Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Library and Information Science

Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman Jun 2020

Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..


Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing Oct 2019

Data Curation Workshop: Tips And Tools For Today, Matthew M. Benzing

Charleston Library Conference

The current state of research data is like a disorganized photo collection: a mix of formats scattered across different media without a lot of authority control. That is changing as the need to make data available to researchers across the world is becoming recognized. Researchers know that their data needs to be maintained and made accessible, but often they do not have the time or the inclination to get involved in all of the details. This provides an excellent opportunity for librarians. Data curation is the process of preparing data to be made available in a repository with the goal …


Peppytides, Dave Zwicky May 2019

Peppytides, Dave Zwicky

2019 Symposium on Electronic Theses and Dissertations

Lightning talk for Symposium on Electronic Theses and Dissertations (ETD) at Purdue University on May 23, 2019.


Collecting Virtual And Augmented Reality In The Twenty-First Century Library, Matthew Hannah, Sarah Huber, Sorin Adam Matei Mar 2019

Collecting Virtual And Augmented Reality In The Twenty-First Century Library, Matthew Hannah, Sarah Huber, Sorin Adam Matei

Matei Interdisciplinary Research Collaboratory

In this paper, we discuss possible pedagogical applications for virtual and augmented reality (VR and AR), within a humanities/social sciences curriculum, articulating a critical need for academic libraries to collect and curate 3D objects. We contend that building infrastructure is critical to keep pace with innovative pedagogies and scholarship. We offer theoretical avenues for libraries to build a repository 3D object files to be used in VR and AR tools and sketch some anticipated challenges. To build an infrastructure to support VR/AR collections, we have collaborated with College of Liberal Arts to pilot a program in which Libraries and CLA …


Wrangle Your Data Like A Pro With The Data Processing Power Of Python, Geoffrey P. Timms, Jeremy M. Brown Oct 2017

Wrangle Your Data Like A Pro With The Data Processing Power Of Python, Geoffrey P. Timms, Jeremy M. Brown

Charleston Library Conference

Management, delivery, and marketing of library resources and collections necessitate interaction with a plethora of data from many sources and in many forms. Accessing and transforming data into meaningful information or different formats used in library automation can be time consuming, but a working knowledge of a programming language can improve efficiency in many facets of librarianship. From processing lists to creating extensible markup language (XML), from editing machine-readable cataloging (MARC) records before upload to automating statistical reports, the Python programming language and third-party application programming interfaces (APIs) can be used to accomplish both behind-the-scenes tasks and end-user facing projects. …


Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur Dec 2016

Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur

Open Access Dissertations

There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.

The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …


Password Strength Analysis: User Coping Mechanisms In Password Selection, Brian Thomas Curnett Apr 2015

Password Strength Analysis: User Coping Mechanisms In Password Selection, Brian Thomas Curnett

Open Access Theses

The security that passwords provide could be seriously flawed due to the way people cope with having to memorize and recall their passwords. The National Institute of Standards and Technology (NIST) standard that is used to measure the password strength, known as entropy, is designed for a single use and does not consider that users may choose to keep parts of their password across password changes. This study shows that a portion of users keep some information from previous passwords across changes. These habits which will be called coping mechanisms that over time serve to erode the protection provided by …


Applying Hierarchical Task Analysis Method To Discovery Layer Evaluation, Marlen Promann, Tao Zhang Jan 2015

Applying Hierarchical Task Analysis Method To Discovery Layer Evaluation, Marlen Promann, Tao Zhang

Libraries Faculty and Staff Scholarship and Research

While usability tests have been helpful in evaluating the success or failure of implementing discovery layers in the library context, the focus of usability tests has remained on the search interface rather than the discovery process for users. The informal site-­‐ and context specific usability tests have offered little to test the rigor of the discovery layers against the user goals, motivations and workflow they have been designed to support. This study proposes hierarchical task analysis (HTA) as an important complementary evaluation method to usability testing of discovery layers. Relevant literature is reviewed for the discovery layers and the HTA …


