Difference between revisions of "Edge template V1b"
(→Intrusion at x: Finished case x.) |
(→Intrusion at w: did part of case w) |
||
Line 206: | Line 206: | ||
==== Intrusion at w ==== | ==== Intrusion at w ==== | ||
− | + | Red responds with | |
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | edges="bottom" | ||
+ | visible="area(f1,a6,n6,n4,l2,h1)" | ||
+ | contents="R e2 d4 d3 B c3 d5 e3 c5 R 1:g3 B 2:g5 R 3:i4" | ||
+ | /> | ||
+ | |||
+ | , and defends the [[ziggurat]] from red3. | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | edges="bottom" | ||
+ | visible="area(a6,f1,h1,h3,i2,i4,g6)" | ||
+ | contents="R e2 d4 d3 B c3 d5 e3 c5 R 1:g3 3:i4 h5 g6 B 2:g5" | ||
+ | /> | ||
+ | |||
+ | Continuation: | ||
+ | <div class="toccolours mw-collapsible mw-collapsed"> | ||
+ | |||
+ | Red's main threat is as follows. | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | edges="bottom" | ||
+ | visible="area(a6,f1,h1,h3,i2,i4,g6)" | ||
+ | contents="R e2 d4 d3 B c3 d5 e3 c5 R 1:g3 3:i4 h5 g6 5:e4 B 2:g5 S d6 e6 e5 e4 f4 f3 h3 h4 i3" | ||
+ | /> | ||
+ | |||
+ | |||
+ | If Blue plays the upper-left shaded cell, then Red plays red5 anyway, after which Red connects via | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | edges="bottom" | ||
+ | visible="area(a6,f1,h1,h3,i2,i4,g6)" | ||
+ | contents="R e2 d4 d3 B c3 d5 e3 c5 R 1:g3 3:i4 h5 g6 5:e4 7:f4 B 2:g5 4:f3 6:e5 6:d6 E *:f5 *:h3" | ||
+ | /> | ||
+ | |||
+ | or | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | edges="bottom" | ||
+ | visible="area(a6,f1,h1,h3,i2,i4,g6)" | ||
+ | contents="R e2 d4 d3 B c3 d5 e3 c5 R 1:g3 3:i4 h5 g6 5:e4 7:e5 9:f5 11:h3 B 2:g5 4:f3 6:e6 8:d6 10:f6" | ||
+ | /> | ||
+ | |||
+ | . | ||
+ | |||
+ | |||
+ | If Blue plays any of the other 3 leftmost shaded cells, then Red plays | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | edges="bottom" | ||
+ | visible="area(a6,f1,h1,h3,i2,i4,g6)" | ||
+ | contents="R e2 d4 d3 B c3 d5 e3 c5 R 1:g3 3:i4 h5 g6 5:f2 B 2:g5 4:e4 4:e5 4:d6 E *:f5 *:h3" | ||
+ | /> | ||
+ | |||
+ | , connecting via one of the stars. | ||
+ | |||
+ | |||
+ | If Blue plays the other shaded cell along the edge, then Red responds with | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | edges="bottom" | ||
+ | visible="area(a6,f1,h1,h3,i2,i4,g6)" | ||
+ | contents="R e2 d4 d3 B c3 d5 e3 c5 R 1:g3 3:i4 h5 g6 5:h3 B 2:g5 4:e6" | ||
+ | /> | ||
+ | |||
+ | , forcing Blue to defend towards the top, after which | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | edges="bottom" | ||
+ | visible="area(a6,f1,h1,h3,i2,i4,g6)" | ||
+ | contents="R e2 d4 d3 B c3 d5 e3 c5 R 1:g3 3:i4 h5 g6 5:h3 7:e4 B 2:g5 4:e6 6:(f2 f3 g2)" | ||
+ | /> | ||
+ | |||
+ | connects directly or via red1. | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | edges="bottom" | ||
+ | visible="area(a6,f1,h1,h3,i2,i4,g6)" | ||
+ | contents="R e2 d4 d3 B c3 d5 e3 c5 R 1:g3 3:i4 h5 g6 5:h3 7:e4 9:e5 11:f5 B 2:g5 4:e6 6:(f2 f3 g2) 8:f4 10:d6" | ||
+ | /> | ||
+ | |||
+ | |||
+ | If Blue plays the middle shaded cell, then Red | ||
+ | |||
+ | <b>to be completed</b> | ||
+ | </div> | ||
==== Intrusion at x ==== | ==== Intrusion at x ==== |
Revision as of 09:59, 25 July 2022
Edge template V1b is a 5th row edge template with 1 stone.
