Gotowa bibliografia na temat „Electronic forgery”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Electronic forgery”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Electronic forgery"

1

Sezonov, Viktor, Mykhailo Fialka, Eduard Poltavski, Nataliia Prokopenko, and Maryna Fomenko. "Forensic Examination of Electronic Documents." Law, State and Telecommunications Review 14, no. 2 (2022): 81–93. http://dx.doi.org/10.26512/lstr.v14i2.40965.

Pełny tekst źródła
Streszczenie:
[Purpose] The purpose of the study is to reveal the concept and essence of forensic prevention of crimes of forgery of electronic documents, to identify problems in the use of information to establish a system of countering crime and document management. [Methodology] The following approaches were used in the work: system-structural, dialectical, empirical. Forgery of electronic documents and their use is investigated not only within the framework of a single criminal case but also by a set of crimes committed depending on the mechanism that is the main one in the structure of criminal technol
Style APA, Harvard, Vancouver, ISO itp.
2

Djamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 3 (2025): 65–70. https://doi.org/10.37547/tajpslc/volume07issue03-11.

Pełny tekst źródła
Streszczenie:
Document forgery represents one of the most pervasive and multifaceted crimes across jurisdictions, affecting areas such as contract law, property rights, financial transactions, and public trust in government-issued records. This study analyzes the objective (actus reus) and subjective (mens rea) elements of document forgery, selling of forged documents, and using forged documents, drawing on an extensive body of international legal scholarship, case law, and statutory frameworks. We discuss the conceptual foundations of forgery, the delineation between material and intellectual falsification
Style APA, Harvard, Vancouver, ISO itp.
3

Djamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 4 (2025): 23–28. https://doi.org/10.37547/tajpslc/volume07issue04-05.

Pełny tekst źródła
Streszczenie:
Document forgery represents one of the most pervasive and multifaceted crimes across jurisdictions, affecting areas such as contract law, property rights, financial transactions, and public trust in government-issued records. This study analyzes the objective (actus reus) and subjective (mens rea) elements of document forgery, selling of forged documents, and using forged documents, drawing on an extensive body of international legal scholarship, case law, and statutory frameworks. We discuss the conceptual foundations of forgery, the delineation between material and intellectual falsification
Style APA, Harvard, Vancouver, ISO itp.
4

Chervinska, Lyubov Volodymyrivna. "On the Problem of Normative Definition of the Concept of «Official Document» in the Criminal Code of Ukraine." Alʹmanah prava, no. 15 (September 1, 2024): 654–59. https://doi.org/10.33663/2524-017x-2024-15-654-659.

Pełny tekst źródła
Streszczenie:
der Articles 357 «Forgery of Documents, Seals, Stamps and Forms, Sale or Use of Forged Documents, Seals, Stamps», 358 «Forgery of Documents, Seals, Stamps and Forms, Sale or Use of Forged Documents, Seals, Stamps», 366 «Official Forgery» of the Criminal Code of Ukraine. The author analyzes the legal regulation of circulation of official documents of Ukraine and establishes the legislator’s approach to determining the content of a document, an official document, and its subtypes — paper and electronic official documents. The study of the regulatory consolidation and doctrinal development of the
Style APA, Harvard, Vancouver, ISO itp.
5

Lin, Yih-Kai, and Ting-Yu Yen. "A Meta-Learning Approach for Few-Shot Face Forgery Segmentation and Classification." Sensors 23, no. 7 (2023): 3647. http://dx.doi.org/10.3390/s23073647.

Pełny tekst źródła
Streszczenie:
The technology for detecting forged images is good at detecting known forgery methods. It trains neural networks using many original and corresponding forged images created with known methods. However, when encountering unseen forgery methods, the technology performs poorly. Recently, one suggested approach to tackle this problem is to use a hand-crafted generator of forged images to create a range of fake images, which can then be used to train the neural network. However, the aforementioned method has limited detection performance when encountering unseen forging techniques that the hand-cra
Style APA, Harvard, Vancouver, ISO itp.
6

Trček, Denis. "Minimising the risk of electronic document forgery." Computer Standards & Interfaces 19, no. 2 (1998): 161–67. http://dx.doi.org/10.1016/s0920-5489(98)00010-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Sarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.

Pełny tekst źródła
Streszczenie:
<em>Forgery is the criminal act that provides misleading information about a product or service. It is the process of making, adapting, or imitating documents or objects with the intent to deceive. Digital forgery (or digital tampering) is the process of manipulating documents or images for the intent of financial, social or political gain. This paper provides a brief introduction to the digital forgery.</em>
Style APA, Harvard, Vancouver, ISO itp.
8

Zulki Zulkifli Noor. "Proof of the Legal Power of Electronic Certificates Against Criminal Acts of Forgery." Journal of Law, Politic and Humanities 4, no. 6 (2024): 2571–75. https://doi.org/10.38035/jlph.v4i6.846.

Pełny tekst źródła
Streszczenie:
his study aims to analyze the legal force of electronic certificates in relation to the crime of forgery. Electronic certificates as one of the digital legal instruments are recognized in Law Number 11 of 2008 concerning Electronic Information and Transactions (UU ITE), providing a strong legal basis for their recognition and validity in the evidence process. However, in its application, there are various challenges, especially related to data security and the risk of forgery. Through a normative legal approach, this study examines various laws and regulations as well as relevant case studies
Style APA, Harvard, Vancouver, ISO itp.
9

Xue, Ziyu, Xiuhua Jiang, Qingtong Liu, and Zhaoshan Wei. "Global–Local Facial Fusion Based GAN Generated Fake Face Detection." Sensors 23, no. 2 (2023): 616. http://dx.doi.org/10.3390/s23020616.

Pełny tekst źródła
Streszczenie:
Media content forgery is widely spread over the Internet and has raised severe societal concerns. With the development of deep learning, new technologies such as generative adversarial networks (GANs) and media forgery technology have already been utilized for politicians and celebrity forgery, which has a terrible impact on society. Existing GAN-generated face detection approaches rely on detecting image artifacts and the generated traces. However, these methods are model-specific, and the performance is deteriorated when faced with more complicated methods. What’s more, it is challenging to
Style APA, Harvard, Vancouver, ISO itp.
10

Kadam, Kalyani, Swati Ahirrao, and Ketan Kotecha. "AHP validated literature review of forgery type dependent passive image forgery detection with explainable AI." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4489. http://dx.doi.org/10.11591/ijece.v11i5.pp4489-4501.

Pełny tekst źródła
Streszczenie:
Nowadays, a lot of significance is given to what we read today: newspapers, magazines, news channels, and internet media, such as leading social networking sites like Facebook, Instagram, and Twitter. These are the primary wellsprings of phony news and are frequently utilized in malignant manners, for example, for horde incitement. In the recent decade, a tremendous increase in image information generation is happening due to the massive use of social networking services. Various image editing software like Skylum Luminar, Corel PaintShop Pro, Adobe Photoshop, and many others are used to creat
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Electronic forgery"

1

Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.

Pełny tekst źródła
Streszczenie:
The ready availability of image-editing software makes it important to ensure the authenticity of images. This thesis concerns the detection and localization of cloning, or Copy-Move Forgery (CMF), which is the most common type of image tampering, in which part(s) of the image are copied and pasted back somewhere else in the same image. Post-processing can be used to produce more realistic doctored images and thus can increase the difficulty of detecting forgery. This thesis presents three novel methods for CMF detection, using feature extraction, surface fitting and segmentation. The Dense Sc
Style APA, Harvard, Vancouver, ISO itp.
2

Le, Riche Pierre (Pierre Jacques). "Handwritten signature verification : a hidden Markov model approach." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51784.

