Xueba's computing system

Chapter 58 Triggered keywords?

Chapter 58 Triggered keywords?

Another notification sound of email arrival!
Lin Yuan frowned subconsciously, "Did you send it repeatedly?"

This situation does happen. After all, any software system will inevitably have bugs. What's more, it is a software system that covers network communication, where retransmission is common. Because the biggest trouble in network communication is "I don't know if you heard me."

Lin Yuan slowly opened his inbox. However, even before he opened the email, he noticed something strange just by looking at the title.

【Automatic reply: Thank you very much for your letter. 】

Although this is still an automatic reply email, the automatic reply email just now did not contain words such as "thank you very much".

Lin Yuan clicked to check the email.

[Your letter has been received. Our staff will contact you as soon as possible after arriving at the post. Please pay attention to the email reply. ]

The wording of this email is obviously much softer than the previous one, and it does not emphasize the importance of word choice to the writer.

Lin Yuan naturally did not think that he was too lucky and was therefore given special treatment. From an IT professional's perspective, he analyzed that it was most likely that the email he had just sent had triggered the keyword strategy of the other party's email processing system.

Using software or AI to pre-process emails is already a mature technology, because the customer service systems of major online shopping platforms have now been widely connected to AI intelligent customer service.

Next, Lin Yuan naturally became curious about what keywords triggered this unusual email reply.

He compared the two emails he sent carefully. In the second email, he just slightly adjusted the formatting of the lines after the other party emphasized the wording requirements, and added the signature of "Zijin Aeronautics and Astronautics University".

Lin Yuan didn't think that this slight adjustment in the format would trigger the keyword, so there was only one answer - the signature of Zijin University of Aeronautics and Astronautics.

"Ha~~"

Lin Yuan's mouth twitched slightly. It seemed that there was indeed something wrong with this organization called OCR.

Lin Yuan immediately opened the browser and typed in the search box: Universities in our country that are on the sanctions list.

Because he vaguely remembered that the school he was attending should be on the sanctions list.

The search results were quickly displayed. Lin Yuan remembered correctly that among the 15 universities sanctioned by Longguo, Zijin Aviation School was on the list.

These 15 universities were sanctioned simply because they were deeply involved in the defense industry. And using a university that is deeply involved in the defense industry as the signature actually triggered an additional email reply from the other party so quickly. . .

This is too urgent. This made Lin Yuan wonder: Why is the fisherman so eager to pull the rod when the fishing line has just started to shake?

"After all, it's too shallow." Lin Yuan got interested, and he immediately went online to get a small email account, and then sent another email to the other party. (PS: Why would Lin Yuan use the email account bound to his real-name mobile phone number to do such a thing?)
The content of the email was fabricated, but the signature was still: Zijin University of Aeronautics and Astronautics.

Of course, Lin Yuan was not stupid enough to send the email without changing his IP. He found a free proxy software on the Internet that could connect to the HK server, and then sent the email.

Although the actual public IP address changes when surfing the Internet in the LAN, the change has a time period. If Lin Yuan was stupid enough to use a small account to send emails without using a proxy, the other party would definitely summarize the source IP address of the emails. Once summarized, it would be found that the emails sent by Lin Yuan's two different accounts were either from the same IP address or from IP addresses with very close geographical locations.

Then it’s GG.

Lin Yuan used a small account to send emails in order to test the other party's strength and also out of mischief.

Not long after, the small mailbox also received an automatic reply email from the other party. However, this time the automatic reply email was not in the style of the extra email, but the original very ordinary email.

Lin Yuan understood after a little thought.

The other party doesn’t seem to be stupid enough to search directly for keywords. If you search directly for keywords in the email content, as long as "Zijin Aerospace University" is in the other party’s keyword list, it will trigger an additional automatic email reply. This is the lowest way to evaluate email content.

However, after testing with a small trumpet, this was not the case.

Lin Yuan probably guessed that some machine learning algorithms must have been used, such as: comprehensive extraction of multiple types of keywords, and then using a K-nearest neighbor algorithm. If it were a little more skillful, the entire email, from the title to the content, would be directly thrown to the AI for judgment.

Therefore, Lin Yuan concluded that the email he sent, because it had his school’s signature at the end, triggered the other party’s algorithm to take it seriously.

The content of my email was already very close to the G-spot of the other party's algorithm, and the final signature was the final blow that hit the target and tipped the balance.

To be on the safe side, Lin Yuan plans to do another test.

He rewrote an email expressing his desire to apply for computing resources, but made sure the writing style was different from his previous one, in case the other party's email retrieval system had a duplicate detection function.

Lin Yuan signed the new email with: Peking University and Tsinghua University.

This is Peking University and Tsinghua University, isn’t that pretty impressive?

Soon, he sent the email, and soon, the automatic reply was received.

However, no additional email replies were triggered. In other words, the other party was not excited at all when the emails about computing power application with similar contents were signed by Peking University and Tsinghua University.

This is a bit interesting.

The powerful Tsinghua University and Peking University actually left the other party indifferent...

Lin Yuan wanted to try other universities on the sanctions list, but this kind of computing resource application system would not receive frequent applications in a short period of time. Because obviously not many people knew about OCR.

Therefore, even though Lin Yuan has opened a proxy to change his IP, he doesn't dare to send emails too frequently. Otherwise, receiving several emails from different IPs in the same period of time is a very suspicious thing.

So what to do next? Have a good sleep.

I don’t think the other party would write such an algorithm for no reason, because this algorithm obviously has a weighted bonus for those universities on the sanctions list.

'The most cunning fishermen often appear in the form of fish.'

Lin Yuan has now lightly touched the hook on the other side, and the other side has already started to pull the rod. The best thing to do next is to wait, and you must not be anxious at this time. But you must not put on an attitude of "I will bite even if the hook is straight."

Lin Yuan did not want to dig deep into the details of COR. He had neither the ability nor the energy to do so at the moment. He just wanted to get some computing resources for free. Of course, in the process, the "North American jungle" operation would also weaken the enemy. But this was obviously not Lin Yuan's primary goal at the moment.

Lin Yuan even looked in the mirror before going to bed.

'Am I too upright? Should I read some magazines like Reader or Friend to hone my character so that I can win the trust of the enemy in subsequent communication?'

 Well, the protagonist’s idleness ends here.

  As expected, the data avalanche again. This is really amazing, twice I wrote about girls and the data was cut in half twice.

  I won’t do any more work later, thanks to the book friends who have followed this far. . .

  
 
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like