Oklahoma State University

Displaying 1-34 of 34 results

  • White Papers // May 2014

    Management Trust, Organizational Trust, and Organizational Performance: Empirical Validation of an Instrument

    The researchers defined trust as \"The willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party\". The purpose of this...

    Provided By Oklahoma State University

  • White Papers // Feb 2012

    A Bargaining-Based Approach for Incentive-Compatible Message Forwarding in Opportunistic Networks

    Opportunistic networking is an important technique to enable users to communicate in an environment where contemporaneous end-to-end paths are unavailable or unstable. To support end-to-end messaging in opportunistic networks, a number of probabilistic routing protocols have been proposed. However, when nodes are selfish, they may not have incentives to participate...

    Provided By Oklahoma State University

  • White Papers // Dec 2011

    Enhancing Data Security by Making Data Disappear in a P2P Systems

    This paper describes the problem of securing data by making it disappear after some time limit, making it impossible for it to be recovered by an unauthorized party. This method is in response to the need to keep the data secured and to protect the privacy of archived data on...

    Provided By Oklahoma State University

  • White Papers // Aug 2011

    On Designing Protocols for Non-Cooperative Multi-Radio Channel Assignment in Multiple Collision Domains

    Channel assignment is a crucial problem for wireless networks, especially for non-cooperative wireless networks, in which nodes are selfish. While there have been a few studies of non-cooperative, multi-radio channel assignment, most existing studies are restricted to single collision domains only. In this paper, the authors study the design of...

    Provided By Oklahoma State University

  • White Papers // Mar 2011

    Key Management in Wireless Sensor Networks Using a Modified Blom Scheme

    Key establishment between any pair of nodes is an essential requirement for providing secure services in wireless sensor networks. Blom's scheme is a prominent key management scheme but its shortcomings include large computation overhead and memory cost. The authors propose a new scheme in this paper that modifies Blom's scheme...

    Provided By Oklahoma State University

  • White Papers // Feb 2011

    A New Protocol Implementing Authentication Transformations for Multi-Located Parties

    This paper discusses a new protocol implementing authentication in a multi-located environment that avoids Man-In-the-Middle (MIM) attack, replay attack and provides privacy, integrity of a message for multi-located parties. The protocol uses the concept that each party is associated with a subsidiary agent. Classical cryptography uses either public-private key pair...

    Provided By Oklahoma State University

  • White Papers // Oct 2010

    Cluster Based Key Management in Wireless Sensor Networks

    Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clusters based on their physical locations. In addition, efficient ways of key distribution among the nodes within the cluster and among controllers of each cluster...

    Provided By Oklahoma State University

  • White Papers // Sep 2010

    Cooperative Sensing With Adaptive Sensing Ranges in Cognitive Radio Ad-Hoc Networks

    Cognitive radio has been proposed as an innovative and effective technology to exploit the efficient reuse of the precious radio spectrum. In spectrum sensing which is a crucial step in cognitive radio networks, an adequate sensing range needs to be defined to avoid the hidden transmitter/receiver problems. Moreover, a secondary...

    Provided By Oklahoma State University

  • White Papers // Aug 2010

    Developing A Cash Flow Plan

    A cash flow plan is a recorded projection of the amount and timing of all cash inflows and cash outflows expected to occur throughout the planning period. Larger farms, substitution of capital assets for labor, and inflation increase the amount of cash required to operate the farm or ranch and...

    Provided By Oklahoma State University

  • White Papers // May 2010

    CTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks

    In a Cyclic Mobile Ad Hoc NETwork (CMANET) where nodes move cyclically, the authors formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggregation issues. Unlike trust management in conventional Peer-To-Peer (P2P) systems, trust management in MANETs is based on simple neighbor trust relationships and...

    Provided By Oklahoma State University

  • White Papers // Jan 2010

    Hypergraph-Based Task-Bundle Scheduling Towards Efficiency and Fairness in Heterogeneous Distributed Systems

    This paper investigates scheduling loosely coupled task-bundles in highly heterogeneous distributed systems. Two allocation quality metrics are used in pay-per-service distributed applications: efficiency in terms of social welfare, and fairness in terms of envy-freeness. The first contribution of this work is that the authors build a unified hyper-graph scheduling model...

    Provided By Oklahoma State University

  • White Papers // Jan 2010

    Recursive Secret Sharing for Distributed Storage and Information Hiding

    This paper presents a recursive computational multi-secret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such that any k of the n shares suffice to recreate the secret S as well as all the hidden...

