T H R E A T a c t , t a y = C o n v e r g e O v e r T i m e ( T h r e a t D a t a a c t , t a y , T h r e a t P r e d a c t , t a y , w p t h r c o n v ) {\displaystyle THREAT_{act,tay}=ConvergeOverTime(ThreatData_{act,tay},ThreatPred_{act,tay},wpthrconv)}
where
T h r e a t D a t a a c t , t a y = T h r e a t I D a t a a c t , t a y + D e l t a P o w e r T e r m s + D e l t a N o n P o w e r t e r m s {\displaystyle ThreatData_{act,tay}=ThreatIData_{act,tay}+DeltaPowerTerms+DeltaNonPowerterms}
<math>ThreatPred_{act,tay}=ThreatPred_{act,tay}+DeltaPowerTerms+DeltaNonPowerTerms