Chapter 9: Login

Style: Science Author: Wen Geng JunchiWords: 2316Update Time: 24/01/12 03:57:34
Qi Ao, Mao Mo, An Gui and others also came to the conference room.

Everyone looked at this box with an interface and asked, "How do you get in?"

Qi Ao found an instruction manual from behind the box. You can enter through the interface. If you enter directly using a computer, access to data is limited. The second method is to enter through the sensor helmet. But it is also in the testing phase now.

Qi Ao said: "The instruction manual states the dangers of accessing through the helmet. You must exit through the normal exit method and cannot force exit, otherwise it will be dangerous."

Sensor helmets contain brainwave sensors and other biosensors. The brainwave sensor is a device that uses current amplification technology to detect the weak electrical signals on the scalp and skin surface to obtain the brain activity state. It is placed on the head through multiple electrodes. After installation, the sensor detects the potential changes in the head and converts them into useful signals. Biosensors also detect other signals, such as heart rate, brain waves, and muscle activity. Based on signal analysis, users can obtain information about the virtual world.

The detection of the virtual world is similar to the use of VR equipment. The principle is based on kinematic sensing technology, using sensors to monitor the user's movements, then converting these movements into electrical signals, and then sending them to the controller to control the virtual reality environment. events and images in . You can use your limbs to interact, control and manipulate physical objects in the virtual reality environment and run simulation programs in real time.

The production process of the virtual world requires the use of some professional technologies, including 3D modeling, virtual scene design, physical simulation and animation production, etc.

First, use 3D modeling tools to create terrain, objects, and other digital content based on the content you want to experience. This digital content is then arranged in a three-dimensional virtual scene and modified accordingly as needed. Then, use physics simulation tools to handle interactions between objects (such as gravity, elasticity, or collisions). Finally, use animation tools to handle NPC behavior and dialogue.

"Sensor helmet? There aren't any here."

"No, I looked around."

"Do I have to make it myself?"

"How to do this?"

Qi Ao said: "Let me take a look at the instructions. I need some brain wave sensors and other biosensors, earphones and microphones, and signal lines."

Zhan Guyue said: "Is there one in this town? When can it be made?"

Jiang Jue said: "Yes, there is a market for electronic components."

Qi Ao said: "If you have it, you can assemble it."

Liu Mozhi said: "Ah, is Mr. Tang asking us to help him complete the production?"

Qi Ao quickly went to the electronic components market in town to buy components. After he arrived, a middle-aged man greeted him and welcomed him to his store to see the products. Qi Ao took out the list and asked him, "Do you have these materials and sensors in your store?"

"some."

Qi Ao said: "Do you want all these? You have quite a complete range of things here. I originally thought I would have to find several stores."

"There are all of these, it's more of a coincidence. Maybe someone came to buy these things?"

Qi Ao said: "Ah, do you also want to buy these things and do brain wave testing?"

"I don't know what it is for, maybe. Some people who make games may need these electronic components."

Qi Ao said: "Ignore them. First help me find things according to this list."

The manufacturing process of brainwave sensors requires technologies including circuit design, signal processing, and programming. First, make a sensor that can detect human brain waves and connect it to the corresponding signal processing unit. Then, use signal processing tools to amplify and filter the read data accordingly to obtain a valid signal. Finally, a programming language is used to update the data collected from the sensors in real time, thereby updating the content displayed in the virtual world experience in real time.

After returning, Qi Ao assembled and spliced ​​the various sensors.

Make up 3 helmets and connect the sensor helmet interface to the interface of the box.

Qi Ao sorted out his ideas. The process of design and use includes: designing VR hardware, including helmets, controllers, monitors, etc.; writing software, including 3D game engines, virtual reality engines, etc.; assembling hardware, integrating helmets, controllers, monitors, etc. etc. are assembled together; installing the software, installing the software onto the hardware; testing, testing the functionality and performance of the VR device. It's quite complicated. I don't know how long it took Mr. Tang.

Zhan Guyue, Dong Chu, and Liu Mozhi brought chairs and prepared them, ready to put on helmets and enter the network.

Qi Ao said: "I'd like to emphasize again, this manual states the dangers of accessing through the helmet. You must exit through the normal exit method, that is, exit with a password. You cannot force exit, otherwise it will be dangerous."

"OK."

They put on their helmets and enter the interface. The data streams seen when entering the network through computers and helmets are different. After they entered, they saw that they were controlling a data carrier. There are also some checking programs on the side, think of them as intrusion programs.

Zhan Guyue said: "Isn't this a normal access method? Why is it regarded as an intrusion program?"

Dong Chu said: "Maybe the system is incomplete?"

Liu Mozhi said: "Perhaps it has not gone through the normal preliminary verification steps?"

There are a large number of ports and access addresses. Need to narrow down your search.

"Mao Mo, An Gui, can you do it? Narrow the search scope and find out the port range that Mr. Tang is most likely to log in to recently."

Mao Mo said: "Okay, it should be possible. We use computer programming to search outside. Some of your information is transmitted through the data line, including the data flow of the port you encountered."

Liu Mozhi said: "Why are so many ports accessing this system? Shouldn't it be that only Mr. Tang has accessed this? This is not disclosed to the public, right?"

Mao Mo said: "It's very strange, since there are other ports for access. Who are these? Where are they?"

Maomo and Angui wrote a program, built a model, and analyzed the data. It was found that these addresses are all virtual. Some method needs to be used to restore the real address.

The censorship program is still tracking and some barriers have been put in place.

"It asked questions at first, but we didn't answer. What was it asking?"

"Is it similar to a verification code?"

"Find the extreme value of function f(x)=2x^2+5x+1."

"What is this? Is it a high-level mathematics question?"

"Yes, this is the verification code for login."

"Fortunately, this question is relatively simple."

"Solution: f'(x)=4x+5=0, we get x=-5/4. Therefore, f(-5/4) is the extreme point. Substitute -5/4 into the original function to get f( -5/4)=2(-25/16)+5(-5/4)+1=-31/16. So the extreme value of function f(x) is -31/16."

"x tends to positive infinity, lim(si

What is x) equal to the root of x/? ” the inspection program asked.

"Equal to 0."

"f'(cosx)=cos2x, find f''(x)."

"Differentiating on both sides of f"(cosx) = cos2x, we get f"(cosx)dcosx = -2si

2xdx, that is, f"(cos.x). (- si

x)dx = -4si

xcos xdx, simplify and get f"(cosx)=4cosx. Let cosx= t, , then f"(t)=4t. So we can get f"(x)= 4x, |x|≤1."

"If f(x) has a second-order derivative on [-1,1], and f(0)=f(1)=0, assuming F(x)=x2f(x), then on (0,1 There is at least one point a in ) such that F"(a)=0. Judge whether it is right or wrong. "

"Yes. Use Rolle's theorem to prove it, or use Taylor's formula to prove it."

The checkers left, and I don't know if they will come back to check on them again.