Chapter 3265

"Boss, what's going on?"

When I heard this question, I wanted to say that we should open those Japanese first, but before I could speak, I suddenly found a rather unstable strange identification signal in my electromagnetic field.

The recognition signal between the dragon race is a kind of code mixed with the characteristics of its own brain wave. This kind of thing has very large randomness, and there is no regularity to speak of. If we have to say that this kind of recognition code has any law, it is that the law of thinking mode will be more unified. In fact, it's just like the way humans recognize the same kind, which is usually based on their looks. If the facial features of two people are digitized and compared, they can hardly find any worries. However, other people will know that some people look alike and some people do not. This is a very complex cognitive model.

Our dragon's recognition signal is not as easy to recognize as a simple electronic transponder. Our brain wave signal itself represents our mode of thinking. Therefore, each member of the dragon clan has its own independent signal. There will be no overlap between the two, thus avoiding the situation of wrong people. At the same time, because everyone's thinking characteristics are completely different, we can accurately identify the signals of each member in the mental network.

But the signal I just received was very odd. The source of this signal is not one, but a large group, the number is at least more than 20, and because it is too dense to identify the number. In addition, the reason why I say this signal is very strange is mainly because it has some characteristics of our dragon race. No, it should not be said that it has the characteristics of our dragon nationality. This feeling is more like that the other party deliberately imitates our characteristics, but because we do not know enough about us, it seems that they have learned a lot.

This part is the beginning of our dragon clan's device. Because the mechanical coding is relatively simple and direct, we will add a mechanical identification code at the beginning of the signal, so that our electronic brain can identify the source of the signal, and then only transmit the needed signal to the biological brain for processing, and the other parts will be shielded. This is also an effective way to improve the signal processing ability.

The other party obviously knew that there was such a structure in our identification signal, so they also added such a mechanical code, and I was very surprised that the other party's code actually existed, rather than a random one.

At present, there are mechanical identification codes in IFF response systems used in various countries, but this code is not fixed, but a dynamic code. This code is different from password. It is not a certain number, but a dynamic variable. When you transmit the identification code, the transponder on the opposite side receives the signal, and then it is brought into a set of dynamic formulas for calculation, and finally a result is obtained. If the number of the result is the same as the predetermined number, it means that the response has passed, and the opposite side is a friendly army, otherwise, it means that the other side is an enemy.

In this process, because the operation formula used by your transponder is always changing, if you bring a group of numbers in advance, there is certainly no way to pass the response. Because no one knows what formula is currently used by the transponder, you can't change the number according to its formula.

So, to cheat this kind of coding, we need a rule. For example, we agree to divide the current time into three groups of two digits according to the hour, minute and second, and require the calculation formula to multiply the three two digits by three, and then add the number you give to get the more or less, so that it is passed. This is the rule of engagement. If the other party does not know this rule, they will not be able to give the appropriate number according to the current situation. Moreover, because the change is accurate to seconds, the artificial method can not keep up with the change speed, because this formula is equal to changing every second. Of course, the actual response rule is much more complicated than this one. I'm just going to give a simple example.

This recognition coding mode is very complex. Although it can still be stolen and cheated in advance, it is very difficult to do this. That is to say, it is very difficult to cheat this response mode under normal circumstances. Moreover, in the response mode used by some special units, only one final number is correct.

Some people may think that it's easier for the other party to get a good score in the end?

That, of course, is impossible. It is true that more correct answers will increase the hit rate of the opponent. However, considering the complexity of the response signal itself, this improvement is almost equal to no improvement. It's like buying a lottery ticket. Suppose the hit rate of this lottery is one in 10 billion, that is to say, when the lottery starts, the grand prize is a number selected from 10 billion numbers. When you fill in one lottery ticket and ten lottery tickets, the hit rate of the latter will certainly be a little higher, but this kind of improvement is known by everyone as basically equal to no improvement, because you are still very difficult to meet.

However, in fact, adding multiple answers to a response is actually more difficult to muddle through, because the answer itself is the filling number of the second group of responses, which is called composite response recognition.

Take a simple example. Suppose there is a dynamic formula, when answering, you need to fill in the number, and then get the calculation result. As long as the answers are single digits, they are all correct. It seems that the hit rate is quite high, because the Da Na is not only one number, but can be from 1 to 9. It seems that there are many answers.However, in fact, the calculation results will be used for secondary identification.

For example, air force identification numbers are 1 to 3, Navy 4 to 5, army 6 to 8, and 9 logistics units. You drive a fighter plane, and the other party makes response recognition. You deceive the transponder because you get the coding rules of the other party. Then you get the number 6, which seems to be right, but in fact, it is tantamount to exposing the fact that you are the enemy. Because you drive fighter planes, but the army does not have fighter planes. Even the army aviation forces only have helicopters and a small number of attack planes. Fighters are all air force sequences. In other words, as long as the answers of fighters are not 1 to 3, they will be wrong.

This method sounds very simple, in fact, it is very simple, but it is precisely this kind of coding that most easily confuses the enemy. Because the identification code of the army can be changed at any time, and the enemy can't steal your intelligence as fast as you can change the code. In this way, as long as the authentication method of the identification representative of the army changes once in three or five days, the enemy's spies will not be able to send useful intelligence even if they are exhausted, because they will be invalid when they get the correct information.

The signal I just received is such a wrong identification code.

The number rule of this mechanical code is correct, because the final answer is the identification code of our own people of Longyuan, and it is not an outsider, or our own identification code of the dragon family.

Originally, it seems that there is no problem, after all, the identification code given by the other party is correct. However, the biggest failure of the other party is that they actually used our dragon identification code.

We dragon people have a mind network, and in the mind network, we are all a whole, just like in a small network community, we can see each other's way of thinking, and can accurately according to this way when the other party is who. This is the same as ordinary people in reality to see an acquaintance's face can call each other's name is the same, this is a very simple truth.

But these guys who fake our signals use our code, which means they steal our names, but their mind wave signals are a complete mess. It's like someone running up in front of you and saying that he's your colleague, turns out to be nothing like the person he's talking about. It's a joke in reality, but for us, that's what the other party is doing now.

The identification code of the other party is equivalent to our network name. After the other party goes online with our network identification code, it is obvious that he is not himself. We are not even needed. As soon as we receive the signal, we find that this is not our own person at all. Ridiculous, the other party thought they had already got our identification code and applied to join our mental network.

"Boss, what's the situation?" I received such a signal, of course, other people around me also received it, but this signal is too obvious, except that the mechanical identification code in front of me is correct, the other parts are totally wrong. This kind of muddle up deceiving way unexpectedly still hopes to join our mind network, these bastard brains are sick? Besides, we don't care whether it looks like it or not. Even if they camouflage perfectly, can join our mind network, but they come in to do what?

The soul network of dragon people is a kind of thinking network, which is a computing mode similar to cloud computing used by biological computers. Each individual dragon is an independent computer, and the mind network is our cloud computing platform. The cloud computing platform is not a computing program, but an artificial intelligence, that is, the collective wisdom in legend. This is why we dragon people are so harmonious, because each of us is only a part of the mental network. We are like many branch parts of a huge collection of wisdom. Just like a person who controls his own hands and feet will never interfere with each other, our mental network itself is a huge collection of wisdom, just like an independent body of consciousness. We are the hands and feet of the conscious body, and the conscious body is certainly a matter that can be easily captured.

However, the other party actually tried to cheat our identification code, and then mixed into our mental network. This is obviously quite a brain drain.

Not to mention our cloud computing mode, there is no way for ordinary people to invade with computers. After all, this itself is not a part of us. Suddenly, a thought that does not belong to him is inserted into a conscious body. What do you think will happen?

What's more, even if the previous problems are all shelved, regardless of it, we intend that the other party can join our mind network completely without obstacles, but what about that?

It's the same as the human brain, because it's not our human brain, it's not our human brain.

Human beings do not emerge out of thin air. Human beings have evolved from the simplest single celled organism to the present state. In this process, an evolutionary individual suddenly evolves neural cells, and then this feature is inherited and gradually amplified. Finally, nerve cells evolve into simple brains. Of course, the original creatures with brains, in fact, have almost no brain capacity, and their thinking ability is very low. However, with the evolution, the brain has become more and more developed, and then to the present level of human beings.Evolution is not the same as nature. The evolutionary rule of nature is the survival of the fittest, not purposeful modification. Therefore, the human brain in the evolution process is actually a process of inheritance and development. The brains of those primitive creatures did not disappear completely from the human brain, and in fact, the process was like building blocks. In fact, in the process of evolution, human beings constantly add things to the brain of primitive creatures, and finally get the human brain. In this process, although some unnecessary brain structures degenerate, they are not completely degraded. This is why humans can not use all our brain structures, because these structures are in the past Some of the useless parts of evolution. These parts are not completely degraded, they are still working, but because there is no corresponding organ and corresponding functional system, they can only be idle all the time.

In other words, the human brain has a lot of useless bits and pieces, and our brain is not the same.

Our dragon clan is an artificial biological weapon, so we pay attention to efficiency. We don't have any extra parts in our brain, all of our brain capacity is 100 percent available. Therefore, although our brain capacity is actually a little smaller than that of human beings, our thinking and computing ability is totally unimaginable.

It is because of this powerful computing power that surpasses everything, so our thinking speed will be so fast.

Usually, when we use human thinking mode for calculation, our brain is in idle state, and our normal thinking mode should be 16 times speed mode, that is, combat mode. When we enter the battlefield, we will fully activate our brain. At this time, our thinking speed is 16 times faster than that of normal people, which means that the pictures that normal people see are played slowly in our sense. However, the mind network is a network with very large data throughput, so our mind network is operated according to our thinking speed, that is to say, it is a 16 times faster network, where all information is flashed by. With the speed of human thinking, even if we invade our network, we can't see anything clearly, right?

www.novelhold.com , the fastest update of the webnovel!