Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Narasimha R Vajjhala
  • University of New York Tirana
    Faculty of Engineering and Architecture
    East Campus, Tirana, Albania.
  • +355685489424
  • Dr. Narasimha Rao Vajjhala is working as the Dean of the Faculty of Engineering and Architecture at the University of... moreedit
In an era of rapid technological advancements and a dynamic global landscape, the need for innovative educational strategies has never been more critical. As traditional teaching methods struggle to keep pace with the demands of the 21st... more
In an era of rapid technological advancements and a dynamic global landscape, the need for innovative educational strategies has never been more critical. As traditional teaching methods struggle to keep pace with the demands of the 21st century, educators are called upon to cultivate a new generation of thinkers equipped with the skills necessary for success in a future that remains largely undefined. The disconnect between outdated educational models and the evolving needs of the modern workforce presents a formidable challenge. However, it also offers a unique opportunity to revolutionize how we approach teaching and learning. Revolutionizing Curricula Through Computational Thinking, Logic, and Problem Solving addresses this challenge head-on by introducing computational thinking as a fundamental skill set applicable across all academic disciplines. This book goes beyond viewing computational thinking as merely a technical skill; it is a versatile tool for problem-solving and logical reasoning, essential for enhancing critical thinking across various subjects. By integrating computational thinking into the core of education, we can prepare students to adapt to future technologies and become innovators and leaders in their respective fields.
The current study focused on recent bachelor of science graduates' perceptions of the usefulness of the abilities they acquired throughout their undergraduate studies while working for research and development firms. A literature review... more
The current study focused on recent bachelor of science graduates' perceptions of the usefulness of the abilities they acquired throughout their undergraduate studies while working for research and development firms. A literature review was used to create a survey. Using government reports, a sample frame of 1600 businesses was chosen to reflect the target group of employers in the U.S.'s research and development sector. N=366 bachelor's degree in science students who started working on or after June 1, 2022 were surveyed to gather data. To lessen respondent bias or lying in the survey, a fresh statistical research element was incorporated. The hypotheses were tested using correlation and descriptive statistics. The dependent variables of program learning effectiveness, employment skill match, and program return on investment were all strongly correlated with all R&D skill characteristics.
The 21st-century marketplace and its consumers are connected digitally as an innovative and inquisitive technique of information gathering. In the first two decades of this millennium, the proliferation of digital media and increasingly... more
The 21st-century marketplace and its consumers are connected digitally as an innovative and inquisitive technique of information gathering. In the first two decades of this millennium, the proliferation of digital media and increasingly mobile Internet connectivity have undoubtedly had a significant influence on brands and brand management. Innovations have ushered in a brand-new epoch known as “the digital era.” This golden age has fostered a few unique challenges that aim to approach branding in novel and interesting ways. Brands are attempting to create a digital identity for their business in today's technology-driven economy to sustain consumer awareness. Maintaining an online presence is essential for businesses to continue being successful and relevant considering the increasing amount of time that customers are spending on digital platforms nowadays.
The purpose of this study was to explore the challenges of using big data analytics by Indian SMEs. This exploratory study has identified the...
The research investigates the risks in adopting and implementing big data analytics in Indian micro, small, and medium enterprises (MSMEs). The researchers outlined a survey questionnaire for accumulating reactions from managers working... more
The research investigates the risks in adopting and implementing big data analytics in Indian micro, small, and medium enterprises (MSMEs). The researchers outlined a survey questionnaire for accumulating reactions from managers working in 50 Indian micro, small, and medium-sized enterprises on behalf of five vital commercial sectors. The application and use of big data analytics offer several significant problems for small companies as an investment in hardware and software resources are substantial. This study's findings provided experimental evidence on five critical challenges that Indian MSMEs face while adopting and implementing big data analytics: lack of human resources, data privacy and security, shortage of technological resources, deficiency of awareness, and financial implications. This study's findings emphasize the challenges that MSMEs face while leveraging big data analytics benefits. The research outcome will promote MSMEs' organizational leadership in p...
The grounded theory study-based chapter comprehensively presents information about the significance of information and communication technology, the e-readiness situation of Nigeria in the field of agri-business. The core purpose of this... more
The grounded theory study-based chapter comprehensively presents information about the significance of information and communication technology, the e-readiness situation of Nigeria in the field of agri-business. The core purpose of this chapter is to discuss the e-readiness challenges faced by the farmers and extension workers communities of the north-east region of Nigeria. While introducing and application of information technology (IT), numerous challenges like infrastructural constraints including electricity, training facilities, lower literacy rates, language and cultural restrictions, lack of awareness campaigns, expensive telecom services have been facing by farmers and extension workers of the targeted region. The significant adoption of technology in agriculture by the young generation when compared to the older age, also highlighted in the chapter. The authors highlighted the dot.com boom in Africa, particularly in Nigeria, along with stakeholder's role in creating a...
