Patrick Brown is an independent scholar in Honolulu, Hawaii. Before moving to Hawaii, he taught in the philosophy department and the school of law at Seattle University. Brown received his Ph.D. in philosophy from Boston...
While teaching genetics over a 10-year time span, I committed to change my pedagogy to include more student-inquiry. The main agent for this change was an epiphany caused by a difficult, yet enlightening experience with action...
James Duffy received his Ph.D. from Fordham University. Currently he teaches English as a second language at the Instituto Tecnológico y de Estudios Superiores de Monterrey in Mexico. He is also coordinating a series of ongoing...
Developmental students face significant academic and life challenges as they pursue a college degree. As students in developmental studies often struggle to complete their courses, research focused on innovative pedagogy that...
Over the past decade, the dominant entrepreneurial form of urban governance has seriously hindered the transformation of cities by neglecting the role of urban contexts in shaping governance structures and outcomes. To promote...
Singers both rejoice and suffer under the weight of their instrument. It becomes not only a major part of their identity but, in many cases, it becomes their central or "master status" (Hughes, 1945). This research examines the...
The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities. Forensic investigation is a complex...
James Duffy received his Ph.D. from Fordham University. Currently he teaches English as a second language at the Instituto Tecnológico y de Estudios Superiores de Monterrey in Mexico. He is also coordinating a series of ongoing...
Knowledge can play an important role in ascertaining an organization’s competitive edge if the knowledge of employees is nurtured and utilized as an asset with a potential to improve service delivery. The study focused on...
Perceptions towards unsustainable supply chain practices in global, mainstream food systems are motivating a shift towards short food supply chains. Short food supply chains are developed to remove the physical and social...
Non-Factoid Question Answering (QA) is the next generation of textual QA systems, which gives passage level summaries for a natural language query, posted by the user. The main issue lies in the appropriateness of the generated...
In this chapter, the authors demonstrate how a university Art Education program assists the university art museum and trains students to lead tours for BRAINY (BRinging Arts INtegration to Youth), the museum's educational...
This fourth essay carries forward the search for a normative empirical economics by focusing on the challenge of finding out just what could be meant by speaking of money as promise. While the essay does not blossom out into a...
The internet makes it easier for people to connect to each other and has become a platform to express ideas and share information with the world. The growth of the internet has indirectly led to the development of social...
“Dear Data” is a graduate research project that involved collecting ethnographic and ethological data that produced some unexpected tensions. Initially, I was uncertain how I could represent the data using art. However, through...
This paper systematically reviews the literature on the adoption of Blockchain technology in Supply Chain Management (SCM) processes. Using the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analysis)...
This first essay of the volume sets the scene for the cumulative work of the five contributors. The issue is the emergence of a genuine science of economics that is based on identifying the real, and simple, variables of...
Early detection of all types of lung nodules with different characters in medical modality images using computer-aided detection is the best acceptable remedy to save the lives of lung cancer sufferers. But accuracy of different...
This paper intends to develop an automatic behavior-based smart phone authentication model by three major phases: feature extraction, weighted logarithmic transformation, and classification. Initially, from the data related to...