提出一个入侵威胁评估模型。
负责撰写威胁评估的委员会已修正了其对俄罗斯的看法。
A committee that writes the threat assessment has rejigged its view on Russia.
介绍了一种基于神经网络的辐射源威胁评估方法。
The paper introduces the method of radar threat assessment based on the neural network.
目前,针对低慢小目标的威胁评估研究还比较少。
Keeping away and treating with LSS-Target (the Low altitude, Slow speed Small Target), having become a cosmopolitan difficult problem and studying hotspot.
工作范围包括IT服务,以提高空间情报的生存能力和威胁评估。
The scope of work covers it services to enhance the survivability of space intelligence and threat assessments.
雷达用途识别是分析雷达型号和进行威胁评估的基础。
Radar usage identification is the base of the radar type analysis and threat evaluation.
该方法有效地解决了对敌空中目标威胁评估与排序问题。
This method resolves the problem of threat assessment and threat sorting to the enemy air attack targets efficiently.
干扰目标威胁评估是电子战指挥决策中的关键环节之一。
Threat assessment of the jamming targets (TAJT) is one of the key factors in electronic warfare.
再对空中、水面和水下各威胁目标进行排序,从而完成其威胁评估。
Then, the air threat targets, water surface targets and underwater targets were ordered to achieve the target assessments.
该方法有效地解决了目标威胁评估与排序问题,提高了防空作战效能。
It is efficiently to solve the problem of target menace assess and ordering, and the efficiency of air defense combat can be improved.
最初,执行基准风险分析当前威胁评估的基础上开发使用的网络保护战略。
Initially, perform a baseline risk analysis based on a current threat assessment to use for developing a network protection strategy.
由于受探测手段的限制,水下潜艇对空中目标的威胁评估一直是研究难题。
Limited from detecting means, the threat estimation on air targets is a difficult problem to submarine underwater.
针对实战系统中的威胁评估问题,提出一种基于直觉模糊推理的改进算法。
Aiming at the problem of threat assessment in actual combat area, an improved technique for threat assessment based on intuitionistic fuzzy reasoning is proposed.
内容包括定期就我们作出的威胁评估交换信息,以及完成对新出现的弹道导弹的联合评估。
This will include regular exchanges of information about our threat assessments, as well as the completion of a joint assessment of emerging ballistic missiles.
在综合分析目标空战能力和战场态势的基础上,提出一种多目标威胁评估方法。
A new multi-target threat assessment method is proposed based on synthesis analysis to air combat capability and air combat situation.
其航迹融合过程包括低层次上的状态和属性估计及高层次上的战场态势和威胁评估。
Its track fusion process includes states and attributes estimation of low levels, it also includes battlefields situation and threaten evaluation of high levels.
AT K公司将设计、建造并安装这个虚拟的空间环境,该环境被称为空间威胁评估测试平台系统。
ATK will design, build and install the virtual space environment called the space Threat Assessment Testbed System, company officials said.
如何在空中目标的指标值不完全确定的情况下对目标进行威胁评估,这是一个棘手的问题。
How to evaluate the threat of air targets on partial unknown attribute value is a hard problem.
依据空战态势、空战效能以及目标战役价值,采用威胁指数法建立了空战目标威胁评估模型。
According to air combat situation, efficiency and target battle value, a target threat estimation model is established based on threat index method.
结合空战的特点,对影响目标威胁评估的属性进行了分析,并用层次分析法确定各属性的权值。
Based on the characteristics of air to air combat, this paper analyzes the factors that affect target threat assessment. The weighting coefficient is obtained using the hierarchy analysis method.
直觉模糊集理论扩展了经典模糊集的表达能力,给辐射源威胁评估问题提供了一种新的解决方法。
The theory of intuitionistic fuzzy set expands the expression ability of classical fuzzy set, which can provide a new method for the problem of emitter threat evaluating.
提出了一个基于威胁评估和模拟攻击的安全风险评估模型,设计并实现了网络安全评估原型系统。
A risk assessment model based on threat assessment and simulation attack is proposed, and a kind of prototype system is designed and realized.
目标威胁评估是目标分配的重要依据,是区分目标的轻重缓急,为多目标攻击决策提供依据的保证。
Targets threat evaluation is the important basis of the target distribution, and guarantees to distinguish the order of importance and urgency, and to provide basis for the decision-making.
在讨论了常用威胁评估算法优缺点的基础上,提出了一种新的基于云模型映射关系的威胁评估方法。
On the basis of the discussion of the advantage and the shortage of usual threat evaluation, a novel threat evaluation based on cloud model mapping processor is proposed.
其中层次较高的威胁评估是根据网络安全态势感知结果,推测或判断威胁程度以及可能的行动方案。
The threat assessment, which is the highest order process of data fusion, inference or detect on intrusion threats or malicious activity according to the cyber-space situation assessment.
文中运用面向对象的VC编程环境,编制了基于贝叶斯网络的态势威胁评估系统模块的图形化仿真软件。
Finally, the software was made, in the VC program environment, about the emulation mode of combine the situation assessment and threat estimate with the Bayesian net.
文中运用面向对象的VC编程环境,编制了基于贝叶斯网络的态势威胁评估系统模块的图形化仿真软件。
Finally, the software was made, in the VC program environment, about the emulation mode of combine the situation assessment and threat estimate with the Bayesian net.
应用推荐