Web 2.0 technologies provide a platform for dynamic social learning and knowledge sharing processes. Small- and Medium-sized Enterprises (SMEs) have limited financial and human resources. The innovative use of collaborative Web 2.0... more
Web 2.0 technologies provide a platform for dynamic social learning and knowledge sharing processes. Small- and Medium-sized Enterprises (SMEs) have limited financial and human resources. The innovative use of collaborative Web 2.0 technologies has the potential of helping SMEs develop and harness intellectual capital. Intellectual capital is the basis for value creation and competitive advantage for SMEs. The acceptance and use of collaborative technologies by the employees in a firm depends to a certain extent on socio-cultural factors, including the national culture. Transition economies, such as Albania after decades of harsh communism have different social and cultural conditions as compared to other developed and developing countries. The purpose of this paper was to investigate the influence of national culture on the acceptance and use of collaborative technologies. Qualitative interviews using semi-structured questions were conducted with 30 managers working in 15 medium-si...
The purpose of this paper is to empirically evaluate the performance of a Centre of Excellence (CoE) as a manifestation of cross-sector collaboration and to identify the factors that are critical to or pose risks for the success of a CoE.... more
The purpose of this paper is to empirically evaluate the performance of a Centre of Excellence (CoE) as a manifestation of cross-sector collaboration and to identify the factors that are critical to or pose risks for the success of a CoE. Design/methodology/approach: The research method of the paper is a case study about a CoE for protection in the field of defence. The longitudinal data for the case were collected in two phases through Internet surveys. The data were analysed with the Critical Factor Index (CFI) method, which ...
This study addresses the twin challenges of talent retention and high project failure rates (40-70%) by harnessing machine learning (ML) techniques to analyze retrospective big data. The study's objective was to ascertain whether project... more
This study addresses the twin challenges of talent retention and high project failure rates (40-70%) by harnessing machine learning (ML) techniques to analyze retrospective big data. The study's objective was to ascertain whether project performance indicators can be a reliable gauge of project manager (PM) organizational commitment. This approach sidesteps the inherent bias and small effect sizes associated with survey self-report responses. Our innovative methodology leverages secondary big data, transforming the values into structured features that predict PM organizational commitment. This study proposes a novel conceptual framework, focusing on actual behavioral evidence rather than traditional, self-reported attitudes to assess the fuzzy predictors of organizational commitment. Among the three developed ML models, one demonstrated a significant 24% effect size, uncovering key features correlating PM tenure and organizational commitment with success. The insights gained from this research have broad implications for global stakeholders in projects and programs, offering a more objective and big data-driven understanding of PM commitment.
Advancing SMEs Toward E-Commerce Policies for Sustainability provides a fresh perspective on how small and medium-sized enterprises (SMEs) can leverage e-commerce for sustainability and considers the best practices and challenges of... more
Advancing SMEs Toward E-Commerce Policies for Sustainability provides a fresh perspective on how small and medium-sized enterprises (SMEs) can leverage e-commerce for sustainability and considers the best practices and challenges of adoption. Covering topics such as data science, digital ethics, and blockchain, this reference work is ideal for business owners, managers, policymakers, researchers, scholars, academicians, educators, and students.
People are increasingly inclined to shop online when traditional shopping becomes tricky or scary. In the first quarter of 2020, when the COVID-19 pandemic began to affect global markets, it became clear that it would test the resilience... more
People are increasingly inclined to shop online when traditional shopping becomes tricky or scary. In the first quarter of 2020, when the COVID-19 pandemic began to affect global markets, it became clear that it would test the resilience and performance of a rapidly growing e-commerce sector in every part of the globe. The entire world has witnessed the novel outburst of coronavirus and went into lockdown, forcing many businesses to shut down temporarily. Countries are gradually relaxing restrictions, but
the future is still uncertain. Even companies reopening have rules enforcing social distancing, wearing masks, and limiting how many customers can enter a space at once. These limitations have forced the
movements of world consumers and observed many difficulties in procuring all kinds of family requirements. These limitations, like government-imposed quarantines, social distancing, and fear of viruses,
provide opportunities for the e-commerce business to thrive over the next few years. Consumers turn to digital options to bypass physical shopping environments, so the behavior change will undoubtedly influence longer-term buyer behavior. This book will help Small- and Medium-sized (SMEs) enterprises advance their e-commerce policies toward sustainability.
The COVID-19 pandemic has highlighted the importance of health data, technology, and access to health informatics. The applications of several information technologies in the context of healthcare are proving instrumental in pandemic... more
The COVID-19 pandemic has highlighted the importance of health data, technology, and access to health informatics. The applications of several information technologies in the context of healthcare are proving instrumental in pandemic control. These technologies were already actively used in the healthcare sector before the pandemic. However, the pandemic has resulted in researchers reassessing how these technologies could have better assisted with the aftermath of the COVID-19 pandemic and how they may mitigate the threat of future pandemics.

Health Informatics and Patient Safety in Times of Crisis provides a fresh perspective on how healthcare informatics has managed the current pandemic and how improved healthcare informatics could help in a future crisis. Covering topics such as digital public health, misinformation, and knowledge management, this premier reference source is an indispensable resource for medical professionals, hospital administrators, public health officials, community leaders, international leaders, libraries, medical students, medical professors, researchers, and academicians.
This chapter explores the applications, contributions, limitations, and challenges of data envelopment analysis (DEA) in healthcare management. DEA, a non-parametric method used for evaluating the efficiency of decision-making units, has... more
This chapter explores the applications, contributions, limitations, and challenges of data envelopment analysis (DEA) in healthcare management. DEA, a non-parametric method used for evaluating the efficiency of decision-making units, has found extensive applications in healthcare sectors such as hospital management, nursing, and outpatient services. The review consolidates findings from a broad range of studies, highlighting DEA's significant contributions to efficiency measurement, benchmarking, resource allocation and optimization, and performance evaluation. However, despite DEA's robust applications, the chapter also identifies several limitations and challenges, including the selection of inputs and outputs, sensitivity to outliers, inability to handle statistical noise, lack of inherent uncertainty measures, homogeneity assumption, and the static nature of traditional DEA models. These challenges underscore the need for further research and methodological advancements in applying DEA in healthcare management.
Cybersecurity attacks have crippled government as well as private and public company sites around the world. The impacts have been serious, including disrupting the supply chain, e-commerce, and everyday communications. Although... more
Cybersecurity attacks have crippled government as well as private and public company sites around the world. The impacts have been serious, including disrupting the supply chain, e-commerce, and everyday communications. Although technology has continued to advance, so have cyber terrorists! In parallel with cyber terrorism, technology has developed exponentially in the last five years, which researchers have termed Industry 4.0. Industry 4.0 technological advancements were intended to help decision-makers, but considering cyber terrorism, one must wonder who is being helped and how. That is the central research question addressed in this chapter. Industry 4.0 environments with a broad mix of technologies have their own set of security and privacy challenges and typical cybersecurity challenges. The current cybersecurity trends that Industry 4.0 technologies face will be discussed in this chapter. The cybersecurity concerns that managers in firms employing Industry 4.0 technology should be aware of are summarized in this chapter. The issues addressed in this chapter will provide readers with a new perspective on Industry 4.0 and cybersecurity concerns. Policymakers, academics, and managers working with organizations that use Industry 4.0 technologies and applications might find this chapter interesting.
The advancements in deep learning methods have brought several new artificial intelligence (AI) applications making AI important for every enterprise that aims to be competitive. Therefore, not only Tech companies but also small- and... more
The advancements in deep learning methods have brought several new artificial intelligence (AI) applications making AI important for every enterprise that aims to be competitive. Therefore, not only Tech companies but also small- and medium-sized enterprises (SMEs) require AI. This paper discusses SME AI applications and reveals the challenges, solutions, and advantages of implementing AI in SMEs. Although some SMEs are concerned with building their applications because of the cost and length of implementing AI, resulting in a high risk of failure, nevertheless, SMEs still depend on artificial intelligence for growth and cloud-based solutions.
The finance sector is one of the key pillars of any nation’s economy. However, with the emergence of big data and rapid technological advancements, the finance sector is processing significant amounts of heterogeneous data. Institutions... more
The finance sector is one of the key pillars of any nation’s economy. However, with the emergence of big data and rapid technological advancements, the finance sector is processing significant amounts of heterogeneous data. Institutions in finance increasingly use machine learning algorithms and techniques to process this heterogeneous data. This exploratory review provides an in-depth look at the machine learning applications in the finance sector. The state-of-the-art machine learning applications in the finance sector were reviewed in this exploratory study. The primary research question addressed in this study was to explore the machine learning algorithms and techniques applied to the applications in the finance sector. Various machine learning algorithms and techniques used in the finance sector were broadly discussed in this study. This study also suggests how machine learning can maximize productivity in the finance sector.
The spike in challenges to security as well as information and resource management across the globe has equally borne the rising demand for a better system and technology to curb it. A news release from the International Committee of the... more
The spike in challenges to security as well as information and resource management across the globe has equally borne the rising demand for a better system and technology to curb it. A news release from the International Committee of the Red Cross (ICRC) in 2020 revealed over 40,000 people were declared missing in Africa. A staggering percentage of that number, a little over 23,000, is documented in Nigeria alone. Despite the numerous factors surrounding missing persons globally, at more than 50% of the original figure, it is unsurprising that most of the cases in Nigeria are attributed to the insurgency and security mishap that has plagued the country for almost a decade. Some of the cases remain unsolved for years, causing the victims to remain untraceable, thereby taking up a different identity and existence, especially if they went missing. Current solutions to find missing persons in Nigeria revolve around word of mouth, media and print announcements, and more recently, social media. These solutions are inefficacious, slow, and do not adequately help find and identify missing persons, especially in situations where time is a determining factor. The use of a facial recognition system with deep learning functionality can help Nigerian law enforcement agencies, and other human rights organizations and friends and families of the missing person speed up the search and find process. Our experimental system combines facial recognition with deep learning using a convoluted neural network. In this study, the authors have used high-standard facial calibration and modeling for feature extraction. These extracted features form the face encodings that are after that compared to a given image.
Recommender systems are widely used by various companies today to help create personalized experiences for users or consumers. These systems incorporate a lot of artificial intelligence techniques, one of which is machine learning.... more
Recommender systems are widely used by various companies today to help create personalized experiences for users or consumers. These systems incorporate a lot of artificial intelligence techniques, one of which is machine learning. Several machine learning algorithms/techniques are applied for recommender systems to work appropriately. This study looks at the processes that are carried out for recommender systems to work and analyzes the various machine learning algorithms/techniques applied in the recommendation process and their pros and cons. Using companies such as Amazon, Netflix, and Instagram as case studies, we would also look at the general benefits and drawbacks of recommender systems and identify ways to improve these systems for future use.
The Covid-19 pandemic has highlighted strained healthcare systems with overcrowded hospitals and a global imbalance in medical resources. The rapidly increasing global population makes it imperative to identify smarter ways of healthcare... more
The Covid-19 pandemic has highlighted strained healthcare systems with overcrowded hospitals and a global imbalance in medical resources. The rapidly increasing global population makes it imperative to identify smarter ways of healthcare management. The advent of 5G cellular communications technology brings significant potential for innovation across different sectors, including healthcare. This chapter provides a review of the various 5G technologies and examines how these technologies can be leveraged to provide smart healthcare services. A discussion of various smart healthcare applications leveraging 5G networks is presented in this chapter, along with the challenges involved in deploying the applications. This chapter also provides recommendations for leadership that could help policymakers design strategies to leverage 5G networks and create smart healthcare applications.
Insider threats significantly impact businesses as well as governments and military organizations. The focus of threats has shifted from external attack to within organizations where authorized users have become potential insider threats.... more
Insider threats significantly impact businesses as well as governments and military organizations. The focus of threats has shifted from external attack to within organizations where authorized users have become potential insider threats. Existing insider threats detection methods, such as the rule-based approach rely on expert knowledge making it not robust. An insider threat detection method is proposed based on email user behaviour and anomaly detection algorithms to overcome this limitation. An email content based on the IT administrator role is constructed from the CERT r6.2 dataset using natural language pre-processing modules. Topic modelling is performed on the dataset to generate a vector space, which serves as input to anomaly detection algorithms to detect malicious email contents. The experimental results demonstrate that the proposed model has an 89% detection rate over the baseline model. A combination of K-means and PCA anomaly detection algorithms yielded a good detection rate of 89% for 1%, 5%, 10%, 15%, 20%, 25%, and 30% cut-off values anomaly scores.
Technology has changed the way retailers predict and understand consumer behavior. One such technology that can enable retailers to understand consumer preferences is Natural Language Processing (NLP). Social media content, including the... more
Technology has changed the way retailers predict and understand consumer behavior. One such technology that can enable retailers to understand consumer preferences is Natural Language Processing (NLP). Social media content, including the opinions and interests of the customers, is recognized as a valuable source of information for businesses. This study aims to perform a semantic analysis of tweets using an NLP algorithm. This study focuses on building an intelligent application capable of predicting the category of goods a customer would most likely buy in a retail store. This study analyzes social media data with NLP to predict what a customer would buy in a retail store. In this study, we measured a 0.3 increase in accuracy when only various forms of nouns were extracted and analyzed.
Further research may include Named-Entity Recognition (NER), especially for proper nouns. The researchers believe this study will contribute to changing the trajectory of NLP in the retail industry. Therefore, the methodology and design used herein will improve the existing approaches that have already been employed concerning NLP and social media data analysis.
Developing countries, especially in Africa, lag behind developed countries in utilizing artificial intelligence to detect and identify financial fraud and corruption incidents. However, with the fight against corruption and the increasing... more
Developing countries, especially in Africa, lag behind developed countries in utilizing artificial intelligence to detect and identify financial fraud and corruption incidents. However, with the fight against corruption and the increasing demand for accountability, artificial intelligence can address this gap. Artificial has already gained popularity and acceptance in nations such as the United States and China and is being used in the banking sector to reduce financial fraud. Nigeria, the most populous African country, can build upon the success of implementing and artificial intelligence in the nation's financial system. This exploratory study seeks to explore how the Economic and Financial Crimes Commission (EFCC) could leverage some of the artificial intelligence techniques to identify and detect instances of financial fraud and corruption. This exploratory study identifies the possibilities for integrating machine learning and artificial intelligence techniques to detect an...
Most organizations, particularly knowledge-based organizations invest significantly in intellectual resources, including individual employee training. However, only some organizations obtain benefit from these investments. Unless... more
Most organizations, particularly knowledge-based organizations invest significantly in intellectual resources, including individual employee training. However, only some organizations obtain benefit from these investments. Unless organizations plan to strategically leverage the intellectual capital, they are likely to lose their strategic competitive advantage. Small- and Medium-sized Enterprises (SMEs) in transition economies often fail to invest in knowledge management activities because of limited financial and human resources. The strategic impact of knowledge management initiatives in a firm depends on how the organization places in service the tacit and explicit components of knowledge. The purpose of this study is to explore how SMEs in transition economies can benefit from leveraging strategically the knowledge assets in the organization. Interviews were conducted with senior managers from 20 medium-sized enterprises in a transition economy- Albania, four from each of the fi...
Software Defect Prediction (SDP) is a major research field in the software development life cycle. The accurate SDP would assist software developers and engineers in developing a reliable software product. Several machine learning... more
Software Defect Prediction (SDP) is a major research field in the software development life cycle. The accurate SDP would assist software developers and engineers in developing a reliable software product. Several machine learning techniques for SDP have been reported in the literature. Most of these studies suffered in terms of prediction accuracy and other performance metrics. Many of these studies focus only on accuracy and this is not enough in measuring the performance of SDP. In this research, we propose a seven-ensemble machine learning model for SDP. The Cat boost, Light Gradient Boosting Machine (LGBM), Extreme Gradient Boosting (XgBoost), boosted cat boost, bagged logistic regression, boosted LGBM, and boosted XgBoost were used for the experimental analysis. We also used the separate individual base model of logistic regression for the analysis on six datasets. This paper extends the performance metrics from only the accuracy, the Area Under Curve (AUC), precision, recall, F-measure, and Matthew Correlation Coefficient (MCC) were used as performance metrics. The results obtained showed that the proposed ensemble Cat boost model gave an outstanding performance for all the three defects datasets as a result of being able to decrease overfitting and reduce the training time.
Digital marketing is a growing trend day by day, with internet marketing concepts becoming a powerful medium for digital marketing and electronic devices such as cell phones, digital billboards, tablets and laptops, portable game devices,... more
Digital marketing is a growing trend day by day, with internet marketing concepts becoming a powerful medium for digital marketing and electronic devices such as cell phones, digital billboards, tablets and laptops, portable game devices, and many gadgets that help in digital marketing. In this chapter, the role of digital marketing in assisting companies to achieve a sustainable competitive advantage was analyzed. The outbreak of the COVID-19 pandemic has put an end to companies' sales and business growth predictions, and digital marketing is no exception. Digital marketing will be at the forefront as many marketers might be looking for creative ways to sell online, reduce lead costs, increase click-through rates and conversion rates, and seek out what's new in digital marketing. This chapter focuses on understanding digital marketing concepts and how firms can achieve a competitive edge using various examples. This chapter reviews the different digital marketing concepts a...
This chapter provides an introduction to agricultural and farm management information systems. This chapter provides an overview of the components, subsystems, processes, and operations in agricultural information systems. This chapter... more
This chapter provides an introduction to agricultural and farm management information systems. This chapter provides an overview of the components, subsystems, processes, and operations in agricultural information systems. This chapter also covers the impact of these systems in improving the efficiency, and productivity of farm output. This chapter introduces several technologies related to the use of information systems in agriculture, including agricultural information systems (AIS), farm management information systems (FMIS), e-agriculture, and precision agriculture. This chapter introduces state-of-the-art technologies used in agriculture in the current context apart from providing an introduction to the use and adoption rates of these information systems. This chapter concludes with a brief discussion on the issues facing the adoption and implementation of agricultural information systems and presents some of the key issues that decision makers need to take to improve the accep...
Big Data has been listed as one of the current and future research frontiers by Gartner. Large-sized companies are already investing on and leveraging big data. Small-sized and medium-sized enterprises (SMEs) can also leverage big data to... more
Big Data has been listed as one of the current and future research frontiers by Gartner. Large-sized companies are already investing on and leveraging big data. Small-sized and medium-sized enterprises (SMEs) can also leverage big data to gain a strategic competitive advantage but are often limited by the lack of adequate financial resources to invest on the technology and manpower. Several big data challenges still exist especially in computer architecture that is CPU-heavy but I/O poor. Cloud computing eliminates the need to maintain expensive computing hardware and software. Cloud computing resources and techniques can be leveraged to address the traditional problems associated with fault tolerance and low performance causing bottlenecks to using big data. SMEs can take advantage of cloud computing techniques to avail the advantages of big data without significant investments in technology and manpower. This paper explores the current trends in the area of big data using cloud re...
This book chapter provides a state-of-the-art survey of visual data mining techniques used for collaborative filtering. The chapter begins with a discussion on various visual data mining techniques along with an analysis of the... more
This book chapter provides a state-of-the-art survey of visual data mining techniques used for collaborative filtering. The chapter begins with a discussion on various visual data mining techniques along with an analysis of the state-of-the-art visual data mining techniques used by researchers as well as in the industry. Collaborative filtering approaches are presented along with an analysis of the state-of-the-art collaborative filtering approaches currently in use in the industry. Visual data mining can provide benefit to existing data mining techniques by providing the users with visual exploration and interpretation of data. The users can use these visual interpretations for further data mining. This chapter dealt with state-of-the-art visual data mining technologies that are currently in use apart. The chapter also includes the key section of the discussion on the latest trends in visual data mining for collaborative filtering.
Communities of Practice (CoPs) are informal groups of individuals sharing knowledge and experience within or outside an organization. CoPs can help organizations, especially Small- and Medium-sized Enterprises (SMEs) with limited... more
Communities of Practice (CoPs) are informal groups of individuals sharing knowledge and experience within or outside an organization. CoPs can help organizations, especially Small- and Medium-sized Enterprises (SMEs) with limited financial and human resources improve efficiency and productivity by leveraging knowledge resources in the organization. Transition economies have different social and economic conditions as compared to developing and developed countries. The success of CoPs in SMEs located in transition economies depends to a certain extent on the social and cultural factors in transition economies. This chapter explores the factors contributing to the success of CoPs as well as challenges that CoPs face in transition economies. This chapter explores the role of national and organizational culture on the functioning of CoPs in SMEs in transition economies. The objective of this chapter is to develop a framework that could be applied to CoPs in transition economies. This ch...
ABSTRACT: There are several packages for 3D graphics in Java that have come up in the past decade with varying degrees of success. This paper does a survey of not only the features of these tools, but also about their importance and the... more
ABSTRACT: There are several packages for 3D graphics in Java that have come up in the past decade with varying degrees of success. This paper does a survey of not only the features of these tools, but also about their importance and the future prospects of Java based graphics tools. There are powerful graphics libraries such as OpenGL for 3D graphics applications on standalone systems, but there remains a prevalent need for a 3D graphics library aimed at Internet based graphics applications. This has led to a lot of Java based ...
ABSTRACT: This paper does a case study of the implications of cyber ethics in developing countries in general, with a special focus on Albania. The issues that are going to be dealt in this paper include the problems of software piracy,... more
ABSTRACT: This paper does a case study of the implications of cyber ethics in developing countries in general, with a special focus on Albania. The issues that are going to be dealt in this paper include the problems of software piracy, public awareness of intellectual property rights, privacy of data and the importance as well as impact of computer ethics on the growth and development of IT industry in developing countries such as Albania, which can be categorized also as a transition country from years of harsh communism towards ...
