
CN111127595B (en) Image processing method and electronic equipment
WO2022052831A1 (en) Method and apparatus for adjusting control position in application program, device and storage medium
WO2015176680A1 (en) Information display method and apparatus
US20160066119A1 (en) Sound effect processing method and device thereof
CN108513671B (en) Display method and terminal for 2D application in VR equipment
CN111147912B (en) Bullet screen display control method and electronic equipment
WO2023138192A1 (en) Method for controlling virtual object to pick up virtual prop, and terminal and storage medium
KR20220098355A (en) Methods and apparatus, devices, media, and articles for selecting a virtual object interaction mode
CN107562303B (en) Method and device for controlling element motion in display interface
CN110045890A (en) The display methods and terminal device of application identities
CN107797723B (en) Display style switching method and terminal
CN110955377A (en) Control method of virtual object and related device
CN107809474B (en) Method and device for prompting download state and terminal equipment
CN111045628A (en) Information transmission method and electronic equipment
CN113599825B (en) Method and related device for updating virtual resources in game
CN109157835B (en) Control method and device for anti-watchman, storage medium and terminal
KR101953781B1 (en) Method for controlling mobile terminal in online game

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant