T h r e a t I P r e d B a s e a c t , t a y = G P o w e r T e r m I a c t , t a y + C o n t i g u i t y T e r m I a c t , t a y + T e r D i s p u t e T e r m a c t , t a y {\displaystyle ThreatIPredBase_{act,tay}=GPowerTermI_{act,tay}+ContiguityTermI_{act,tay}+TerDisputeTerm_{act,tay}}
where
G P o w e r T e r m I a c t , t a y = A n a l F u n c ( P O W E R a c t , P O W E R t a y , w p g r e a t t h r e s h , w p g r e a t l e v , w p g r e a t 1 , w p g r e a t 2 ) {\displaystyle GPowerTermI_{act,tay}=AnalFunc(POWER_{act},POWER_{tay},\mathbf {wpgreatthresh,wpgreatlev} ,wpgreat1,wpgreat2)}
C o n t i g u i t y T e r m I a c t , t a y = C o n t i g u i t y a c t , t a y ∗ w p c o n t i g u i t y {\displaystyle ContiguityTermI_{act,tay}=Contiguity_{act,tay}*\mathbf {wpcontiguity} }
<math>TerDisputeTerm_{act,tay}=TerDispute_{act,tay}*\mathbf{wpterdisp}