,N# _0 Z5 `( F3 u
S' B G' [1 a] Military chess situations can be divided into fierce fighting type I and stable type II. # f5 Y! t9 q5 Q '? 3 liters
3 Z,w2 c+ G( m$ E* R' c
In the fierce competition, all sides' troop dispatch is centered on the key to survival, so good overall situation, keen observation and accurate operator step calculation are the main weapons to win;
7 H/ |' \! X' m: G Sometimes the battle is too fierce or it is difficult to calculate the strength, and intuition (chess sense) will play a major role.
$ r t $ `(x4 ~ 2m "][ And in a stable situation, if one side's advantages accumulate and break through a certain limit, it will definitely slaughter the opponent,, S2`, T3`/_1w.
Opponents rose up and the situation turned into a fierce battle; M4 B! V% Q7 k2 u
Otherwise, the situation will develop into a draw.
# O" _。 ? . N8 V: T5g-H&; Z6 G5 J Because quite a few players have chosen a closed opening, the following mainly discusses II.
. Y/ P$ j- U/ s- f7 R' T will solve the main problem of how to gain and accumulate advantages.
9 ~; ~ 6r”D4 m2 CCD transforms type II into type I "I am a knife and I am a fish". - f: g9 c( v- |/ S
Of course, first of all, we need to be clear about how to measure the relative strength of the enemy and ourselves in a stable situation. There are three criteria:
G0 \ 9e * f-e7s (y3j1y # y+x-g $ f, the sum of a component and information (because it can be transformed into each other at any time, it must be investigated in a unified way); - W+ e+ b6 h$ F) n: y
Second, one party and its balance to the family;
1 B2 j; T5 g# [2 A] Tripartite and Its Contact with Home.
j:Y " S)Q3 S & amp; N8 E collides with a high entropy force with a low entropy force (that is, touches a darker force with a brighter block).
0g * @; r- U6 a7 I( f! E3 m7 ~% g/ B will be profitable in a unified sense. For example, we think that the military commander will not lose 4 J- h by exploring the road and colliding with the enemy commander! F # i' E & Q9 W4 |
(It's just information gained by our own strength), the counter-killing of the enemy commander and the exchange of our commander are both dry losses. Mainly the low entropy of the other side clearly exchanged our high entropy secret order.
W5 `9 o# d" J Pay attention to the initial distribution of military chess, and we will record the five children in the front row as # B7N2D; E0 X,B; U% j# L% g
(1) Write the chess pieces in the second to fourth rows as 8E3 x $ V (x% c) w&; ^
(2) Record that the stress of five or six wires is 6 ~. N6 v6 N( H# s+ J- V6 G8 P7 I
(3) We roughly divide the chess pieces into five categories: flag, thunder, soldier, official and bullet.
^! p; Before the collision, we knew nothing about (3). It may be a soldier, an official, a thunder or a bomb.
/H5 o ' M; I 'a.y5' q We can confirm that (2) it is not a mine, but whether it is a bomb is uncertain; /Q:. Franc Avon
From the beginning of the chess game, we have a deep understanding of (1), knowing that the children here are not thunder and bullets, but only officials or soldiers.
4 b: m i3} 6 ` 9 k "u/m3 I even have a more detailed understanding of the probability distribution of officers and men appearing in different parts of the front line. /F8 I 1? 2 K( l/ g' o
We see the artificial serial number (1) (2) (3), and its numerical value is just the sign of entropy.
' }5 ? +i8 x & amp; I naturally come to the conclusion that the secret of "making money" in military chess lies in actively attacking the pieces behind the second line with the power of the first line, or touching the pieces in the last two rows with the pieces in the second to fourth lines. Of course, the first-line exam type is the most profitable. % l h. @0 `,[9 W 1 h
(The entropy difference between the two sides of the collision is the largest) It is better to kill a battalion in (3) than to eat a brigade in (1); It is obviously more valuable to take the platoon leader to touch the second to fourth lines and make a right match than to touch the first line.
7, q+g/av 'c-| So our problem boils down to how to make our first line contact with other second and fourth lines or even go deep into the bottom line? (I9 e3 L4 f3 X4 S 1 L' A
Or in short, how to open the line? This leads to the layout problem of zt stream.
& amp]% q * X ' L(v(| 8 A; V+ `7 C, it is easy to see that the theoretical essence of zt flow is advocating attack, and "attack profit" 1 {/ W8 j6 B4 A3 l0 @+ [5 U] is given by the principle of entropy difference.
There is theoretical support. The above argument is the cornerstone of why zt stream attaches importance to layout, and it is also the concrete layout principle of zt stream. & ampf & ampt! y5h; Johnson & Johnson company Me, P( N
Zt Liu thinks that layout and playing chess should be considered together, and layout should be regarded as the first stage of playing chess. 7 [$ h L7 ~2 o" ]
The three principles of disposal are: big front, dark sideline and hard bottom line. /u:^0 x $ l; m . {:d(Q2 P3 J; F' B9 c
The first line is not to deploy two divisions and two brigades, but to deploy one soldier first. This is to meet the requirements of the first situation. In addition to soldiers, we should try our best to deploy some divisions and brigades that can take the lead or test mines, instead of too many platoons for wandering around. These differences are indeed conducive to security, stability and harmony, and are also conducive to cooperation. However, they are easily eaten, without rewards, and interfere with you and your family.
k; z ' F; W7 a y( P' Y) More importantly, they occupy the position that was originally suitable for Daiko. 0 M8]9 @ amp; h,g+ ~
If they are chewed dry, it will make your condition thinner; If they are not chewed dry, they will often get in the way and slow down your attack. X g0 T 1 I5 d* R 1 w9 v7 J
However, you may well ask, if my first line are all older children, it will be inconvenient to play chess with my family. What should I do?
