The Black Tech Life of Scum - Chapter 257
In the northwest, a branch of the Computer Technology Research Center of the Chinese Army, an old man suddenly received an internal call and then went out with joy.
“Hey, Li, what kind of wind brought you here? Why didn’t you say hello before you came?” The old man greeted the comer;
“Lao Lu, I have something to do with you, something important. An internal contact list has been opened online,” said the person seriously.
The visitor is expert Li. This time, he came from Quancheng to serve him.
Times are developing and society is advancing. Coordinating the movement and office of military personnel is no longer the way of introduction letters in the past, but a contact system on the military network that is completely independent of the Internet;
The old man is called Lu Fang, a senior expert in the domestic computer field, and a backbone in the military network and computer field;
Lu Fang completed the personnel reception procedures according to the process, which brought Expert Li into the research institute and took him to his office;
At the office of Lu Fang, as soon as he closed the door, Expert Li did not even have a drink of tea, he took out a USB flash drive he brought with him and handed it to Lu Fang;
“There is a little guy who made two things in the research institute on my side. I think it’s strange, but it’s hard to ask, so I will come to you to confirm it first,” said expert Li.
“Oh? People are on your side. You do n’t know how to ask. Instead, I came here to find the answer? What is so mysterious?” Lu Fang asked curiously while plugging in a USB stick.
“It may be related to artificial intelligence,” Li expert Shen said.
Artificial intelligence was actually proposed very early, and was proposed as early as the birth of electronic computers. It is a classification of computer science;
Different times have different understandings of this word, but all in all, it is to study it to understand the essence of intelligence and produce a new intelligent machine that can respond in a similar way to human intelligence;
Learning, thinking, consciousness, reasoning, these are all part of intelligence,
Humans have never stopped their research on artificial intelligence, and have also achieved certain results, such as special analog applications such as computers and humans playing chess, various security recognition technologies, various automatic technologies, etc .;
There are also many examples of successful commercial use in the private sector, but Lu Fang is very clear that Expert Li cannot find himself here because of these things;
Therefore, Lu Fang was not in a hurry to open the U disk. There must be a password on it, and it must be opened by expert Li Li.
“What’s going on?” Lu Fang asked.
“Speaking of this, we must first talk about a gadget that uses lasers to fight mosquitoes,” said expert Li.
“Who’s so boring, got mosquitoes with a laser?”
“This is not important. What is important is that it was made,” expert Li Shen said. “At the time, the designer gave me a sample, and when I held it, he was bored to do it. I Let me tell you, this little guy usually does a lot of boring things; “
“For example, a helmet that forces people to quit smoking, a tea set that automatically makes tea and tea, so I hold it without taking it seriously, and put it in the room and open it, anyway, it consumes no electricity, and is boring Just observe it, and then you have an amazing discovery; “
“This little thing is not only very sensitive and accurate, but also has the ability to learn and correct itself. At the beginning, it may take more than one second to two seconds to hit a mosquito. It takes no more than half a second to shoot down a mosquito; “
“At first I thought it was my own illusion. Later, I did an experiment. It really hits faster and faster, and the detection distance will increase. You also came down from the battlefield. It is clear that our grasp of time is still It’s a bit accurate. At the ear piercing of a cat, half a second is enough to decide life and death; “
“If it’s just this thing, I’m not quite sure until he comes up with a walking device called a walking machine. You can understand this thing as a wheelchair that can walk automatically through control;”
“I used a prototype to conduct experiments. On the same road, the first walk took three minutes. The second walk took five seconds less, and the third walk took another three seconds. These changes in time are not an increase in speed, but rather they will optimize the walking path by themselves and choose to directly avoid some fixed obstacles; “
Lu Fang asked, “First of all, what is the main purpose of your coming to me?”
“Two ideas, one is to see if this thing can be encrypted, and then see if these technologies have military value,” said expert Li.
“Let ’s talk about the second question first. In fact, I do n’t say that you have the bottom of your heart. This automatic learning technology has advantages and disadvantages if it is used in the military. Soldiers will have dependencies and will not be mentioned. On tanks or warships, it can indeed get an optimal driving route quickly, but at the same time it also gives the enemy the opportunity to bury or set ambush on your route, which is a big problem; Speak slowly.
“It should be a good choice for automatic aiming artillery or missiles. However, this has some limitations. It is more applicable only to the close-in artillery systems of missiles or warships, and it is overly dependent on electronic equipment. The test in the electromagnetic environment, even under the influence of electromagnetic bombs, is not small. “
“When it comes to encryption, whether it is artificial intelligence or something else, it is always a program. No matter how complicated it is, there is always a logic there, as long as there is enough interest to understand it. The principle, or logic, to crack or imitate is only a matter of time and investment; “
“The reason why the military network has not been invaded is largely because of our high level of confidentiality and personnel awareness. It may also have been blocked by the enemy ’s access to some channel leaks. The Internet is also very easy to be invaded. The reason is very simple. It is built on the same platform. It may be difficult to build it, but there are many ways to destroy it; “
“Some time ago, we received a programming system here. It is very powerful and has the ability to learn by itself. In the future, it can even subvert the current computer software structure. It can be seen that it is also running on a binary computer, but Its logic is weird. We have tried our best to break it; “
“You also know that computers are the same thing. High and low levels are used to represent 0 and 1, which are input into the processor for calculation. The higher the frequency, the more threads, and the faster the calculation;”
“But this system, obviously, uses the platform of this set of rules to operate, but it does not seem to be restricted by this set of rules at all, so until now, let’s not talk about it, even if its principles have not been understood, I think that to say true encryption, we must reach such a level! “Lu Fang expressed solemn expression when he said this.
“Hahaha, maybe you know this system. If I’m not mistaken, it should be called a Chinese programming system. However, it doesn’t need any operating system support, but it has no system. Running programs; “expert Li laughed.
“How do you know? Forget it, keep it secret!” Lu Fang was surprised, then turned dull again, and the discipline had long been deeply imbedded in their minds.
“I haven’t come here for nothing if I have you,” laughed Expert Li.
Lu Fang’s face was strange, but he didn’t ask much, but staggered the topic:
“Actually, I think the laser mosquito you said is very interesting. Before the end of World War II, there was no radar. Everyone in air combat can only detect enemy aircraft by sight and hearing, and then use artillery or fighter aircraft to attack the enemy Machine shot down; “
“Then it entered the era of jet fighters, and radar technology has also become popular. With the eyes, the method of hearing has fallen behind. By the time of the third generation of aircraft, the theory of air combat basically used missiles for over-horizon strikes. The machine guns used for close-range fighting are no longer useful, and even the role of anti-aircraft artillery is getting smaller; “
“Now the fighter has developed to the fifth generation. Previously, only Mi had it. Now we have it, and we also have a bear. In the face of fighters with stealth as the design point ~ www.mtlnovel.com ~ the role of radar has become smaller, The reflection area of a bird in the air is larger than that; “
“Although it has not yet reached the point where it is necessary to return to visual reconnaissance operations, what about the next six generations of fighters? Visual stealth plus radar stealth cannot be achieved with the current technology for at least ten or even twenty years. So, that The technology of laser hitting mosquitoes, as long as it is enlarged, and the laser is replaced with anti-aircraft guns or missiles, plus radar, it is undoubtedly a very advanced air defense system, even leading the world! “
Expert Li thought that this was the truth, not that he did not have this consciousness, but was paralyzed by some information;
Because there are no stealth missiles around the world, the huge tail flame makes stealth impossible. However, the speed of the supersonic missile several times the speed of sound makes it almost impossible for the ground-based air defense missile to intercept;
The response speed is too slow. At present, only Mao Xiong and Lao Mi can have an early warning mechanism for missile strikes around the world;
However, if you have this last layer of defense, it doesn’t matter much. If it is a conventional warhead, it will be very different from being hit by a mile or two from the ground;
Of course, nuclear bombs are meaningless.
What’s important is that Expert Li knows very well that the programming system that caused Lu Fang’s headaches is in the hands of Zhang Yifan. Although it can’t be said, he is confident now;
The reason why I found this is that I was afraid of Zhang Yifan’s disgust above, because the programming system submitted for so long, but there was no statement on it;
Now that the reason is clear, it’s easy to handle. Next, just see if Lu Fang’s team can crack these two software …..
(https: //)
Remember the first domain name in this book:. Mobile website reading URL: