Kontaktujte nás | Jazyk: čeština English
dc.title | Intensity of EMF generated by electronic safety system devices | en |
dc.contributor.author | Pospíšilík, Martin | |
dc.contributor.author | Vnenčáková, Eva | |
dc.contributor.author | Kutaj, Milan | |
dc.relation.ispartof | MATEC Web of Conferences | |
dc.identifier.issn | 2261-236X Scopus Sources, Sherpa/RoMEO, JCR | |
dc.date.issued | 2017 | |
utb.relation.volume | 125 | |
dc.event.title | 21st International Conference on Circuits, Systems, Communications and Computers, CSCC 2017 | |
dc.event.sdate | 2017-07-14 | |
dc.event.edate | 2017-07-17 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | EDP Sciences | |
dc.identifier.doi | 10.1051/matecconf/201712502059 | |
dc.relation.uri | https://www.matec-conferences.org/articles/matecconf/abs/2017/39/matecconf_cscc2017_02059/matecconf_cscc2017_02059.html | |
dc.description.abstract | As the importance of wireless networks based on radio frequencies increases in time, a space for discussion on harmfulness of the electromagnetic radiation has occurred. On the one hand there are studies showing that a direct influence of non-ionizing electromagnetic waves on the human organism was not confirmed until a certain intensity has been reached. On the other hand, critical voices appear, warning that even low intensities of non-ionizing electromagnetic fields are harmful to the human body, if it is exposed to the radiation for a prolonged time. The authors of this paper have no ambition to resolve this dispute. However, they provide data on the intensity of the electromagnetic fields generated by several components of electronic security system that are operating on the basis of the wireless network. The data have been gained in a specialized workplace and will allow the reader to imagine how intensive the radio signals generated by the battery-operated devices are compared to the current hygienic and technical limits. © The Authors, published by EDP Sciences, 2017. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1007614 | |
utb.identifier.obdid | 43877315 | |
utb.identifier.scopus | 2-s2.0-85032873649 | |
utb.source | d-scopus | |
dc.date.accessioned | 2018-01-15T16:31:33Z | |
dc.date.available | 2018-01-15T16:31:33Z | |
dc.rights | Attribution 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.rights.access | openAccess | |
utb.contributor.internalauthor | Pospíšilík, Martin | |
utb.fulltext.affiliation | Martin Pospisilik 1*, Eva Vnencakova 2, Milan Kutaj 2 1 Tomas Bata University in Zlin, Faculty of Applied Informatics, Nad Stranemi 4511, 760 05 Zlin, Czech Republic 2 University of Zilina, Faculty of Security Engineering, 1st May Street 32, 010 26 Zilina, Slovakia * Corresponding author: pospisilik@fai.utb.cz | |
utb.fulltext.dates | - | |
utb.scopus.affiliation | Tomas Bata University in Zlin, Faculty of Applied Informatics, Nad Stranemi 4511, Zlin, Czech Republic; University of Zilina, Faculty of Security Engineering, 1st May Street 32, Zilina, Slovakia | |
utb.fulltext.faculty | Faculty of Applied Informatics |