Academic literature on the topic 'Lock picking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Lock picking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Lock picking"

1

Wells, William A. "Picking the clathrin lock." Journal of Cell Biology 167, no. 5 (November 29, 2004): 807. http://dx.doi.org/10.1083/jcb1675rr5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eggan, Kevin. "Picking the Lock on Pluripotency." New England Journal of Medicine 369, no. 22 (November 28, 2013): 2150–51. http://dx.doi.org/10.1056/nejmcibr1311880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Miller, D. S., and D. О. Petrov. "RESEARCH SPECIFICS OF SEPARATE TYPES OF CYLINDER LOCKS PICKED BY SELF IMPRESSIONING MASTER KEYS." Theory and Practice of Forensic Science and Criminalistics 18 (December 26, 2018): 316–23. http://dx.doi.org/10.32353/khrife.2018.36.

Full text
Abstract:
Criminalistic research on locks takes an important place in prevention, qualification, disclosure and investigation of property crimes related to house penetration, so-called burglaries. The analysis of modern expert practice has established a tendency to increase the unauthorized (criminal) picking of cylinder pin locks with a horizontally oriented keyhole that has become widespread in last years. Its contributes a large number of manufactured devices (manufactured in China mainly) for picking indicated locks, namely master keys operating on the principle of self impressioning and can be purchased through the Internet, as well as a larger number video materials regarding their use. In the available criminalistic literature only singles, at some extent current and actual ways of unauthorized picking of cylinder pin locks using of outside objects with developed recommendations according research on such as manipulation method by means of a selected forged key and bumping are covered. Method of self impressioning that is the basis of picking modern locks mastered and successfully used by "qualified" burglars majority, in modern criminalistics is not mentioned at all. Therefore the purpose of this article is to highlight criminalistic research possibilities of certain types of cylinder pin locks, picked by means of an manufactured self impressioning master key. The article pays attention to such problem aspects: method of self impressioning using in the way of picking a lock with a cylinder mechanism; design features of self impressioning master key to cylinder locks, concerning to the solution of diagnostic and identification issues; traces classification of self impressioning master key remaining on lock details; difficulties research on cylinder locks that were subjected to action of a self impressioning master key.
APA, Harvard, Vancouver, ISO, and other styles
4

Lusso, Paolo. "Picking the Lock with a Hairpin." Structure 11, no. 2 (February 2003): 129–30. http://dx.doi.org/10.1016/s0969-2126(03)00013-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rosenbloom, E. S. "Picking the Lock: A Note on “Locks at the Racetrack”." Interfaces 22, no. 2 (April 1992): 15–17. http://dx.doi.org/10.1287/inte.22.2.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jain, Aakriti, and Roberto Zoncu. "Picking the arginine lock on PQLC2 cycling." Proceedings of the National Academy of Sciences 118, no. 35 (August 27, 2021): e2112682118. http://dx.doi.org/10.1073/pnas.2112682118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kuo, Yu-Chen, and Jia-Huey Lin. "Picking the lock: how universal healthcare programs influence entrepreneurial activities." Small Business Economics 54, no. 1 (July 7, 2018): 3–24. http://dx.doi.org/10.1007/s11187-018-0077-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Yan Li, and Rui Zhang. "AD630 Lock-In Amplifier Circuit for Weak Signal." Advanced Materials Research 482-484 (February 2012): 975–80. http://dx.doi.org/10.4028/www.scientific.net/amr.482-484.975.

Full text
Abstract:
Lock-in amplifying (LIA) is one of important techniques of picking up weak signals buried in the noise, and is the core component of Tunable Diode Laser Absorption Spectroscopy (TDLAS) technology. Then we design a small size, dual phase lock-in amplifier (LIA) integrated circuit. This paper is based on the phase-sensitive detector AD630, together with the phase-locked loop (PLL) circuit (74HC4046) and the active filter (MAX275) the value of Q and the center frequency of which could be adjusted. The output signals were collected by A/D converter and dedicated high-resolution data acquisition card. The range of frequency is 500Hz-100 kHz, the dynamic range of acquisition signal is greater than 100dB, the signal-to-noise ratio is up to 60dB, and the overall area of circuit is only 14cm × 14.8cm. Experiments show that the design meets the requirements of integration into the system.
APA, Harvard, Vancouver, ISO, and other styles
9

Churchill, David. "The Spectacle of Security: Lock-Picking Competitions and the Security Industry in mid-Victorian Britain." History Workshop Journal 80, no. 1 (July 31, 2015): 52–74. http://dx.doi.org/10.1093/hwj/dbv018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Auriol, Emmanuelle, and Michel Benaim. "Standardization in Decentralized Economies." American Economic Review 90, no. 3 (June 1, 2000): 550–70. http://dx.doi.org/10.1257/aer.90.3.550.

Full text
Abstract:
This paper presents a dynamic model, inspired by evolutionary game theory, of how standards and norms emerge in decentralized economies. It shows that standardization outcomes depend on adopters' attitudes to problems caused by incompatibility. If individuals display aversion to incompatibility, standardization never fails to happen eventually, but societies sometimes end up picking inferior standards. In this case, official action can be useful to quickly achieve sensible standardization. On the other hand, when individuals display tolerance or neutrality to incompatibility, there is neither path-dependency nor a lock-in problem, and regulation seems a poor alternative to laissez-faire. (JEL C73, D62, L1)
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Lock picking"

1

Troskie, Herman R. W. "A comparative survey of the law relating to strikes in South Africa and the Netherlands." 1998. http://hdl.handle.net/10500/16219.

Full text
Abstract:
In the first section of the dissertation, strike law in the Netherlands is focused upon. The following issues are inter alia dealt with: the historical background of the strike phenomenon, the right to strike and restrictions on this right, the reluctance of the Dutch legislature to legislate in the field of industrial action, and the directly applicable provisions of the European Social Charter. The second section of the dissertation deals with South African strike law and also starts off with a discussion of the historical background thereof, whereafter the provisions of the 1995 Labour Relations Act are analysed and discussed. The third and last section highlights some of the major differences and points to some similarities between the two legal systems. It concludes that the detailed South African labour legislation does not provide more certainty than the Dutch judge-made law in respect of the law relating to strikes.
Law
LL.M.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Lock picking"

1

Secrets of lock picking. Boulder, Colo: Paladin Press, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Levine, Jerry. The picking book. Parkridge, IL (850 Busse Highway, Parkridge 60068): Locksmithing Pub. Co., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sharpe, Stephen C. E-Z picking: Exposing the secrets : an easy-to-use guide to successfully learn how to pick locks. 3rd ed. Orange, CA (1060 N. Batavia Ste. C, Orange 92667): Pro-Lok, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The lock artist. New York: Minotaur Books, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Carl, Black. Opening combination padlocks: No tools, no problem. Boulder, Colo: Paladin Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Central Intelligence Agency. The CIA lockpicking manual. New York, NY: Skyhorse, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Practical lock picking: A physical penetration tester's training guide. Burlington, MA: Syngress/Elsevier, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pick guns: Lock picking for spies, cops, and locksmiths. Boulder, Colo: Paladin Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yifang, Li, ed. Tian cai suo jiang: The lock artist / Steve Hamilton. Xinbei Shi: Fan xing duo mei ti, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hamilton, Steve. The lock artist. Thorndike, Me: Center Point Pub., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Lock picking"

1

Subramanian, Venkataraman, Daniel J. Slade, and Paul R. Thompson. "Picking the PAD Lock: Chemical and Biological Approaches to Identify PAD Substrates and Inhibitors." In Protein Deimination in Human Health and Disease, 377–427. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-8317-5_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stephens, Piers H. G. "Picking at the Locke of Economic Reductionism." In Environmental Futures, 3–23. London: Palgrave Macmillan UK, 1999. http://dx.doi.org/10.1007/978-1-349-27265-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bajgiran, Omid Sanei, Andre A. Cire, and Louis-Martin Rousseau. "A First Look at Picking Dual Variables for Maximizing Reduced Cost Fixing." In Integration of AI and OR Techniques in Constraint Programming, 221–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59776-8_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Svatoňová, Eva. "The Dark Side of Laughter: Humour as a Tool for Othering in the Memes of Czech Far-Right Organization Angry Mothers." In Nonprofit and Civil Society Studies, 239–63. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98798-5_11.

Full text
Abstract:
AbstractFar-right grassroot organizations were early adopters of the internet and social media and have been using it to spread their ideologies, mobilize people and network since the 1990s. With the increased usage of social media, their communication style has naturally changed. Due to the interactive nature of social media, the far-right groups started to communicate in a savvy style based on meme and DIY aesthetics. This style allows these groups to blurry the line between serious and irony (Shifman, L., Memes in Digital Culture. Massachusetts Institute of Technology, Cambridge, Massachusetts, 2014) but also between facts and misinformation (Klein, O., The Open Journal of Sociopolitical Studies 154–179, 2020). There is a burgeoning body of literature investigating the way and for what purposes such organizations use the internet in which the researchers look particularly on memes (Klein, O., The Open Journal of Sociopolitical Studies 154–179, 2020) but also humour (Billig, M., Comic racism and violence. In S. Lockyer, & M. Pickering (Eds.), Beyond a joke. The limits of humor (pp. 25–44). New York: Palgrave Macmillan, 2005a; Billig, M., Laughter and ridicule. Towards a social critique of humor. London: SAGE Publications, 2005b). However, not many studies explored the link between humour and morality. The aim of this exploratory study, in which humour is viewed as a means of claims making and negotiation of political views, is to deepen the knowledge of how humour in memes produced and reproduced by far-right organizations can serve as a tool for constructing a moral order. To do so, I analysed memes used on the far-right Facebook page run by Czech organization Angry Mothers which engage in anti-Islam and anti-gender activism. Based on Michael Billig’s (2005) distinction between rebellious and disciplinary humour, I argue that the organization used rebellious humour to present themselves as an alternative to mainstream media and resistance to the alleged dictatorship of liberal elites and disciplinary humour to put minorities (both sexual and ethnic) “in their place”.
APA, Harvard, Vancouver, ISO, and other styles
5

Ollam, Deviant. "Fundamentals of pin tumbler and wafer locks." In Practical Lock Picking, 1–35. Elsevier, 2010. http://dx.doi.org/10.1016/b978-1-59749-611-7.00001-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ollam, Deviant. "The basics of picking." In Practical Lock Picking, 37–84. Elsevier, 2010. http://dx.doi.org/10.1016/b978-1-59749-611-7.00002-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ollam, Deviant. "Beginner training." In Practical Lock Picking, 85–117. Elsevier, 2010. http://dx.doi.org/10.1016/b978-1-59749-611-7.00003-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ollam, Deviant. "Advanced training." In Practical Lock Picking, 119–38. Elsevier, 2010. http://dx.doi.org/10.1016/b978-1-59749-611-7.00004-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ollam, Deviant. "Quick-entry tricks." In Practical Lock Picking, 139–74. Elsevier, 2010. http://dx.doi.org/10.1016/b978-1-59749-611-7.00005-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ollam, Deviant. "They all come tumbling down." In Practical Lock Picking, 175–206. Elsevier, 2010. http://dx.doi.org/10.1016/b978-1-59749-611-7.00006-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Lock picking"

1

Knight, Edward, Sam Lord, and Budi Arief. "Lock Picking in the Era of Internet of Things." In 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2019. http://dx.doi.org/10.1109/trustcom/bigdatase.2019.00121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arthur, Karl, Andrew J. Doxon, Courtney Parsons, and William R. Provancher. "Lock picking simulation using visual and bimanual haptic display." In 2012 IEEE Haptics Symposium (HAPTICS). IEEE, 2012. http://dx.doi.org/10.1109/haptic.2012.6183845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shepard, Hannon, Michael Young, and Billy Kihei. "Physical Security Using Machine Learning to Detect Lock Picking at Traffic Cabinets." In 2022 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2022. http://dx.doi.org/10.1109/icce53296.2022.9730555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shiraishi, Masaki, and Ryuya Uda. "Comparison of Algorithms and Action Coordinates Sets in Detection of Slight Differences in Motions like Lock-Picking." In 2020 5th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM). IEEE, 2020. http://dx.doi.org/10.1109/seeda-cecnsm49515.2020.9221806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lourakis, Manolis, and Maria Pateraki. "Computer vision for increasing safety in container handling operations." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002146.

Full text
Abstract:
Workers in ports work with and in close proximity of heavy machinery. Quay cranes used for moving containers between ships and the dockside yard are one of the most accident-prone equipment types. For picking up containers, these cranes are equipped with spreaders, i.e. lifting devices which are lowered down on top of containers and lock on to them mechanically. We are concerned here with monitoring a moving quay crane spreader so as to make sure that safe clearance distances are maintained from the locations of dock workers in a port container cargo handling environment. The paper describes the application of computer vision techniques to develop a model-based, monocular spreader tracker. By tracking in three dimensions the position and orientation of the spreader during loading and unloading operations, a threat volume enclosing it can be defined. Constantly monitoring the distance of dock workers from this threat volume can improve the operator’s situational awareness and increase safety in the work environment. Quantitative experimental evaluation is also reported.
APA, Harvard, Vancouver, ISO, and other styles
6

Mas, Ignasi, Ramon Morros, and Veronica Vilaplana. "Picking Groups Instead of Samples: A Close Look at Static Pool-Based Meta-Active Learning." In 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW). IEEE, 2019. http://dx.doi.org/10.1109/iccvw.2019.00171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Okuzawa, Takeru, Kushal Gupta, Tetsuro Takanishi, and Ahmedagha Eldaniz Hamidzada. "Successful to Isolate Original Reservoir by Coiled Tubing Cementing for Workover Wells." In SPE/IADC Middle East Drilling Technology Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/202163-ms.

Full text
Abstract:
Abstract In workover phase prior to commencing sidetrack operation, it is required to recover old existing completion string for isolating & abandoning existing reservoir section in accordance with well integrity and global well abandonment standards. Prior to utilization of the coiled tubing cementing approach, the practice was to recover all existing completion by cutting and pulling out the dual tubing or mill the permanent packer. After all the completion recovery, spot and squeeze cementing operations were conducted. However a major drawback of this process is, until recovering some part of completion string, the actual physical condition of the completion strings remains unknown and it poses high risk to get stuck in cased hole or end up in loosing accessibility inside completion string due to corrosion. Furthermore, in some of the old wells had failure to recover completion components like a dual flow assembly and a dual packer due to completion age, had led to improper zonal isolation. Even if all the old existing completion is recovered successfully, it consumes a lot of operation time and several fishing trips with overshot or junk mill BHA (Bottom Hole Assembly). In order to minimize the risk of being stuck or loosing accessibility and ending up failing to recover existing completion and to save operational time, the coiled tubing cementing was conducted to isolate existing reservoir and leave remaining parts of completion downhole. During the operation phase, injectivity test was performed by pumping sea water followed by bull heading kill fluid in to the reservoir. Losses rate was evaluated while observing the well, a high viscosity pill was spotted in order to treat losses and control loss rate. Coiled tubing was rigged up on Long string and run in hole to tag a landing nipple in existing completion string in order to have reference of depth corrected against ORTE (Original Rotary Table Elevation) depths while using the coiled tubing for operations. After having correct reference of depth with tagging completions nipple accessory, coiled tubing with slim OD cementing BHA was run in hole to tag PBTD (Plug Back Total Depth) and then picked up to certain depth while spotting cement slurry at controlled speed. Once the complete amount of slurry was spotted during picking up coiled tubing was pulled out to be away from cement slurry and then coiled tubing BOP (Blow Out Preventer) was closed and cement was squeezed in to the formation. After squeezing pre determined volume or archiving the lock up pressure, coiled tubing was pulled further up and circulated out to ensure all cement slurry out from coiled tubing (inside and outside). Top of cement was confirmed by tagging with the milling assembly connected to coiled tubing and the pressure test was performed after waiting on cement to confirm the integrity of the barrier. For short string, similar abandonment plug process was followed as that of the long string. After performing tagging operations, cement was spotted while pulling out the coil tubing to certain depth and then coil tubing was picked up above the cement to squeeze cement in to the formation. Similar coiled tubing cement operation for isolating lower perforations was performed on three other wells, and proper zonal isolation was achieved against reservoirs. This improved approach of abandoning lower reservoir prior to completions recovery proved to save 2-3 days of rig operational time in comparison to previous operations practices of recovering existing completion completely & then perform cementing operations for zonal isolation against each reservoir. Based on the successful result in three wells, it is concluded that this coiled tubing cement operation is effective for zonal isolation and provide savings in operation days.
APA, Harvard, Vancouver, ISO, and other styles
8

Abubakar, Aria, Mandar Kulkarni, and Anisha Kaul. "Automating Well Log Correlation Workflow Using Soft Attention Convolutional Neural Networks." In SPE Annual Technical Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/205985-ms.

Full text
Abstract:
Abstract In the process of deriving the reservoir petrophysical properties of a basin, identifying the pay capability of wells by interpreting various geological formations is key. Currently, this process is facilitated and preceded by well log correlation, which involves petrophysicists and geologists examining multiple raw log measurements for the well in question, indicating geological markers of formation changes and correlating them with those of neighboring wells. As it may seem, this activity of picking markers of a well is performed manually and the process of ‘examining’ may be highly subjective, thus, prone to inconsistencies. In our work, we propose to automate the well correlation workflow by using a Soft- Attention Convolutional Neural Network to predict well markers. The machine learning algorithm is supervised by examples of manual marker picks and their corresponding occurrence in logs such as gamma-ray, resistivity and density. Our experiments have shown that, specifically, the attention mechanism allows the Convolutional Neural Network to look at relevant features or patterns in the log measurements that suggest a change in formation, making the machine learning model highly precise.
APA, Harvard, Vancouver, ISO, and other styles
9

Blake, Larry, George Gavrus, Jack Vecchiarelli, and J. Stoklosa. "Best Estimate Plus Uncertainty Analysis of LBLOCA for a Pickering B CANDU Reactor." In ASME 2010 3rd Joint US-European Fluids Engineering Summer Meeting collocated with 8th International Conference on Nanochannels, Microchannels, and Minichannels. ASMEDC, 2010. http://dx.doi.org/10.1115/fedsm-icnmm2010-31018.

Full text
Abstract:
The Pickering B Nuclear Generating Station consists of four CANDU reactors. These reactors are horizontal pressure tube, heavy water cooled and moderated reactors fuelled with natural uranium. Under a postulated large break loss of coolant accident (LOCA), positive reactivity results from coolant void formation. The transient is terminated by the operation of the safety systems within approximately 2 seconds of the start of the transient. The initial increase in reactor power, terminated by the action of the safety system, is termed the power pulse phase of the accident. In many instances the severity of an LBLOCA can be characterized by the adiabatic energy deposited to the fuel during this phase of the accident. Historically, Limit of Operating Envelope (LOE) calculations have been used to characterize the severity of the accident. LOE analyses are conservative analyses in which the key operational and safety related parameters are set to conservative or limiting values. Limit based analyses of this type result in calculated transient responses that will differ significantly from the actual expected response of the station. As well, while the results of limit calculations are conservative, safety margins and the degree of conservatism is generally not known. As a result of these factors, the use of Best Estimate Plus Uncertainty (BEPU) analyses in safety analyses for nuclear power plants has been increasing. In Canada, the nuclear industry has been pursuing best estimate analysis through the BEAU (Best Estimate Analysis and Uncertainty) methodology in order to obtain better characterization of the safety margins. This approach is generally consistent with those used internationally. Recently, a BEAU analysis of the Pickering B NGS was completed for the power pulse phase of a postulated Large Break LOCA. The analysis comprised identification of relevant phenomena through a Phenomena Identification and Ranking (PIRT) process, assessment of the code input uncertainties, sensitivity studies to quantify the significance of the input parameters, generation of a functional response surface and its validation, and determination of the safety margin. The results of the analysis clearly demonstrate that the Limit of Operating Envelope (LOE) results are significantly conservative relative to realistic analysis even when uncertainties are considered. In addition, the extensive sensitivity analysis performed to supplement the primary result provides insight into the primary contributors to the results.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Lock picking"

