LIBRARY
RESEARCH
FOR
COMPUTER
SCIENCE
Clarke Iakovakis
Research & Instruction Librarian
Neumann Library
http://libguides.uhcl.edu/CSCI6530
OUTLINE FOR
TODAY
• Academic Research
• Principles of Good
Searching
• Searching in the
Research Databases &
Library Catalog
SECTION 1:
ACADEMIC
RESEARCH
Scholar. Image licensed under CC BY-NC-ND 2.0 on Flickr by Anjan Chatterjee.
• A literature review is part of the published work
referencing related research, theory, and
background information
• A review of the literature (literature search) may
be conducted to…
• understand a topic
• help you form a research question
• provide confirmation of an already existing
hypothesis
• analyze and interpret your own data
• gain exposure to past, current, and ongoing
research about a subject you are exploring
for research of your own
REVIEWING LITERATURE
PEER
REVIEW
 A process for establishing
authority of scholarly research
 Experts in the field/discipline
review the original ideas to certify
the accuracy, validity, and value
of the results
Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C. Mitcham (Ed.), Encyclopedia of Science,
Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from
http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v=
2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c
“AUTHORITATIVE”
INFORMATION:
WHAT ARE SOME SOURCES OF
SCHOLARLY INFORMATION?
•Peer-reviewed journal articles
•Books
•Reference works (encyclopedias, textbooks)
•Gray literature
• Reports (government, industry,
non-governmental organizations)
• Theses & dissertations
• Conference proceedings
•Archives
“Computer laptop” by Steve Hillebrand, licensed under public domain
PERIODICALS (JOURNALS,
MAGAZINES)
Peer-reviewed
Refereed
Scholarly
Academic
Trade
Professional
Practitioner
Industry
General
Popular
Publication
information
Abstract
Author information
Introduction
Background
Literature Review
Related Work
Methodology
Results
Data
Tables/Charts/Plots
Discussion
Conclusions
References
ANATOMY OF A SCHOLARLY ARTICLE
DISSECT THIS CITATION
What is the…
 Article title
 Authors
 Journal name
 Volume number
 Issue number
 Page number
range
 Year of
publication
B. Grobauer, T. Walloschek, and E. Stocker,
“Understanding Cloud Computing
Vulnerabilities,” Security & Privacy, IEEE, vol. 9,
no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
HOW DO I FIND AN ARTICLE
WHEN I HAVE A CITATION?
A. Google
B. OneSearch
C. A subscription database, such as IEEE Xplore,
INSPEC or ACM Digital Library
B. Grobauer, T. Walloschek, and E. Stocker,
“Understanding Cloud Computing
Vulnerabilities,” Security & Privacy, IEEE, vol. 9,
no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
EXERCISE 1: SEE PAPER HANDOUT
Title: Face Recognition Performance: Role
of Demographic Information
Lead Author: Klare
Journal name? Database? Year of Publication?
SECTION 2: PRINCIPLES OF
GOOD SEARCHING
On the Scent. Image licensed CC-BY on Flickr by stephen
bowler.
• Determine your research question1
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
• Join terms and concepts with appropriate Boolean operators4
• Make use of database’s limiters & suggested subject terms5
• Organize and cite your sources6
SEARCH PROCESS
One
• What are some ways artificial intelligence is used to
prevent or solve crimes?
Two
• How is artificial intelligence used to solve or prevent
crimes of spoofing, phishing, identity theft,
malware, and in facial recognition and surveillance?
Three
• In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
1. DETERMINE YOUR RESEARCH
QUESTION
2. IDENTIFY THE KEY CONCEPTS
•artificial
intelligence
•face recognition
•crime solving
In what ways is artificial intelligence
developed to recognize faces for
use in surveillance to prevent or
solve crimes?
artificial
intelligenc
e
Machine
learning Neural
networks
Intelligent
agents
Self-
adjusting
systems
3. List alternate keywords,
synonyms, and related words
In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or solve
crimes?
