Although a large number of studies have focused on various aspects of politeness,very little is known about how politeness intention is activated cognitively during verbal communication.The present study aims to explo...Although a large number of studies have focused on various aspects of politeness,very little is known about how politeness intention is activated cognitively during verbal communication.The present study aims to explore the cognitive mechanism of politeness intention processing,and how it is related to pragmatic failure during cross-cultural communication.Using 30 Chinese EFL university students who were instructed to finish a probe word judgment task with 96 virtual scenarios,the results indicate that within both mono-and cross-cultural contexts,the response time in the experimental scenarios was significantly slower than that of the filler scenarios.This suggests that politeness intention was activated while understanding the surface meaning of the conversation;however,the EFL learners could not completely avoid the negative transfer of their native politeness conventions when they were comprehending the conversational intention of the target language.Furthermore,no significant differences in response time were found between the groups with high and low English pragmatic competence,illustrating that transferring the pragmatic rules and principles into cross-cultural communication skills was more cognitively demanding.Overall,this study adds to the literature on politeness research and provides some implications for foreign language pragmatic instructions.展开更多
This paper discusses problems of multicasting and its application. Two ways are proposed to overcome theproblems of multicasting according to the architectures of current networks and the functional requirements of as...This paper discusses problems of multicasting and its application. Two ways are proposed to overcome theproblems of multicasting according to the architectures of current networks and the functional requirements of asurveillance System. One is that Winsock API is directly used to implement multicasting on a network supportingmulticasting. The other adopts the technology of proxy server and tunneling on a network not supporting multicast-ing. In addition,this paper discusses some techniques of multicasting,such as sending,resending,auto-adjusting withthe change of the transmission quality of networks,and the management of multicast group and multicast addresses.展开更多
Security of smart technologies like smart grids and crowd energy systems cannot rely only on technical solutions, humans play a significant role in failure, security culture, information security, cyber security, trus...Security of smart technologies like smart grids and crowd energy systems cannot rely only on technical solutions, humans play a significant role in failure, security culture, information security, cyber security, trust and sharing, and perceptions and concern. This paper investigates security issues in smart technologies and the related role of human failure, whether it is intentional or unintentional.Methods that help reducing this failure are discussed. A human oriented framework for failure reduction is presented in order to enhance security.展开更多
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems(ICS).These systems are becoming more connected to the internet,either directly or through the co...Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems(ICS).These systems are becoming more connected to the internet,either directly or through the corporate networks.This makes them vulnerable to cyber-attacks.Abnormal behaviour in floodgates operated by ICS could be caused by both(intentional)attacks and(accidental)technical failures.When operators notice abnormal behaviour,they should be able to distinguish between those two causes to take appropriate measures,because for example replacing a sensor in case of intentional incorrect sensor measurements would be ineffective and would not block corresponding the attack vector.In the previous work,we developed the attack-failure distinguisher framework for constructing Bayesian Network(BN)models to enable operators to distinguish between those two causes,including the knowledge elicitation method to construct the directed acyclic graph and conditional probability tables of BN models.As a full case study of the attack-failure distinguisher framework,this paper presents a BN model constructed to distinguish between attacks and technical failures for the problem of incorrect sensor measurements in floodgates,addressing the problem of floodgate operators.We utilised experts who associate themselves with the safety and/or security community to construct the BN model and validate the qualitative part of constructed BN model.The constructed BN model is usable in water management infrastructures to distinguish between intentional attacks and accidental technical failures in case of incorrect sensor measurements.This could help to decide on appropriate response strategies and avoid further complications in case of incorrect sensor measurements.展开更多
文摘Although a large number of studies have focused on various aspects of politeness,very little is known about how politeness intention is activated cognitively during verbal communication.The present study aims to explore the cognitive mechanism of politeness intention processing,and how it is related to pragmatic failure during cross-cultural communication.Using 30 Chinese EFL university students who were instructed to finish a probe word judgment task with 96 virtual scenarios,the results indicate that within both mono-and cross-cultural contexts,the response time in the experimental scenarios was significantly slower than that of the filler scenarios.This suggests that politeness intention was activated while understanding the surface meaning of the conversation;however,the EFL learners could not completely avoid the negative transfer of their native politeness conventions when they were comprehending the conversational intention of the target language.Furthermore,no significant differences in response time were found between the groups with high and low English pragmatic competence,illustrating that transferring the pragmatic rules and principles into cross-cultural communication skills was more cognitively demanding.Overall,this study adds to the literature on politeness research and provides some implications for foreign language pragmatic instructions.
文摘This paper discusses problems of multicasting and its application. Two ways are proposed to overcome theproblems of multicasting according to the architectures of current networks and the functional requirements of asurveillance System. One is that Winsock API is directly used to implement multicasting on a network supportingmulticasting. The other adopts the technology of proxy server and tunneling on a network not supporting multicast-ing. In addition,this paper discusses some techniques of multicasting,such as sending,resending,auto-adjusting withthe change of the transmission quality of networks,and the management of multicast group and multicast addresses.
基金supported by the by the Canton of Fribourg,Switzerland,through the smart living lab project at the University of Fribourg
文摘Security of smart technologies like smart grids and crowd energy systems cannot rely only on technical solutions, humans play a significant role in failure, security culture, information security, cyber security, trust and sharing, and perceptions and concern. This paper investigates security issues in smart technologies and the related role of human failure, whether it is intentional or unintentional.Methods that help reducing this failure are discussed. A human oriented framework for failure reduction is presented in order to enhance security.
基金the Netherlands Organization for Scientific Research(NWO)in the framwork of the Cyber Security research program under the project“Secure Our Safety:Building Cyber Security for Flood Management(SOS4Flood)”.
文摘Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems(ICS).These systems are becoming more connected to the internet,either directly or through the corporate networks.This makes them vulnerable to cyber-attacks.Abnormal behaviour in floodgates operated by ICS could be caused by both(intentional)attacks and(accidental)technical failures.When operators notice abnormal behaviour,they should be able to distinguish between those two causes to take appropriate measures,because for example replacing a sensor in case of intentional incorrect sensor measurements would be ineffective and would not block corresponding the attack vector.In the previous work,we developed the attack-failure distinguisher framework for constructing Bayesian Network(BN)models to enable operators to distinguish between those two causes,including the knowledge elicitation method to construct the directed acyclic graph and conditional probability tables of BN models.As a full case study of the attack-failure distinguisher framework,this paper presents a BN model constructed to distinguish between attacks and technical failures for the problem of incorrect sensor measurements in floodgates,addressing the problem of floodgate operators.We utilised experts who associate themselves with the safety and/or security community to construct the BN model and validate the qualitative part of constructed BN model.The constructed BN model is usable in water management infrastructures to distinguish between intentional attacks and accidental technical failures in case of incorrect sensor measurements.This could help to decide on appropriate response strategies and avoid further complications in case of incorrect sensor measurements.