Kishen Iyengar

Learn More
Research Article Cluster analysis is a powerful statistical procedure for extricating natural configurations among the data and the populations. Cluster analysis, with its seemingly limitless power to produce groupings in any dataset, has all the trappings of a super-technique. However, the method produces clusters even in the absence of any natural(More)
Stokes' first and second problems for an incompressible couple stress fluid are considered under isothermal conditions. The problems are solved through the use of Laplace transform technique. Inversion of the Laplace transform of the velocity component in each case is carried out using a standard numerical approach. Velocity profiles are plotted and studied(More)
Ranking journals is an important exercise in academia. While several approaches to rank journals exist, an inherent assumption of these approaches is that there is indeed a hierarchy of journals, which is captured by the methods used for ranking them. We address a more fundamental question: Is there a linear hierarchy within journals? In this article, we(More)
The ring-stage susceptibility assay was modified to quantify the susceptibilities of multiple strains of control and delayed-clearance phenotype (DCP) Plasmodium falciparum strains to seven endoperoxide antimalarial drugs. The susceptibility of all of the DCP lines to six of the drugs was lower than that of the controls. In contrast, DCP parasites did not(More)
A MIMIC (multiple indicators and multiple causes) model serves as a strong statistical validation technique for a set of formative indicators and can be used when reflective indicators of related constructs to the focal formative construct are available. The method uses the reflective items as a criterion measure to establish the validity of the formative(More)
The argument whether open-source code is more secure than proprietary software has more or less been one of opinions and beliefs and not based on empirical tests and validation. In this paper, we empirically examine vulnerabilities data and compare closed-source and open-source operating systems. Our results indicate that although there are differences in(More)
Central to a process of IT adoption is the managerial ability to simultaneously balance the continuous exploring of the technology and its advantages, while also exploiting it. It is this simultaneity that we refer to as IT adoption ambidexterity, and recognize as an area in need of research. Based on prior research on organizational ambidexterity, this(More)
  • 1