SlideShare una empresa de Scribd logo
1 de 41
LIBRARY
RESEARCH
FOR
COMPUTER
SCIENCE
Clarke Iakovakis
Research & Instruction Librarian
Neumann Library
http://libguides.uhcl.edu/CSCI6530
OUTLINE FOR
TODAY
• Academic Research
• Principles of Good
Searching
• Searching in the
Research Databases &
Library Catalog
SECTION 1:
ACADEMIC
RESEARCH
Scholar. Image licensed under CC BY-NC-ND 2.0 on Flickr by Anjan Chatterjee.
• A literature review is part of the published work
referencing related research, theory, and
background information
• A review of the literature (literature search) may
be conducted to…
• understand a topic
• help you form a research question
• provide confirmation of an already existing
hypothesis
• analyze and interpret your own data
• gain exposure to past, current, and ongoing
research about a subject you are exploring
for research of your own
REVIEWING LITERATURE
PEER
REVIEW
 A process for establishing
authority of scholarly research
 Experts in the field/discipline
review the original ideas to certify
the accuracy, validity, and value
of the results
Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C. Mitcham (Ed.), Encyclopedia of Science,
Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from
http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v=
2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c
“AUTHORITATIVE”
INFORMATION:
WHAT ARE SOME SOURCES OF
SCHOLARLY INFORMATION?
•Peer-reviewed journal articles
•Books
•Reference works (encyclopedias, textbooks)
•Gray literature
• Reports (government, industry,
non-governmental organizations)
• Theses & dissertations
• Conference proceedings
•Archives
“Computer laptop” by Steve Hillebrand, licensed under public domain
PERIODICALS (JOURNALS,
MAGAZINES)
Peer-reviewed
Refereed
Scholarly
Academic
Trade
Professional
Practitioner
Industry
General
Popular
Publication
information
Abstract
Author information
Introduction
Background
Literature Review
Related Work
Methodology
Results
Data
Tables/Charts/Plots
Discussion
Conclusions
References
ANATOMY OF A SCHOLARLY ARTICLE
DISSECT THIS CITATION
What is the…
 Article title
 Authors
 Journal name
 Volume number
 Issue number
 Page number
range
 Year of
publication
B. Grobauer, T. Walloschek, and E. Stocker,
“Understanding Cloud Computing
Vulnerabilities,” Security & Privacy, IEEE, vol. 9,
no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
HOW DO I FIND AN ARTICLE
WHEN I HAVE A CITATION?
A. Google
B. OneSearch
C. A subscription database, such as IEEE Xplore,
INSPEC or ACM Digital Library
B. Grobauer, T. Walloschek, and E. Stocker,
“Understanding Cloud Computing
Vulnerabilities,” Security & Privacy, IEEE, vol. 9,
no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
EXERCISE 1: SEE PAPER HANDOUT
Title: Face Recognition Performance: Role
of Demographic Information
Lead Author: Klare
Journal name? Database? Year of Publication?
SECTION 2: PRINCIPLES OF
GOOD SEARCHING
On the Scent. Image licensed CC-BY on Flickr by stephen
bowler.
• Determine your research question1
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
• Join terms and concepts with appropriate Boolean operators4
• Make use of database’s limiters & suggested subject terms5
• Organize and cite your sources6
SEARCH PROCESS
One
• What are some ways artificial intelligence is used to
prevent or solve crimes?
Two
• How is artificial intelligence used to solve or prevent
crimes of spoofing, phishing, identity theft,
malware, and in facial recognition and surveillance?
Three
• In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
1. DETERMINE YOUR RESEARCH
QUESTION
2. IDENTIFY THE KEY CONCEPTS
•artificial
intelligence
•face recognition
•crime solving
In what ways is artificial intelligence
developed to recognize faces for
use in surveillance to prevent or
solve crimes?
artificial
intelligenc
e
Machine
learning Neural
networks
Intelligent
agents
Self-
adjusting
systems
3. List alternate keywords,
synonyms, and related words
In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or solve
crimes?
Face
recognition
biometric
s
Face
detection
pattern
recognition
iris
recognition
3. List alternate keywords,
synonyms, and related
wordsIn what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
WHICH STATEMENT BELOW WILL GENERATE
MORE SEARCH RESULTS?
4. Join terms and concepts with
appropriate Boolean operators
Machine
learning
Artificial
intelligence Intelligent
agents
Artificial intelligence OR machine
learning OR intelligent agents
Face recognition OR
eigenfaces OR skin
texture analysis
Artificial intelligence
OR machine
learning OR
intelligent agents
Concept 1:
FACE RECOGNITION
Concept 2:
ARTIFICIAL INTELLIGENCE
Alternate
term:
biometrics machine learning
Alternate
term:
face detection neural networks
Alternate
term:
iris recognition intelligent agents
WHICH STATEMENT BELOW WILL GENERATE
MORE SEARCH RESULTS?
WHICH SEARCH WILL FIND
FEWER RESULTS?
A.
B.
m
QUOTATION MARKS: EXACT
PHRASE
TRUNCATION (WILDCARDS)
compute
computes
computing
computation
computer
computers
comput*
*
CONTROLLED VOCABULARY
(ALSO CALLED “TAXONOMY” OR “HIERARCHY” OR
“THESAURUS”)
• A list of terms and term relationships designed to
o organize information about similar subjects
o assist content authors in consistently classifying/tagging
content
o enable users to find the information they need by
translating their language into the language of the
information store.
Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.
• State your research topic1
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
• Join terms and concepts with appropriate Boolean operators4
• Make use of database’s limiters & suggested subject terms5
• Organize and cite your sources6
SEARCH STRATEGIES
SECTION 3: RESEARCH
DATABASES &
LIBRARY CATALOG
Artificial Intelligence
AND (face recognition OR biometrics)
AND surveillance
EXERCISE 2: SEE PAPER
HANDOUT
• Write down two key concepts for the topic:
How are data mining methods developed and used for
detecting spam?
• Write down 1-3 alternate terms, synonyms, and related
words for each concept
• Go to IEEE Xplore and click on Command Search
• Join terms together with parentheses () and Boolean
operators (AND/OR)
• Use database limiters to narrow and refine your results.
Write down additional alternate terms above as you browse
SECTION 4: CITING SOURCES
Too much
information?
Ask a Librarian
Stop by the reference desk or schedule a
research consultation!In person
library@uhcl.edu
Email
281-283-3910
Phone
Text
http://libanswers.uhcl.edu
281-816-4341
IM
FEEDBACK PLEASE!

Más contenido relacionado

Destacado

2 CrossCulTour project overview by J. Mayer
2 CrossCulTour project overview by J. Mayer2 CrossCulTour project overview by J. Mayer
2 CrossCulTour project overview by J. MayerTRANSROMANICA
 
HIPAA Access Medical Records by Sainsbury-Wong
HIPAA Access Medical Records by Sainsbury-WongHIPAA Access Medical Records by Sainsbury-Wong
HIPAA Access Medical Records by Sainsbury-WongLorianne Sainsbury-Wong
 
Informe tic primer paso 1
Informe tic primer paso 1Informe tic primer paso 1
Informe tic primer paso 1Indira Donaire
 
20151014 finland to become an experimentalist society annukka berg
20151014 finland to become an experimentalist society annukka berg20151014 finland to become an experimentalist society annukka berg
20151014 finland to become an experimentalist society annukka bergAnnukka Berg
 
Cisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout SessionCisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout SessionSplunk
 
Outdoor training 2012
Outdoor training  2012 Outdoor training  2012
Outdoor training 2012 eduvalarezo3
 

Destacado (13)

El metal
El metalEl metal
El metal
 
2 CrossCulTour project overview by J. Mayer
2 CrossCulTour project overview by J. Mayer2 CrossCulTour project overview by J. Mayer
2 CrossCulTour project overview by J. Mayer
 
HIPAA Access Medical Records by Sainsbury-Wong
HIPAA Access Medical Records by Sainsbury-WongHIPAA Access Medical Records by Sainsbury-Wong
HIPAA Access Medical Records by Sainsbury-Wong
 
[DK] SPA med angular
[DK] SPA med angular[DK] SPA med angular
[DK] SPA med angular
 
Informe tic primer paso 1
Informe tic primer paso 1Informe tic primer paso 1
Informe tic primer paso 1
 
Upper limb bone
Upper limb bone Upper limb bone
Upper limb bone
 
TIAD : Automate everything with Google Cloud
TIAD : Automate everything with Google CloudTIAD : Automate everything with Google Cloud
TIAD : Automate everything with Google Cloud
 
Conceptos bioetica
Conceptos bioeticaConceptos bioetica
Conceptos bioetica
 
20151014 finland to become an experimentalist society annukka berg
20151014 finland to become an experimentalist society annukka berg20151014 finland to become an experimentalist society annukka berg
20151014 finland to become an experimentalist society annukka berg
 
Keungguln lokal
Keungguln lokalKeungguln lokal
Keungguln lokal
 
Cisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout SessionCisco and Splunk: Under the Hood of Cisco IT Breakout Session
Cisco and Splunk: Under the Hood of Cisco IT Breakout Session
 
Outdoor training 2012
Outdoor training  2012 Outdoor training  2012
Outdoor training 2012
 
Zombiee
ZombieeZombiee
Zombiee
 

Similar a Csci 6530 2016 fall presentation

Connected Data for Machine Learning | Paul Groth
Connected Data for Machine Learning | Paul GrothConnected Data for Machine Learning | Paul Groth
Connected Data for Machine Learning | Paul GrothConnected Data World
 
Data-knowledge transition zones within the biomedical research ecosystem
Data-knowledge transition zones within the biomedical research ecosystemData-knowledge transition zones within the biomedical research ecosystem
Data-knowledge transition zones within the biomedical research ecosystemMaryann Martone
 
Crim 4391 homeland security fall15
Crim 4391 homeland security fall15Crim 4391 homeland security fall15
Crim 4391 homeland security fall15ciakov
 
Post 1What is text analytics How does it differ from text mini.docx
Post 1What is text analytics How does it differ from text mini.docxPost 1What is text analytics How does it differ from text mini.docx
Post 1What is text analytics How does it differ from text mini.docxstilliegeorgiana
 
Post 1What is text analytics How does it differ from text mini
Post 1What is text analytics How does it differ from text miniPost 1What is text analytics How does it differ from text mini
Post 1What is text analytics How does it differ from text minianhcrowley
 
Knowledge graph construction for research & medicine
Knowledge graph construction for research & medicineKnowledge graph construction for research & medicine
Knowledge graph construction for research & medicinePaul Groth
 
Search, Signals & Sense: An Analytics Fueled Vision
Search, Signals & Sense: An Analytics Fueled VisionSearch, Signals & Sense: An Analytics Fueled Vision
Search, Signals & Sense: An Analytics Fueled VisionSeth Grimes
 
Thinking about technology .... differently
Thinking about technology .... differentlyThinking about technology .... differently
Thinking about technology .... differentlylisld
 
Pratt Sils LIS653 4 Fall 2007
Pratt Sils LIS653 4 Fall 2007Pratt Sils LIS653 4 Fall 2007
Pratt Sils LIS653 4 Fall 2007PrattSILS
 
SILC5931: Intro to STEM Education Library Instruction
SILC5931: Intro to STEM Education Library InstructionSILC5931: Intro to STEM Education Library Instruction
SILC5931: Intro to STEM Education Library Instructionciakov
 
Presentation to the J. Craig Venter Institute, Dec. 2014
Presentation to the J. Craig Venter Institute, Dec. 2014Presentation to the J. Craig Venter Institute, Dec. 2014
Presentation to the J. Craig Venter Institute, Dec. 2014Mark Wilkinson
 
Information literacy
Information literacyInformation literacy
Information literacySean Socha
 
Empowering Search Through 3RDi Semantic Enrichment
Empowering Search Through 3RDi Semantic EnrichmentEmpowering Search Through 3RDi Semantic Enrichment
Empowering Search Through 3RDi Semantic EnrichmentThe Digital Group
 
SearchInFocus: Exploratory Study on Query Logs and Actionable Intelligence
SearchInFocus: Exploratory Study on Query Logs and Actionable Intelligence SearchInFocus: Exploratory Study on Query Logs and Actionable Intelligence
SearchInFocus: Exploratory Study on Query Logs and Actionable Intelligence Marina Santini
 

Similar a Csci 6530 2016 fall presentation (20)

Connected Data for Machine Learning | Paul Groth
Connected Data for Machine Learning | Paul GrothConnected Data for Machine Learning | Paul Groth
Connected Data for Machine Learning | Paul Groth
 
S17 biot6838 santiago
S17 biot6838 santiagoS17 biot6838 santiago
S17 biot6838 santiago
 
Data-knowledge transition zones within the biomedical research ecosystem
Data-knowledge transition zones within the biomedical research ecosystemData-knowledge transition zones within the biomedical research ecosystem
Data-knowledge transition zones within the biomedical research ecosystem
 
Crim 4391 homeland security fall15
Crim 4391 homeland security fall15Crim 4391 homeland security fall15
Crim 4391 homeland security fall15
 
Post 1What is text analytics How does it differ from text mini.docx
Post 1What is text analytics How does it differ from text mini.docxPost 1What is text analytics How does it differ from text mini.docx
Post 1What is text analytics How does it differ from text mini.docx
 
Post 1What is text analytics How does it differ from text mini
Post 1What is text analytics How does it differ from text miniPost 1What is text analytics How does it differ from text mini
Post 1What is text analytics How does it differ from text mini
 
Knowledge graph construction for research & medicine
Knowledge graph construction for research & medicineKnowledge graph construction for research & medicine
Knowledge graph construction for research & medicine
 
Search, Signals & Sense: An Analytics Fueled Vision
Search, Signals & Sense: An Analytics Fueled VisionSearch, Signals & Sense: An Analytics Fueled Vision
Search, Signals & Sense: An Analytics Fueled Vision
 
Thinking about technology .... differently
Thinking about technology .... differentlyThinking about technology .... differently
Thinking about technology .... differently
 
Pratt Sils LIS653 4 Fall 2007
Pratt Sils LIS653 4 Fall 2007Pratt Sils LIS653 4 Fall 2007
Pratt Sils LIS653 4 Fall 2007
 
SILC5931: Intro to STEM Education Library Instruction
SILC5931: Intro to STEM Education Library InstructionSILC5931: Intro to STEM Education Library Instruction
SILC5931: Intro to STEM Education Library Instruction
 
SOC 111 (Fall 2012)
SOC 111 (Fall 2012)SOC 111 (Fall 2012)
SOC 111 (Fall 2012)
 
Presentation to the J. Craig Venter Institute, Dec. 2014
Presentation to the J. Craig Venter Institute, Dec. 2014Presentation to the J. Craig Venter Institute, Dec. 2014
Presentation to the J. Craig Venter Institute, Dec. 2014
 
Information literacy
Information literacyInformation literacy
Information literacy
 
Empowering Search Through 3RDi Semantic Enrichment
Empowering Search Through 3RDi Semantic EnrichmentEmpowering Search Through 3RDi Semantic Enrichment
Empowering Search Through 3RDi Semantic Enrichment
 
Research & citing sources made easy
Research & citing sources made easyResearch & citing sources made easy
Research & citing sources made easy
 
A01-Openness in knowledge-based systems
A01-Openness in knowledge-based systemsA01-Openness in knowledge-based systems
A01-Openness in knowledge-based systems
 
Knowledge acquisition using automated techniques
Knowledge acquisition using automated techniquesKnowledge acquisition using automated techniques
Knowledge acquisition using automated techniques
 
SearchInFocus: Exploratory Study on Query Logs and Actionable Intelligence
SearchInFocus: Exploratory Study on Query Logs and Actionable Intelligence SearchInFocus: Exploratory Study on Query Logs and Actionable Intelligence
SearchInFocus: Exploratory Study on Query Logs and Actionable Intelligence
 
Neuroscience as networked science
Neuroscience as networked scienceNeuroscience as networked science
Neuroscience as networked science
 

Más de ciakov

Copyright in Higher Education
Copyright in Higher EducationCopyright in Higher Education
Copyright in Higher Educationciakov
 
Open Access: Increase the Visibility of your Scholarship
Open Access: Increase the Visibility of your ScholarshipOpen Access: Increase the Visibility of your Scholarship
Open Access: Increase the Visibility of your Scholarshipciakov
 
Open Access: Identifying Quality Journals & Avoiding Predatory Publishers
Open Access: Identifying Quality Journals & Avoiding Predatory PublishersOpen Access: Identifying Quality Journals & Avoiding Predatory Publishers
Open Access: Identifying Quality Journals & Avoiding Predatory Publishersciakov
 
Pols 4903 presentation
Pols 4903 presentationPols 4903 presentation
Pols 4903 presentationciakov
 
Pols 3103 fall presentation 2
Pols 3103 fall presentation 2Pols 3103 fall presentation 2
Pols 3103 fall presentation 2ciakov
 
Ensc 5530 jan2018 ci
Ensc 5530 jan2018 ciEnsc 5530 jan2018 ci
Ensc 5530 jan2018 ciciakov
 
Open data: Enhancing preservation, reproducibility, and innovation
Open data: Enhancing preservation, reproducibility, and innovationOpen data: Enhancing preservation, reproducibility, and innovation
Open data: Enhancing preservation, reproducibility, and innovationciakov
 
Ensc 5530 jan2017 ci
Ensc 5530 jan2017 ciEnsc 5530 jan2017 ci
Ensc 5530 jan2017 ciciakov
 
Geol4391 2016 fall presentation
Geol4391 2016 fall presentationGeol4391 2016 fall presentation
Geol4391 2016 fall presentationciakov
 
Crim5036 2016 fall presentation
Crim5036 2016 fall presentationCrim5036 2016 fall presentation
Crim5036 2016 fall presentationciakov
 
Biot6838 2016 fall presentation
Biot6838 2016 fall presentationBiot6838 2016 fall presentation
Biot6838 2016 fall presentationciakov
 
Edci7137 2016 spring presentation
Edci7137 2016 spring presentationEdci7137 2016 spring presentation
Edci7137 2016 spring presentationciakov
 
Edci7137 2016 spring presentation
Edci7137 2016 spring presentationEdci7137 2016 spring presentation
Edci7137 2016 spring presentationciakov
 
Soci 4385 mcmullen fall15 cli
Soci 4385 mcmullen fall15 cliSoci 4385 mcmullen fall15 cli
Soci 4385 mcmullen fall15 cliciakov
 
Crim 5331 advanced criminology fall15
Crim 5331 advanced criminology fall15Crim 5331 advanced criminology fall15
Crim 5331 advanced criminology fall15ciakov
 
Crim 4384 statistics
Crim 4384 statisticsCrim 4384 statistics
Crim 4384 statisticsciakov
 
Crim 4385 undergraduate research methods spr15
Crim 4385 undergraduate research methods spr15Crim 4385 undergraduate research methods spr15
Crim 4385 undergraduate research methods spr15ciakov
 
Geog 4311 historical geography
Geog 4311 historical geographyGeog 4311 historical geography
Geog 4311 historical geographyciakov
 
Gis for library staff
Gis for library staffGis for library staff
Gis for library staffciakov
 
Altmetrics: What is it and how is it relevant to librarians?
Altmetrics: What is it and how is it relevant to librarians?Altmetrics: What is it and how is it relevant to librarians?
Altmetrics: What is it and how is it relevant to librarians?ciakov
 

Más de ciakov (20)

Copyright in Higher Education
Copyright in Higher EducationCopyright in Higher Education
Copyright in Higher Education
 
Open Access: Increase the Visibility of your Scholarship
Open Access: Increase the Visibility of your ScholarshipOpen Access: Increase the Visibility of your Scholarship
Open Access: Increase the Visibility of your Scholarship
 
Open Access: Identifying Quality Journals & Avoiding Predatory Publishers
Open Access: Identifying Quality Journals & Avoiding Predatory PublishersOpen Access: Identifying Quality Journals & Avoiding Predatory Publishers
Open Access: Identifying Quality Journals & Avoiding Predatory Publishers
 