    Provided By Oklahoma State University

  • White Papers // Jan 2010

    A Distributed Data Storage Scheme for Sensor Networks

    The authors present a data storage scheme for sensor networks that achieves the targets of encryption and distributed storage simultaneously. They partition the data to be stored into numerous pieces such that at least a specific number of them have to be brought together to recreate the data. The procedure...

    Provided By Oklahoma State University

  • White Papers // Jan 2010

    Internet Voting Protocol Based on Implicit Data Security

    This paper presents a new protocol for Internet voting based on implicit data security. This protocol allows recasting of votes, which permits a change of mind by voters either during the time window over which polling is open or during a shorter period over which recasting is permitted. The security...

    Provided By Oklahoma State University

  • White Papers // Aug 2009

    Unequal Error Protection Rateless Coding for Efficient MPEG Video Transmission

    This paper proposes a rateless coding for efficient MPEG video transmission over loss prone networks. An MPEG video stream is comprised of various frame types, which contribute differently to the displayed video quality. The authors employ rateless codes with Unequal Error Protection (UEP) property to have more protection on frames...

    Provided By Oklahoma State University

  • White Papers // Aug 2009

    Rateless Codes With Optimum Intermediate Performance

    Intermediate recovery rate is important in applications where partial recovery of the source packets from received encoded packets is still beneficial. For instance, in video or voice transmission, the receiver can benefit from incomplete recovered data by playing a lower quality of the media. This motivates the design of Forward...

    Provided By Oklahoma State University

  • White Papers // Jul 2009

    H-Trust: A Group Trust Management System for Peer-to-Peer Desktop Grid

    Peer-To-Peer Desktop Grid (P2PDG) has emerged as a pervasive cyber-infrastructure tack-ling many large-scale applications with high impacts. As a burgeoning research area, P2PDG can support numerous applications, including scientific computing, file sharing, web services, and virtual organization for collaborative activities and projects. To handle trustworthiness issues of these services, trust...

    Provided By Oklahoma State University

  • White Papers // May 2009

    VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks

    With emerging Internet-scale open content and resource sharing, social networks, and complex cyber-physical systems, trust issues become prominent. In this paper, the authors propose a trust vector based scheme (VectorTrust) for aggregation of distributed trust scores. Leveraging a Bellman-Ford based algorithm for fast trust score aggregation, VectorTrust features localized and...

    Provided By Oklahoma State University

  • White Papers // Apr 2009

    A Low-Latency and Error-Resilient Video-on-Demand Broadcasting Protocol Using UEP-Rateless Codes

    In this paper a new reliable and low-latency Video-On-Demand (VOD) broadcasting protocol is proposed. Most existing VOD broadcasting protocols have no protection against frame loss. In order to acquire loss-resiliency, the authors encode each segment of a partitioned video with an Unequal Error Protection (UEP) rate-less code. Using this error...

    Provided By Oklahoma State University

  • White Papers // Feb 2009

    Efficient Grid Task-Bundle Allocation Using Bargaining Based Self-Adaptive Auction

    To address coordination and complexity issues, the authors formulate a grid task allocation problem as a bargaining based self-adaptive auction and propose the BarSAA grid task-bundle allocation algorithm. During the auction, prices are iteratively negotiated and dynamically adjusted until market equilibrium is reached. The BarSAA algorithm features decentralized bidding decision...

    Provided By Oklahoma State University

  • White Papers // Feb 2009

    A Recursive Threshold Visual Cryptography Scheme

    Conventional secret sharing schemes, which have several networking applications, are information theoretically very inefficient. For example, a (k, n) secret sharing scheme expands a secret of b bits into n shares each of at least bits in size. Furthermore, since only of these shares are needed to recreate the secret,...

    Provided By Oklahoma State University

  • White Papers // Sep 2004

    Economic Factors Affecting Cow Herd Performance

    Economic performance of the beef cow-calf or cowherd enterprise can be measured in alternative ways. This extension fact sheet summarizes a decade of SPA (Standardized Performance Analysis) data and recent research findings. The results presented in this sheet, provides insight into factors that affect performance across many sizes and production...

