Difference between revisions of "Template VI1/Other Intrusion on the 1st row"

From HexWiki
Jump to: navigation, search
(Defending against VI1 right (other) intrusion on the 1st row)
 
(fixed diagrams)
Line 26: Line 26:
 
Sa6
 
Sa6
  
Bg7  MR Mh5 Pi3 Pi4
+
Bg7  red M1h5 Pi3 Pi4
 
</hex>
 
</hex>
  
Line 71: Line 71:
  
 
Bg7 Rh5 Bi3 Pe7 Pf6 Pf7 Pg5 Pg6 Ph6 Ph7 Pi5 Pi6 Pi7
 
Bg7 Rh5 Bi3 Pe7 Pf6 Pf7 Pg5 Pg6 Ph6 Ph7 Pi5 Pi6 Pi7
MV Mj3 Mi4
+
red M1j3 Mi4
 
</hex>
 
</hex>
  
Line 88: Line 88:
 
Bg7 Rh5 Bi5 Bi3
 
Bg7 Rh5 Bi5 Bi3
 
Rj3 Bi4
 
Rj3 Bi4
MV Mk4 Mk5 Mj5 Mi7 Mi6 Mh7 Mh6
+
red Mk4 Mk5 Mj5 Mi7 Mi6 Mh7 Mh6
 
</hex>
 
</hex>
  
Line 105: Line 105:
 
Bg7 Rh5 Bi3
 
Bg7 Rh5 Bi3
 
Rj3 Bi4
 
Rj3 Bi4
MV Mj4 Mi5 Mk5
+
red Mj4 Mi5 Mk5
 
Ph6, Ph7, Pi6
 
Ph6, Ph7, Pi6
 
</hex>
 
</hex>
Line 123: Line 123:
 
Bg7 Rh5 Bi7 Bi3
 
Bg7 Rh5 Bi7 Bi3
 
Rj3 Bi4
 
Rj3 Bi4
MV Mj4 Mi5 Mj5 Pj6 Pj7 Pk5 Pk6 Pk7
+
red Mj4 Mi5 Mj5 Pj6 Pj7 Pk5 Pk6 Pk7
 
</hex>
 
</hex>
  
Line 142: Line 142:
  
 
Bg7 Rh5 Bi4 Pe7 Pf6 Pf7 Pg5 Pg6 Ph6 Ph7 Pi5 Pi6 Pi7
 
Bg7 Rh5 Bi4 Pe7 Pf6 Pf7 Pg5 Pg6 Ph6 Ph7 Pi5 Pi6 Pi7
MV Mh3 Mh4
+
red Mh3 Mh4
 
</hex>
 
</hex>
  
Line 158: Line 158:
  
 
Bg7 Rh5 Bg5 Bi4 Rh3 Bh4
 
Bg7 Rh5 Bg5 Bi4 Rh3 Bh4
MV Mf4 Me5 Mf5 Me7 Mf6 Mf7 Mg6
+
red M1f4 Me5 Mf5 Me7 Mf6 Mf7 Mg6
 
</hex>
 
</hex>
  
Line 174: Line 174:
  
 
Bg7 Rh5 Bi4 Rh3 Bh4
 
Bg7 Rh5 Bi4 Rh3 Bh4
MV Mg4 Mg5 Me5
+
red M1g4 Mg5 Me5
 
Pf6, Pf7, Pg6
 
Pf6, Pf7, Pg6
 
</hex>
 
</hex>
Line 191: Line 191:
  
 
Bg7 Rh5 Be7 Bi4 Rh3 Bh4
 
Bg7 Rh5 Be7 Bi4 Rh3 Bh4
MV Mg4 Mg5 Mf5
+
red M1g4 Mg5 Mf5
 
Pc7 Pd6 Pd7 Pe5 Pe6
 
Pc7 Pd6 Pd7 Pe5 Pe6
 
</hex>
 
</hex>
Line 227: Line 227:
  
