Top Banner
LIBRARY RESEARCH FOR COMPUTER SCIENCE Clarke Iakovakis Research & Instruction Librarian Neumann Library
41

Csci 6530 2016 fall presentation

Feb 07, 2017

Download

Education

ciakov
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Csci 6530 2016 fall presentation

LIBRARY RESEARCH FOR COMPUTER SCIENCE

Clarke IakovakisResearch & Instruction LibrarianNeumann Library

Page 2: Csci 6530 2016 fall presentation

http://libguides.uhcl.edu/CSCI6530

Page 3: Csci 6530 2016 fall presentation

OUTLINE FOR TODAY

• Academic Research• Principles of Good Searching • Searching in the Research

Databases & Library Catalog• Citing Sources & EndNote

Page 5: Csci 6530 2016 fall presentation

• A literature review is part of the published work referencing related research, theory, and background information• A review of the literature (literature search)

may be conducted to…• understand a topic• help you form a research question• provide confirmation of an already existing

hypothesis• analyze and interpret your own data• gain exposure to past, current, and ongoing

research about a subject you are exploring for research of your own

REVIEWING LITERATURE

Page 6: Csci 6530 2016 fall presentation

PEER REVIEW

A process for establishing authority of scholarly research

Experts in the field/discipline review the original ideas to certify the accuracy, validity, and value of the results

Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C. Mitcham (Ed.), Encyclopedia of Science, Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v=2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c

“AUTHORITATIVE” INFORMATION:

Page 7: Csci 6530 2016 fall presentation

WHAT ARE SOME SOURCES OF SCHOLARLY INFORMATION?

•Peer-reviewed journal articles•Books•Reference works (encyclopedias, textbooks)•Gray literature• Reports (government, industry,

non-governmental organizations)• Theses & dissertations• Conference proceedings

•Archives“Computer laptop” by Steve Hillebrand, licensed under public

domain

Page 8: Csci 6530 2016 fall presentation

PERIODICALS (JOURNALS, MAGAZINES)

Peer-reviewedRefereedScholarlyAcademic

TradeProfessiona

lPractitione

rIndustry

GeneralPopular

Page 9: Csci 6530 2016 fall presentation

Publication informationAbstractAuthor informationIntroduction

Background Literature Review Related Work

MethodologyResults

Data Tables/Charts/Plots

Discussion Conclusions

References Works Cited

ANATOMY OF A SCHOLARLY ARTICLE

Page 10: Csci 6530 2016 fall presentation

DISSECT THIS CITATION

What is the…

Article title Authors Journal name

Volume number Issue number Page number

range Year of

publication DOI

B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115

Page 11: Csci 6530 2016 fall presentation

HOW DO I FIND AN ARTICLE WHEN I HAVE A CITATION?

A. GoogleB. OneSearchC. A subscription database, such as IEEE

Xplore, INSPEC or ACM Digital Library

Page 12: Csci 6530 2016 fall presentation

B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115

Page 13: Csci 6530 2016 fall presentation

EXERCISE 1: SEE PAPER HANDOUT

Title: Face Recognition Performance: Role of Demographic InformationLead Author: Klare

Journal name? Database? Year of Publication?

Page 14: Csci 6530 2016 fall presentation

SECTION 2: PRINCIPLES OF GOOD SEARCHING

On the Scent. Image licensed CC-BY on Flickr by stephen bowler.

Page 15: Csci 6530 2016 fall presentation

• Determine your research question1•Identify the key concepts2•List alternate keywords, synonyms, and related words3• Join terms and concepts with appropriate Boolean operators4•Make use of database’s limiters & suggested subject terms 5•Organize and cite your sources6

SEARCH PROCESS

Page 16: Csci 6530 2016 fall presentation

One •What are some ways artificial intelligence is used to prevent or solve crimes?

Two •How is artificial intelligence used to solve or prevent crimes of spoofing, phishing, identity theft, malware, and in facial recognition and surveillance?

Three •In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

1. DETERMINE YOUR RESEARCH QUESTION

Page 17: Csci 6530 2016 fall presentation

2. IDENTIFY THE KEY CONCEPTS

•artificial intelligence•face recognition•crime solving

In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

Page 18: Csci 6530 2016 fall presentation

artificial

intelligence

Machine

learning

Neural

networks

Intelligent agent

s

Self-adjusti

ng system

s

3. List alternate keywords, synonyms, and related words

OR

In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?