0 _% Q & ampo, \% Y+ f* I2 J% V 1 p is very simple. Killing the eldest child from the beginning exposed the "dangerous children's forces" that have not collided in the back. The "UFO" formed by these sub-forces will be more conducive to cooperating with the opponent's scruples. At the same time, your brave opening will also create opportunities for low-entropy particles to collide with high-entropy particles.
-s2 n+ w) d: b$ l lateral line (it should be understood as (2)) should be "dark" and operated in a black box, so that opponents can't judge by other methods except collision, even if there is collision, there is no extra information!
4 w" F+ a* x b: G) N/ G0 G+ D (the damage brigade commander only knows that it is 38+, and the damage engineer knows that it is not a bomb).
/ S. t,p- |。 m K! O/ x4 B' C is a method of randomly arranging two to four linear forces. More important is the way.
* v7 K: p4 J: H2 r 1 f) v' E8 Q Generally speaking, it is not easy to attack (test) Υ Υ Υ Υ Υ Υ Υ Υ.
/ o( }* h5 M# t! E & amp? (d)7x; u! 3S & amp; K% budget/expenditure
Note: this well-known principle is almost self-evident: isolated collisions are always beneficial to defenders. )
,q! b; { 1w # m[8 `; M) p0 u%? 1 Z We'd rather spend a game of chess to explore the road than go straight to the front with an unfamiliar second-line division. & ltbr & gt! qk % 1x。 C2E3 x * @' D7' Every bullet is a bullet before it is touched, but it is not a bullet after it is touched. & ltbr & gt! F+ p9 c4 I" s" m" {8 r Even sometimes, the Ming soldiers of the other side fly in front of your second-line platoon leader, and your platoon leader has to retreat, exposing the third-line bomb to "eat" the engineers. & u2C% cU. E & ltbr & gt In short, online children should keep their high entropy state with forbearance and complete the defense task first. Once an opponent hits them (or eats them and gets blown up), these [2] children will become [1] children, and then we can use them freely. 0b # R/j+x & amp; f .]0n & lt; Br> (3) Class B shoulders the mission of loading mines, live ammunition, ammunition, soldiers, flags and even commanders, and cannot act rashly. & ltbr & gt+D/ R) r5 P0 `+ I c7 o. D* C* d This part is required reading for military strategists, and many experts are willing to get to the bottom of it, # }3 _ 1 ~, u$ C _
There are even masters who want to show off their superb sense of chess by judging and fighting your thunder.
4 M9 n- T, {0 M9 N6 A% _% E# d So the arrangement of this part should be a bit tricky, and the hard and brittle thunder and the flexible live thunder should be mixed and dispersed, $ d% S.I 1K5B8k.
(As a result, all the players' first-line players are getting bigger and bigger, and eventually they are all led by one army) 4 J: Q9 J% z+ J9 n) d" B* P2 B
It is necessary to properly combine aerial bombing.
9f; T4 P+ q9 d- z- Y5 \: C The opportunity of aerial bombing is often fleeting, and the target will flee after a little hesitation, 4]+C) B0E.Y.
When it shows the commander's ferocious face, it's too late to regret it! 4 W0 F* k. L 1 e% ~- t9 y2 r
Therefore, the principle of aerial bombing is to bomb the bomb with a little inspiration and fake it at any time.
4m . A+V; ~2 q' {3 h In terms of layout theory, zt stream advocates multiple online bombs (average 1.5), and < br>& ampH "9L0F6L $ n can be sent and received freely in this way, and it can compete for the instantaneous control of the main line in fierce battle and be empty when it is stable. 5 E" n: l: L! e! g+H & lt; br & gt& ltbr & gt! P.s2x-] "At the beginning of the development of R chess, players always have a tendency to pursue delicate skills, (liar, pretender, blank ammunition, etc.)' O7b" E2'1T8}.
But it ignores that the so-called "big hand" is to take a big teacher (not 38) to simplify and actively attack. “g6 H3 f; r; [7 s
I summed up the following formula. When I have a good overall view of my family, I always follow these principles (such as smartsxm, airman). (m "d * d1# g6h: ` 3 watts/gram.
This magnificent and tough style of play is called "large array method" by borrowing Weiqi terminology.
1 R0 Z4 F3 f " V9 L; _ & ampx,`! J recorded the four major families as A, B, C and D in counterclockwise order.
/I 1 D3 _ (m principle1:
$ I am! Q: m 65438+ 0 k: SB only bombs the secret order, A holds the secret order, and C holds the explicit order (38+ has been eaten), so it is wise for A to take the initiative to attack B array with the secret order. 0 k0 r% e0 O2 z' q* M# z% y
-At this time, there will be two situations: T! w7 O? 7 u% P% g5 V9 Y
Secret order in exchange for B's secret order (often after destroying several children) will further weaken B;
The secret order of t4 T 1 _' L+ x 1 BA completed the task of selling and frying.
)} 2 B& amp; b! _$ ^( ? In this case, it is bound to eat 38+, and because of the explicit oppression threat of C, B dare not blow it up easily) 5 W' O0 C3 \4 M6 I+ G/ E! ]' Oh
Then C40 can slaughter B at will, in order to force B (sometimes D) secretly. $ H% U7? $ },P! B. H( U6 s- W 1 U
This order cannot be reversed! 2 G5 B4 B8 { * K9 N(O e9 U; T
If C explicitly orders B to attack first, and then A secretly orders it to continue to attack, then C eats the bullet, while A secretly orders B (as a non-bomber) to curl up to meet the commander when the attack continues (or D may help).
: ]7 |4 q' p$ \: O The consequence of reversing the order is to annihilate one less 38+'a9 meter |18 west, y.