Difference between revisions of "Edge template VI1a"
(Converted to new hexboard diagrams) |
(Undo revision 7352: oops, committed wrong page.) |
||
Line 1: | Line 1: | ||
− | + | Template VI1-a is a 6th row [[edge template]] with one stone. | |
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 5: | Line 5: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R j2 | + | contents="R j2" |
/> | /> | ||
− | Red | + | This template is the first one stone 6th row [[edge template|template]] for which a proof of validity has been written out. The template has been verified by computer, and also verified to be minimal. |
+ | |||
+ | == Elimination of irrelevant Blue moves == | ||
+ | |||
+ | Red has a couple of direct threats to connect, using smaller templates. Blue must play in the carrier of these threats in order to counter them. To prevent Red from connecting Blue must play in the intersection of Red's threats carriers. | ||
+ | |||
+ | === [[edge template IV1a]] === | ||
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 14: | Line 20: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R i4 j2 S d7 e6 e7 f5 f6 f7 g5 g6 g7 h4 h5 h6 h7 i3 i5 i6 i7 j3 j5 j6 j7" |
/> | /> | ||
− | |||
− | |||
− | |||
− | |||
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 25: | Line 27: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R i4 j2 S e7 f6 f7 g5 g6 g7 h5 h6 h7 i3 i5 i6 i7 j3 j4 j5 j6 j7 k5 k6 k7" |
/> | /> | ||
− | + | === [[edge template IV1b]] === | |
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 34: | Line 36: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R i4 j2 S d7 e6 e7 f5 f6 f7 g5 g6 g7 h4 h5 h7 i3 i5 i6 i7 j3 j4 j5 j6 j7 k5 k6 k7" |
/> | /> | ||
− | + | ||
+ | === Using the [[parallel ladder]] trick === | ||
+ | |||
+ | 6 moves can furthermore be discarded thanks to the [[Parallel ladder]] trick. Of course, symmetry will cut our work in half! | ||
+ | |||
+ | We can dispose of 3 moves on the left (and, using mirror symmetry, the corresponding 3 moves on the right), as follows: | ||
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 43: | Line 50: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R 3:h5 5:h6 1:i4 j2 B 4:g7 6:h7 2:i5 S e7 f6 g5" |
/> | /> | ||
− | + | At this point, we can use [[Tom's move]] as follows: | |
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 52: | Line 59: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R h5 h6 i4 3:i6 j2 7:k3 1:k5 5:l4 B g7 h7 i5 4:i7 6:j5 2:j6 S e7 f6 g5" |
/> | /> | ||
− | + | === [[Overlapping connections|Remaining possibilities]] for Blue === | |
− | + | Blue's first move must be one of the following: | |
<hexboard size="7x14" | <hexboard size="7x14" | ||
coords="none" | coords="none" | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R j2 S f7 g6 g7 h5 h7 i3 i4 i5 i6 i7 j3" |
/> | /> | ||
− | + | See | |
− | + | [[Template_VI1/Intrusion_on_the_3rd_row]], | |
− | + | [[Template_VI1/Intrusion_on_the_4th_row]], | |
− | + | [[Template_VI1/The_remaining_intrusion_on_the_fifth_row]]. | |
− | + | ||
− | + | ||
− | + | ||
− | / | + | |
== Specific defense == | == Specific defense == | ||
− | + | For the moves that intersect all the carriers, Red has to find specific answers. Let's deal with the remaining intrusions! | |
− | + | ||
− | + | ||
+ | ===One remaining intrusion on the first row (stub) === | ||
<hexboard size="7x14" | <hexboard size="7x14" | ||
coords="none" | coords="none" | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R j2 B f7" |
/> | /> | ||
− | + | ||
+ | Details to follow | ||
+ | |||
+ | ===The other remaining intrusion on the first row=== | ||
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 90: | Line 95: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R j2 B g7" |
/> | /> | ||
− | + | Red should go here: | |
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 99: | Line 104: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R 1:h5 j2 B g7" |
/> | /> | ||
− | + | See more details [[Template VI1/Other Intrusion on the 1st row| here]]. | |
− | + | ===The remaining intrusion on the second row (stub)=== | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
<hexboard size="7x14" | <hexboard size="7x14" | ||
− | coords=" | + | coords="none" |
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R j2 B g6" |
/> | /> | ||
− | + | ===The remaining intrusion on the third row (stub)=== | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
<hexboard size="7x14" | <hexboard size="7x14" | ||
− | coords=" | + | coords="none" |
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R j2 B h5" |
/> | /> | ||
− | |||
− | + | Red should go here: | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 146: | Line 133: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R j2 1:k3 B h5" |
/> | /> | ||
− | + | Details to follow. | |
− | + | ||
+ | ===The remaining intrusion on the fourth row=== | ||
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 156: | Line 144: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R j2 B i4" |
/> | /> | ||
− | or | + | Red should move here (or the equivalent mirror-image move at "+"): |
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 165: | Line 153: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R h3 j2 B i4 E +:k3" |
/> | /> | ||
− | === | + | For more details, see [[Template VI1/Intrusion on the 4th row|this page]]. |
− | + | ===The remaining intrusion on the fifth row=== | |
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 175: | Line 163: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R j2 B i3" |
/> | /> | ||
− | + | First establish a [[double ladder]] on the right. | |
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 184: | Line 172: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R 7:i4 j2 1:j3 5:j5 3:k4 B 8:h5 i3 2:i5 6:i7 4:k5" |
/> | /> | ||
− | + | Then use [[Tom's move]]: | |
<hexboard size="7x14" | <hexboard size="7x14" | ||
Line 193: | Line 181: | ||
edges="bottom" | edges="bottom" | ||
visible="area(a7,n7,n5,k2,i2,c5)" | visible="area(a7,n7,n5,k2,i2,c5)" | ||
− | contents="R | + | contents="R 3:f4 1:f5 5:h3 i4 j2 j3 j5 k4 B 2:f6 4:g5 h5 i3 i5 i7 k5" |
/> | /> | ||
+ | |||
[[category:edge templates]] | [[category:edge templates]] | ||
+ | [[category:theory]] |
Revision as of 02:32, 9 March 2021
Template VI1-a is a 6th row edge template with one stone.
This template is the first one stone 6th row template for which a proof of validity has been written out. The template has been verified by computer, and also verified to be minimal.
Elimination of irrelevant Blue moves
Red has a couple of direct threats to connect, using smaller templates. Blue must play in the carrier of these threats in order to counter them. To prevent Red from connecting Blue must play in the intersection of Red's threats carriers.
edge template IV1a
edge template IV1b
Using the parallel ladder trick
6 moves can furthermore be discarded thanks to the Parallel ladder trick. Of course, symmetry will cut our work in half!
We can dispose of 3 moves on the left (and, using mirror symmetry, the corresponding 3 moves on the right), as follows:
At this point, we can use Tom's move as follows:
Remaining possibilities for Blue
Blue's first move must be one of the following:
See Template_VI1/Intrusion_on_the_3rd_row, Template_VI1/Intrusion_on_the_4th_row, Template_VI1/The_remaining_intrusion_on_the_fifth_row.
Specific defense
For the moves that intersect all the carriers, Red has to find specific answers. Let's deal with the remaining intrusions!
One remaining intrusion on the first row (stub)
Details to follow
The other remaining intrusion on the first row
Red should go here:
See more details here.
The remaining intrusion on the second row (stub)
The remaining intrusion on the third row (stub)
Red should go here:
Details to follow.
The remaining intrusion on the fourth row
Red should move here (or the equivalent mirror-image move at "+"):
For more details, see this page.
The remaining intrusion on the fifth row
First establish a double ladder on the right.
Then use Tom's move: