国际象棋开局胜率统计一览表.docx

上传人:b****6 文档编号:7958696 上传时间:2023-01-27 格式:DOCX 页数:22 大小:23.56KB
下载 相关 举报
国际象棋开局胜率统计一览表.docx_第1页
第1页 / 共22页
国际象棋开局胜率统计一览表.docx_第2页
第2页 / 共22页
国际象棋开局胜率统计一览表.docx_第3页
第3页 / 共22页
国际象棋开局胜率统计一览表.docx_第4页
第4页 / 共22页
国际象棋开局胜率统计一览表.docx_第5页
第5页 / 共22页
点击查看更多>>
下载资源
资源描述

国际象棋开局胜率统计一览表.docx

《国际象棋开局胜率统计一览表.docx》由会员分享,可在线阅读,更多相关《国际象棋开局胜率统计一览表.docx(22页珍藏版)》请在冰豆网上搜索。

国际象棋开局胜率统计一览表.docx

国际象棋开局胜率统计一览表国际象棋开局胜率统计一览表国际象棋开局胜率统计一览表从200万局国际比赛结果中进行数据统计得出以下的数据白开局胜率统计最高的五个开局为:

后翼弃兵开局BlackmarDiemer弃兵西班牙开局象开局维也纳开局执黑统计结果最好的五种防御开局为:

西西里防御尼姆佐-印度防御Robatsch防御Alekhine防御尼姆佐防御国际象棋开局百科ECO-A类、B类2007-08-0212:

11A类开局A00非正规开局,1a3,b3,d3,g4A01尼姆佐维奇拉尔森进攻,1b3A02伯德开局,1f4A03伯德开局,1f4d5A04列蒂开局,1Nf3A05列蒂开局,1Nf3Nf6A06列蒂开局,1Nf3d5A07王翼印度进攻,1Nf3d52g3A08王翼印度进攻,1Nf3d52g3c53Bg2A09列蒂开局,1Nf3d52c4A10英国式开局,1c4A11英国式开局,卡罗坎体系,1c4c6A12英国式开局,1c4c62Nf3d53b3A13英国式开局,1c4e6A14英国式开局,新卡塔兰拒弃兵,1c4e62Nf3d53g3Nf64Bg2Be75O-OA15英国式开局,1c4Nf6A16英国式开局,1c4Nf62Nc3A17英国式开局,1c4Nf62Nc3e6A18英国式开局,麦克纳斯变例,1c4Nf62Nc3e63e4A19英国式开局,麦克纳斯变例,西西里变例,1c4Nf62Nc3e63e4c5A20英国式开局,1c4e5A21英国式开局,1c4e52Nc3A22英国式开局,1c4e52Nc3Nf6A23英国式开局,布莱曼体系,凯列斯变例,1c4e52Nc3Nf63g3c6A24英国式开局,布莱曼体系的g6变化,1c4e52Nc3Nf63g3g6A25英国式开局,1c4e52Nc3Nc6A26英国式开局,封闭体系,1c4e52Nc3Nc63g3g64Bg2Bg75d3d6A27英国式开局,三马体系,1c4e52Nc3Nc63Nf3A28英国式开局,1c4e52Nc3Nc63Nf3Nf6A29英国式开局,四马体系,王翼侧翼象,1c4e52Nc3Nc63Nf3Nf64g3A30英国式开局,对称体系,1c4c5A31英国式开局,对称体系,别诺尼结构,1c4c52Nf3Nf63d4A32英国式开局,对称变例,1c4c52Nf3Nf63d4cxd44Nxd4e65Nc3Nc6A33英国式开局,对称体系,1c4c52Nc3A34英国式开局,对称体系,1c4c52Nc3Nc6A35英国式开局,1c4c52Nc3Nc63g3A36英国式开局,1c4c52Nc3Nc63g3A37英国式开局,对称体系,1c4c52Nc3Nc63g3g64Bg2Bg75Nf3A38英国式开局,对称体系,1c4c52Nc3Nc63g3g64Bg2Bg75Nf3Nf6A39英国式开局,对称体系的d4主变,1c4c52Nc3Nc63g3g64Bg2Bg75Nf3Nf66O-OO-O7d4A40后兵开局,1d4A41后兵开局,黑方d6变化,1d4d6A42现代防御,阿维尔巴赫体系,1d4d62c4g63Nc3Bg74e4A43旧式别诺尼防御,1d4c5A44旧式别诺尼防御,1d4c52d5e5A45后兵开局,1d4Nf6A46后兵开局,1d4Nf62Nf3A47后翼印度防御,1d4Nf62Nf3b6A48王翼印度防御,1d4Nf62Nf3g6A49王翼印度防御,侧翼出动,1d4Nf62Nf3g63g3A50后兵开局,1d4Nf62c4A51布达佩斯弃兵,1d4Nf62c4e5A52布达佩斯弃兵,1d4Nf62c4e53dxe5Ng4A53古印度开局,1d4Nf62c4d6A54古印度开局,乌克兰变例,1d4Nf62c4d63Nc3e54Nf3A55古印度开局,主变,1d4Nf62c4d63Nc3e54Nf3Nbd75e4A56别诺尼防御,1d4Nf62c4c5A57平科弃兵,伏尔加弃兵,1d4Nf62c4c53d5b5A58平科弃兵,1d4Nf62c4c53d5b54cxb5a65bxa6A59平科弃兵,1d4Nf62c4c53d5b54cxb5a65bxa6Bxa66Nc3d67e4A60别诺尼防御,1d4Nf62c4c53d5e6A61别诺尼防御,1d4Nf62c4c53d5e64Nc3exd55cxd5d66Nf3g6A62别诺尼防御,侧翼象变例,1d4Nf62c4c53d5e64Nc3exd55cxd5d66Nf3g67g3Bg78Bg2O-OA63别诺尼防御,侧翼象变例,9.Nbd7变化A64别诺尼防御,侧翼象变例,11.Re8变化A65别诺尼防御,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4A66别诺尼防御,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67f4A67别诺尼防御,泰曼诺夫变例,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67f4Bg78Bb5+A68别诺尼防御,四兵进攻,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67f4Bg78Nf3O-OA69别诺尼防御,四兵进攻主变,A70别诺尼防御,古典体系,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67Nf3A71别诺尼防御,古典体系,8Bg5的变化,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67Nf3Bg78Bg5A72别诺尼防御,古典体系,不走9.O-O的变化,1d4Nf62c4c53d5e64Nc3exd55cxd5d66e4g67Nf3Bg78Be2O-OA73别诺尼防御,古典体系,9.O-O的变化,A74别诺尼防御,古典体系,9.a6和10.a4的变化,A75别诺尼防御,古典体系,9.a6和10.a4的主变,A76别诺尼防御,古典体系,9.Re8变化A77别诺尼防御,古典体系,9.Re8,10.Nd2的变化,A78别诺尼防御,古典体系,.Re8and.Na6的变化,A79别诺尼防御,古典体系,11.f3的变化,A80荷兰防御,1d4f5A81荷兰防御,1d4f52g3A82荷兰防御,斯汤顿弃兵,1d4f52e4A83荷兰防御,斯汤顿弃兵,1d4f52e4fxe43Nc3Nf64Bg5A84荷兰防御,1d4f52c4A85荷兰防御,c4之后走Nc3的变化,1d4f52c4Nf63Nc3A86荷兰防御,1d4f52c4Nf63g3A87荷兰防御,列宁格勒体系,1d4f52c4Nf63g3g64Bg2Bg75Nf3A88荷兰防御,列宁格勒体系,1d4f52c4Nf63g3g64Bg2Bg75Nf3O-O6O-Od67