SlideShare a Scribd company logo
LIBRARY
RESEARCH
FOR
COMPUTER
SCIENCE
Clarke Iakovakis
Research & Instruction Librarian
Neumann Library
http://libguides.uhcl.edu/CSCI6530
Please turn
your clicker
ON
HOW MUCH EXPERIENCE DO YOU HAVE USING
SCHOLARLY ARTICLE DATABASES IN YOUR
RESEARCH?
a. I have not used scholarly article
databases before
b. I have a little experience using scholarly
article databases
c. I have used scholarly article databases
many times
Csci 6530 2016 spring presentation
OUTLINE FOR
TODAY
• Academic Research
• Principles of Good
Searching
• Searching in the
Research Databases &
Library Catalog
SECTION 1:
ACADEMIC
RESEARCH
Scholar. Image licensed under CC BY-NC-ND 2.0 on Flickr by Anjan Chatterjee.
• A literature review is part of the published work
referencing related research, theory, and
background information
• A review of the literature (literature search) may
be conducted to…
• understand a topic
• help you form a research question
• provide confirmation of an already existing
hypothesis
• analyze and interpret your own data
• gain exposure to past, current, and ongoing
research about a subject you are exploring
for research of your own
REVIEWING LITERATURE
PEER
REVIEW
 A process for establishing
authority of scholarly research
 Experts in the field/discipline
review the original ideas to certify
the accuracy, validity, and value
of the results
Chubin, D. E., & Hackett, E. J. (2005). Peer Review. In C. Mitcham (Ed.), Encyclopedia of Science,
Technology, and Ethics (Vol. 3, pp. 1390-1394). Detroit: Macmillan Reference USA. Retrieved from
http://libproxy.uhcl.edu/login?url=http://go.galegroup.com/ps/i.do?id=GALE%7CCX3434900491&v=
2.1&u=txshracd2589&it=r&p=GVRL&sw=w&asid=67e06d81c0d758521a67ba637722e45c
“AUTHORITATIVE”
INFORMATION:
WHAT ARE SOME SOURCES OF
SCHOLARLY INFORMATION?
•Peer-reviewed journal articles
•Books
•Reference works (encyclopedias, textbooks)
•Gray literature
• Reports (government, industry,
non-governmental organizations)
• Theses & dissertations
• Conference proceedings
•Archives
“Computer laptop” by Steve Hillebrand, licensed under public domain
PERIODICALS (JOURNALS,
MAGAZINES)
Peer-reviewed
Refereed
Scholarly
Academic
Trade
Professional
Practitioner
Industry
General
Popular
Publication
information
Abstract
Author information
Introduction
Background
Literature Review
Related Work
Methodology
Results
Data
Tables/Charts/Plots
Discussion
Conclusions
References
ANATOMY OF A SCHOLARLY ARTICLE
DISSECT THIS CITATION
What is the…
 Article title
 Authors
 Journal name
 Volume number
 Issue number
 Page number
range
 Year of
publication
B. Grobauer, T. Walloschek, and E. Stocker,
“Understanding Cloud Computing
Vulnerabilities,” Security & Privacy, IEEE, vol. 9,
no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
HOW DO I FIND AN ARTICLE
WHEN I HAVE A CITATION?
A. Google
B. OneSearch
C. A subscription database, such as IEEE Xplore,
INSPEC or ACM Digital Library
B. Grobauer, T. Walloschek, and E. Stocker,
“Understanding Cloud Computing
Vulnerabilities,” Security & Privacy, IEEE, vol. 9,
no. 2, pp. 50-57, 2011. doi: 10.1109/MSP.2010.115
TRY IT
Title: Face Recognition Performance:
Role of Demographic Information
Lead Author: Klare
Journal name? Journal year?
SECTION 2: PRINCIPLES OF
GOOD SEARCHING
On the Scent. Image licensed CC-BY on Flickr by stephen
bowler.
• Determine your research question1
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
• Join terms and concepts with appropriate Boolean operators4
• Make use of database’s limiters & suggested subject terms5
• Organize and cite your sources6
SEARCH PROCESS
One
• What are some ways artificial intelligence is used to
prevent or solve crimes?
Two
• How is artificial intelligence used to solve or prevent
crimes of spoofing, phishing, identity theft,
malware, and in facial recognition and surveillance?
Three
• In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
1. DETERMINE YOUR RESEARCH
QUESTION
2. IDENTIFY THE KEY CONCEPTS
•artificial
intelligence
•face recognition
•crime solving
In what ways is artificial intelligence
developed to recognize faces for
use in surveillance to prevent or
solve crimes?
artificial
intelligenc
e
Machine
learning Neural
networks
Intelligent
agents
Self-
adjusting
systems
3. List alternate keywords,
synonyms, and related words
In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or solve
crimes?
Face
recognition
biometric
s
Face
detection
pattern
recognition
iris
recognition
3. List alternate keywords,
synonyms, and related
wordsIn what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
CONTROLLED VOCABULARY
(ALSO CALLED “TAXONOMY” OR “HIERARCHY” OR
“THESAURUS”)
• A list of terms and term relationships designed to
o organize information about similar subjects
o assist content authors in consistently classifying/tagging
content
o enable users to find the information they need by
translating their language into the language of the
information store.
Leise, F. (2008). Controlled vocabularies, an introduction. Indexer, 26(3), 121-126.
• Identify the key concepts2
• List alternate keywords, synonyms, and related
words3
In what ways is artificial intelligence developed to
recognize faces for use in surveillance to prevent or
solve crimes?
4. Join terms and concepts with
appropriate Boolean operators
Csci 6530 2016 spring presentation
Machine
learning
Artificial
intelligence Intelligent
agents
Artificial intelligence OR machine
learning OR intelligent agents
Face recognition OR
eigenfaces OR skin
texture analysis
Artificial intelligence
OR machine
learning OR
intelligent agents
Csci 6530 2016 spring presentation
WHICH STATEMENT BELOW WILL GENERATE
MORE SEARCH RESULTS?
WHICH SEARCH WILL FIND
FEWER RESULTS?
A.
B.
OR
artificial intelligence
artificial intelligence
crime
crime
m
TRUNCATION (WILDCARDS)
compute
computes
computing
computation
computor
computers
comput*
*
• State your research topic1
• Identify the key concepts2
• List alternate keywords, synonyms, and related words3
• Join terms and concepts with appropriate Boolean operators4
• Make use of database’s limiters & suggested subject terms5
• Organize and cite your sources6
SEARCH STRATEGIES
SECTION 3: RESEARCH
DATABASES &
LIBRARY CATALOG
Screenshot from Wargames © United Artists. Retrieved from Tumblr
Why use a library when I have Google?
But wait…
tumblr
.gov Wikipedia
Subscription
databases
Password-protected
websites
restricted
access
$$$
Illegal
content
Classified
documents
Surface Web
Deep Web
Amazon
cnn
Google
ads
Surface Web
Deep Web
http://www.uhcl.edu/library
TO CONNECT TO LIBRARY
DATABASES FROM HOME
Log in using your library barcode and last name
Log in using your eservice account
Call the library and ask for a password
Google it
Log in using your UHCL username and password
Csci 6530 2016 spring presentation
Csci 6530 2016 spring presentation
Csci 6530 2016 spring presentation
Please turn
your clicker
OFF
SECTION 4: CITING SOURCES
Too much
information?
Ask a Librarian
Stop by the reference desk or schedule a
research consultation!In person
library@uhcl.edu
Email
281-283-3910
Phone
Text
http://libanswers.uhcl.edu
281-816-4341
IM
FEEDBACK PLEASE!