    Provided By Oklahoma State University

  • White Papers // Jul 2004

    Bacterial Diseases of Poultry: Excluding Respiratory Diseases

    Bacteria are microscopic living organisms. Successful control of bacterial diseases entails isolating and identifying disease-producing species, if present, and preventing multiplication and spread of the organism within the animal's body or to other animals. This fact sheet discusses the symptoms, prevention, and treatment of various bacterial diseases prevailing in poultry.

    Provided By Oklahoma State University

  • White Papers // Jun 2004

    Common Ticks of Oklahoma

    This fact sheet describes the life cycles, types, and various diseases caused by the ticks of Oklahoma. Ticks are very important pests of wildlife, domestic animals, and humans. Their irritating bites cause extreme pain and economic losses in domestic animals and a great deal of discomfort to people who work...

    Provided By Oklahoma State University

  • White Papers // May 2004

    Heat Detection Aids for Dairy and Beef A.I.

    This fact sheet discusses heat detection aids for the best outcome when using artificial insemination for dairy and beef cattle. The most limiting factor in artificial insemination programs is the proper detection of cows or heifers in estrus. Estrus, or "heat," is that period of time that occurs every 18...

    Provided By Oklahoma State University

  • White Papers // Oct 2003

    Johne's Disease (An Emerging Disease of Oklahoma City)

    This fact sheet describes the clinical signs, diagnosis, prevalence, and prevention of Johne's disease in Oklahoma. Johne's Disease (pronounced yo-nee's) is a disease of the intestinal tract of cattle and other ruminants. It is caused by the bacteria Mycobacterium Para tuberculosis, acid fast bacteria very similar to the organism that...

    Provided By Oklahoma State University

  • White Papers // Oct 2003

    Home Processing of Poultry

    Processing is the final step in the production of broiler chickens. As the saying goes "last, but certainly not the least." The quality of the final product is dependent on proper processing. This fact sheet describes the steps involved in processing chickens starting from preparing the chicken for slaughter to...

    Provided By Oklahoma State University

  • White Papers // Aug 2003

    Fly Control in the Poultry House

    This fact sheet contains information on how to control flies, species of flies, and management of flies in the poultry house. Fly control should be an integral part of every poultry producer's management program. Flies spread disease and filth, is a nuisance to employees, and can become problems for nearby...

    Provided By Oklahoma State University

  • White Papers // Aug 2003

    Feeding Waste Milk to Dairy Calves

    This fact sheet discusses reasons and precautions of feeding waste milk to dairy calves. Dairy producers feed a variety of liquid feeds to young calves after the initial colostrums. These liquid feeds include surplus colostrums, whole milk, transition milk, waste or discard milk, and milk replacer. Waste or discard milk...

    Provided By Oklahoma State University

  • White Papers // Aug 2003

    Livestock Disease - Cause and Control

    The purpose of this fact sheet is to acquaint livestock producers with some basic facts about diseases, their spread, and ways to minimize losses. The livestock industry is extremely important to the economy of Oklahoma and includes not only commercial producers of meat or milk, but also purebred breeders and...

    Provided By Oklahoma State University

  • White Papers // Aug 2003

    Some Ideas About Crossbreeding Sheep

    This paper discusses certain important factors in crossbreeding of sheep. Why do commercial producers crossbreed sheep-or any animal, for that matter? There are two reasons. First, no breed of sheep is best in all characteristics. If a producer combines the best characteristics of several different breeds, he has a chance...

    Provided By Oklahoma State University

  • White Papers // Mar 2003

    Wild Bird Control in the Poultry House

    Poultry houses of all kinds can be troubled with wild birds. Not only do the wild birds cause messes with their droppings and nests, but they can consume or contaminate large quantities of feed and be carriers of diseases and parasites. Another problem with birds is that they can damage...

    Provided By Oklahoma State University

  • White Papers // Jan 2003

    Dry Cow Feeding and Management

    Proper dry cow nutrition and management is critical, since decisions made during this period will have a tremendous impact on milk production and health during the next lactation. The purpose of a dry period is to allow the cow's udder an opportunity to regenerate secretory tissue and to allow the...

    Provided By Oklahoma State University

  • White Papers // Jul 2002

    Hatching Ostrich Chicks

    Production of the ostrich in the United States in locations other than zoos and wildlife preserves is a relatively new segment of animal husbandry. The natural home of the ostrich is Africa, but large numbers of the birds are now being produced in the United States and Canada. Birds are...

    Provided By Oklahoma State University

  • White Papers // Mar 2011

    Key Management in Wireless Sensor Networks Using a Modified Blom Scheme

    Key establishment between any pair of nodes is an essential requirement for providing secure services in wireless sensor networks. Blom's scheme is a prominent key management scheme but its shortcomings include large computation overhead and memory cost. The authors propose a new scheme in this paper that modifies Blom's scheme...

    Provided By Oklahoma State University

  • White Papers // Jan 2010

    Internet Voting Protocol Based on Implicit Data Security

    This paper presents a new protocol for Internet voting based on implicit data security. This protocol allows recasting of votes, which permits a change of mind by voters either during the time window over which polling is open or during a shorter period over which recasting is permitted. The security...

    Provided By Oklahoma State University

  • White Papers // Jan 2010

    A Distributed Data Storage Scheme for Sensor Networks

    The authors present a data storage scheme for sensor networks that achieves the targets of encryption and distributed storage simultaneously. They partition the data to be stored into numerous pieces such that at least a specific number of them have to be brought together to recreate the data. The procedure...

    Provided By Oklahoma State University

  • White Papers // Jan 2010

    Recursive Secret Sharing for Distributed Storage and Information Hiding

    This paper presents a recursive computational multi-secret sharing technique that hides k - 2 secrets of size b each into n shares of a single secret S of size b, such that any k of the n shares suffice to recreate the secret S as well as all the hidden...

    Provided By Oklahoma State University

  • White Papers // Feb 2009

    A Recursive Threshold Visual Cryptography Scheme

    Conventional secret sharing schemes, which have several networking applications, are information theoretically very inefficient. For example, a (k, n) secret sharing scheme expands a secret of b bits into n shares each of at least bits in size. Furthermore, since only of these shares are needed to recreate the secret,...

    Provided By Oklahoma State University

  • White Papers // Oct 2010

    Cluster Based Key Management in Wireless Sensor Networks

    Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clusters based on their physical locations. In addition, efficient ways of key distribution among the nodes within the cluster and among controllers of each cluster...

    Provided By Oklahoma State University

  • White Papers // Aug 2011

    On Designing Protocols for Non-Cooperative Multi-Radio Channel Assignment in Multiple Collision Domains

    Channel assignment is a crucial problem for wireless networks, especially for non-cooperative wireless networks, in which nodes are selfish. While there have been a few studies of non-cooperative, multi-radio channel assignment, most existing studies are restricted to single collision domains only. In this paper, the authors study the design of...

    Provided By Oklahoma State University

  • White Papers // Feb 2009

    Efficient Grid Task-Bundle Allocation Using Bargaining Based Self-Adaptive Auction

    To address coordination and complexity issues, the authors formulate a grid task allocation problem as a bargaining based self-adaptive auction and propose the BarSAA grid task-bundle allocation algorithm. During the auction, prices are iteratively negotiated and dynamically adjusted until market equilibrium is reached. The BarSAA algorithm features decentralized bidding decision...

    Provided By Oklahoma State University

  • White Papers // May 2010

    CTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks

    In a Cyclic Mobile Ad Hoc NETwork (CMANET) where nodes move cyclically, the authors formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggregation issues. Unlike trust management in conventional Peer-To-Peer (P2P) systems, trust management in MANETs is based on simple neighbor trust relationships and...

    Provided By Oklahoma State University

  • White Papers // May 2009

    VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks

    With emerging Internet-scale open content and resource sharing, social networks, and complex cyber-physical systems, trust issues become prominent. In this paper, the authors propose a trust vector based scheme (VectorTrust) for aggregation of distributed trust scores. Leveraging a Bellman-Ford based algorithm for fast trust score aggregation, VectorTrust features localized and...

    Provided By Oklahoma State University

  • White Papers // Jan 2010

    Hypergraph-Based Task-Bundle Scheduling Towards Efficiency and Fairness in Heterogeneous Distributed Systems

    This paper investigates scheduling loosely coupled task-bundles in highly heterogeneous distributed systems. Two allocation quality metrics are used in pay-per-service distributed applications: efficiency in terms of social welfare, and fairness in terms of envy-freeness. The first contribution of this work is that the authors build a unified hyper-graph scheduling model...