Pełny tekst źródła
Streszczenie:
Thesis (MEng)--University of Stellenbosch, 2000.<br>ENGLISH ABSTRACT: Handwritten signature verification (HSV) is the process through which handwritten signatures are analysed in an attempt to determine whether the person who made the signature is who he claims to be. Banks and other financial institutions lose billions of rands annually to cheque fraud and other crimes that are preventable with the aid of good signature verification techniques. Unfortunately, the volume of cheques that are processed precludes a thorough HSV process done in the traditional manner by human operators. It
Style APA, Harvard, Vancouver, ISO itp.
3

Hamid, Lars-Eric, and Simon Möller. "How Secure is Verisure’s Alarm System?" Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295618.

Pełny tekst źródła
Streszczenie:
Security is a very important part of today’s society.Verisure is the leader in home alarm systems with 30 years ofexperience. In this project, we aim to evaluate how secure theiralarm system is from a software perspective. The system wasbought in January 2020. After an initial threat modeling, followedby penetration testing it turns out that the alarm system is not assecure as Verisure markets. We could find several security flawsin the system. Some of them let an attacker block the system,and others yield full control without the user’s knowledge. Thereare also a couple of vulnerabilities tha
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Electronic forgery"

1

Mulford, Robert. Bank check compliance and liability protection. Thomson/Pratt, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Mulford, Robert. Bank check compliance and liability protection: Administrator manual. Thomson/Pratt, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Mulford, Robert. Bank check compliance and liability protection: Student manual. Thomson/Pratt, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Tanner, Marcus. Croatia: A nation forged in war. Yale University Press, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Wiggli, Oscar. Partition forgée: Sculptures et compositions musicales. Editions Iroise, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Autotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. IEEE, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

International Association of Aquatic and Marine Science Libraries and Information Centers. Conference. Electronic information and publications: Looking to the electronic future, let's not forget the archival past : proceedings of the 24th Annual Conference of the International Association of Aquatic and Marine Science Libraries and Information Centers (IAMSLIC) and the 17th Polar Libraries Colloquy (PLC). Edited by Markham James W. 1939-, Duda Andrea L, Andrews Martha, and Polar Libraries Colloquy (17th : 1998 : Reykjavík, Iceland). IAMSLIC, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military. Storming Media, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Mulford, Robert, and Barkley Clark. Bank Check Compliance Liability and Protection: Check Processing Staff Edition. A.S. Pratt/Sheshunoff, 2003.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Tanner, Marcus. Croatia: A Nation Forged in War. Yale University Press, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "Electronic forgery"

1

Sheng, YunZhong, HangJun Wang, and GuangQun Zhang. "Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing." In Advances in Mechanical and Electronic Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31528-2_54.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Sapra, Prince, and Vaishali Kikan. "Analysis of various copy-move forgery detection techniques." In Recent Trends in Communication and Electronics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003193838-73.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Rehman, Kaleemur, and Saiful Islam. "A Keypoint-Based Technique for Detecting the Copy Move Forgery in Digital Images." In Micro-Electronics and Telecommunication Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9562-2_66.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mannepalli, Kasiprasad, Swetha Danthala, Panyam Narahari Sastry, Durgaprasad Mannepalli, and Bathula Murali Krishna. "Investigation of forgery in speech recordings using similarities of pitch chroma and spectral flux." In Recent Trends in Communication and Electronics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003193838-92.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Hari Nagarubini, K., K. Suthendran, and E. Muthu Kumaran. "Beyond the pixel: examining forgery techniques and detection methods in digital forensics." In Advances in Electronics, Computer, Physical and Chemical Sciences. CRC Press, 2025. https://doi.org/10.1201/9781003616252-32.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Boges, Daniya J., Marco Agus, Pierre Julius Magistretti, and Corrado Calì. "Forget About Electron Micrographs: A Novel Guide for Using for Quantitative Analysis of Dense Reconstructions." In Volume Microscopy. Springer US, 2020. http://dx.doi.org/10.1007/978-1-0716-0691-9_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Hemalatha, R., and R. Amutha. "Risk Detection and Assessment in Digital Signature." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-9317-5.ch018.

Pełny tekst źródła
Streszczenie:
Nowadays people are living in a digital era in which all aspects of our lives depend on computers, networks, software applications and other electronic devices. Due to the technological development the security tasks and threat intelligence is a challenging task. Information theft is one of the most expensive segments of cybercrime. It is essential to protect information from cyber threats. In business, the digital signature plays an important role in authorizing the digital data. The receiver or some third party can verify this binding. In larger business, the signing process supports regulat
Style APA, Harvard, Vancouver, ISO itp.
8

Mbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA)." In Cloud Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6539-2.ch040.

Pełny tekst źródła
Streszczenie:
World-wide electronic university libraries, with wide accessibility, are considered to be essential units in both academic and nonacademic information utilization. Within this context, the developed world wasted no time improving and expanding their libraries by applying the technology leverage offered by cloud computing. As institutions from developed countries expanded the use of cloud technology for library applications, it became clear that this technology was highly vulnerable to security threats. Nevertheless, this did not retard advanced nations from proceeding. Undaunted, they forged a
Style APA, Harvard, Vancouver, ISO itp.
9

Mbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA)." In Advances in Library and Information Science. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4631-5.ch010.

Pełny tekst źródła
Streszczenie:
World-wide electronic university libraries, with wide accessibility, are considered to be essential units in both academic and nonacademic information utilization. Within this context, the developed world wasted no time improving and expanding their libraries by applying the technology leverage offered by cloud computing. As institutions from developed countries expanded the use of cloud technology for library applications, it became clear that this technology was highly vulnerable to security threats. Nevertheless, this did not retard advanced nations from proceeding. Undaunted, they forged a
Style APA, Harvard, Vancouver, ISO itp.
10

Boman Inga-Lill and Bartfai Aniko. "Support in Everyday Activities with a Home-based Electronic Memory Aid for Persons with Memory Impairments." In Assistive Technology Research Series. IOS Press, 2009. https://doi.org/10.3233/978-1-60750-042-1-369.

Pełny tekst źródła
Streszczenie:
In previous studies we have found that a set of electronic memory aids in a training apartment in a hospital and in two prototype apartments could help persons with memory impairments after acquired brain injury to carry out everyday activities. In this study we have examined the possibilities of a newly developed electronic memory aid with a wireless design and individually spoken reminders as support to carry out everyday activities in the participant's own home. A multiple baseline AB design was used. Five participants with memory impairments after acquired brain injury got reminders for th
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Electronic forgery"

1

GuorenYao, Gaoming Yang, Xintian Liu, and Lei Chen. "Two-Stream Manipulation Trace Network for Face Forgery Detection." In 2025 8th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE). IEEE, 2025. https://doi.org/10.1109/aemcse65292.2025.11042665.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Zhang, Chenghao. "Federated learning-based cross-domain face forgery detection for consumer IOT systems." In 4th International Conference on Electronic Information Engineering and Data Processing (EIEDP 2025), edited by Azlan Bin Mohd Zain and Lei Chen. SPIE, 2025. https://doi.org/10.1117/12.3067515.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Biswas, Subir, Md Ariful Islam, Jayanti Rout, Minati Mishra, and Debendra Muduli. "Passive Image Forgery Detection Through Ensemble Learning with ELA." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10827508.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kashyap, Nandini, Prince Yadav, Nikita, and Ms Anukriti Kaushal. "Deep Learning Strategies for Effective Image Forgery Detection and Localization." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10827254.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Liu, Yutong. "A Method for Face Expression Forgery Detection Based on Reconstruction Error." In 2024 6th International Conference on Electronics and Communication, Network and Computer Technology (ECNCT). IEEE, 2024. http://dx.doi.org/10.1109/ecnct63103.2024.10704368.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chen, Oscal Tzyh-Chiang, Wei-Jei Lin, and Cheng-Tai Tsai. "Consistent Learning of Multiple Paths Using Frequency-Aware Clues for Face Forgery Detection." In 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2024. http://dx.doi.org/10.1109/icce-taiwan62264.2024.10674230.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Parthiban, S., V. C. Bharathi, A. Anbumani, S. Ananthi, and R. Sathya. "Enhanced Forgery Detection of Fake Face in Forensic Investigation using Convolution Neural Network." In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2024. http://dx.doi.org/10.1109/icosec61587.2024.10722521.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Thorstensen, Eivind Bruun, Atle Helge Qvale, Vebjørn Andresen, Roy Johnsen, and Paal Bratland. "Effect of Heat Treatment and Manufacturing Method on the Susceptibility to Hydrogen Induced Stress Cracking of UNS N06625." In CONFERENCE 2024. AMPP, 2024. https://doi.org/10.5006/c2024-20899.