Face
recognition
biometric
s
Face
detection
pattern
recognition
iris
recognition
3. List alternate keywords,
synonyms, and related
wordsIn what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
WHICH STATEMENT BELOW WILL GENERATE
MORE SEARCH RESULTS?
4. Join terms and concepts with
appropriate Boolean operators
Machine
learning
Artificial
intelligence Intelligent
agents
Artificial intelligence OR machine
learning OR intelligent agents
Face recognition OR
eigenfaces OR skin
texture analysis
Artificial intelligence
OR machine
learning OR
intelligent agents
Concept 1:
FACE RECOGNITION
Concept 2:
ARTIFICIAL INTELLIGENCE
Alternate
term:
biometrics machine learning
Alternate
term:
face detection neural networks
Alternate
term:
iris recognition intelligent agents
WHICH STATEMENT BELOW WILL GENERATE
MORE SEARCH RESULTS?
WHICH SEARCH WILL FIND
FEWER RESULTS?
A.
B.
m
QUOTATION MARKS: EXACT
PHRASE
TRUNCATION (WILDCARDS)
compute
computes
computing
computation
computer
computers
comput*
*
CONTROLLED VOCABULARY
(ALSO CALLED “TAXONOMY” OR “HIERARCHY” OR
“THESAURUS”)
• A list of terms and term relationships designed to
o organize information about similar subjects
o assist content authors in consistently classifying/tagging
content
o enable users to find the information they need by
translating their language into the language of the
information store.
Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.
• State your research topic1
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
• Join terms and concepts with appropriate Boolean operators4
• Make use of database’s limiters & suggested subject terms5
• Organize and cite your sources6
SEARCH STRATEGIES
SECTION 3: RESEARCH
DATABASES &
LIBRARY CATALOG
Artificial Intelligence
AND (face recognition OR biometrics)
AND surveillance
EXERCISE 2: SEE PAPER
HANDOUT
• Write down two key concepts for the topic:
How are data mining methods developed and used for
detecting spam?
• Write down 1-3 alternate terms, synonyms, and related
words for each concept
• Go to IEEE Xplore and click on Command Search
• Join terms together with parentheses () and Boolean
operators (AND/OR)
• Use database limiters to narrow and refine your results.
Write down additional alternate terms above as you browse
SECTION 4: CITING SOURCES
Too much
information?
Ask a Librarian
Stop by the reference desk or schedule a
research consultation!In person
library@uhcl.edu
Email
281-283-3910
Phone
Text
http://libanswers.uhcl.edu
281-816-4341
IM
FEEDBACK PLEASE!

Csci 6530 2016 fall presentation

  • 1.
  • 2.
  • 3.
    OUTLINE FOR TODAY • AcademicResearch • Principles of Good Searching • Searching in the Research Databases & Library Catalog
  • 4.
    SECTION 1: ACADEMIC RESEARCH Scholar. Imagelicensed under CC BY-NC-ND 2.0 on Flickr by Anjan Chatterjee.
  • 5.
    • A literaturereview is part of the published work referencing related research, theory, and background information • A review of the literature (literature search) may be conducted to… • understand a topic • help you form a research question • provide confirmation of an already existing hypothesis • analyze and interpret your own data • gain exposure to past, current, and ongoing research about a subject you are exploring for research of your own REVIEWING LITERATURE
  • 6.
    PEER REVIEW  A processfor establishing authority of scholarly research  Experts in the field/discipline review the original ideas to certify the accuracy, validity, and value of the results Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C. Mitcham (Ed.), Encyclopedia of Science, Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v= 2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c “AUTHORITATIVE” INFORMATION:
  • 7.
    WHAT ARE SOMESOURCES OF SCHOLARLY INFORMATION? •Peer-reviewed journal articles •Books •Reference works (encyclopedias, textbooks) •Gray literature • Reports (government, industry, non-governmental organizations) • Theses & dissertations • Conference proceedings •Archives “Computer laptop” by Steve Hillebrand, licensed under public domain
  • 8.
  • 9.
    Publication information Abstract Author information Introduction Background Literature Review RelatedWork Methodology Results Data Tables/Charts/Plots Discussion Conclusions References ANATOMY OF A SCHOLARLY ARTICLE
  • 10.
