| 1. | A method of heuristic scanning for macro virus 一种启发式宏病毒扫描技术 |
| 2. | Scan specification st configuration 扫描技术规范st配置 |
| 3. | Analysis and realization of network attack of overflow vulnerability 下溢出漏洞扫描技术的网络渗透分析与实现 |
| 4. | Other isotope scanning techniques are similarly lab - bound 其他的同位素扫描技术,同样也仅限于在实验室使用。 |
| 5. | Clinical application of quasi coronary ct scan in fracture of anklebone 扫描技术在踝关节骨折检查中的应用价值 |
| 6. | Application of boundary scan technique to the design for board - level test 边界扫描技术在板级可测性设计中的应用 |
| 7. | However , you can protect your network from this type of scanning technique 然而,你可以保护贵网络免于这类扫描技术。 |
| 8. | Clinical application of msct 16 slices scanning technique in coronary artery calcium score 扫描技术在冠状动脉钙化评分中的临床应用 |
| 9. | This is another area where iris scanning may have an edge over other authentication methods 这也是虹膜扫描技术优于其他识别技术的一个方面。 |
| 10. | In scanning , the technique of using more than one vertical scan to reproduce a complete image 利用多次垂直扫描来重显一幅完整图象的扫描技术。 |