Difference between revisions of "Edge template VI1a"

From HexWiki
Jump to: navigation, search
m (Changed "handwritten" to "written out" because this is not actually handwritten. Printed text does not qualify.)
(Adding link to new page, "Defending against VI1 right (other) intrusion on the 1st row")
Line 157: Line 157:
 
</hex>
 
</hex>
  
Details to follow
+
Red should go here:
 +
 
 +
<hex>
 +
R7 C14 Q0
 +
1:BBBBBBBBBRBBBBB
 +
Sa2 Sb2 Sc2 Sd2 Se2 Sf2 Sg2 Sh2 Rj2 Sl2 Sm2 Sn2
 +
Sa3 Sb3 Sc3 Sd3 Se3 Sf3 Sm3 Sn3
 +
Sa4 Sb4 Sc4 Sd4 Sn4
 +
Sa5 Sb5
 +
Sa6
 +
 
 +
Bg7  MR Mh5
 +
</hex>
 +
 
 +
See more details [[Template VI1/Other Intrusion on the 1st row| here]].
  
 
===The remaining intrusion on the second row (stub)===
 
===The remaining intrusion on the second row (stub)===

Revision as of 00:42, 20 August 2010

This template is the first one stone 6th row template for which a proof has been written out.

Elimination of irrelevant Blue moves

Red has a couple of direct threats to connect, using smaller templates. Blue must play in the carrier of these threats in order to counter them. To prevent Red from connecting Blue must play in the intersection of Red's threats carriers.

edge template IV1a

edge template IV1b

Using the parallel ladder trick

6 moves can furthermore be discarded thanks to the Parallel ladder trick. Of course, symmetry will cut our work in half!

We can dispose of 3 moves on the left (and, using mirror symmetry, the corresponding 3 moves on the right), as follows:

132546

At this point, we can use the Parallel ladder trick as follows:

7561324

Remaining possibilities for Blue

Blue's first move must be one of the following:

WARNING: Unrecognized token: [[#The_remaining_intrusion_on_the_fifth_row|Pi3]]
WARNING: Unrecognized token: [[#The_remaining_intrusion_on_the_fifth_row|Pj3]]
WARNING: Unrecognized token: [[Template_VI1/Intrusion_on_the_4th_row|Pi4]]
WARNING: Unrecognized token: [[Template_VI1/Intrusion_on_the_3rd_row|Ph5]]
WARNING: Unrecognized token: [[Template_VI1/Intrusion_on_the_3rd_row|Pi5]]
WARNING: Unrecognized token: [[#The_remaining_intrusion_on_the_second_row_.28stub.29|Pg6]]
WARNING: Unrecognized token: [[#The_remaining_intrusion_on_the_second_row_.28stub.29|Pi6]]
WARNING: Unrecognized token: [[#One_remaining_intrusion_on_the_first_row_.28stub.29|Pf7]]
WARNING: Unrecognized token: [[#The_other_remaining_intrusion_on_the_first_row_.28stub.29|Pg7]]
WARNING: Unrecognized token: [[#The_other_remaining_intrusion_on_the_first_row_.28stub.29|Ph7]]
WARNING: Unrecognized token: [[#One_remaining_intrusion_on_the_first_row_.28stub.29|Pi7]]

Specific defense

For the moves that intersect all the carriers, Red has to find specific answers. Let's deal with the remaining intrusions!

One remaining intrusion on the first row (stub)

Details to follow

The other remaining intrusion on the first row (stub)

Red should go here:

1

See more details here.

The remaining intrusion on the second row (stub)

The remaining intrusion on the third row (stub)

Red should go here:

1

See more details here.

The remaining intrusion on the fourth row

Red should move here (or the equivalent mirror-image move at "+"):

For more details, see this page.

The remaining intrusion on the fifth row

First establish a double ladder on the right.

17382546

Then use Tom's move:

53142