Difference between revisions of "Edge template VI1a"
(→Remaining possibilities for Blue: cell links (new feature !)) |
m (Changed "handwritten" to "written out" because this is not actually handwritten. Printed text does not qualify.) |
||
Line 1: | Line 1: | ||
− | This template is the first one stone 6th row [[edge template|template]] for which a proof has been | + | This template is the first one stone 6th row [[edge template|template]] for which a proof has been written out. |
<hex> | <hex> |
Revision as of 20:08, 19 March 2009
This template is the first one stone 6th row template for which a proof has been written out.
Contents
- 1 Elimination of irrelevant Blue moves
- 2 Specific defense
- 2.1 One remaining intrusion on the first row (stub)
- 2.2 The other remaining intrusion on the first row (stub)
- 2.3 The remaining intrusion on the second row (stub)
- 2.4 The remaining intrusion on the third row (stub)
- 2.5 The remaining intrusion on the fourth row
- 2.6 The remaining intrusion on the fifth row
Elimination of irrelevant Blue moves
Red has a couple of direct threats to connect, using smaller templates. Blue must play in the carrier of these threats in order to counter them. To prevent Red from connecting Blue must play in the intersection of Red's threats carriers.
edge template IV1a
edge template IV1b
Using the parallel ladder trick
6 moves can furthermore be discarded thanks to the Parallel ladder trick. Of course, symmetry will cut our work in half!
We can dispose of 3 moves on the left (and, using mirror symmetry, the corresponding 3 moves on the right), as follows:
At this point, we can use the Parallel ladder trick as follows:
Remaining possibilities for Blue
Blue's first move must be one of the following:
WARNING: Unrecognized token: [[#The_remaining_intrusion_on_the_fifth_row|Pi3]]WARNING: Unrecognized token: [[#The_remaining_intrusion_on_the_fifth_row|Pj3]]
WARNING: Unrecognized token: [[Template_VI1/Intrusion_on_the_4th_row|Pi4]]
WARNING: Unrecognized token: [[Template_VI1/Intrusion_on_the_3rd_row|Ph5]]
WARNING: Unrecognized token: [[Template_VI1/Intrusion_on_the_3rd_row|Pi5]]
WARNING: Unrecognized token: [[#The_remaining_intrusion_on_the_second_row_.28stub.29|Pg6]]
WARNING: Unrecognized token: [[#The_remaining_intrusion_on_the_second_row_.28stub.29|Pi6]]
WARNING: Unrecognized token: [[#One_remaining_intrusion_on_the_first_row_.28stub.29|Pf7]]
WARNING: Unrecognized token: [[#The_other_remaining_intrusion_on_the_first_row_.28stub.29|Pg7]]
WARNING: Unrecognized token: [[#The_other_remaining_intrusion_on_the_first_row_.28stub.29|Ph7]]
WARNING: Unrecognized token: [[#One_remaining_intrusion_on_the_first_row_.28stub.29|Pi7]]
Specific defense
For the moves that intersect all the carriers, Red has to find specific answers. Let's deal with the remaining intrusions!
One remaining intrusion on the first row (stub)
Details to follow
The other remaining intrusion on the first row (stub)
Details to follow
The remaining intrusion on the second row (stub)
The remaining intrusion on the third row (stub)
Red should go here:
See more details here.
The remaining intrusion on the fourth row
Red should move here (or the equivalent mirror-image move at "+"):
For more details, see this page.
The remaining intrusion on the fifth row
First establish a double ladder on the right.
Then use Tom's move: