Post on 07-Feb-2017
LIBRARY RESEARCH FOR COMPUTER SCIENCE
Clarke IakovakisResearch & Instruction LibrarianNeumann Library
OUTLINE FOR TODAY
• Academic Research• Principles of Good Searching • Searching in the Research
Databases & Library Catalog• Citing Sources & EndNote
SECTION 1: ACADEMIC RESEARCH
Scholar. Image licensed under CC BY-NC-ND 2.0 on Flickr by Anjan Chatterjee.
• A literature review is part of the published work referencing related research, theory, and background information• A review of the literature (literature search)
may be conducted to…• understand a topic• help you form a research question• provide confirmation of an already existing
hypothesis• analyze and interpret your own data• gain exposure to past, current, and ongoing
research about a subject you are exploring for research of your own
REVIEWING LITERATURE
PEER REVIEW
A process for establishing authority of scholarly research
Experts in the field/discipline review the original ideas to certify the accuracy, validity, and value of the results
Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C. Mitcham (Ed.), Encyclopedia of Science, Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v=2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c
“AUTHORITATIVE” INFORMATION:
WHAT ARE SOME SOURCES OF SCHOLARLY INFORMATION?
•Peer-reviewed journal articles•Books•Reference works (encyclopedias, textbooks)•Gray literature• Reports (government, industry,
non-governmental organizations)• Theses & dissertations• Conference proceedings
•Archives“Computer laptop” by Steve Hillebrand, licensed under public
domain
PERIODICALS (JOURNALS, MAGAZINES)
Peer-reviewedRefereedScholarlyAcademic
TradeProfessiona
lPractitione
rIndustry
GeneralPopular
Publication informationAbstractAuthor informationIntroduction
Background Literature Review Related Work
MethodologyResults
Data Tables/Charts/Plots
Discussion Conclusions
References Works Cited
ANATOMY OF A SCHOLARLY ARTICLE
DISSECT THIS CITATION
What is the…
Article title Authors Journal name
Volume number Issue number Page number
range Year of
publication DOI
B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
HOW DO I FIND AN ARTICLE WHEN I HAVE A CITATION?
A. GoogleB. OneSearchC. A subscription database, such as IEEE
Xplore, INSPEC or ACM Digital Library
B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” Security & Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
EXERCISE 1: SEE PAPER HANDOUT
Title: Face Recognition Performance: Role of Demographic InformationLead Author: Klare
Journal name? Database? Year of Publication?
SECTION 2: PRINCIPLES OF GOOD SEARCHING
On the Scent. Image licensed CC-BY on Flickr by stephen bowler.
• Determine your research question1•Identify the key concepts2•List alternate keywords, synonyms, and related words3• Join terms and concepts with appropriate Boolean operators4•Make use of database’s limiters & suggested subject terms 5•Organize and cite your sources6
SEARCH PROCESS
One •What are some ways artificial intelligence is used to prevent or solve crimes?
Two •How is artificial intelligence used to solve or prevent crimes of spoofing, phishing, identity theft, malware, and in facial recognition and surveillance?
Three •In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
1. DETERMINE YOUR RESEARCH QUESTION
2. IDENTIFY THE KEY CONCEPTS
•artificial intelligence•face recognition•crime solving
In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
artificial
intelligence
Machine
learning
Neural
networks
Intelligent agent
s
Self-adjusti
ng system
s
3. List alternate keywords, synonyms, and related words
OR
In what ways is artificial intelligence developed to recognize faces for use in surveillance to prevent or solve crimes?
Face recognition
biometrics
Face detect
ion
pattern
recognition
iris recognitionOR
3. List alternate keywords, synonyms, and related wordsIn what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or solve crimes?
Machine learning
Artificial intelligence Intellige
nt agents
M EOR
Artificial intelligence OR machine learning OR intelligent agents
Face recognition OR eigenfaces OR skin texture analysis
Artificial intelligence OR machine learning OR
intelligent agents
AND:INTERSECTION
Concept 1:FACE RECOGNITION
Concept 2:ARTIFICIAL INTELLIGENCE
Alternate term:
biometrics machine learning
Alternate term:
face detection neural networks
Alternate term:
iris recognition intelligent agents
CONTROLLED VOCABULARY(ALSO CALLED “TAXONOMY” OR “HIERARCHY” OR “THESAURUS”)• A list of terms and term relationships designed to
o organize information about similar subjects
o assist content authors in consistently classifying/tagging content
o enable users to find the information they need by translating their language into the language of the information store.
Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.
Search Tip
• State your research topic1•Identify the key concepts2•List alternate keywords, synonyms, and related words3• Join terms and concepts with appropriate Boolean operators4•Make use of database’s limiters & suggested subject terms 5•Organize and cite your sources6
SEARCH STRATEGIES
EXERCISE 2: SEE PAPER HANDOUT
•Write down two key concepts for the topic:How are data mining methods developed and used for
detecting spam?
•Write down 1-3 alternate terms, synonyms, and related words for each concept• Go to IEEE Xplore and click on Command Search• Join terms together with parentheses () and Boolean operators (AND/OR)• Use database limiters to narrow and refine your results.
Write down additional alternate terms above as you browse the results
Ask a Librarian
Stop by the reference desk or schedule a research consultation!In person
library@uhcl.eduEmail
281-283-3910Phone
Text
http://libanswers.uhcl.edu
281-816-4341
IM