Difference between revisions of "Edge template V1a"
(Simplified the analysis) |
(→Red's threats: Added two missing reductions.) |
||
Line 20: | Line 20: | ||
=== Red's threats === | === Red's threats === | ||
− | + | Reductions to a [[ziggurat]]: | |
<hexboard size="5x10" | <hexboard size="5x10" | ||
visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | ||
edges="bottom" | edges="bottom" | ||
coords="none" | coords="none" | ||
− | contents="R g1 R f3 S area(f2, | + | contents="R g1 R f3 S area(f2,f3,d5,g5,g2)" |
+ | /> | ||
+ | <hexboard size="5x10" | ||
+ | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | ||
+ | edges="bottom" | ||
+ | coords="none" | ||
+ | contents="R g1 R f3 S area(f2,c5,f5,f3,g2)" | ||
/> | /> | ||
Line 54: | Line 60: | ||
coords="none" | coords="none" | ||
contents="R g1 R g2 S area(f2,d3,b5,i5,i3,h2)-f4" | contents="R g1 R g2 S area(f2,d3,b5,i5,i3,h2)-f4" | ||
+ | /> | ||
+ | |||
+ | Reduction to [[edge template III1b|template III-1-b]]: | ||
+ | <hexboard size="5x10" | ||
+ | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | ||
+ | edges="bottom" | ||
+ | coords="none" | ||
+ | contents="R g1 R f3 S area(f2,c5,g5,g2)-e5" | ||
/> | /> | ||
Revision as of 00:57, 6 July 2021
Template V1-a is a 5th row edge template with 1 stone.
This template often appears as a third move, for instance in the a3 opening, because the played piece is guaranteed to link to one edge and is not too far from the other one. Thus it follows the principle of the weakest link.
Note that there is also a mirror image form of this template.
It may seem that this template is very strong because it reaches 5 rows into the board, but it rarely occurs outside of the opening, because of the huge size of the template; the template requires 31 empty hexes and 10 hexes along an edge — the entire edge on the 10x10 board!
Furthermore, the large perimeter makes it more vulnerable to encroaching adjacent plays and forcing moves. Additionally, the carrier surrounds the 5th row piece on both "shoulders" so that non-overlapping plays from the 5th row piece can occur in only two directions.
Contents
Defending the template
Red's threats
Reductions to a ziggurat:
Reductions to template IVa:
Reductions to template IVb:
Reduction to template III-1-b:
Blue's options
These threats only overlap in 3 hexes, so to attempt blocking the template, Blue must move in one of these.
If Blue moves at x:
Red responds as follows.
Red is threatening to connect at "+". Blue must block by playing somewhere between Red's two pieces. Red then continues as follows:
Red has forced a bottleneck, resulting in a 2nd row ladder. Red's 2 acts as a ladder escape. The final position is
If Blue moves at y:
Red can respond at 2, which is connected to the bottom and forms a loose connection with the Red piece on the 5th row. To stop the immediate connection, Blue must play at a or b.
If Blue moves at a, Red connects via edge template IV2p.
If Blue moves at b, Red connects via edge template IV2a.
If Blue moves at z:
The situation is entirely symmetric to when Blue moves at y. Red can respond at 2. To stop the immediate connection, Blue must play at a or b.
If Blue moves at a, Red connects via edge template IV2p.
If Blue moves at b, Red connects via edge template IV2a.