1

Sherman, Amir, Rebecca Grumet, Ron Ophir, Nurit Katzir, and Yiqun Weng. Whole genome approach for genetic analysis in cucumber: Fruit size as a test case. United States Department of Agriculture, December 2013. http://dx.doi.org/10.32747/2013.7594399.bard.

Full text
Abstract:
The Cucurbitaceae family includes a broad array of economically and nutritionally important crop species that are consumed as vegetables, staple starches and desserts. Fruit of these species, and types within species, exhibit extensive diversity as evidenced by variation in size, shape, color, flavor, and others. Fruit size and shape are critical quality determinants that delineate uses and market classes and are key traits under selection in breeding programs. However, the underlying genetic bases for variation in fruit size remain to be determined. A few species the Cucurbitaceae family were sequenced during the time of this project (cucumber was already sequenced when the project started watermelon and melon sequence became available during the project) but functional genomic tools are still missing. This research program had three major goals: 1. Develop whole genome cucumber and melon SNP arrays. 2. Develop and characterize cucumber populations segregating for fruit size. 3. Combine genomic tools, segregating populations, and phenotypic characterization to identify loci associated with fruit size. As suggested by the reviewers the work concentrated mostly in cucumber and not both in cucumber and melon. In order to develop a SNP (single nucleotide polymorphism) array for cucumber, available and newly generated sequence from two cucumber cultivars with extreme differences in shape and size, pickling GY14 and Chinese long 9930, were analyzed for variation (SNPs). A large set of high quality SNPs was discovered between the two parents of the RILs population (GY14 and 9930) and used to design a custom SNP array with 35000 SNPs using Agilent technology. The array was validated using 9930, Gy14 and F1 progeny of the two parents. Several mapping populations were developed for linkage mapping of quantitative trait loci (QTL) for fruit size These includes 145 F3 families and 150 recombinant inbred line (RILs F7 or F8 (Gy14 X 9930) and third population contained 450 F2 plants from a cross between Gy14 and a wild plant from India. The main population that was used in this study is the RILs population of Gy14 X 9930. Phenotypic and morphological analyses of 9930, Gy14, and their segregating F2 and RIL progeny indicated that several, likely independent, factors influence cucumber fruit size and shape, including factors that act both pre-anthesis and post-pollination. These include: amount, rate, duration, and plane of cell division pre- and post-anthesis and orientation of cell expansion. Analysis of F2 and RIL progeny indicated that factors influencing fruit length were largely determined pre-anthesis, while fruit diameter was more strongly influenced by environment and growth factors post-anthesis. These results suggest involvement of multiple genetically segregating factors expected to map independently onto the cucumber genome. Using the SNP array and the phenotypic data two major QTLs for fruit size of cucumber were mapped in very high accuracy (around 300 Kb) with large set of markers that should facilitate identification and cloning of major genes that contribute to fruit size in cucumber. In addition, a highly accurate haplotype map of all RILS was created to allow fine mapping of other traits segregating in this population. A detailed cucumber genetic map with 6000 markers was also established (currently the most detailed genetic map of cucumber). The integration of genetics physiology and genomic approaches in this project yielded new major infrastructure tools that can be used for understanding fruit size and many other traits of importance in cucumber. The SNP array and genetic population with an ultra-fine map can be used for future breeding efforts, high resolution mapping and cloning of traits of interest that segregate in this population. The genetic map that was developed can be used for other breeding efforts in other populations. The study of fruit development that was done during this project will be important in dissecting function of genes that that contribute to the fruit size QTLs. The SNP array can be used as tool for mapping different traits in cucumber. The development of the tools and knowledge will thus promote genetic improvement of cucumber and related cucurbits.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography