Search Articles

View query in Help articles search

Search Results (1 to 10 of 286 Results)

Download search results: END BibTex RIS


The Influence of Two Different Invitation Letters on Chlamydia Testing Participation: Randomized Controlled Trial

The Influence of Two Different Invitation Letters on Chlamydia Testing Participation: Randomized Controlled Trial

First Impression Bias and Primacy EffectsVisiting address: Het Overloon 2 6411 TE Heerlen 045-8506613 (9.00h-12.00h) Visiting Address: Het Overloon 2 6411 TE Heerlen 045-850 66 13 (9.00h-12.00h)

Gill ten Hoor, Christian JPA Hoebe, Jan EAM van Bergen, Elfi EHG Brouwers, Robert AC Ruiter, Gerjo Kok

J Med Internet Res 2014;16(1):e24

Datathons and Software to Promote Reproducible Research

Datathons and Software to Promote Reproducible Research

These impediments include time-intensive configuration, inadequate documentation, code rot, “dependency hell,” and a research environment that insufficiently rewards efforts to reproduce the work of other investigators.Breaking down the technical barriers that

Leo Anthony Celi, Sharukh Lokhandwala, Robert Montgomery, Christopher Moses, Tristan Naumann, Tom Pollard, Daniel Spitz, Robert Stretch

J Med Internet Res 2016;18(8):e230

Systematic Review on Internet Support Groups (ISGs) and Depression (1): Do ISGs Reduce Depressive Symptoms?

Systematic Review on Internet Support Groups (ISGs) and Depression (1): Do ISGs Reduce Depressive Symptoms?

intervening variable)NoI = 47 (7.8%c d/o)C = 49 (3.9% d/o)Depression was treated as a intervening variable rather than an outcomeES = 0.24N/RLiebermann 2005d [28,45]USAN = 66 or 65 patients with PD assigned to:Heterogeneous (Het

Kathleen Margaret Griffiths, Alison L Calear, Michelle Banfield

J Med Internet Res 2009;11(3):e40

Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation

Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation

., log k –1 do2: Compute ct ←Add(ct, Rot(ct;2i))3: end for4: Outputs: ciphertext ct encrypting Σ1≤ i≤k mi in each plaintext slotSecure logistic regression algorithm.0: Inputs: Ciphertexts { ct.zj}0≤j≤d, a polynomial g(x), a number of iterations IterNum1: For

Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang

JMIR Med Inform 2018;6(2):e19