 
Bg7 Rh5 Bi3 Rh6 Bi5 Ri6 Bf6
 
Bg7 Rh5 Bi3 Rh6 Bi5 Ri6 Bf6
MV Mj3 Mi4 Mk4 Mj5 Ml5
+
red M1j3 Mi4 Mk4 Mj5 Ml5
 
</hex>
 
</hex>
  
Line 260: Line 260:
  
 
Bg7 Rh5 Bi4 Bg5 Rg6 Rf6 Bi6
 
Bg7 Rh5 Bi4 Bg5 Rg6 Rf6 Bi6
MV Mh3 Mh4 Mf4 Mf5 Md5
+
red M1h3 Mh4 Mf4 Mf5 Md5
 
</hex>
 
</hex>
  

Revision as of 16:34, 22 August 2015

This article deals with a special case in defending against intrusions in template VI1, namely the right-hand ('other') intrusion on the 1st that is not eliminated by sub-templates threats.

Basic situation

abcdefghijklmn1234567

Red should go here:

abcdefghijklmn12345671


The Red 1 hex is connected to the bottom, and threatens to connect to the top through either one of the "+" hexes. It is now Blue's move.

Claim #1: Blue must move in one of the following + squares below

If Blue moves to

abcdefghijklmn1234567

If not, Red can move to either i3 or i4 and secure a connection.

Proposed first Red response

If Blue moves to {e7, f6, f7, g5, g6}, Red should take i6 and force a Blue response in either i3 or i4. If Blue moves to {h6, h7, i5, i6, i7}, Red should take f6 and force a Blue response in either i3 or i4. If Blue takes i3 or i4 direcly, proceed with Response to i3 or Response to i4 instructions below.

Response to i3

If we've arrived here, Blue has just taken i3, i4 is free, h5 is securely connected to the bottom and Blue has at most one of the "+" squares below (with one exception; see i3 addendum). In this case, Red should first take j3 and force a Blue response at i4:

abcdefghijklmn123456712

CASE #1: Blue has i5. SOLUTION:

abcdefghijklmn12345671327564

CASE #2: Blue has no tiles in {h6, h7, i5, i6, i7}, or has either {h6, h7, i6} (indicated by +). SOLUTION:

abcdefghijklmn1234567123

CASE #3: Blue has i7. SOLUTION:

abcdefghijklmn1234567123

Blue must take one of the + hexes or Red wins. Now, Red can play i6 and force h7, then play h6 and connect to h5 (which is already securely connected.

Response to i4

If we've arrived here, Blue has just taken i4, i3 is free, h5 is securely connected to the bottom and Blue has at most one of the "+" squares below (with one exception; see i4 addendum). In this case, Red should first take h3 and force a Blue response at h4:

abcdefghijklmn123456712

CASE #1: Blue has g5. SOLUTION:

abcdefghijklmn12345671235746

CASE #2: Blue has no tiles in {e7, f6, f7, g5, g6}, or has either {f6, f7, g6} (indicated by +). SOLUTION:

abcdefghijklmn1234567132

CASE #3: Blue has e7. SOLUTION:

abcdefghijklmn1234567132

Blue must take one of the + hexes or Red wins. Now, Red can play f6 and force f7, then play g6 and connect to h5 (which is already securely connected.

i3 addendum

I claimed that Blue can have only one of the + hexes but this is not quite true if Blue first "plays out" the secured bridge. But in this case Red definitely can acquire i6.

abcdefghijklmn1234567

In this case, Red can still play j3 to force i4, then k4 to force j5, then l5 wins:


abcdefghijklmn123456712345

i4 addendum

I claimed that Blue can have only one of the + hexes but this is not quite true if Blue first "plays out" the secured bridge. But in this case Red definitely can acquire f6.

abcdefghijklmn1234567

In this case, Red can still play h3 to force h4, then f4 to force f5, then d5 wins:


abcdefghijklmn123456713254