    DISSECT THIS CITATION Whatis the…  Article title  Authors  Journal name  Volume number  Issue number  Page number range  Year of publication B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
  • 11.
    HOW DO IFIND AN ARTICLE WHEN I HAVE A CITATION? A. Google B. OneSearch C. A subscription database, such as IEEE Xplore, INSPEC or ACM Digital Library
  • 12.
    B. Grobauer, T.Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
  • 13.
    EXERCISE 1: SEEPAPER HANDOUT Title: Face Recognition Performance: Role of Demographic Information Lead Author: Klare Journal name? Database? Year of Publication?
  • 14.
    SECTION 2: PRINCIPLESOF GOOD SEARCHING On the Scent. Image licensed CC-BY on Flickr by stephen bowler.
  • 15.
    • Determine yourresearch question1 • Identify the key concepts2 • List alternate keywords, synonyms, and related words3 • Join terms and concepts with appropriate Boolean operators4 • Make use of database’s limiters & suggested subject terms5 • Organize and cite your sources6 SEARCH PROCESS
  • 16.
    One • What aresome ways artificial intelligence is used to prevent or solve crimes? Two • How is artificial intelligence used to solve or prevent crimes of spoofing, phishing, identity theft, malware, and in facial recognition and surveillance? Three • In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes? 1. DETERMINE YOUR RESEARCH QUESTION
  • 17.
    2. IDENTIFY THEKEY CONCEPTS •artificial intelligence •face recognition •crime solving In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
  • 18.
    artificial intelligenc e Machine learning Neural networks Intelligent agents Self- adjusting systems 3. Listalternate keywords, synonyms, and related words In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
  • 19.
    Face recognition biometric s Face detection pattern recognition iris recognition 3. List alternatekeywords, synonyms, and related wordsIn what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
  • 20.
    WHICH STATEMENT BELOWWILL GENERATE MORE SEARCH RESULTS?
  • 21.
    4. Join termsand concepts with appropriate Boolean operators
  • 23.
  • 24.
    Face recognition OR eigenfacesOR skin texture analysis Artificial intelligence OR machine learning OR intelligent agents
  • 25.
    Concept 1: FACE RECOGNITION Concept2: ARTIFICIAL INTELLIGENCE Alternate term: biometrics machine learning Alternate term: face detection neural networks Alternate term: iris recognition intelligent agents
  • 26.
    WHICH STATEMENT BELOWWILL GENERATE MORE SEARCH RESULTS?
  • 27.
    WHICH SEARCH WILLFIND FEWER RESULTS? A. B.
  • 28.
  • 29.
  • 30.
  • 31.
    CONTROLLED VOCABULARY (ALSO CALLED“TAXONOMY” OR “HIERARCHY” OR “THESAURUS”) • A list of terms and term relationships designed to o organize information about similar subjects o assist content authors in consistently classifying/tagging content o enable users to find the information they need by translating their language into the language of the information store. Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.
  • 32.
    • State yourresearch topic1 • Identify the key concepts2 • List alternate keywords, synonyms, and related words3 • Join terms and concepts with appropriate Boolean operators4 • Make use of database’s limiters & suggested subject terms5 • Organize and cite your sources6 SEARCH STRATEGIES
  • 33.
  • 36.
    Artificial Intelligence AND (facerecognition OR biometrics) AND surveillance
  • 37.
    EXERCISE 2: SEEPAPER HANDOUT • Write down two key concepts for the topic: How are data mining methods developed and used for detecting spam? • Write down 1-3 alternate terms, synonyms, and related words for each concept • Go to IEEE Xplore and click on Command Search • Join terms together with parentheses () and Boolean operators (AND/OR) • Use database limiters to narrow and refine your results. Write down additional alternate terms above as you browse
  • 38.
  • 39.
  • 40.
    Ask a Librarian Stopby the reference desk or schedule a research consultation!In person library@uhcl.edu Email 281-283-3910 Phone Text http://libanswers.uhcl.edu 281-816-4341 IM
  • 41.