Restricted Doomsday Syndrome

Chapter 431: Data hedging

Once again, I waved the radioactive gray particle resonance device oscillating shock wave towards the life of the element body lying on the metal tube. The shock wave was still intercepted by the hemispherical protective cover. Just digging a big hole in the metal tube can almost be determined. The protective cover is not only aimed at the radioactive ash particle resonance device, but has also been in automatic operation. Even if it is frozen, it cannot be stopped. Once a simple oscillating shock wave is sensed, it will be automatically activated. The dense live ammunition before Omi caused to some extent Judgment interference

This is the reason why the radioactive gray particle resonance device can exert lethality this time

However, since he was hit with an oscillating shock wave, the battle was over. The image of the fall of the river popped up on the retina screen. At this time, the intensive artillery fire also fell from the height like rain, covering the body of the body lying in the metal pipe. The life of the nearly broken body has lost its ability to move, and it can only passively bear the baptism of the barrage. In the observation image of the retina screen, even if it is constantly subjected to such a violent attack, its healing ability has not completely disappeared. The more subtle The crack is shrinking, just like the dry ground is absorbing the water brought by the drizzle

However, the barrage can limit the production of the shield, which is enough

I waved the radioactive ash particle resonance device towards it again. Without looking at the oscillating space, I jumped up and grabbed the metal tube and then swayed upwards. I caught the falling river in mid-air and started the pseudo-grabbing to find the best climbing path. In the metal tube leading directly to the core of the institute

"The life of the body has been destroyed"

"Then keep going" I said that after taking out the nutritional block to replenish energy, I went deep into the pipeline with Jinjiang

On the way, I did not use pseudo-grabbing. Although I can use nutrition blocks to supplement energy, but we can carry no more nutrition blocks. There is no danger in the last battle, but in order to obtain enough data, find out who can effectively defeat the enemy. Method, almost half of the energy consumed in the entanglement is judged according to the progressive consumption of the previous two battles, the enemy will become stronger and stronger, and each subsequent battle will need to consume more energy. Therefore, when it is not necessary It ’s better to save energy, even if it will delay some time

"The reactions of the foreigners disappeared" Ban said suddenly after half an hour

"Is there a temporary data hedging space again?" I asked

"The possibility is very high" said: "Most of the research institutes have the technology and materials to create temporary data hedging space, because there are many experiments that must enter a unique space to carry out, or isolate from normal space. The technology of temporary data hedging space is not a surprise. The Goat Church has always been against the ruling bureau. Many members are themselves research members. Even if they transform the life form into a body life, the knowledge and experience they once had , Wisdom and memory will not disappear, however, because the ruling bureau's management of materials is very strict, therefore, only after occupying the research institute and obtaining the resources in the research institute, can their ideas be put into practice. "

I paused and said with doubt: "Before the fall of the 33rd area, I have never heard of the life of the corpuscles who captured the institute. Although they used strange viruses to destroy the urban area of ​​the 33rd area, I still do n’t understand how they are occupying the research institute. The security system here is still intact. If the life of the body has not been repaired, it is that they did not destroy the system. However, according to the data I got, the security system is intact At that time, the body life at that time did not have the ability to capture the research institute. Even if the strange virus or the internal response was used, it was impossible to do it in the research institute. All defense work was carried out by the security system. The security guard acts as an executor, and human beings are not allowed to come into contact with this type of work "

This cataclysm that happened a long time ago was full of various doubts, and it seemed that she did n’t even understand it. Although she has become the core of the security network, she can read some of the data sealed in the network. My brain hardware does not care about what happened that year. Things, however, the sensibility is full of curiosity. This curiosity has not been deeply interfered by the brain hardware. Therefore, the degree of conversion into data is not fast. Before the complete conversion into cold data, this sensitivity will still affect me. The behavior of

I'm quite used to and now understand the performance of brain hardware. The stronger the emotions and the emotions that are temporarily harmless in the logical judgment, the slower the conversion into data. Therefore, although my sensibility will eventually become false Something, but at the moment it was born is true and in a certain sense, I am only a real human at that moment, after that, it will become a planner disguised as an adult.

In this case, no matter what kind of frustrating, sad, entangled, and painful conclusions are drawn, there is only a moment of frustration, sorrow, entanglement, and pain. After that, the conclusion will lose its temperature, and I will not Feel frustrated, sad, entangled, and pained again

Just like now, I do n’t feel anything wrong, neither excited nor depressed, as if one string in my heart represents various emotional emotions, one string will never vibrate, while other vibrating strings, also Under the influence of this static string, the energy of vibration will soon be lost

"There are types of data manipulation proficiency in the body of the body, are they invading security systems and security guards?" When I said this sentence, the inquisitive curiosity had long disappeared.

