• A risk assessment model based on threat assessment and simulation attack is proposed, and a kind of prototype system is designed and realized.

    提出了一个基于威胁评估模拟攻击的安全风险评估模型设计实现了网络安全评估原型系统

    youdao

  • The content of battle damage simulation is briefly introduced in this paper, while the basic structure and modeling methods of threat model, equipment model and damage model are discussed in detail.

    该文简要介绍了装备战斗损伤仿真内容详细论述了威胁模型装备模型损伤模型基本结构建模方法

    youdao

  • Via the method mentioned above, the generated route has the function of terrain following, terrain avoidance and threat avoidance. Simulation results are provided to illustrate the idea.

    仿真结果表明生成航迹具有地形跟随、地形回避威胁回避功能

    youdao

  • Simulation results show that the maximum membership degree method is simple and can effectively implement threat level sequencing of the targets in multi-aircraft, multi-target cooperative air combat.

    仿真结果表明最大隶属方法简单易于实现有效解决多机目标协同空战中的目标威胁排序问题。

    youdao

  • The simulation result indicates this model can efficiently solve the problem of target threat evaluation, and help commanders to allocate targets and improve the efficiency of air defense combat.

    仿真结果表明模型能够有效地解决目标威胁评估问题能够有助于指挥员进行目标分配提高防空武器系统性能。

    youdao

  • The simulation result indicates this model can efficiently solve the problem of target threat evaluation, and help commanders to allocate targets and improve the efficiency of air defense combat.

    仿真结果表明模型能够有效地解决目标威胁评估问题能够有助于指挥员进行目标分配提高防空武器系统性能。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定