While air pollution and chemicals are believed to pose a major threat, our analysis determined that tourism served as the silent killer.
虽然空气污染和化学物质被确认为是主要的威胁,但我们的分析认定,旅游业也是一个无声的杀手。
Indeed, two recent reports from the Centre for Naval Analysis, an American military-research institute, suggest that border-related conflicts are a growing threat.
事实上,美国海军分析中心(美国军事研究机构)最近的两份报告指出,围绕边境线的冲突正越来越威胁着我们。
These images can be used for threat analysis on the ground and on buildings, by detecting and showing changes not readily apparent to the human eye.
通过探测显示肉眼很难识别的变化,这些图像可用于分析地面和建筑物的威胁状况。
Nazarbayev seemed to face no real threat of civil unrest, said Sarah Michaels, deputy director of analysis at Oxford Analytica, a global analysis and advisory form.
此决定也让人变得“愈发的好奇”,因为纳扎尔巴耶夫似乎并没有真正面临社会动荡的威胁,全球分析和咨询机构—牛津分析顾问公司分析部副部长莎拉·麦克说道。
The threat demands a comprehensive analysis capability now.
如今解决这种威胁要求具备全面的分析能力。
Digital library of the University analysis of the threat to network security, made a series of network security management strategy.
通过对高校数字图书馆的网络安全面临的威胁进行分析,提出了一系列的网络安全管理策略。
Initially, perform a baseline risk analysis based on a current threat assessment to use for developing a network protection strategy.
最初,执行基准风险分析当前威胁评估的基础上开发使用的网络保护战略。
They will surely have made their own threat analysis and estimates of risks.
他们一定会作出了自己的威胁分析和估计的风险。
Radar usage identification is the base of the radar type analysis and threat evaluation.
雷达用途识别是分析雷达型号和进行威胁评估的基础。
An impact damage tolerance reliability analysis method was discussed for composite structures by introducing an impact threat concept.
论述了基于冲击威胁概念的复合材料结构冲击损伤容限可靠性分析方法。
This paper pointed the threat faced by Three-Layer MPLS VPN first, then analysis the security of control layer, data layer and management layer, at last gave some advices to keep the system security.
本文首先指出三层MPLSVPN可能受到的安全威胁,然后分析了三层MPLS VPN在数据面、控制面和管理面上的安全性,最后提出保持系统安全的一些建议。
However, insider attack modeling and threat analysis tools have not been evolved at the same rate.
然而,攻击建模和威胁分析工具方面的研究仍处于摸索阶段。
By the use of fuzzy optimization theory and hierarchy analysis process, multiple targets detected by airborne fire control system are sorted according to their threat level.
利用模糊优选理论与层次分析方法,对航空火控系统探测到的多个目标进行了威胁程度的排序。
A new multi-target threat assessment method is proposed based on synthesis analysis to air combat capability and air combat situation.
在综合分析目标空战能力和战场态势的基础上,提出一种多目标威胁评估方法。
There are many risk assessment methods for information system, and in this paper the quantitative risk assessment method based on threat analysis is presented.
对信息系统风险评估的方法有多种,该文提出了基于威胁分析的量化风险评估方法。
Actually, SWOT analysis can provide a framework for identifying and analyzing strengths, weaknesses, opportunities, and threat.
实际上,SWOT分析可以提供一个框架,用于识别和分析的优势,弱点,机会和威胁。
After having finished a more thorough analysis of the safe threat which faces to MOM, it describes the domestic and foreign research situation, finally points out the article's research content.
其中对消息中间件面临的安全威胁做了较为深入的分析,最后指出国内外的研究现状,明确本文研究内容。
According to the analysis of the factors in air-raid targets threat ordering, the method that using rough set theory to order targets threat is presented.
通过对影响空袭目标威胁排序因素的分析,针对定性与定量因素并存的情况,提出利用粗糙集理论进行威胁排序的方法。
Analysis of how to make use of advantages and avoid the threat (ST) is the North China Pharmaceutical Group should be the development of new market segments.
分析了如何利用优势,避免威胁(ST)即华北制药集团应开发新的细分市场。
Then has analyzed own strength, the weakness and the opportunity and the threat from environment using the SWOT analysis method.
然后运用SWOT分析方法分析了武钢氧气公司自身的优势、劣势和环境的机会和威胁。
As the threat membership vectors satisfies the comparative series, then evaluate and sort the aerial targets' threat through grey relationship analysis.
然后在分析威胁隶属度构成的向量满足比较序列的前提下,应用灰色关联度分析对空中目标进行威胁评估与排序。
But to stop the analysis there is to miss the bigger threat.
但是停止分析又将错失更大的威胁。
In order to find the strength, the weakness, the opportunity and the threat of YL store, this paper analysis the macro and micro environment.
接着为了了解YL超市目前所面临的机遇与威胁及自身的优势与弱势,对YL超市进行了宏观环境与微观环境的分析。
The experiment proves the correctness and performance of vulnerability relation model, and the threat analysis method based on the model is more reasonable and effective.
实验证明了脆弱性关联模型的正确性及其优越的描述性能,基于该模型的威胁分析方法也更为合理、有效。
Automatic identification of the digital modulation type of a signal has found applications in many areas, including electronic warfare, surveillance and threat analysis.
的数字信号调制类型的自动识别已应用在许多领域,包括电子战,监视和威胁分析。
Export the complete BHO scan report along with threat analysis information to standard HTML format for offline analysis.
BHO的出口完整的扫描报告信息的分析,随着威胁标准的HTML格式的离线分析。
The marketing environment analysis has indicated the SEEPG Corporation's opportunity and the threat, defined its superiority and inferiority.
营销环境分析指明了SEEPG公司的机会和威胁,明晰了其优势与劣势。
The threat-assessment pattern analyzed the threat level to network security through multi-sensor fusion technology with the result of early warning analysis.
威胁评估模块将预警分析的结果(攻击预测)作为输入,利用多属性融合技术定量分析网络安全威胁程度。
The threat-assessment pattern analyzed the threat level to network security through multi-sensor fusion technology with the result of early warning analysis.
威胁评估模块将预警分析的结果(攻击预测)作为输入,利用多属性融合技术定量分析网络安全威胁程度。
应用推荐