Nc3c6A89荷兰防御,列宁格勒体系,1d4f52c4Nf63g3g64Bg2Bg75Nf3O-O6O-Od67Nc3Nc6A90荷兰防御,1d4f52c4Nf63g3e64Bg2A91荷兰防御,1d4f52c4Nf63g3e64Bg2Be7A92荷兰防御,1d4f52c4Nf63g3e64Bg2Be75Nf3O-OA93荷兰防御,石墙体系,鲍特维尼克变例,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od57b3A94荷兰防御,石墙体系,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od57b3c68Ba3A95荷兰防御,石墙体系,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od57Nc3c6A96荷兰防御,古典变例,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od6A97荷兰防御,伊尔因-热涅夫斯基变例,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od67Nc3Qe8A98荷兰防御,伊尔因-热涅夫斯基变例,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od67Nc3Qe88Qc2A99荷兰防御,伊尔因-热涅夫斯基变例,1d4f52c4Nf63g3e64Bg2Be75Nf3O-O6O-Od67Nc3Qe88b3B类开局B00不常见的王前兵开局B01斯堪的纳维亚防御,1e4d5B02阿列亨防御,1e4Nf6B03阿列亨防御,1e4Nf62e5Nd53d4B04阿列亨防御,现代体系,1e4Nf62e5Nd53d4d64Nf3B05阿列亨防御,现代体系,1e4Nf62e5Nd53d4d64Nf3Bg4B06现代防御,1e4g6B07彼尔茨乌菲姆采夫防御,1e4d62d4Nf6B08彼尔茨乌菲姆采夫防御,古典体系,1e4d62d4Nf63Nc3g64Nf3B09彼尔茨乌菲姆采夫防御,奥地利进攻,1e4d62d4Nf63Nc3g64f4B10卡罗坎防御,1e4c6B11卡罗坎防御,双马体系,1e4c62Nc3d53Nf3Bg4B12卡罗坎防御,1e4c62d4B13卡罗坎防御,兑换变例,1e4c62d4d53exd5cxd5B14卡罗坎防御,帕诺夫鲍特维尼克攻击,1e4c62d4d53exd5cxd54c4Nf65Nc3e6B15卡罗坎防御,1e4c62d4d53Nc3B16卡罗坎防御,布隆斯坦拉尔森变例,1e4c62d4d53Nc3dxe44Nxe4Nf65Nxf6+gxf6B60西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5B61西西里防御,拉乌舍尔攻击,拉尔森变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5Bd77Qd2B62西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e6B63西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2B64西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2Be78O-O-OO-O9f4B65西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2Be78O-O-OO-O9f4Nxd410Qxd4B66西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2a6B67西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2a68O-O-OBd7B68西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2a68O-O-OBd79f4Be7B69西西里防御,拉乌舍尔攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bg5e67Qd2a68O-O-OBd79f4Be710Nf3b511Bxf6B70西西里防御,龙式变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g6B71西西里防御,龙式变例,列文菲什变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66f4B72西西里防御,龙式变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3B73西西里防御,龙式变例,古典体系,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77Be2Nc68O-OB74西西里防御,龙式变例,古典体系,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77Be2Nc68O-OO-O9Nb3B75西西里防御,龙式变例,南斯拉夫攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77f3B76西西里防御,龙式变例,南斯拉夫攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77f3O-OB77西西里防御,龙式变例,南斯拉夫攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77f3O-O8Qd2Nc69Bc4B78西西里防御,龙式变例,南斯拉夫攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77f3O-O8Qd2Nc69Bc4Bd710O-O-OB79西西里防御,龙式变例,南斯拉夫攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3g66