منابع مشابه
Tensions and Opportunities in Convergence: Shifting Concepts of Disease in Emerging Molecular Medicine
The convergence of biomedical sciences with nanotechnology as well as ICT has created a new wave of biomedical technologies, resulting in visions of a 'molecular medicine'. Since novel technologies tend to shift concepts of disease and health, this paper investigates how the emerging field of molecular medicine may shift the meaning of 'disease' as well as the boundary between health and diseas...
متن کاملConcepts of Genetic Epidemiology
Y.Y. Shugart (ed.), Applied Computational Genomics, Translational Bioinformatics 1, DOI 10.1007/978-94-007-5558-1_2, © Springer Science+Business Media Dordrecht 2012 Abstract The major aim of this chapter is to provide an overview of the fi eld of genetic epidemiology and its relevance to the identi fi cation of the causes and risk factors for human diseases. The most important goal of the meth...
متن کاملDesign and Implementation of ShiCo: Visualising Shifting Concepts over Time
In different times, people use different words to describe concepts. Change and stability in word usage are possible indicators of wider socio-cultural changes. To gain insight into how people perceive concepts, it is valuable to trace how the words denoting a certain concept change over time. Existing tools for exploring historical concepts, such as keyword searching or topic modeling, are ill...
متن کاملRapidly Shifting Concepts Regarding Androgens and Prostate Cancer
There has been a recent dramatic shift in our understanding of the relationship between androgens and prostate cancer (PCa). Whereas for several decades it had been assumed that higher serum testosterone (T) concentrations would lead to ever-greater PCa growth, current literature indicates that PCa growth is unaffected by changes in serum T throughout most of the naturally occurring range. A Sa...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science & Technology Studies
سال: 2004
ISSN: 2243-4690
DOI: 10.23987/sts.55170