« 集中連載:「ダート競馬の楽しみ」第4回 | Main | 競馬があってありがたい »

中山牝馬Sを当てるために知っておくべき3つのこと

Nakayamahinnbas


■1■京都牝馬Sで負けていた馬
過去10年の連対馬を見渡すと、20頭中、7頭は京都牝馬S組である。牝馬限定の重賞同士だけに、結びつきがあって当然であるが、着順がリンクしているとは言い難い結果となっている。京都牝馬S→中山牝馬Sという連勝は一度もなく、京都牝馬Sで惨敗していた馬の中山牝馬Sでの巻き返しが多いことが特徴である。

考えうる理由は2つ。ひとつは、古馬牝馬が重賞を連続で勝つということが、体調維持の面で難しいということ。もうひとつは、京都1600m(外回り)で行われる京都牝馬Sと、中山1800mで行われる中山牝馬Sでは、勝ち馬に求められる資質が全く違ってくるからである。京都牝馬Sが一瞬の切れ味が問われるヨーイドンの競馬になるのに対し、中山牝馬Sはスピードの持続力が要求されるレースになりやすいのである。

つまり、京都牝馬Sを切れ味不足で負けていたような、スピードの持続力を武器とする、地脚の強い馬を中山牝馬Sでは狙うべきということだ。

■2■基本的には内枠の先行馬有利
中山1800mコースは、スタンド前の上り坂の途中からスタートする。スタートから第1コーナーまでの距離は205mしかなく、上りスタートのため、テンが極端に速くなることはない。よって、スロー~ミドルに流れるのが必然といえる。ただし、過去8年のラップ(以下)を見ると、意外とそうでもなく、オースミコスモとニシノブルームーン、レディアルバローザが勝った年はハイペースで流れている。

12.2-11.2-11.8-11.6-11.5-12.2-12.0-11.5-12.1(46.8-47.8)H
12.7-12.3-12.7-12.5-12.1-12.2-11.8-11.5-11.9(50.2-47.4)S
12.4-11.4-12.1-12.0-12.2-12.5-11.8-11.8-11.6(47.9-47.7)M
12.7-11.7-12.6-12.0-11.8-12.2-12.2-12.2-12.8(49.0-49.4)M
12.2-11.6-12.4-12.3-12.3-11.8-11.8-11.5-12.5(48.5-47.6)M
12.4-11.4-12.1-12.2-12.4-12.5-12.1-11.5-12.5(48.1-48.6)M
12.3-11.2-11.5-11.7-11.9-12.3-12.5-11.8-12.4(46.7-49.0)H
12.1-10.6-11.5-11.6-12.1-11.8-11.2-12.1-12.4(45.8-47.5)H

これはコースの形態上、どうしてもスロー~ミドルに流れやすいレースを各ジョッキーが意識するあまり、いつの間にかテンが速くなり、逃げ・先行馬が厳しいペースに巻き込まれてしまうからである。その競り合いに巻き込まれず、自分のペースで走ることが出来た馬の差しが決まることもある。各馬の出方次第でペースが極端に変わってしまう難しいレースではあるが、基本的には先行馬に有利なコースであることは間違いがない。

また、第1コーナーまでの距離が短いため、内枠を引いた馬がかなり有利になることも覚えておきたい。外枠からの発走であれば、ペースが速くなったケースにのみ、差し馬にとってはレースがしやすい。ただ、基本的には内枠の馬に有利なコースである。

■3■勝ち馬は2着馬よりもハンデが重い
過去10年の勝ち馬のハンデの平均は55kg、2着馬のハンデの平均は54kgと勝ち馬のハンデの方が2着馬よりも重い。実際に、勝ち馬のハンデより2着馬のハンデが重かったのは僅か3年のみ。イメージとしては、勝ち馬は実力のある重ハンデ馬で、2着には比較的軽量のハンデ馬が突っ込んでくるというところか。

現在のランキング順位はこちら

|

Comments

just the job thanks

Posted by: cheap gates | March 19, 2012 at 12:52 PM

The crux of your writing while appearing agreeable originally, did not really settle perfectly with me after some time. Somewhere within the sentences you were able to make me a believer unfortunately only for a while. I still have a problem with your jumps in logic and one would do nicely to help fill in those breaks. In the event that you actually can accomplish that, I will undoubtedly end up being impressed.

Posted by: gates for sale | March 20, 2012 at 11:06 PM

This really answered my problem, thank you!

Posted by: laptop repairs wolverhampton | March 25, 2012 at 07:10 AM

Some genuinely great posts on this internet site , regards for contribution.

Posted by: motorcycle insurance | March 28, 2012 at 08:42 PM

Oh my goodness! an amazing article dude. Thank you However I am experiencing issue with ur rss . Don’t know why Unable to subscribe to it. Is there anyone getting identical rss problem? Anyone who knows kindly respond. Thnkx

Posted by: cheap lucky strike | March 29, 2012 at 04:54 PM

"Folks do not want to seem silly; to keep away from the appearance of foolishness, they're prepared to remain truly fools.