Over 50% of all information systems (IS) projects fail around the world. The research question was: Can machine learning (ML) find the failure causes by searching unstructured IS project big data? A pragmatic mixed methods research design... more
Over 50% of all information systems (IS) projects fail around the world. The research question was: Can machine learning (ML) find the failure causes by searching unstructured IS project big data? A pragmatic mixed methods research design was developed. After a literature review, structured programming, random forest ML and parametric statistics were applied to a large big data source containing unstructured IS project metrics. A statistically significant model was created, identifying 7 features from ML at an 80% classification accuracy, and 4 predictors of IS project failure, with a 27% effect size.
Software Defect Prediction (SDP) is a major research field in the software development life cycle. The accurate SDP would assist software developers and engineers in developing a reliable software product. Several machine learning... more
Software Defect Prediction (SDP) is a major research field in the software development life cycle. The accurate SDP would assist software developers and engineers in developing a reliable software product. Several machine learning techniques for SDP have been reported in the literature. Most of these studies suffered in terms of prediction accuracy and other performance metrics. Many of these studies focus only on accuracy and this is not enough in measuring the performance of SDP. In this research, we propose a seven-ensemble machine learning model for SDP. The Cat boost, Light Gradient Boosting Machine (LGBM), Extreme Gradient Boosting (XgBoost), boosted cat boost, bagged logistic regression, boosted LGBM, and boosted XgBoost were used for the experimental analysis. We also used the separate individual base model of logistic regression for the analysis on six datasets. This paper extends the performance metrics from only the accuracy, the Area Under Curve (AUC), precision, recall, F-measure, and Matthew Correlation Coefficient (MCC) were used as performance metrics. The results obtained showed that the proposed ensemble Cat boost model gave an outstanding performance for all the three defects datasets as a result of being able to decrease overfitting and reduce the training time.
Recommender systems can help provide preference-based personalized services to consumers and help them make informed decisions. However, a key shortcoming of the recommender systems is the lack of interactive methods to dynamically change... more
Recommender systems can help provide preference-based personalized services to consumers and help them make informed decisions. However, a key shortcoming of the recommender systems is the lack of interactive methods to dynamically change the weights of recommendation algorithms. Our proposed system uses the Twitter profile and tweets to identify the interests of a user and then recommends the relevant products and services to that user. Our recommendation system is built to predict and personalize products and services based on the result of mining and analyzing the user's Twitter timeline. The proposed recommender system is built upon an artificial intelligence platform called IBM Watson. The experimental result from the platform displayed the category of goods and services the user is most likely to consume. Our recommender system also showed a strong correlation between the category of products and services a user consumes and his/her tweets.
The objective of the current study was to use a rigorous controlled experiment simulating a project failure to measure how cognitive bias and competency impact a PM’s risk management decision making in a crisis while controlling for... more
The objective of the current study was to use a rigorous controlled experiment simulating a project failure to measure how cognitive bias and competency impact a PM’s risk management decision making in a crisis while controlling for other project and firm level variables including lying or faking responses. The MANOVA, repeated measures ANOVA controlled experiment and post-hoc analysis techniques were rigorous because the study took place in approximately the same point in time and each participant received all treatments. The 24 respondents in these repeated measures experiment outperforms most psychology factorial research design, which would require a 4 x 24= 96 sample size to accommodate 3 treatments and a control group. We found bias significantly impacted PM risk management decision making in a crisis, but certification and competency resulted in the best decisions. Generalizations are cautioned due to the exploratory nature of this study. However, the literature review and methods were articulated well enough to encourage replications and extensions by other researchers.
Transnational higher education is a multinational growth strategy requiring a foreign direct investment to establish a university or a campus in a new country and, if possible, to use articulation agreements with credible partners to... more
Transnational higher education is a multinational growth strategy requiring a foreign direct investment to establish a university or a campus in a new country and, if possible, to use articulation agreements with credible partners to increase domestic enrolment. Due to the potential international student learning style differences, we hypothesized there may be difficulties teaching Information Communication Technology (ICT) courses in transnational strategies due to the student origin or domestic campus location. The purpose of this study was to examine if student learning was effective within ICT graduate courses at an accredited sub-Saharan Africa-based university implementing the transnational education strategy. We found student learning was effective, but paradoxically, some factors indicated unusual results. Learning impact was higher when students disregarded the learning objectives, which we were able to explain theoretically. Conversely, learning impact was higher for many students who avoided tutoring, which we also rationalized.