Libraries Respond To Mobile Ubiquity: Research And Assessment Of Mobile Device Usage Trends For Academic And Medical Libraries, Megan M. Hurst, Eleanor I. Cook, J. Michael Lindsay, Martha F. Earl Jun 2014

Libraries Respond To Mobile Ubiquity: Research And Assessment Of Mobile Device Usage Trends For Academic And Medical Libraries, Megan M. Hurst, Eleanor I. Cook, J. Michael Lindsay, Martha F. Earl

Charleston Library Conference

The authors consider trends in mobile device usage for the Internet as a whole, for EBSCO Discovery Service across all client libraries, and at two specific libraries: Preston Medical Library, serving the University of Tennessee (UT) Graduate School of Medicine and UT Medical Center, and the Joyner Library at East Carolina University, serving students and faculty on the main campus. Librarians at Preston Medical Library conducted a survey to determine which mobile devices, platforms, and apps were used by their patrons in 2012. East Carolina University piloted an iPad and e-reader lending program in 2010–2011. The results of each are …


Study Of User Search Activities With Two Discovery Tools At An Academic Library, Xi Niu, Tao Zhang, Hsin-Liang Chen Jan 2014

Study Of User Search Activities With Two Discovery Tools At An Academic Library, Xi Niu, Tao Zhang, Hsin-Liang Chen

Libraries Faculty and Staff Scholarship and Research

The goal of this study was to investigate and compare user search activities of two discovery tools at an academic library. The implementation of a new discovery tool (Primo by Ex Libris) to replace an existing system (VuFind) provided a unique opportunity to collect transaction logs of both systems and examine user search behavior in an empirical test. Results from a transaction log analysis and a user study of this study have contributed to the understanding of users’ search behavior and their preferences and perceptions of the two systems. We find both commonalities and differences between VuFind and Primo for …


Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge Oct 2013

Mispronunciation Detection For Language Learning And Speech Recognition Adaptation, Zhenhao Ge

Open Access Dissertations

The areas of "mispronunciation detection" (or "accent detection" more specifically) within the speech recognition community are receiving increased attention now. Two application areas, namely language learning and speech recognition adaptation, are largely driving this research interest and are the focal points of this work.

There are a number of Computer Aided Language Learning (CALL) systems with Computer Aided Pronunciation Training (CAPT) techniques that have been developed. In this thesis, a new HMM-based text-dependent mispronunciation system is introduced using text Adaptive Frequency Cepstral Coefficients (AFCCs). It is shown that this system outperforms the conventional HMM method based on Mel Frequency Cepstral …


Overview: The Role Of Information Policy In Resolving Global Challenges, Sharon A. Weiner Jun 2013

Overview: The Role Of Information Policy In Resolving Global Challenges, Sharon A. Weiner

Purdue Policy Research Institute (PPRI) Policy Briefs

Governments in many countries recognize the importance of knowledge-based societies whose citizens are adaptable and have the means to engage in continuous learning. Information societies can address global challenges far more readily than those that do not adopt its characteristics of ICTs (information and communication technologies) and connectivity; usable content; infrastructure and deliverability; and human intellectual capability.


A Justification For Semantic Training In Data Curation Frameworks Development, Xiaogang Ma, Benjamin D. Branch, Kristin Wegner Jan 2013

A Justification For Semantic Training In Data Curation Frameworks Development, Xiaogang Ma, Benjamin D. Branch, Kristin Wegner

Libraries Faculty and Staff Presentations

In the complex data curation activities involving proper data access, data use optimization and data rescue, opportunities exist where underlying skills in semantics may play a crucial role in data curation professionals ranging from data scientists, to informaticists, to librarians. Here, We provide a conceptualization of semantics use in the education data curation framework (EDCF) (Fig. 1) [1] under development by Purdue University and endorsed by the GLOBE program [2] for further development and application. Our work shows that a comprehensive data science training includes both spatial and non-spatial data, where both categories are promoted by standard efforts of organizations …