2015
DOI: 10.7250/ste.2014.009
|View full text |Cite
|
Sign up to set email alerts
|

Reducing Exposure to Radiofrequency Electromagnetic Fields from Wireless Networking with Portable Computers

Abstract: The relevance of this study is determined by the rapid development in the portable computer and wireless data transmission technologies. Modern working and living environments have become abundant in radiofrequency electromagnetic fields. This article investigates the effectiveness of intervention measures to reduce laptop computer user's exposure to the radiofrequency electromagnetic field from wireless networking. Different exposure reduction solutions using 2G, 3G, 4G wireless network modems are studied. In… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
(18 reference statements)
0
1
0
Order By: Relevance
“…Electromagnetic interference (EMI) may arise from other devices in the same frequency bands. If this radiation reaches smart devices or the operator's receiver with sufficient amplitude, it can impact network health, inhibiting innovative system operation and affecting proper wireless transmission [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…Electromagnetic interference (EMI) may arise from other devices in the same frequency bands. If this radiation reaches smart devices or the operator's receiver with sufficient amplitude, it can impact network health, inhibiting innovative system operation and affecting proper wireless transmission [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…Then, the magnetic field measurement results are presented. Apart from previously published papers [4], [13] which do not classify data, we propose an unsupervised classification of measured data by K-Medians method in order to determine the critical positions of the laptop. This process segments measured data into classes leading to the establishment of different levels of dangerous and non-dangerous zones in the laptop neighborhood.…”
Section: Introductionmentioning
confidence: 99%