"Impossible, it is almost impossible to invade the security system that integrates the entire ruling bureau," said Qian. "I used to think that there was such a possibility, but after becoming a part of the security network, I realized that this is nonsense. Like now, I have become the core of the security network, and the old security system in the 33rd area is also separated from the entire security system for some reason, but I still ca n’t digest this part of the security system quickly. If you ca n’t even restart the core of the security system, you ca n’t master the entire security system at all. Moreover, it is possible to restart the area hidden in the institute only when the security system of the 33rd district is stripped from the structure of the security system of the ruling bureau. The core of the security system "

"Then, the beginning of all this may not be the introduction of viruses in urban areas, but the security system of the 33rd district has been stripped from the construction of the security system of the ruling bureau." I finally came to this conclusion, "Who, use What method, for what purpose, will the thirty-three district come out? "

"... I don't know" Chi said for a while, "The other party did not leave any clues, but I think Sha, who is not a goat sect, said that the security system is very strict with the defense of the institute. Will work in the institute but absolutely do n’t know, and it ’s impossible to get close to the core security area ”

After a while, I said to her, "Yan, do you know what Shah did in the research institute?"

"She used to work in the institute and was a researcher," said Qi. "Don't she tell you too?"

"... Can you find identification on a secure network?" I asked, "Even if I work in an institute, there is a detailed division of labor?"

Fan's communication is broken

Although it is impossible to prove that Sha is the culprit of the origin of the 33rd catastrophe, but after analyzing a large amount of data, brain hardware has reached a conclusion similar to that I used my brain to think-Sha is not likely to be a simple victim.

But no matter what she did in the end, what is the purpose, now she is gradually becoming the real master of the 33rd district, and is the best partner for us adventurers. This is beyond doubt. I still think about it. Separate the computing resources of the hardware to calculate the success rate and action plan of letting Sha replace Sha

Simply using the native brain to think, the conclusion is very obvious. The biggest obstacle to let Ban replace Sha is the affection of Ban on Sha and Sha ’s guidance to Ban in these years.

I hope the brain hardware can give precise and detailed suggestions

However, this is all after dealing with the current task

When the door leading to the next area finally appeared, more than forty minutes had passed since Omi and I defeated the life of the element body. Perhaps it was due to the last lesson of the body of the security agent, and maybe it was based on physical conditions and technical standards. Restriction, this time it took much more time to try to unlock this time. When the door was opened, it was found that there was no shadow of the passage or room behind the door, only a revolving dust.

Like a portal

"There is indeed such a door at this location of the pipeline in the existing data, but there is absolutely no such thing behind the door. Although there is a lack of data that cannot be analyzed in depth, but the overall operation structure of this thing and the witch used by the body life The technique is very similar "

"Maybe those foreigners chose to enter this portal" I guessed, which could explain why they lost contact with the fire. Although they have signaling devices, if the separation distance is too long, the effective range between the signaling devices cannot be It's normal to lose contact when connecting

"Since those foreigners have received the guidance of the enemy, then I suggest that you leave this channel and look for the route to the core of the research institute from the outside."

Her newsletter has just been sent, and the suggestion from the brain hardware pops up on the retina screen-using chain judgment to enter the observation mode is a judgment for special cases. Compared to the case, I trust the brain hardware, or rather, I trust myself , Because the way the brain hardware obtains data seems to come not only from my perception of the outside, but also my brain thinking, and even my physical instincts and intuitions

The conclusions and suggestions given by brain hardware are cooler than thinking, more detailed than sense, and more flexible than instinct intuition.

After I received the suggestion from the brain hardware, the scene around the radar function that opened the chain judgment was faded, and its appearance and structure collapsed, and only a black and white linear world remained.

"There is bad news." In this wire-framed world, I saw the true appearance behind this door, "We have reached the end of this metal pipe, and there is no way ahead." This means that we can only cross this A door, go to the place designated by the enemy, and want to avoid this door from the outside, looking for other routes around the pipe behind it becomes impossible in a short time because the part of this pipe behind the door is already The whole thing disappeared "

"It's impossible for me to be able to see it clearly here," said surprisingly for a long while, she confirmed again: "I'm sure the pipeline is continuing, this part of the safety network has been controlled by me, and there is no abnormal data."

