scispace - formally typeset
Search or ask a question
Institution

Mississippi State University

EducationStarkville, Mississippi, United States
About: Mississippi State University is a education organization based out in Starkville, Mississippi, United States. It is known for research contribution in the topics: Population & Catfish. The organization has 14115 authors who have published 28594 publications receiving 700030 citations. The organization is also known as: The Mississippi State University of Agriculture and Applied Science & Mississippi State University of Agriculture and Applied Science.


Papers
More filters
Journal ArticleDOI
24 Apr 2009-Science
TL;DR: To understand the biology and evolution of ruminants, the cattle genome was sequenced to about sevenfold coverage and provides a resource for understanding mammalian evolution and accelerating livestock genetic improvement for milk and meat production.
Abstract: To understand the biology and evolution of ruminants, the cattle genome was sequenced to about sevenfold coverage. The cattle genome contains a minimum of 22,000 genes, with a core set of 14,345 orthologs shared among seven mammalian species of which 1217 are absent or undetected in noneutherian (marsupial or monotreme) genomes. Cattle-specific evolutionary breakpoint regions in chromosomes have a higher density of segmental duplications, enrichment of repetitive elements, and species-specific variations in genes associated with lactation and immune responsiveness. Genes involved in metabolism are generally highly conserved, although five metabolic genes are deleted or extensively diverged from their human orthologs. The cattle genome sequence thus provides a resource for understanding mammalian evolution and accelerating livestock genetic improvement for milk and meat production.

1,144 citations

Journal ArticleDOI
01 Jun 2013

1,136 citations

Journal ArticleDOI
Kanchon K. Dasmahapatra1, James R. Walters2, Adriana D. Briscoe3, John W. Davey, Annabel Whibley, Nicola J. Nadeau2, Aleksey V. Zimin4, Daniel S.T. Hughes5, Laura Ferguson5, Simon H. Martin2, Camilo Salazar6, Camilo Salazar2, James J. Lewis3, Sebastian Adler7, Seung-Joon Ahn8, Dean A. Baker9, Simon W. Baxter2, Nicola Chamberlain10, Ritika Chauhan11, Brian A. Counterman12, Tamas Dalmay11, Lawrence E. Gilbert13, Karl H.J. Gordon14, David G. Heckel8, Heather M. Hines5, Katharina J. Hoff7, Peter W. H. Holland5, Emmanuelle Jacquin-Joly15, Francis M. Jiggins, Robert T. Jones, Durrell D. Kapan16, Durrell D. Kapan17, Paul J. Kersey, Gerardo Lamas, Daniel Lawson, Daniel Mapleson11, Luana S. Maroja18, Arnaud Martin3, Simon Moxon19, William J. Palmer2, Riccardo Papa20, Alexie Papanicolaou14, Yannick Pauchet8, David A. Ray12, Neil Rosser1, Steven L. Salzberg21, Megan A. Supple22, Alison K. Surridge2, Ayşe Tenger-Trolander10, Heiko Vogel8, Paul A. Wilkinson23, Derek Wilson, James A. Yorke4, Furong Yuan3, Alexi Balmuth24, Cathlene Eland, Karim Gharbi, Marian Thomson, Richard A. Gibbs25, Yi Han25, Joy Jayaseelan25, Christie Kovar25, Tittu Mathew25, Donna M. Muzny25, Fiona Ongeri25, Ling-Ling Pu25, Jiaxin Qu25, Rebecca Thornton25, Kim C. Worley25, Yuanqing Wu25, Mauricio Linares26, Mark Blaxter, Richard H. ffrench-Constant27, Mathieu Joron, Marcus R. Kronforst10, Sean P. Mullen28, Robert D. Reed3, Steven E. Scherer25, Stephen Richards25, James Mallet1, James Mallet10, W. Owen McMillan, Chris D. Jiggins2, Chris D. Jiggins6 
05 Jul 2012-Nature
TL;DR: It is inferred that closely related Heliconius species exchange protective colour-pattern genes promiscuously, implying that hybridization has an important role in adaptive radiation.
Abstract: Sequencing of the genome of the butterfly Heliconius melpomene shows that closely related Heliconius species exchange protective colour-pattern genes promiscuously.

1,103 citations

Journal ArticleDOI
TL;DR: In this paper, the authors develop the concept of community-based enterprise (CBE) and argue that it provides a potential strategy for sustainable local development in poor populations, maintaining that natural and social capital are integral and inseparable from economic considerations, transforming the community into an entrepreneur and an enterprise.
Abstract: In this article we develop the concept of community-based enterprise (CBE) and argue that it provides a potential strategy for sustainable local development in poor populations. We maintain that in this emerging form of entrepreneurship, typically rooted in community culture, natural and social capital are integral and inseparable from economic considerations, transforming the community into an entrepreneur and an enterprise. Drawing on interdisciplinary and multilevel approaches, we propose a theoretical model of the determinants, characteristics, and consequences of CBEs.

1,079 citations

Journal ArticleDOI
TL;DR: Investigation of the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats suggests that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users.
Abstract: Information technology executives strive to align the actions of end users with the desired security posture of management and of the firm through persuasive communication. In many cases, some element of fear is incorporated within these communications. However, within the context of computer security and information assurance, it is not yet clear how these fear-inducing arguments, known as fear appeals, will ultimately impact the actions of end users. The purpose of this study is to investigate the influence of fear appeals on the compliance of end users with recommendations to enact specific individual computer security actions toward the mitigation of threats. An examination was performed that culminated in the development and testing of a conceptual model representing an infusion of technology adoption and fear appeal theories. Results of the study suggest that fear appeals do impact end user behavioral intentions to comply with recommended individual acts of security, but the impact is not uniform across all end users. It is determined in part by perceptions of self-efficacy, response efficacy, threat severity, and social influence. The findings of this research contribute to information systems security research, human-computer interaction, and organizational communication by revealing a new paradigm in which IT users form perceptions of the technology, not on the basis of performance gains, but on the basis of utility for threat mitigation.

1,079 citations


Authors

Showing all 14277 results

NameH-indexPapersCitations
Naomi J. Halas14043582040
Bin Liu138218187085
Shuai Liu129109580823
Vijay P. Singh106169955831
Liangpei Zhang9783935163
K. L. Dooley9532063579
Feng Chen95213853881
Marco Cavaglia9337260157
Tuan Vo-Dinh8669824690
Nicholas H. Barton8426732707
S. Kandhasamy8123550363
Michael S. Sacks8038620510
Dinesh Mohan7928335775
James Mallet7820921349
George D. Kuh7724830346
Network Information
Related Institutions (5)
Texas A&M University
164.3K papers, 5.7M citations

94% related

University of Georgia
93.6K papers, 3.7M citations

93% related

Purdue University
163.5K papers, 5.7M citations

93% related

Michigan State University
137K papers, 5.6M citations

93% related

University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

93% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202347
2022247
20211,725
20201,620
20191,465
20181,467