    Provided By Oklahoma State University

  • White Papers // Jul 2009

    H-Trust: A Group Trust Management System for Peer-to-Peer Desktop Grid

    Peer-To-Peer Desktop Grid (P2PDG) has emerged as a pervasive cyber-infrastructure tack-ling many large-scale applications with high impacts. As a burgeoning research area, P2PDG can support numerous applications, including scientific computing, file sharing, web services, and virtual organization for collaborative activities and projects. To handle trustworthiness issues of these services, trust...

    Provided By Oklahoma State University

  • White Papers // Feb 2011

    A New Protocol Implementing Authentication Transformations for Multi-Located Parties

    This paper discusses a new protocol implementing authentication in a multi-located environment that avoids Man-In-the-Middle (MIM) attack, replay attack and provides privacy, integrity of a message for multi-located parties. The protocol uses the concept that each party is associated with a subsidiary agent. Classical cryptography uses either public-private key pair...

    Provided By Oklahoma State University

  • White Papers // Aug 2009

    Unequal Error Protection Rateless Coding for Efficient MPEG Video Transmission

    This paper proposes a rateless coding for efficient MPEG video transmission over loss prone networks. An MPEG video stream is comprised of various frame types, which contribute differently to the displayed video quality. The authors employ rateless codes with Unequal Error Protection (UEP) property to have more protection on frames...

    Provided By Oklahoma State University

  • White Papers // Aug 2009

    Rateless Codes With Optimum Intermediate Performance

    Intermediate recovery rate is important in applications where partial recovery of the source packets from received encoded packets is still beneficial. For instance, in video or voice transmission, the receiver can benefit from incomplete recovered data by playing a lower quality of the media. This motivates the design of Forward...

    Provided By Oklahoma State University

  • White Papers // Apr 2009

    A Low-Latency and Error-Resilient Video-on-Demand Broadcasting Protocol Using UEP-Rateless Codes

    In this paper a new reliable and low-latency Video-On-Demand (VOD) broadcasting protocol is proposed. Most existing VOD broadcasting protocols have no protection against frame loss. In order to acquire loss-resiliency, the authors encode each segment of a partitioned video with an Unequal Error Protection (UEP) rate-less code. Using this error...

    Provided By Oklahoma State University

  • White Papers // Feb 2012

    A Bargaining-Based Approach for Incentive-Compatible Message Forwarding in Opportunistic Networks

    Opportunistic networking is an important technique to enable users to communicate in an environment where contemporaneous end-to-end paths are unavailable or unstable. To support end-to-end messaging in opportunistic networks, a number of probabilistic routing protocols have been proposed. However, when nodes are selfish, they may not have incentives to participate...

    Provided By Oklahoma State University

  • White Papers // Sep 2010

    Cooperative Sensing With Adaptive Sensing Ranges in Cognitive Radio Ad-Hoc Networks

    Cognitive radio has been proposed as an innovative and effective technology to exploit the efficient reuse of the precious radio spectrum. In spectrum sensing which is a crucial step in cognitive radio networks, an adequate sensing range needs to be defined to avoid the hidden transmitter/receiver problems. Moreover, a secondary...

    Provided By Oklahoma State University

  • White Papers // Dec 2011

    Enhancing Data Security by Making Data Disappear in a P2P Systems

    This paper describes the problem of securing data by making it disappear after some time limit, making it impossible for it to be recovered by an unauthorized party. This method is in response to the need to keep the data secured and to protect the privacy of archived data on...

    Provided By Oklahoma State University

  • White Papers // Sep 2004

    Economic Factors Affecting Cow Herd Performance

    Economic performance of the beef cow-calf or cowherd enterprise can be measured in alternative ways. This extension fact sheet summarizes a decade of SPA (Standardized Performance Analysis) data and recent research findings. The results presented in this sheet, provides insight into factors that affect performance across many sizes and production...

    Provided By Oklahoma State University

  • White Papers // Aug 2003

    Fly Control in the Poultry House

    This fact sheet contains information on how to control flies, species of flies, and management of flies in the poultry house. Fly control should be an integral part of every poultry producer's management program. Flies spread disease and filth, is a nuisance to employees, and can become problems for nearby...

    Provided By Oklahoma State University

  • White Papers // Mar 2003

    Wild Bird Control in the Poultry House

    Poultry houses of all kinds can be troubled with wild birds. Not only do the wild birds cause messes with their droppings and nests, but they can consume or contaminate large quantities of feed and be carriers of diseases and parasites. Another problem with birds is that they can damage...

    Provided By Oklahoma State University

  • White Papers // Oct 2003

    Home Processing of Poultry

    Processing is the final step in the production of broiler chickens. As the saying goes "last, but certainly not the least." The quality of the final product is dependent on proper processing. This fact sheet describes the steps involved in processing chickens starting from preparing the chicken for slaughter to...

    Provided By Oklahoma State University

  • White Papers // Jul 2002

    Hatching Ostrich Chicks

    Production of the ostrich in the United States in locations other than zoos and wildlife preserves is a relatively new segment of animal husbandry. The natural home of the ostrich is Africa, but large numbers of the birds are now being produced in the United States and Canada. Birds are...

    Provided By Oklahoma State University

  • White Papers // Jul 2004

    Bacterial Diseases of Poultry: Excluding Respiratory Diseases

    Bacteria are microscopic living organisms. Successful control of bacterial diseases entails isolating and identifying disease-producing species, if present, and preventing multiplication and spread of the organism within the animal's body or to other animals. This fact sheet discusses the symptoms, prevention, and treatment of various bacterial diseases prevailing in poultry.

    Provided By Oklahoma State University

  • White Papers // Oct 2003

    Johne's Disease (An Emerging Disease of Oklahoma City)

    This fact sheet describes the clinical signs, diagnosis, prevalence, and prevention of Johne's disease in Oklahoma. Johne's Disease (pronounced yo-nee's) is a disease of the intestinal tract of cattle and other ruminants. It is caused by the bacteria Mycobacterium Para tuberculosis, acid fast bacteria very similar to the organism that...

    Provided By Oklahoma State University

  • White Papers // Jun 2004

    Common Ticks of Oklahoma

    This fact sheet describes the life cycles, types, and various diseases caused by the ticks of Oklahoma. Ticks are very important pests of wildlife, domestic animals, and humans. Their irritating bites cause extreme pain and economic losses in domestic animals and a great deal of discomfort to people who work...

    Provided By Oklahoma State University

  • White Papers // Jan 2003

    Dry Cow Feeding and Management

    Proper dry cow nutrition and management is critical, since decisions made during this period will have a tremendous impact on milk production and health during the next lactation. The purpose of a dry period is to allow the cow's udder an opportunity to regenerate secretory tissue and to allow the...

    Provided By Oklahoma State University

  • White Papers // May 2004

    Heat Detection Aids for Dairy and Beef A.I.

    This fact sheet discusses heat detection aids for the best outcome when using artificial insemination for dairy and beef cattle. The most limiting factor in artificial insemination programs is the proper detection of cows or heifers in estrus. Estrus, or "heat," is that period of time that occurs every 18...

    Provided By Oklahoma State University

  • White Papers // Aug 2003

    Feeding Waste Milk to Dairy Calves

    This fact sheet discusses reasons and precautions of feeding waste milk to dairy calves. Dairy producers feed a variety of liquid feeds to young calves after the initial colostrums. These liquid feeds include surplus colostrums, whole milk, transition milk, waste or discard milk, and milk replacer. Waste or discard milk...

    Provided By Oklahoma State University

  • White Papers // Aug 2003

    Livestock Disease - Cause and Control

    The purpose of this fact sheet is to acquaint livestock producers with some basic facts about diseases, their spread, and ways to minimize losses. The livestock industry is extremely important to the economy of Oklahoma and includes not only commercial producers of meat or milk, but also purebred breeders and...

    Provided By Oklahoma State University

  • White Papers // Aug 2003

    Some Ideas About Crossbreeding Sheep

    This paper discusses certain important factors in crossbreeding of sheep. Why do commercial producers crossbreed sheep-or any animal, for that matter? There are two reasons. First, no breed of sheep is best in all characteristics. If a producer combines the best characteristics of several different breeds, he has a chance...

    Provided By Oklahoma State University

  • White Papers // Aug 2010

    Developing A Cash Flow Plan

    A cash flow plan is a recorded projection of the amount and timing of all cash inflows and cash outflows expected to occur throughout the planning period. Larger farms, substitution of capital assets for labor, and inflation increase the amount of cash required to operate the farm or ranch and...

    Provided By Oklahoma State University

  • White Papers // May 2014

    Management Trust, Organizational Trust, and Organizational Performance: Empirical Validation of an Instrument

    The researchers defined trust as \"The willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party\". The purpose of this...

    Provided By Oklahoma State University