Posted by: foolish ashanti mp3 | May 25, 2014 at 05:05 AM

However, medicines ought to be combined with care and based on the instructions distributed by the skin doctor. Suffering from acne can cause embarrassment and more devastating psychological issues in some people. The skin is the largest organ in the body, it is the most visible parts of the body, so it only makes sense that we care for it.

Posted by: www.ykhoavn.com | June 11, 2014 at 04:18 AM

It's a shame you don't have a donate button! I'd without a doubt donate to this excellent blog! I suppose for now i'll settle for bookmarking and adding your RSS feed to my Google account. I look forward to brand new updates and will talk about this site with my Facebook group. Talk soon!

Posted by: Beth | July 07, 2014 at 07:46 AM

Hi there! Do you know if they make any plugins to safeguard against hackers? I'm kinda paranoid about losing everything I've worked hard on. Any recommendations?

Posted by: http://tightenwhatsloose.wordpress.com/ | August 03, 2014 at 11:03 PM

I think the admin of this site is genuinely working hard in favor of his web site, because here every information is quality based information.

Posted by: Millard | August 04, 2014 at 07:26 PM

I am regular reader, how are you everybody? This post posted at this web page is in fact good.

Posted by: Madonna | August 05, 2014 at 12:48 AM

I know this if off topic but I'm looking into starting my own weblog and was curious what all is required to get setup? I'm assuming having a blog like yours would cost a pretty penny? I'm not very internet savvy so I'm not 100% certain. Any recommendations or advice would be greatly appreciated. Appreciate it

Posted by: snorerx amazon | August 05, 2014 at 05:48 PM

Fantastic items from you, man. I've remember your stuff prior to and you're simply extremely fantastic. I really like what you have acquired here, really like what you are saying and the way during which you assert it. You make it enjoyable and you still care for to stay it smart. I can not wait to learn much more from you. This is really a wonderful website.

Posted by: 300 seize your glory hack | August 07, 2014 at 05:56 PM

louis vuitton I'm really inspired together with your writing talents and also with the format in your weblog. Is that this a paid theme or did you customize it your self? Either way stay up the nice quality writing, it's uncommon to peer a nice weblog like this one today..

Posted by: louis vuitton | August 08, 2014 at 03:20 AM

Ѵielen Dank! Wollt ich nur mal sagen.

Posted by: christian louboutin outlet | August 08, 2014 at 07:33 AM

(Not to mention it can help you catch some stupid mistakes in this regard. This leaves a difference in price between the Kindle 3G and Kindle Wireless reading device of $50. Run Firefox; Microsofts Internet Explorer is clunky and the most hacked software on the planet.

Posted by: Ngan | August 09, 2014 at 08:42 AM

However, if your computer is not currently infected with malware, it's possible that at some time in the past, malicious software altered your computer's DNS settings. However, there are two simple commands that the average user can try: Open the command prompt Type the following cscript "C:\Program Files\Microsoft Office\Office15\ospp. The hack performs to "activate" Windows 7 by bypassing activation completely, and as a result does not call for any item key.

Posted by: Caroline | August 09, 2014 at 07:03 PM

Zufaellig bin ichh auf еurem Portal gelandet und mhss sɑgen, dass miir dieѕe vom Design und den Infoгmationen richtig gut gefaellt.

Posted by: fake christian louboutin | August 09, 2014 at 07:19 PM

Hello! I just want to give you a big thumbs up for your great information you have here on this post. I am returning to your blog for more soon.

Posted by: Indiana | August 11, 2014 at 09:41 AM

and beyond, that home windows was wave-formed, which eventually developed into much more of a flag, because of shadowing along with other effects. Even still, script kiddies are generally looked down upon by the hacker community as a whole (be them black hat or white hat) due to the fact that they aren't of much use to either one and can be both an obstacle and an irritant to both. The tracking server tried to take action against, or users of the Bit - Torrent internetszolg.

Posted by: studentconference.net | August 12, 2014 at 08:51 AM

Click on the flashing computer in the top right hand corner. The latest Kindle has extremely well spaced keys that makes typing a breeze. Failure to do so enables open (and perhaps malicious) networks to have access to the files and information stored in your device while you are blissfully unaware of the whole thing.

Posted by: Dwain | August 12, 2014 at 12:03 PM

Domestic pets might trigger motions detectors along with deliver fake alarms. You can trust on an iphone app development company if it is a reliable company. You can find out additional about why volumes develop into fragmented by applying the "Disk Defragmenter" Aid.

Posted by: windows 7 key | March 26, 2015 at 03:53 AM

Post a comment