Genetic risks and healthy choices: creating citizen-consumers of genetic services through empowerment and facilitation

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

phylogeography and genetic diversity of the lesser mouse- eared bat (myotis blythii) in iran

in current study, 63 samples of bat populations collected from differ regions were used for evaluating the geographic variations. twenty cranial and dental characters for traditional morphometric and landmarks method on the ventral, dorsal skull and mandible for geometry morphometric studies were used. statistical analyses of traditional morphometric and geometry morphometric data indicated low...

Majority report: Citizen empowerment through collaborative sensemaking

In the past crisis sensemaking activities have primarily been controlled by professional emergency responders and the media. Social media, however, has the potential to see a shift towards more grassroots and ad hoc citizen engagement. This paper sets out our vision and our progress in implementation of a new online platform called ‘Majority Report’, which aims to empower citizen sensemaking ac...

متن کامل

GENETIC PROGRAMMING AND MULTIVARIATE ADAPTIVE REGRESION SPLINES FOR PRIDICTION OF BRIDGE RISKS AND COMPARISION OF PERFORMANCES

In this paper, two different data driven models, genetic programming (GP) and multivariate adoptive regression splines (MARS), have been adopted to create the models for prediction of bridge risk score. Input parameters of bridge risks consists of safe risk rating (SRR), functional risk rating (FRR), sustainability risk rating (SUR), environmental risk rating (ERR) and target output. The total ...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sociology of Health & Illness

سال: 2009

ISSN: 0141-9889

DOI: 10.1111/j.1467-9566.2009.01202.x