Page 19: Csci 6530 2016 fall presentation

Face recognition

biometrics

Face detect

ion

pattern

recognition

iris recognitionOR

3. List alternate keywords, synonyms, and related wordsIn what ways is artificial intelligence developed to

recognize faces for use in surveillance to prevent or solve crimes?

Page 20: Csci 6530 2016 fall presentation

WHICH STATEMENT BELOW WILL GENERATE MORE SEARCH RESULTS?

A.

B.

Page 21: Csci 6530 2016 fall presentation

•ANDORNOT

4. Join terms and concepts with appropriate Boolean operators

Page 22: Csci 6530 2016 fall presentation
Page 23: Csci 6530 2016 fall presentation

Machine learning

Artificial intelligence Intellige

nt agents

M EOR

Artificial intelligence OR machine learning OR intelligent agents

Page 24: Csci 6530 2016 fall presentation

Face recognition OR eigenfaces OR skin texture analysis

Artificial intelligence OR machine learning OR

intelligent agents

AND:INTERSECTION

Page 25: Csci 6530 2016 fall presentation

Concept 1:FACE RECOGNITION

Concept 2:ARTIFICIAL INTELLIGENCE

Alternate term:

 biometrics  machine learning

Alternate term:

 face detection  neural networks

Alternate term:

 iris recognition  intelligent agents

Page 26: Csci 6530 2016 fall presentation

WHICH STATEMENT BELOW WILL GENERATE MORE SEARCH RESULTS?

A.

B.

Page 27: Csci 6530 2016 fall presentation

WHICH SEARCH WILL FIND FEWER RESULTS?

A.B.

Page 28: Csci 6530 2016 fall presentation

ANDORem

Page 29: Csci 6530 2016 fall presentation

QUOTATION MARKS: EXACT PHRASESearch Tip

Page 30: Csci 6530 2016 fall presentation

TRUNCATION (WILDCARDS)

computecomputescomputing

computationcomputercomputers

comput* * Search Tip

Page 31: Csci 6530 2016 fall presentation

CONTROLLED VOCABULARY(ALSO CALLED “TAXONOMY” OR “HIERARCHY” OR “THESAURUS”)• A list of terms and term relationships designed to

o organize information about similar subjects

o assist content authors in consistently classifying/tagging content

o enable users to find the information they need by translating their language into the language of the information store.

Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.

Search Tip

Page 32: Csci 6530 2016 fall presentation

• State your research topic1•Identify the key concepts2•List alternate keywords, synonyms, and related words3• Join terms and concepts with appropriate Boolean operators4•Make use of database’s limiters & suggested subject terms 5•Organize and cite your sources6

SEARCH STRATEGIES

Page 33: Csci 6530 2016 fall presentation

SECTION 3: RESEARCH DATABASES & LIBRARY CATALOG

Page 34: Csci 6530 2016 fall presentation
Page 35: Csci 6530 2016 fall presentation
Page 36: Csci 6530 2016 fall presentation

Artificial IntelligenceAND (face recognition OR biometrics)AND surveillance

Page 37: Csci 6530 2016 fall presentation

EXERCISE 2: SEE PAPER HANDOUT

•Write down two key concepts for the topic:How are data mining methods developed and used for

detecting spam?

•Write down 1-3 alternate terms, synonyms, and related words for each concept• Go to IEEE Xplore and click on Command Search• Join terms together with parentheses () and Boolean operators (AND/OR)• Use database limiters to narrow and refine your results.

Write down additional alternate terms above as you browse the results

Page 38: Csci 6530 2016 fall presentation

SECTION 4: CITING SOURCES

Page 39: Csci 6530 2016 fall presentation

Too much information?

Page 40: Csci 6530 2016 fall presentation

Ask a Librarian

Stop by the reference desk or schedule a research consultation!In person

[email protected]

281-283-3910Phone

Text

http://libanswers.uhcl.edu

281-816-4341

IM

Page 41: Csci 6530 2016 fall presentation

FEEDBACK PLEASE!