Explore chapters and articles related to this topic
Safety Guidelines for Electromagnetic Field Exposure and Mobile Towers
Published in Jitendra Behari, Radio Frequency and Microwave Effects on Biological Tissues, 2019
The mobile phone works by communicating with a nearby base station (also called a “cell site”) which connects it to the main phone network (Figure 5.5). When moving, if the mobile phone gets too far away from the cell it is connected to, that cell sends a message to another cell to convey the new cell to take over the call. This is termed a “hand off,” and the call continues with the new cell the phone taking over. The taken over is done so well and carefully that the user does not know that the call was transferred to another cell. The level of RF energy inside buildings where a base station signal is available is typically much lower than the level outside, depending on the construction materials of the building. The RF waves transmitted and reflected to and from these base stations and in the process are given off into the environment, where people are exposed to these radiations. Since this is a chronic phenomenon, their biological effects may be important and need to be examined in detail.Their biological effect is now well documented (French et al. 2001; Behari 2009). An estimate of power emission from a tower is shown in Tables 6.2a, b, c, and 6.3).
Security and Privacy in Mobile Cloud Computing
Published in Mukesh Kumar Awasthi, Ravi Tomar, Maanak Gupta, Mathematical Modeling for Intelligent Systems, 2023
While customers retain and use confidential material, app developers should pay attention to the two issues: developers can implement a layer of security as an added step in the application level, and then they can ensure that customers’ sensitive information also isn’t kept in the identification module card. Moreover, cloud backup solutions are critical for customers because if a customer’s mobile is stolen or their information is deleted, the user can restore his data from the cloud. At the moment, unique security mechanisms are integrated into mobile devices. There are numerous security programs for mobile devices available, each with its own set of functions such as detecting and preventing mobile viruses, controlling unwanted access, and protecting privacy.
From Automation to Interaction Design
Published in Guy A. Boy, The Handbook of Human-Machine Interaction, 2017
Why interaction design has become so important? The primary reason is that software is embedded in many systems and tools. We do not use the tools in a physical manner anymore; we interact with them. Most mobile phones are computers that enable us to communicate via various resources including telephony, email, and the Internet. They enable us to store large quantity of data including text, music, photos and movies, which can be sent to other mobile phones or computers connected to a network. Human and machine agents interact between each other either directly or via other human and/or machine agents. A machine agent such as a modern mobile phone is a software-intensive system.
Non-ionizing radiation as possible carcinogen
Published in International Journal of Environmental Health Research, 2022
Shiwangi Gupta, Radhey Shyam Sharma, Rajeev Singh
Several research groups are also working on different wireless technology and its effect on human health. Code division multiple access (CDMA) is a communication method used by different radio technologies that allow multi users to share same frequency band. The transmission power of CDMA is limited to a maximum of 6–7milliWatts (Garg 2000). In early 1990s, 2 G was developed for digital mobile communication systems (GSM or Global System for Mobile Communication). The transmission power intensity of mobile phone is 2 watts in GSM850/900 and 1 watt in GSM1800/1900 (ICNIRP 2009). The third generation (3 G) mobile network technology used to access the internet and the fourth generation (4 G) technology offers high-speed internet access, videos and higher data rates. 5 G or fifth generation of mobile technology provides complete wireless communication with no limitations and 5 G has high speed of transmission rate (Prabhakara et al. 2017). Different specifications of 3 G, GSM and CDMA mobile phone technologies have been shown in Table 4. In connection to the above, Wi-fi can also create a small wireless computer system in a place where they are often called wireless local area networks (WLANs).