Pełny tekst źródła
Streszczenie:
Abstract This paper presents results obtained from examining the effect of heat treatment and production method on the hydrogen induced stress cracking (HISC) susceptibility of UNS N06625 (Alloy 625). Five different versions of Alloy 625 were examined: Hot forged material heat treated at 920 °C, 1010 °C and 1100 °C respectively, material produced by hot isostatic pressing (HIP) and material that has been solution annealed and strain hardened (cold worked) at a temperature below secondary phase formation. The different versions of Alloy 625 were initially characterized by identifying the critic
Style APA, Harvard, Vancouver, ISO itp.
9

Johnsen, Roy, Linn C. Gjelseng, Martin A. Heimsæther, Anders Jernberg, and Atle H. Qvale. "Influence of Manufacturing Process and Resulting Microstructure on HISC Susceptibility of 25Cr Duplex Stainless Steel Pipe." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-13410.

Pełny tekst źródła
Streszczenie:
Abstract In this paper, the hydrogen induced stress cracking (HISC) susceptibility of 25Cr duplex stainless-steel tubulars produced through hot extrusion with- and without subsequent cold drawing, forging and centrifugal casting have been examined. Two different test methods have been used; i) Stepwise (slow) Load Increase, and ii) Slow Strain Rate Testing. Samples pre-charged with hydrogen and samples without hydrogen were included in the test program. Pre-charged samples were also polarized cathodically during testing under stress. The microstructure was characterised, including measurements
Style APA, Harvard, Vancouver, ISO itp.
10

Khanna, Nitin, George T. C. Chiu, Jan P. Allebach, and Edward J. Delp. "Scanner identification with extension to forgery detection." In Electronic Imaging 2008, edited by Edward J. Delp III, Ping Wah Wong, Jana Dittmann, and Nasir D. Memon. SPIE, 2008. http://dx.doi.org/10.1117/12.772048.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Electronic forgery"

1

Salter and Weston. L51534 A Study of New Joining Processes for Pipelines. Pipeline Research Council International, Inc. (PRCI), 1987. http://dx.doi.org/10.55274/r0010083.

Pełny tekst źródła
Streszczenie:
Over many decades it has been accepted that the most economical way to produce a pipeline is to join together the standard lengths of pipe as quickly as possible, using a highly mobile task force of welders and other technicians, leaving tie-ins, crossings, etc. to smaller specialist crews. The work pattern which evolved almost invariably involved several crews of welders strung out along the pipelines, progress being controlled by the rate at which the leading pair could complete the weld root. The spread from this first crew to final inspection could be a considerable distance, acceptable on
Style APA, Harvard, Vancouver, ISO itp.
2

Hefetz, Abraham, and Justin O. Schmidt. Use of Bee-Borne Attractants for Pollination of Nonrewarding Flowers: Model System of Male-Sterile Tomato Flowers. United States Department of Agriculture, 2003. http://dx.doi.org/10.32747/2003.7586462.bard.

Pełny tekst źródła
Streszczenie:
The use of bee natural product for enhancing pollination is especially valuable in problematic crops that are generally avoided by bees. In the present research we attempted to enhance bee visitation to Male Sterile (M-S) tomato flowers generally used in the production of hybrid seeds. These flowers that lack both pollen and nectar are unattractive to bees that learn rapidly to avoid them. The specific objects were to elucidate the chemical composition of the exocrine products of two bumble bee species the North American Bombus impatiens and the Israeli B. terrestris. Of these, to isolate and
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!