More Related Content

PPTX
Csci 6530 2015 fall_cli2
PPTX
CSCI6530: Library Instruction for Research Methods in Computer Science
PPTX
Csci 6530 2016 fall presentation
PPTX
Geol4391 2016 fall presentation
PPTX
Nutrition and Exercise
PDF
Kratzer, Aaron Undergraduate Thesis
PDF
Productividad tranporte
DOCX
#AKidneyForJoey Flyer
Csci 6530 2015 fall_cli2
CSCI6530: Library Instruction for Research Methods in Computer Science
Csci 6530 2016 fall presentation
Geol4391 2016 fall presentation
Nutrition and Exercise
Kratzer, Aaron Undergraduate Thesis
Productividad tranporte
#AKidneyForJoey Flyer

Viewers also liked (8)

PPTX
La circunferencia y la sección aurea
PDF
Onalenna mpedi CV
PPTX
Web development post io2016
PPTX
Mitos y realidades del Outsourcing
PPTX
A balanced life: Managing Stress, Nutrition and Exercise
PDF
#NSD14 - La sécurité autour du Big Data
PDF
Foreclosures in Bowdoin-Geneva_Analysis&Recommendations
PDF
Os cinco "solas" da Reforma Protestante
La circunferencia y la sección aurea
Onalenna mpedi CV
Web development post io2016
Mitos y realidades del Outsourcing
A balanced life: Managing Stress, Nutrition and Exercise
#NSD14 - La sécurité autour du Big Data
Foreclosures in Bowdoin-Geneva_Analysis&Recommendations
Os cinco "solas" da Reforma Protestante
Ad

Similar to Csci 6530 2016 spring presentation (20)