Pols 4903 presentation
Pols 4903 presentationPols 4903 presentation
Pols 4903 presentation
 
Pols 3103 fall presentation 2
Pols 3103 fall presentation 2Pols 3103 fall presentation 2
Pols 3103 fall presentation 2
 
Ensc 5530 jan2018 ci
Ensc 5530 jan2018 ciEnsc 5530 jan2018 ci
Ensc 5530 jan2018 ci
 
Open data: Enhancing preservation, reproducibility, and innovation
Open data: Enhancing preservation, reproducibility, and innovationOpen data: Enhancing preservation, reproducibility, and innovation
Open data: Enhancing preservation, reproducibility, and innovation
 
Ensc 5530 jan2017 ci
Ensc 5530 jan2017 ciEnsc 5530 jan2017 ci
Ensc 5530 jan2017 ci
 
Geol4391 2016 fall presentation
Geol4391 2016 fall presentationGeol4391 2016 fall presentation
Geol4391 2016 fall presentation
 
Crim5036 2016 fall presentation
Crim5036 2016 fall presentationCrim5036 2016 fall presentation
Crim5036 2016 fall presentation
 
Biot6838 2016 fall presentation
Biot6838 2016 fall presentationBiot6838 2016 fall presentation
Biot6838 2016 fall presentation
 
Edci7137 2016 spring presentation
Edci7137 2016 spring presentationEdci7137 2016 spring presentation
Edci7137 2016 spring presentation
 
Edci7137 2016 spring presentation
Edci7137 2016 spring presentationEdci7137 2016 spring presentation
Edci7137 2016 spring presentation
 
Soci 4385 mcmullen fall15 cli
Soci 4385 mcmullen fall15 cliSoci 4385 mcmullen fall15 cli
Soci 4385 mcmullen fall15 cli
 
Crim 5331 advanced criminology fall15
Crim 5331 advanced criminology fall15Crim 5331 advanced criminology fall15
Crim 5331 advanced criminology fall15
 
Crim 4384 statistics
Crim 4384 statisticsCrim 4384 statistics
Crim 4384 statistics
 
Crim 4385 undergraduate research methods spr15
Crim 4385 undergraduate research methods spr15Crim 4385 undergraduate research methods spr15
Crim 4385 undergraduate research methods spr15
 
Geog 4311 historical geography
Geog 4311 historical geographyGeog 4311 historical geography
Geog 4311 historical geography
 
Gis for library staff
Gis for library staffGis for library staff
Gis for library staff
 
Altmetrics: What is it and how is it relevant to librarians?
Altmetrics: What is it and how is it relevant to librarians?Altmetrics: What is it and how is it relevant to librarians?
Altmetrics: What is it and how is it relevant to librarians?
 

Último

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 

Último (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Csci 6530 2016 fall presentation

  • 3. OUTLINE FOR TODAY • Academic Research • Principles of Good Searching • Searching in the Research Databases & Library Catalog
  • 4. SECTION 1: ACADEMIC RESEARCH Scholar. Image licensed under CC BY-NC-ND 2.0 on Flickr by Anjan Chatterjee.
  • 5. • A literature review is part of the published work referencing related research, theory, and background information • A review of the literature (literature search) may be conducted to… • understand a topic • help you form a research question • provide confirmation of an already existing hypothesis • analyze and interpret your own data • gain exposure to past, current, and ongoing research about a subject you are exploring for research of your own REVIEWING LITERATURE
  • 6. PEER REVIEW  A process for establishing authority of scholarly research  Experts in the field/discipline review the original ideas to certify the accuracy, validity, and value of the results Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C. Mitcham (Ed.), Encyclopedia of Science, Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v= 2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c “AUTHORITATIVE” INFORMATION:
  • 7. WHAT ARE SOME SOURCES OF SCHOLARLY INFORMATION? •Peer-reviewed journal articles •Books •Reference works (encyclopedias, textbooks) •Gray literature • Reports (government, industry, non-governmental organizations) • Theses & dissertations • Conference proceedings •Archives “Computer laptop” by Steve Hillebrand, licensed under public domain
  • 9. Publication information Abstract Author information Introduction Background Literature Review Related Work Methodology Results Data Tables/Charts/Plots Discussion Conclusions References ANATOMY OF A SCHOLARLY ARTICLE
  • 10. DISSECT THIS CITATION What is the…  Article title  Authors  Journal name  Volume number  Issue number  Page number range  Year of publication B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
  • 11. HOW DO I FIND AN ARTICLE WHEN I HAVE A CITATION? A. Google B. OneSearch C. A subscription database, such as IEEE Xplore, INSPEC or ACM Digital Library
  • 12. B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
  • 13. EXERCISE 1: SEE PAPER HANDOUT Title: Face Recognition Performance: Role of Demographic Information Lead Author: Klare Journal name? Database? Year of Publication?
  • 14. SECTION 2: PRINCIPLES OF GOOD SEARCHING On the Scent. Image licensed CC-BY on Flickr by stephen bowler.
  • 15. • Determine your research question1 • Identify the key concepts2 • List alternate keywords, synonyms, and related words3 • Join terms and concepts with appropriate Boolean operators4 • Make use of database’s limiters & suggested subject terms5 • Organize and cite your sources6 SEARCH PROCESS
  • 16. One • What are some ways artificial intelligence is used to prevent or solve crimes? Two • How is artificial intelligence used to solve or prevent crimes of spoofing, phishing, identity theft, malware, and in facial recognition and surveillance? Three • In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes? 1. DETERMINE YOUR RESEARCH QUESTION
  • 17. 2. IDENTIFY THE KEY CONCEPTS •artificial intelligence •face recognition •crime solving In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
  • 18. artificial intelligenc e Machine learning Neural networks Intelligent agents Self- adjusting systems 3. List alternate keywords, synonyms, and related words In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
  • 19. Face recognition biometric s Face detection pattern recognition iris recognition 3. List alternate keywords, synonyms, and related wordsIn what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
  • 20. WHICH STATEMENT BELOW WILL GENERATE MORE SEARCH RESULTS?
  • 21. 4. Join terms and concepts with appropriate Boolean operators
  • 22.
  • 24. Face recognition OR eigenfaces OR skin texture analysis Artificial intelligence OR machine learning OR intelligent agents
  • 25. Concept 1: FACE RECOGNITION Concept 2: ARTIFICIAL INTELLIGENCE Alternate term: biometrics machine learning Alternate term: face detection neural networks Alternate term: iris recognition intelligent agents
  • 26. WHICH STATEMENT BELOW WILL GENERATE MORE SEARCH RESULTS?
  • 27. WHICH SEARCH WILL FIND FEWER RESULTS? A. B.
  • 28. m
  • 31. CONTROLLED VOCABULARY (ALSO CALLED “TAXONOMY” OR “HIERARCHY” OR “THESAURUS”) • A list of terms and term relationships designed to o organize information about similar subjects o assist content authors in consistently classifying/tagging content o enable users to find the information they need by translating their language into the language of the information store. Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.
  • 32. • State your research topic1 • Identify the key concepts2 • List alternate keywords, synonyms, and related words3 • Join terms and concepts with appropriate Boolean operators4 • Make use of database’s limiters & suggested subject terms5 • Organize and cite your sources6 SEARCH STRATEGIES
  • 33. SECTION 3: RESEARCH DATABASES & LIBRARY CATALOG
  • 34.
  • 35.
  • 36. Artificial Intelligence AND (face recognition OR biometrics) AND surveillance
  • 37. EXERCISE 2: SEE PAPER HANDOUT • Write down two key concepts for the topic: How are data mining methods developed and used for detecting spam? • Write down 1-3 alternate terms, synonyms, and related words for each concept • Go to IEEE Xplore and click on Command Search • Join terms together with parentheses () and Boolean operators (AND/OR) • Use database limiters to narrow and refine your results. Write down additional alternate terms above as you browse
  • 38. SECTION 4: CITING SOURCES
  • 40. Ask a Librarian Stop by the reference desk or schedule a research consultation!In person library@uhcl.edu Email 281-283-3910 Phone Text http://libanswers.uhcl.edu 281-816-4341 IM