"Could it be an illusion created by the temporary data hedge space?" I asked, waving the radioactive ash particle resonance device upwards and chiseling the metal wall above

"What are you going to do? Gao Chuan" asked

"Look at whether there is a pipe behind" I answered, picking up Omi and jumping out of the pipe. Then, my naked eye saw the part of the pipe that continued to spread forward with the door as the end point, and it was there in the black and white vision of the chain judgment. I still have nothing. I tried to knock on the pipe part like a hallucination with a knife-like critical weapon. The solid touch and the dull impact sound seemed to tell me that it is real.

Although this strange phenomenon has never been seen, it is still feasible to explain it with "anomalies in world data". If this is the "truth" of the structure of the life of the body using temporary data hedging, then continue along this pipeline , I do n’t know where I ’m going to look forward. This pipe extends beyond the field of view, very tortuous, maybe it will be farther and farther from the core of the institute in the end, and may even exist in the form of a loop without an end point. Compared to entering the gray fog vortex and going deep into the tiger ’s den or trap, the chance of going directly to the core of the institute along this pipeline using data hedging structure is not great.

Although the initiative is in the hands of the other party, no one can be sure that this is not a trap of reverse thinking, but compared to luck, I believe that the judgment made by the brain hardware combined various data

"Is it a data hedge? Bian" I confirm to Bian again

It took about a minute to send a definite message: "Yes, because of your reminder, I re-analyzed the data in this part of the space. Although there is not enough information to compare, the data saved in this part of the safety network is also No problems can be found, but there are indeed some areas of concern after the range is extended to kilometers. "

"We continue to move forward for a while, you analyze it to see where this pipeline will lead," I decided.

Neither Jiang nor Omi have any objections to my decision. We have moved along this strange route again by four kilometers on the pipeline. After installing two signal device modules, the analysis is no longer necessary. Because of the abnormal state of overlapping signals, she has discovered the hole I opened in this pipeline through the monitoring device in the pipeline area.

Along the way, no matter how the pipeline twists and turns, but in the sense of being straight forward, but as a result, I and Jiang returned to the door

There is no doubt that we have entered into a huge temporary data hedging space without realizing it before.

The answer given by Fan is the same as the answer given by the brain hardware. Even if we go back, it is not likely to leave this temporary data hedge space. Temporary data hedge space is not a space in the normal space, and It is through some ways to impact and modify the data in the normal space, so that it has a certain characteristic, thus generating various peculiar phenomena

The ability used by the Mageweave messenger is, to a certain extent, the application of this data hedging technology-manufacturing specific temporary data hedging space. Using this data anomaly, manufacturing generally does not produce strong, regular and Strengthen, even weird and unconventional phenomena

Even the manufacture and use of boundary weapons and critical weapons also involve this kind of data hedging theory. It can be said that data hedging is the core of the technology of the ruling bureau

If you look at this theory and technology from a real-world perspective, it is not a hacking behavior that breaks the rules of doomsday illusion, but the interaction between a gradual internal program and the consciousness of patients with doomsday syndrome. It is a normal and objective Phenomenon because consciousness full of elasticity and instability is one of the cornerstones of this world

In theory, it is entirely feasible to form a data hedging phenomenon in the doomsday illusion from the external intervention of the patient's consciousness in the l, or the internal formula of the interference level, even in the script of Dr. Ande, which uses this external means to interfere with the end Illusory attempt

However, for the life in the doomsday illusion that can't perceive the real world, the cognition of this kind of data hedging is coupled with enthusiasm and directness-this is a level of technology, spell or ability that is sufficient to interfere with the space. www.readwn.com ~ The essence of this class of technology is probably just the interference of their own consciousness in the world structure, but as long as they think that some way is enough to form this phenomenon, it is likely to form this phenomenon, Whether this way is the strong will of idealism, or the step-by-step deepening of materialism, it is just a process.

Under normal circumstances, this kind of data hedging will gradually return to normal with the passage of time without continuous loading. This is probably because the hierarchy as the core of the world is working, and the program is more stable and strict than consciousness.

The same is the temporary data hedge space, and its degree of stability is also different. Some temporary data hedge spaces are not stable enough, and can be broken with critical weapons. Some temporary data hedge spaces are unidirectional and can leave along a specific route, but (Now I encounter a fairly stable and closed trap-type temporary data hedging space to be continued)

p

[Registered member can get private bookshelf ~ www.readwn.com ~ Convenient]

Restricted 431 data hedging of end-stage symptoms

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like