fingerprint technique meaning in Chinese
指纹法
指纹技术
Examples
- The application of dna fingerprint technique in monitoring the es cell chimeric mice
Dna指纹图在小鼠es细胞嵌合体鉴定中的应用 - Knox has designed a voice identification software program that works more accurately than current fingerprinting techniques a scientific breakthrough that would mean disaster in the wrong hands
诺克斯设计出了一套语音识别软件程序,比目前的指纹辨认技术更为精确,这是一项科学突破,落入恶人之手便意味着灾难。 - Multi - locus dna fingerprint technique was used to check the chimerism of chimeric mouse generated by injecting es cells into blastocysts and to detect whether the chimeric mouse is a germ - line chimeras . the results indicated that : the multi - locus dna fingerprint with a new synthesized probe - jl - 02 , has enough polymerism and good stability , and should be very useful to monitor the chimerism in different tissues of es cell chimeric mouse and to check whether an es cell line has the capacity to enter the germ line , especially when involving strains that can not be discerned with coat color or biochemical markers
尝试应用多位点dna指纹技术,检测经过胚胎干细胞es细胞途径所获得的嵌合体小鼠中es细胞在各种脏器中的嵌合情况检测es细胞在嵌合体小鼠中是否实现种系传递。结果表明:采用新型的人工合成的寡核苷酸多聚体探针jl - 02探针的多位点dna指纹图谱,具有足够的多态性和很好的稳定性。 - Application of modern analytical technology in quality control of traditional chinese medicine ( tcm ) are introduced in this paper , including chromatographic techniques , spectral techniques , nuclear magnetic resonance ( nmr ) , mass spectrometry ( ms , gc - ms , lc - ms , ce - ms , icp - ms ) , dna fingerprint techniques , x - ray diffraction techniques
摘要介绍色谱法、光谱法、核磁共振波谱、质谱及其联用技术、 dna分子诊断技术、 x射线衍射法等几种现代分析方法在中药质量控制中的应用。 - Firstly , the interrelated knowledge about network security vulnerability is introduced in this thesis , include definition , cause of formation , character and attribute , sort and detecting method . different kinds of skills and characteristics of port - scan technique are analyzed and compared in this thesis . then , the virtues and defects of three kinds of fingerprint technique of os - detect are also analyzed and compared
本论文首先介绍了网络安全漏洞的相关知识,包括漏洞的定义、成因、特征和属性、分类及检测方法,对各种端口扫描技术及其特点进行了分析和比较,介绍了三种探测操作系统的指纹技术,并分析了它们的优缺点。