The validity and minimality of this template has been checked by computer. The template was mentioned on 2016-05-19 by the user shalev in this Little Golem thread, but likely predates that post.
Contents
Defense against intrusions
Reduction
Red has 3 main threats. Using the ziggurat:
Using edge template III1b:
And using edge_template_IV1d:
For a blocking attempt, Blue must play in the overlap:
Intrusion at a
If Blue intrudes at a, Red can start by forcing a 3rd or 2nd row ladder like this
or like this:
Red's continuation will be discussed below.
Intrusion at b
If Blue intrudes at b, Red can start by forcing a 3rd row ladder like this:
Red's continuation will be discussed below.
Intrusion at c
If Blue intrudes at c, Red can start by forcing a 2nd row ladder like this:
Red's continuation will be discussed below.
Continuation after 3rd row ladder
If Red achieved a 3rd row ladder after intrusions a or b as shown above, Red continues as follows.
Now Red is connected by Tom's move for 3rd and 5th row parallel ladders.
Continuation:
Now Red has two main threats. Via a ziggurat:
And via edge template IV2b:
Blue must play in the overlap:
Intrusion at p, q, r
Now Blue must play in one of the 3 shaded cells. If Blue plays in the left 2 of those 3, then Red connects via IV-2-b. Otherwise, Red connects via Tom's move.
Intrusion at s
Red is connected by edge template IV1d.
Intrusion at t
Now Red is connected by edge template V2m. If Blue plays 4 on the first row instead, Red connects by Tom's move:
Intrusion at u
Red is connected by Tom's move.
Intrusion at v
Red is connected by double threat.
Intrusion at w
Red responds with
, and defends the ziggurat from red3.
Continuation:
Red's main threat is as follows.
If Blue plays the upper-left shaded cell, then Red plays red5 anyway, after which Red connects via
or
.
If Blue plays any of the other 3 leftmost shaded cells, then Red plays
, connecting via one of the stars.
If Blue plays the other shaded cell along the edge, then Red responds with
, forcing Blue to defend towards the top, after which
connects directly or via red1.
If Blue plays the middle shaded cell, then Red
to be completed
Intrusion at x
Red can respond here:
Continuation:
Red has several threats. Via double threats:
Via double threat and edge template III2b:
Via bridges and Tom's move:
Via a wheel and Tom's move:
Via a double threat and Tom's move:
Via a different double threat and Tom's move:
Blue must play in the overlap:
If Blue plays at r:
And then, depending on Blue's next move, either a crescent
or Tom's move:
If Blue plays at t:
If Blue plays at b or c, Red plays at a and connects via Tom's move. If Blue plays at a:
Now Red is connected left by double threat, and right by a clipped version of edge template V2m.
Intrusion at y
Note that the hexes marked "*" are captured by Red 3, so Blue 4 is forced. Then Red is connected by edge template IV2e.
Intrusion at z
Note that the hexes marked "*" are captured by Red 3, so Blue 4 is forced. Then Red is connected by edge template IV2p.
Continuation after 2nd row ladder
If Red achieved a 2nd row ladder after intrusions a or c above, Red continues as follows.
Now Red connects in essentially the same way as Tom's move.
Continuation:
Red has these threats:
The overlap in which Blue must play is:
Four of these five possible moves can be analysed together. In the following diagram, assume Blue has played 1 in any one of the cells marked with +:
After Red 2, that group is safely connected to them bottom, now matter which of the pluses Blue chose before.
That leaves only one Blue move to deal with:
Note that Red 4 connects to the bottom with IV-2-b.