PDF
ARTIFICIAL INTELLEGNENCE IOT BASEDPPT.pdf
PDF
Week 7 - Module 16 - PPT- Artificial Intelligence Representation of Knowledge...
PDF
Integrated approach for domain dimensional information retrieval system by us...
PPTX
Crim 4391 homeland security fall15
DOCX
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
PPTX
Jacobson eng111 f11
PPT
Digital and Electronic Libraries
PPTX
Wheatley and Hervieux "Voice-Assistants, Artificial Intelligence, and the fut...
PPTX
Intro artificial intelligence
PDF
Semantic Knowledge Representation for Information Retrieval Winfried Gödert
PPT
Writing a Databases Research Paper
PDF
Semantic Knowledge Representation for Information Retrieval Winfried Gödert
PDF
january-2025_Top10 Read_Articles_ijait.pdf
DOC
Artificial intelligence
PPTX
CUA Engineering104
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
PDF
May 2025: Top 10 Read Articles Advanced Information Technology
PPTX
Indexing Techniques: Their Usage in Search Engines for Information Retrieval
PPT
Mathew.ppt
PDF
History of AI, Current Trends, Prospective Trajectories
ARTIFICIAL INTELLEGNENCE IOT BASEDPPT.pdf
Week 7 - Module 16 - PPT- Artificial Intelligence Representation of Knowledge...
Integrated approach for domain dimensional information retrieval system by us...
Crim 4391 homeland security fall15
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
Jacobson eng111 f11
Digital and Electronic Libraries
Wheatley and Hervieux "Voice-Assistants, Artificial Intelligence, and the fut...
Intro artificial intelligence
Semantic Knowledge Representation for Information Retrieval Winfried Gödert
Writing a Databases Research Paper
Semantic Knowledge Representation for Information Retrieval Winfried Gödert
january-2025_Top10 Read_Articles_ijait.pdf
Artificial intelligence
CUA Engineering104
July 2025: Top 10 Read Articles Advanced Information Technology
May 2025: Top 10 Read Articles Advanced Information Technology
Indexing Techniques: Their Usage in Search Engines for Information Retrieval
Mathew.ppt
History of AI, Current Trends, Prospective Trajectories
Ad

More from ciakov (20)

PPTX
Copyright in Higher Education
PPTX
Open Access: Increase the Visibility of your Scholarship
PPTX
Open Access: Identifying Quality Journals & Avoiding Predatory Publishers
PPTX
Pols 4903 presentation
PPTX
Pols 3103 fall presentation 2
PPTX
Ensc 5530 jan2018 ci
PPTX
Open data: Enhancing preservation, reproducibility, and innovation
PPTX
Ensc 5530 jan2017 ci my draft
PPTX
Ensc 5530 jan2017 ci
PPTX
Crim5036 2016 fall presentation
PPTX
Biot6838 2016 fall presentation
PPTX
Edci7137 2016 spring presentation
PPTX
Edci7137 2016 spring presentation
PPTX
Soci 4385 mcmullen fall15 cli
PPTX
Crim 5331 advanced criminology fall15
PPTX
SILC5931: Intro to STEM Education Library Instruction
PPTX
Crim 4384 statistics
PPTX
Crim 4385 undergraduate research methods spr15
PPTX
Geog 4311 historical geography
PPTX
Gis for library staff
Copyright in Higher Education
Open Access: Increase the Visibility of your Scholarship
Open Access: Identifying Quality Journals & Avoiding Predatory Publishers
Pols 4903 presentation
Pols 3103 fall presentation 2
Ensc 5530 jan2018 ci
Open data: Enhancing preservation, reproducibility, and innovation
Ensc 5530 jan2017 ci my draft
Ensc 5530 jan2017 ci
Crim5036 2016 fall presentation
Biot6838 2016 fall presentation
Edci7137 2016 spring presentation
Edci7137 2016 spring presentation
Soci 4385 mcmullen fall15 cli
Crim 5331 advanced criminology fall15
SILC5931: Intro to STEM Education Library Instruction
Crim 4384 statistics
Crim 4385 undergraduate research methods spr15
Geog 4311 historical geography
Gis for library staff

Recently uploaded (20)

PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
01-Introduction-to-Information-Management.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
master seminar digital applications in india
PDF
RMMM.pdf make it easy to upload and study
PDF
Classroom Observation Tools for Teachers
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Institutional Correction lecture only . . .
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
01-Introduction-to-Information-Management.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
O5-L3 Freight Transport Ops (International) V1.pdf
human mycosis Human fungal infections are called human mycosis..pptx
master seminar digital applications in india
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
Final Presentation General Medicine 03-08-2024.pptx
A systematic review of self-coping strategies used by university students to ...
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

Csci 6530 2016 spring presentation