Difference between revisions of "Edge template VI1a"
(→The remaining intrusion on the fourth row: eliminated two blue answers (one explicitly, the other with template III1b)) |
(→Specific defence: one sub-defence less) |
||
Line 314: | Line 314: | ||
</hex> | </hex> | ||
− | ==== Specific | + | ==== Specific defence ==== |
So we must deal with each of these responses. (Which will not be too hard!) | So we must deal with each of these responses. (Which will not be too hard!) | ||
Line 366: | Line 366: | ||
</hex> | </hex> | ||
===== Bg5 ===== | ===== Bg5 ===== | ||
+ | <hex> | ||
+ | R7 C14 Q1 | ||
+ | 1:BBBBBBBBBRBBBBB | ||
+ | Sa2 Sb2 Sc2 Sd2 Se2 Sf2 Sg2 Sh2 Rj2 Sl2 Sm2 Sn2 | ||
+ | Sa3 Sb3 Sc3 Sd3 Se3 Sf3 Sm3 Sn3 | ||
+ | Sa4 Sb4 Sc4 Sd4 Sn4 | ||
+ | Sa5 Sb5 | ||
+ | Sa6 | ||
+ | |||
+ | Bi4 Rh3 | ||
+ | |||
+ | N:on Bg5 Rf4 | ||
+ | </hex> | ||
+ | Threatening: | ||
+ | <hex> | ||
+ | R7 C14 Q1 | ||
+ | 1:BBBBBBBBBRBBBBB | ||
+ | Sa2 Sb2 Sc2 Sd2 Se2 Sf2 Sg2 Sh2 Rj2 Sl2 Sm2 Sn2 | ||
+ | Sa3 Sb3 Sc3 Sd3 Se3 Sf3 Sm3 Sn3 | ||
+ | Sa4 Sb4 Sc4 Sd4 Sn4 | ||
+ | Sa5 Sb5 | ||
+ | Sa6 | ||
+ | |||
+ | Bi4 Rh3 | ||
+ | Bg5 Rf4 | ||
+ | Pe4 | ||
+ | Pc5 R4d5 Pe5 | ||
+ | Pb6 Pc6 Pd6 | ||
+ | Pa7 Pb7 Pc7 Pd7 | ||
+ | </hex> | ||
+ | <hex> | ||
+ | R7 C14 Q1 | ||
+ | 1:BBBBBBBBBRBBBBB | ||
+ | Sa2 Sb2 Sc2 Sd2 Se2 Sf2 Sg2 Sh2 Rj2 Sl2 Sm2 Sn2 | ||
+ | Sa3 Sb3 Sc3 Sd3 Se3 Sf3 Sm3 Sn3 | ||
+ | Sa4 Sb4 Sc4 Sd4 Sn4 | ||
+ | Sa5 Sb5 | ||
+ | Sa6 | ||
+ | |||
+ | Bi4 Rh3 | ||
+ | Bg5 Rf4 | ||
+ | Pe5 Pf5 | ||
+ | R4e6 | ||
+ | Pd7 Pe7 | ||
+ | </hex> | ||
+ | |||
+ | <hex> | ||
+ | R7 C14 Q1 | ||
+ | 1:BBBBBBBBBRBBBBB | ||
+ | Sa2 Sb2 Sc2 Sd2 Se2 Sf2 Sg2 Sh2 Rj2 Sl2 Sm2 Sn2 | ||
+ | Sa3 Sb3 Sc3 Sd3 Se3 Sf3 Sm3 Sn3 | ||
+ | Sa4 Sb4 Sc4 Sd4 Sn4 | ||
+ | Sa5 Sb5 | ||
+ | Sa6 | ||
+ | |||
+ | Bi4 Rh3 | ||
+ | Bg5 Rf4 | ||
+ | Pd5 R4e5 Pf5 | ||
+ | Pc6 Pd6 Pe6 Pf6 | ||
+ | Pb7 Pc7 Pe7 Pf7 | ||
+ | </hex> | ||
+ | So the only hope for Blue lies in the intersection of the threats, Be5, but it is unsufficient: | ||
+ | |||
+ | <hex> | ||
+ | R7 C14 Q1 | ||
+ | 1:BBBBBBBBBRBBBBB | ||
+ | Sa2 Sb2 Sc2 Sd2 Se2 Sf2 Sg2 Sh2 Rj2 Sl2 Sm2 Sn2 | ||
+ | Sa3 Sb3 Sc3 Sd3 Se3 Sf3 Sm3 Sn3 | ||
+ | Sa4 Sb4 Sc4 Sd4 Sn4 | ||
+ | Sa5 Sb5 | ||
+ | Sa6 | ||
+ | |||
+ | Bi4 Rh3 | ||
+ | Bg5 Rf4 | ||
+ | N:on Be5 Rf5 Be7 Rf6 Bf7 Rg6 Bg7 Rj5 | ||
+ | Pk3 Pi5 | ||
+ | </hex> | ||
===== Bg6 ===== | ===== Bg6 ===== | ||
===== Be7 ===== | ===== Be7 ===== |
Revision as of 14:02, 14 January 2009
This template is the first one stone 6th row template for which a proof has been handwritten.
Contents
- 1 Elimination of irrelevant Blue moves
- 2 Specific defence
Elimination of irrelevant Blue moves
Red has a couple of direct threats to connect, using smaller templates. Blue must play in the carrier of these threats in order to counter them. To prevent Red from connecting Blue must play in the intersection of Red's threats carriers.
edge template IV1a
edge template IV1b
Using the parallel ladder trick
6 moves can furthermore be discared thanks to the Parallel ladder trick. Of course, symmetry will cut our work in half!
We can dispose of 3 moves on the left (and, using mirror symmetry, the corresponding 3 moves on the right), as follows:
At this point, we can use the Parallel ladder trick as follows:
Remaining possibilities for Blue
Blue's first move must be one of the following:
Specific defence
For the moves that intersect all the carriers, Red has to find specific answers. Let's deal with the remaining intrusions!
One remaining intrusion on the first row
The other remaining intrusion on the first row
The remaining intrusion on the second row
The remaining intrusion on the third row
The remaining intrusion on the fourth row
Red should move here:
Elimination of irrelevant Blue moves
This gives Red several immediate threats: From III1a:
From III1a again:
From III1b :
From IV1a:
From IV1b:
The intersection of all of these leaves:
Specific defence
So we must deal with each of these responses. (Which will not be too hard!)
Bg4
And now either
or
Bg5
Threatening:
So the only hope for Blue lies in the intersection of the threats, Be5, but it is unsufficient:
Bg6
Be7
Bg7
To be continued...