• The software includes three subsystems: database system, aircraft target vulnerability model system and graphics visualization module.

    软件包括数据库系统易损性评估系统可视化模块三大子系统。

    youdao

  • After the analysis and comparison of the existing vulnerability analysis methods, a new vulnerability model of distributed systems based on reliability theory is proposed.

    现有脆弱性分析方法进行分析比较提出基于可靠性理论分布式系统脆弱性模型

    youdao

  • The fragmentation artillery warhead is utilized in the paper. The target damage tree is used to build vulnerability model by means of analyzing the vulnerability of vehicle of launching missile.

    本文采用战斗部为破片式战斗部,通过导弹发射车易损性分析,目标毁伤建立目标易损性计算模型

    youdao

  • A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.

    公司用于检测漏洞保护s OA基础结构业务策略中包含用于目标和攻击之间多个SOA深度防御模型

    youdao

  • A computer network vulnerability evaluation system is designed based on attack graph modeling method. The computer network security evaluation tools and model check tools are integrated in the system.

    攻击建模方法为基础,提出了综合利用网络安全评估工具模型检验工具计算机网络脆弱性评估系统设计方案

    youdao

  • Based on the structure preserving model, according to the variation of transient energy in power network, line vulnerability index and outset vulnerability index are defined.

    结构保持模型基础上,根据网络暂态能量变化规律,定义了支路割集的脆弱性指标

    youdao

  • A visual model is set up by using GIS technology combined with the method of working out the earthquake vulnerability index curve.

    本文将求解建筑物地震易损性指数曲线的分析方法程序GIS技术相结合建立可视化模型

    youdao

  • The proposed fuzzy pattern recognition model under fuzzy environment is applied to theevaluation of groundwater vulnerability.

    模糊环境模糊识别理论具体应用地下水脆弱性评价中。

    youdao

  • Secondly, the dissertation analyzed and induced network vulnerability scanners' functions, and presented a CIM model of the scanner.

    分析归纳网络漏洞扫描系统功能基础上,构建了其对应的CIM通用模型

    youdao

  • The dissertation studied the management information modeling method based on CIM, then presented a CIM model of network vulnerability scanner.

    本文基于CIM管理信息建模方法进行了研究提出一个网络漏洞扫描系统的CIM管理信息模型

    youdao

  • Based on the DRASTIC model, the fuzzy analysis theory and method which are suitable for evaluating aquifer vulnerability are established and have been used in Cangzhou City.

    以DRAST IC模型为基础建立了评价含水层污染性难程度模糊分析理论方法应用沧州市区地下水系统脆弱性评价。

    youdao

  • A perfect security vulnerability collection model based on the notion of vulnerability auto-collection is proposed.

    提出了一种完善安全漏洞收集模型

    youdao

  • According to the specific conditions of semi-confined aquifer in the urban area of Changchun City, the catastrophe model was selected for vulnerability assessment.

    根据长春城区半承压含水层具体状况突变理论进行脆弱性评价。

    youdao

  • The model displayed a hierarchical structure for system risk, in which the possibility and consequences of threat were evaluated by three risk factors - asset, vulnerability and control measure.

    模型应用资产弱点控制措施威胁发生可能性后果进行评估呈现系统风险层次结构

    youdao

  • Influence of geometrical parameters of slope, space location and disaster-resisting performance of hazard bearing body on vulnerability are analyzed based on the model.

    并采用该模型分析了几何特征参数、受灾体空间位置以及受灾体抗灾性能易损性影响规律。

    youdao

  • The experiment proves the correctness and performance of vulnerability relation model, and the threat analysis method based on the model is more reasonable and effective.

    实验证明脆弱性关联模型正确性及其优越描述性能基于模型的威胁分析方法更为合理、有效。

    youdao

  • But the existing risk analysis model based on term rewriting ignores the induction procedure from risk to decision, and makes it easy to propagate the potential vulnerability.

    但是现存重写模型忽略了分析决策之间推理过程容易导致潜在威胁的传播。

    youdao

  • Network vulnerability index calculation, pays attention to the method and the model of network vulnerability index calculation.

    网络脆弱性指数计算,主要研究网络脆弱性指数计算方法脆弱性指数计算模型

    youdao

  • After analyzing various shortcomings of evaluation methods, the paper proposes a multi-dimensional security vulnerability evaluation model.

    分析评估方法不足之处后,提出一种多维度安全漏洞风险评估方法。

    youdao

  • The selection of model parameters was discussed in detail, and then the model was used to evaluate vulnerability of aircraft guarantee system.

    最后根据模型航空保障系统易损性进行评估对模型参数选择进行了分析。

    youdao

  • According to the characteristics of vulnerability assessment of aircraft guarantee system on board, a vulnerability assessment model is presented.

    针对舰船航空保障系统易损性评估特性,提出一种易损性评估模型

    youdao

  • This paper makes an E-R model for the comprehensive vulnerability analysis model, and establishes IMS vulnerability knowledge base.

    脆弱性综合分析模型进行E-R建模建立了脆弱性知识库

    youdao

  • There are three theoretical models on the prevention of eating disorders:non-specific vulnerability-stressor model, social cognitive model, and critical social perspectives model.

    目前关于进食障碍预防理论模型主要三种非特异性易感压力模型社会认知模型批判性社会观点模型。

    youdao

  • And point out the problems existed in the traditional collaborative filtering methods: ratings matrix sparsity, cold start, vulnerability, single interest model and scalability issues.

    指出传统协同过滤方法存在评分矩阵稀疏启动易受攻击性兴趣模型单一可扩展性等问题。

    youdao

  • A fuzzy comprehensive evaluation model based on the DRASTIC system is developed for assessing aquifer vulnerability.

    DRASTIC模型为基础,建立了模糊综合评价模型。

    youdao

  • The model includes three modules, which are hazard assessment based on net cell, vulnerability assessment bas

    同时广州市崩塌灾害为例,采用模型进行评估并取得了良好的效果。

    youdao

  • The model includes three modules, which are hazard assessment based on net cell, vulnerability assessment bas

    同时广州市崩塌灾害为例,采用模型进行评估并取得了良好的效果。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定