In keeping with the unique visual exciting style of the handbook, we wanted to finish with a thinking-outside-the-box implication for future research design practices to question the status quo rather than summarize what is already... more
In keeping with the unique visual exciting style of the handbook, we wanted to finish with a thinking-outside-the-box implication for future research design practices to question the status quo rather than summarize what is already articulated in the preface and introductory chapters. Four contributing authors volunteered to collaborate on this final concluding chapter. Each author brings a distinct sociocultural and ideological perspective to the table based on his or her contribution being in different sections of this book and his or her research experience being grounded in diverse epistemological disciplinary roots. In other words, each of us works in a different discipline, and we have different dominant research ideologies and ontological approaches to research.

And 72 more

Research Interests:
This project provides an interdisciplinary approach to risk and contingency management, encouraging researchers and practitioners to provide best practices and a look into the future of this field. This book will provide significant... more
This project provides an interdisciplinary approach to risk and contingency management, encouraging researchers and practitioners to provide best practices and a look into the future of this field. This book will provide significant insights that should benefit business leaders and policymakers on risk and contingency management in times of crisis. Our previous edited book published in 2018 by IGI -Research, Practices, and Innovations in Global Risk and Contingency Management - was quite successful. This book will be submitted for possible indexation in Scopus, WoS, and major indices. There are no publication fees for accepted manuscripts.
This project provides an interdisciplinary approach to risk and contingency management, encouraging researchers and practitioners to provide best practices and a look into the future of this field. This book will provide significant... more
This project provides an interdisciplinary approach to risk and contingency management, encouraging researchers and practitioners to provide best practices and a look into the future of this field. This book will provide significant insights that should benefit business leaders and policymakers on risk and contingency management in times of crisis. Our previous edited book published in 2018 by IGI -Research, Practices, and Innovations in Global Risk and Contingency Management - was quite successful. This book will be submitted for possible indexation in Scopus, WoS, and major indices. There are no publication fees for accepted manuscripts.
The mission of the International Journal of Risk and Contingency Management (IJRCM) is to discover what risk and uncertainty mean to different disciplines and industries. Risks are known in the sense they can be measured but it is the... more
The mission of the International Journal of Risk and Contingency Management (IJRCM) is to discover what risk and uncertainty mean to different disciplines and industries. Risks are known in the sense they can be measured but it is the underlying uncertainty that remains elusive. Risk is present across industries and sectors (private, public, and non-profit). As a result, organizations and government around the world are currently experiencing higher levels of risk. At the other end of the spectrum from risk, contingency is the buffer against expected risk and uncertainty.  The journal provides an interdisciplinary approach to risk and contingency management, encouraging researchers and practitioners to provide best practices and a look into the future of this field.
Book Title: Global Risk and Contingency Management Research in Times of Crisis Editors Dr. Narasimha Rao Vajjhala, https://orcid.org/0000-0002-8260-2392 Faculty of Engineering and Architecture, University of New York Tirana, Tirana... more
Book Title: Global Risk and Contingency Management Research in Times of Crisis
Editors

Dr. Narasimha Rao Vajjhala, https://orcid.org/0000-0002-8260-2392
Faculty of Engineering and Architecture,
University of New York Tirana,
Tirana (Albania)

Professor Kenneth David Strang, https://orcid.org/0000-0002-4333-4399
W3-Research, New York (USA),
RMIT University (Australia)

Publisher: IGI Global (Headquartered in Hershey, Pennsylvania, USA).

Link for Submission of Chapters: https://www.igi-global.com/publish/call-for-papers/call-details/5719
Call for Chapters Book Title: Global Risk and Contingency Management Research in Times of Crisis Editors Dr. Narasimha Rao Vajjhala, https://orcid.org/0000-0002-8260-2392 Faculty of Engineering and Architecture, University of New York... more
Call for Chapters

Book Title: Global Risk and Contingency Management Research in Times of Crisis

Editors

Dr. Narasimha Rao Vajjhala, https://orcid.org/0000-0002-8260-2392
Faculty of Engineering and Architecture,
University of New York Tirana,
Tirana (Albania)

Professor Kenneth David Strang, https://orcid.org/0000-0002-4333-4399
W3-Research, New York (USA),
RMIT University (Australia)

Publisher: IGI Global (Headquartered in Hershey, Pennsylvania, USA).

Link for Submission of Chapters: https://www.igi-global.com/publish/call-for-papers/call-details/5719