Takchess Chess Improvement

A Novice chessplayer works to get better at chess using an improvement program based upon the methods of Michael de la Maza and the teachings of Dan Heisman

Sunday, May 15, 2005

Contents of CT-ART 3 by Tactical Methods

For those who are curious: This is the contents of CT-ART by Tactical Methods(note this is different from the combinational Motifs listed in previous blog)


CT-ART 3.0.
Tactical methods
1. ANNIHILATION OF DEFENCE

1.1. Annihilation of the pieces defending other pieces
1.2. Annihilation of the pieces defending the back rank
1.3. Annihilation of the pieces defending the king, the most important squares and files
1.4. Annihilation of the pawns defending the most important squares and files
1.5. Annihilation of the pinning pieces

2. DISTRACTION

2.1. Distraction of the pieces defending other pieces
2.2. Distraction of the pieces defending the back rank
2.3. Distraction of the pieces defending the most important files
2.4. Distraction of the pieces defending the most important squares
2.5. Distraction of the pawns
2.6. Unblocking the pawns with the help of distraction
2.7. Distraction of the pinning pieces
2.8. Distraction of the pieces carrying out the dangerous threats

3. DECOY

3.1. Decoy of a king to a mating net
3.2. Decoy to a knight fork
3.3. Decoy to a queen double attack
3.4. Decoy to a file blow
3.5. Exploiting an open attack
3.6. Decoy for a pin
3.7. Other cases of decoy

4. OPEN ATTACK

4.1. Execution of an open attack
4.2. Removal of obstacles
4.3. Decoy to an attacked file
4.4. Decoy to a blow dealt by the piece moved away
4.5. Placement of the attacking piece to the file for attack
4.6. "Mill"
4.7. Exploiting an open attack in the attack on a king

5. OPENING OF A FILE

5.1. The h- (a-) file
5.2. The g- (b-) file
5.3. The f- (c-) file
5.4. The d- and e-files
5.5. Ranks
5.6. The a1-h8 (h1-a8) diagonal
5.7. The a2-g8 (h7-b1) diagonal
5.8. Other diagonals
5.9. Conjunction of files, ranks and diagonals

6. SPACE CLEARANCE

6.1. File clearance
6.2. Rank clearance
6.3. Diagonal clearance
6.4. Clearance of several files
6.5. Square clearance

7. X-RAY ATTACK

8. INTERCEPTION

8.1. Execution of interception
8.2. Interception of potentially important files
8.3. Double interception
8.4. Interception with distraction
8.5. Interception with decoy
8.6. Interception with open attack
8.7. Interception with space clearance

9. BLOCKING, ENCIRCLEMENT

9.1. Smothered mate
9.2. Other methods of blocking a king
9.3. Blocking of the pieces and pawns protecting a king
9.4. Encirclement

10. DESTRUCTION OF THE PAWN SHELTER

10.1. The king is defended by fianchetto

10.1.1. The bishop is absent
10.1.2. The fianchettoed bishop defends a king
10.1.3. "Sieve" structure. A bishop is outside the "fianchetto"

10.2. One pawn protects the king
10.3. Two pawns protect the king
10.4. Three pawns protect the king

10.4.1. The pawns are on f7, g7 and h6
10.4.2. The pawns are on f6, g7 and h7
10.4.3. The pawns are on f6, g7 and h6
10.4.4. The pawns are on f7, g7 and h7
10.4.5. Other pawn configurations

10.5. A king is protected by the pawns placed on the sixth and fifth ranks
10.6. Peculiarities of the attack in a Q-side castling position
10.7. Attack on an uncastled king

11. PAWN PROMOTION

11.1. Pawn breakthrough
11.2. Distraction from a passed pawn
11.3. Interception or blocking
11.4. A pawn is promoted to a knight
11.5. Forcing necessary exchanges
11.6. Both opponents have dangerous passed pawns
11.7. Passed pawn supports the piece invasion of the back rank
11.8. Passed pawn takes part in the attack on a king
11.9. Conjunction of methods

12. INTERMEDIATE MOVE. WINNING OF A TEMPO

12.1. Intermediate move
12.2. Winning of a tempo
12.3. "Ignoring" the threat

13. PLAY FOR A STALEMATE

14. RESTRICTING OF A MATERIAL

15. PURSUIT

15.1. Pursuit of a king
15.2. Pursuit of a queen

16. CONJUNCTION OF TACTICAL METHODS

16.1. Exploiting a passed pawn
16.2. Exploiting a double attack

16.2.1. Knight double attack
16.2.3. Rook double attack
16.2.4. Queen double attack
16.2.5. Conjunction of double attacks

16.3. Exploiting an open attack
16.4. Exploiting a pin
16.5. Counterblow by a "pinned" piece
16.6. Attack on a king

16.6.1. Threats along the back rank
16.6.2. Threats along the h-file
16.6.3. Attack on a king unprotected by the pawns
16.6.4. Attack on an uncastled king
16.6.5. "Dragging the king out"
16.6.6. A king is protected by fianchetto
16.6.7. One pawn protects the king
16.6.8. Two pawns protect the king
16.6.9. Three pawns protect the king

16.7. Combinations to win material
16.8. Conjunction of threats to attack the king and to win material

16.8.1. Conjunction of threats to attack the king and the queen
16.8.2. Conjunction of threats to attack the king and to attack the other pieces

0 Comments:

Post a Comment

<< Home