How to Develop a Validated Geographic Search Filter: Five Key Steps

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to hinder tuberculosis control: five easy steps.

The control of tuberculosis remains an area of interest and concern. Some recent Lancet papers bring positive news, albeit with important questions left unanswered. Wang and colleagues' longitudinal study1 concluded that tuberculosis prevalence in China was reduced by shifting to the recommended approach based on directly observed treatment, short course (DOTS) for tuberculosis diagnosis and tr...

متن کامل

How to identify existing literature on patients' knowledge, views, and values: the development of a validated search filter.

OBJECTIVE The research sought to establish validated search filters for retrieval of studies on patients' knowledge and values. SETTING Two nonprofit organizations in the Netherlands were studied for guideline development. METHODS An existing filter was adapted to three bibliographic interfaces. After defining the scope, a reference database was built for the development of the new filters....

متن کامل

How to Develop a Shared Vision: The Key to IS Strategic Alignment

This article presents a framework for creating a shared vision between an organization’s CIO and its top management team (TMT). Such a vision is the key to aligning the organization’s information systems (IS) strategy with its business strategy. We describe how this shared vision is facilitated by six visioning mechanisms and identify five distinct configurations of visioning mechanisms being u...

متن کامل

How to Develop a Research Protocol

Introduction What is reasoning? Scientific approach What is science? Three domains of science Function of science What is research? Steps in research (Scientific Approach) Identify the question or problem Sources used Criteria for evaluation Conduct a literature review of question Primary and secondary sources Frame a hypothesis Develop the study design Questions for development Characteristics...

متن کامل

How to Protect DES Against Exhaustive Key Search

The block cipher DESX is de ned by DESXk:k1:k2(x) = k2 DESk(k1 x), where denotes bitwise exclusive-or. This construction was rst suggested by Ron Rivest as a computationally-cheap way to protect DES against exhaustive key-search attacks. This paper proves, in a formal model, that the DESX construction is sound. We show that, when F is an idealized block cipher, FXk:k1:k2(x) = k2 Fk(k1 x) is sub...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Evidence Based Library and Information Practice

سال: 2020

ISSN: 1715-720X

DOI: 10.18438/eblip29633