• While air pollution and chemicals are believed to pose a major threat, our analysis determined that tourism served as the silent killer.

    虽然空气污染化学物质确认主要威胁,但我们分析认定旅游业也是一个无声的杀手。

    youdao

  • Indeed, two recent reports from the Centre for Naval Analysis, an American military-research institute, suggest that border-related conflicts are a growing threat.

    事实上美国海军分析中心(美国军事研究机构)最近份报告指出,围绕边境线冲突越来越威胁着我们。

    youdao

  • These images can be used for threat analysis on the ground and on buildings, by detecting and showing changes not readily apparent to the human eye.

    通过探测显示肉眼很难识别变化这些图像用于分析地面建筑物威胁状况。

    youdao

  • Nazarbayev seemed to face no real threat of civil unrest, said Sarah Michaels, deputy director of analysis at Oxford Analytica, a global analysis and advisory form.

    此决定也让人变得“愈发好奇”,因为纳扎尔巴耶夫似乎没有真正面临社会动荡威胁全球分析咨询机构—牛津分析顾问公司分析部副部长莎拉·麦克说道

    youdao

  • The threat demands a comprehensive analysis capability now.

    如今解决这种威胁要求具备全面分析能力。

    youdao

  • Digital library of the University analysis of the threat to network security, made a series of network security management strategy.

    通过高校数字图书馆网络安全面临威胁进行分析提出了一系列的网络安全管理策略

    youdao

  • Initially, perform a baseline risk analysis based on a current threat assessment to use for developing a network protection strategy.

    最初执行基准风险分析当前威胁评估基础开发使用网络保护战略

    youdao

  • They will surely have made their own threat analysis and estimates of risks.

    他们一定作出了自己威胁分析估计的风险。

    youdao

  • Radar usage identification is the base of the radar type analysis and threat evaluation.

    雷达用途识别分析雷达型号和进行威胁评估基础

    youdao

  • An impact damage tolerance reliability analysis method was discussed for composite structures by introducing an impact threat concept.

    论述基于冲击威胁概念的复合材料结构冲击损伤容限可靠性分析方法

    youdao

  • This paper pointed the threat faced by Three-Layer MPLS VPN first, then analysis the security of control layer, data layer and management layer, at last gave some advices to keep the system security.

    本文首先指出MPLSVPN可能受到安全威胁然后分析三层MPLS VPN数据控制管理面上安全性最后提出保持系统安全一些建议

    youdao

  • However, insider attack modeling and threat analysis tools have not been evolved at the same rate.

    然而攻击建模威胁分析工具方面的研究仍处于摸索阶段。

    youdao

  • By the use of fuzzy optimization theory and hierarchy analysis process, multiple targets detected by airborne fire control system are sorted according to their threat level.

    利用模糊优选理论层次分析方法,对航空火控系统探测到多个目标进行了威胁程度的排序

    youdao

  • A new multi-target threat assessment method is proposed based on synthesis analysis to air combat capability and air combat situation.

    综合分析目标空战能力战场态势的基础提出一种多目标威胁评估方法

    youdao

  • There are many risk assessment methods for information system, and in this paper the quantitative risk assessment method based on threat analysis is presented.

    信息系统风险评估方法多种该文提出基于威胁分析量化风险评估方法

    youdao

  • Actually, SWOT analysis can provide a framework for identifying and analyzing strengths, weaknesses, opportunities, and threat.

    实际上SWOT分析可以提供一个框架用于识别分析优势弱点机会威胁

    youdao

  • After having finished a more thorough analysis of the safe threat which faces to MOM, it describes the domestic and foreign research situation, finally points out the article's research content.

    其中消息中间件面临安全威胁较为深入分析最后指出国内外研究现状,明确本文研究内容。

    youdao

  • According to the analysis of the factors in air-raid targets threat ordering, the method that using rough set theory to order targets threat is presented.

    通过影响空袭目标威胁排序因素分析,针对定性与定量因素并存的情况,提出利用粗糙理论进行威胁排序的方法

    youdao

  • Analysis of how to make use of advantages and avoid the threat (ST) is the North China Pharmaceutical Group should be the development of new market segments.

    分析如何利用优势避免威胁(ST)华北制药集团开发新的细分市场

    youdao

  • Then has analyzed own strength, the weakness and the opportunity and the threat from environment using the SWOT analysis method.

    然后运用SWOT分析方法分析了武钢氧气公司自身的优势劣势环境机会威胁

    youdao

  • As the threat membership vectors satisfies the comparative series, then evaluate and sort the aerial targets' threat through grey relationship analysis.

    然后分析威胁隶属度构成的向量满足比较序列的前提下,应用灰色关联度分析空中目标进行威胁评估排序

    youdao

  • But to stop the analysis there is to miss the bigger threat.

    但是停止分析错失更大威胁

    youdao

  • In order to find the strength, the weakness, the opportunity and the threat of YL store, this paper analysis the macro and micro environment.

    接着为了了解YL超市目前所面临机遇威胁及自身优势弱势,对YL超市进行宏观环境微观环境的分析

    youdao

  • The experiment proves the correctness and performance of vulnerability relation model, and the threat analysis method based on the model is more reasonable and effective.

    实验证明脆弱性关联模型正确性及其优越描述性能基于模型的威胁分析方法更为合理、有效。

    youdao

  • Automatic identification of the digital modulation type of a signal has found applications in many areas, including electronic warfare, surveillance and threat analysis.

    数字信号调制类型自动识别应用许多领域包括电子战监视威胁分析

    youdao

  • Export the complete BHO scan report along with threat analysis information to standard HTML format for offline analysis.

    BHO的出口完整扫描报告信息分析随着威胁标准HTML格式离线分析。

    youdao

  • The marketing environment analysis has indicated the SEEPG Corporation's opportunity and the threat, defined its superiority and inferiority.

    营销环境分析指明了SEEPG公司的机会威胁,明晰了优势劣势

    youdao

  • The threat-assessment pattern analyzed the threat level to network security through multi-sensor fusion technology with the result of early warning analysis.

    威胁评估模块将预警分析结果(攻击预测)作为输入,利用多属性融合技术定量分析网络安全威胁程度

    youdao

  • The threat-assessment pattern analyzed the threat level to network security through multi-sensor fusion technology with the result of early warning analysis.

    威胁评估模块将预警分析结果(攻击预测)作为输入,利用多属性融合技术定量分析网络安全威胁程度

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定