Be3Bg77f3O-O8Qd2Nc69Bc4Bd710O-O-OQa511Bb3Rfc812h4B80西西里防御,舍维宁根变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e6B81西西里防御,舍维宁根变例,凯列斯攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66g4B82西西里防御,舍维宁根变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66f4B83西西里防御,舍维宁根变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Be2B84西西里防御,舍维宁根变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Be2a6B85西西里防御,舍维宁根变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Be2a67O-OQc78f4Nc6B86西西里防御,菲舍尔索金攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Bc4B87西西里防御,菲舍尔索金攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Bc4a67Bb3b5B88西西里防御,菲舍尔索金攻击,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Bc4Nc6B89西西里防御,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3e66Bc4Nc67Be3B17卡罗坎防御,斯坦尼茨变例,1e4c62d4d53Nc3dxe44Nxe4Nd7B18卡罗坎防御,古典体系,1e4c62d4d53Nc3dxe44Nxe4Bf5B19卡罗坎防御,古典体系,1e4c62d4d53Nc3dxe44Nxe4Bf55Ng3Bg66h4h67Nf3Nd7B20西西里防御,1e4c5B21西西里防御,2.f4和2.d4变化,1e4c52f4B22西西里防御,阿拉宾变例,1e4c52c3B23西西里防御,封闭体系,1e4c52Nc3B24西西里防御,封闭体系,1e4c52Nc3Nc63g3B25西西里防御,封闭体系,1e4c52Nc3Nc63g3g64Bg2Bg75d3d6B26西西里防御,封闭体系中的6.Be3变化,1e4c52Nc3Nc63g3g64Bg2Bg75d3d66Be3B27西西里防御,1e4c52Nf3B28西西里防御,奥凯利变例,1e4c52Nf3a6B29西西里防御,尼姆佐维奇-鲁宾斯坦变例,1e4c52Nf3Nf6B30西西里防御,1e4c52Nf3Nc6B31西西里防御,罗索里莫变例(带g6,无d6),1e4c52Nf3Nc63Bb5g6B32西西里防御,拉布唐纳体系,1e4c52Nf3Nc63d4cxd44Nxd4e5B33西西里防御,阿根廷变例,1e4c52Nf3Nc63d4cxd44Nxd4B34西西里防御,西马金变例,1e4c52Nf3Nc63d4cxd44Nxd4g65Nxc6B35西西里防御,西马金变例,现代变例带Bc4,1e4c52Nf3Nc63d4cxd44Nxd4g65Nc3Bg76Be3Nf67Bc4B36西西里防御,加速侧翼象,1e4c52Nf3Nc63d4cxd44Nxd4g65c4B37西西里防御,加速侧翼象,1e4c52Nf3Nc63d4cxd44Nxd4g65c4Bg7B38西西里防御,加速侧翼象,马罗齐绑定,1e4c52Nf3Nc63d4cxd44Nxd4g65c4Bg76Be3B39西西里防御,加速侧翼象,布莱耶尔变例,1e4c52Nf3Nc63d4cxd44Nxd4g65c4Bg76Be3Nf67Nc3Ng4B40西西里防御,1e4c52Nf3e6B41西西里防御,保尔逊体系,卡恩变例,1e4c52Nf3e63d4cxd44Nxd4a6B42西西里防御,保尔逊体系,卡恩变例,1e4c52Nf3e63d4cxd44Nxd4a65Bd3B43西西里防御,保尔逊体系,卡恩变例,1e4c52Nf3e63d4cxd44Nxd4a65Nc3B44西西里防御,保尔逊体系,1e4c52Nf3e63d4cxd44Nxd4Nc6B45西西里防御,保尔逊体系,泰曼诺夫变例,1e4c52Nf3e63d4cxd44Nxd4Nc65Nc3B46西西里防御,保尔逊体系,泰曼诺夫变例,1e4c52Nf3e63d4cxd44Nxd4Nc65Nc3a6B47西西里防御,保尔逊体系,泰曼诺夫(巴斯切科夫)变例,1e4c52Nf3e63d4cxd44Nxd4Nc65Nc3Qc7B48西西里防御,保尔逊体系,泰曼诺夫变例,1e4c52Nf3e63d4cxd44Nxd4Nc65Nc3Qc76Be3B49西西里防御,保尔逊体系,泰曼诺夫变例,1e4c52Nf3e63d4cxd44Nxd4Nc65Nc3Qc76Be3a67Be2B50西西里防御,1e4c52Nf3d6B51西西里防御,卡纳尔-索科尔斯基(罗索里莫,莫斯科)进攻,1e4c52Nf3d63Bb5+B52西西里防御,卡纳尔-索科尔斯基(罗索里莫,莫斯科)进攻,1e4c52Nf3d63Bb5+Bd7B53西西里防御,切克霍夫变例,1e4c52Nf3d63d4cxd44Qxd4B54西西里防御,1e4c52Nf3d63d4cxd44Nxd4B55西西里防御,普宁斯变例,威尼斯进攻,1e4c52Nf3d63d4cxd44Nxd4Nf65f3e56Bb5+B56西西里防御,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3B57西西里防御,索金变例,1e4c52Nf3d63d4cxd44Nxd4Nf65Nc3Nc66Bc4B58西西里防御,鲍列斯拉夫斯基变例,1e4c52Nf3

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 考试认证 > 司法考试

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1