首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.

Background

The use of cellular and cordless telephones has increased dramatically during the last decade. There is concern of health problems such as malignant diseases due to microwave exposure during the use of these devices. The brain is the main target organ.

Methods

Since the second part of the 1990's we have performed six case-control studies on this topic encompassing use of both cellular and cordless phones as well as other exposures. Three of the studies concerned brain tumours, one salivary gland tumours, one non-Hodgkin lymphoma (NHL) and one testicular cancer. Exposure was assessed by self-administered questionnaires.

Results

Regarding acoustic neuroma analogue cellular phones yielded odds ratio (OR) = 2.9, 95 % confidence interval (CI) = 2.0–4.3, digital cellular phones OR = 1.5, 95 % CI = 1.1–2.1 and cordless phones OR = 1.5, 95 % CI = 1.04–2.0. The corresponding results were for astrocytoma grade III-IV OR = 1.7, 95 % CI = 1.3–2.3; OR = 1.5, 95 % CI = 1.2–1.9 and OR = 1.5, 95 % CI = 1.1–1.9, respectively. The ORs increased with latency period with highest estimates using > 10 years time period from first use of these phone types. Lower ORs were calculated for astrocytoma grade I-II. No association was found with salivary gland tumours, NHL or testicular cancer although an association with NHL of T-cell type could not be ruled out.

Conclusion

We found for all studied phone types an increased risk for brain tumours, mainly acoustic neuroma and malignant brain tumours. OR increased with latency period, especially for astrocytoma grade III-IV. No consistent pattern of an increased risk was found for salivary gland tumours, NHL, or testicular cancer.  相似文献   

2.

Introduction

The impact of electromagnetic fields on health is of increasing scientific interest. The aim of this study was to examine how the Drosophila melanogaster animal model is affected when exposed to portable or mobile phone fields.

Methods/Results

Two experiments have been designed and performed in the same laboratory conditions. Insect cultures were exposed to the near field of a 2G mobile phone (the GSM 2G networks support and complement in parallel the 3G wide band or in other words the transmission of information via voice signals is served by the 2G technology in both mobile phones generations) and a 1880 MHz cordless phone both digitally modulated by human voice. Comparison with advanced statistics of the egg laying of the second generation exposed and non-exposed cultures showed limited statistical significance for the cordless phone exposed culture and statistical significance for the 900 MHz exposed insects. We calculated by physics, simulated and illustrated in three dimensional figures the calculated near fields of radiation inside the experimenting vials and their difference. Comparison of the power of the two fields showed that the difference between them becomes null when the experimental cylinder radius and the height of the antenna increase.

Conclusions/Significance

Our results suggest a possible radiofrequency sensitivity difference in insects which may be due to the distance from the antenna or to unexplored intimate factors. Comparing the near fields of the two frequencies bands, we see similar not identical geometry in length and height from the antenna and that lower frequencies tend to drive to increased radiofrequency effects.  相似文献   

3.
There is a lively debate over who is to blame for the harms arising from unhealthy behaviours, like overeating and excessive drinking. In this paper, I argue that given how demanding the conditions required for moral responsibility actually are, we cannot be highly confident that anyone is ever morally responsible. I also adduce evidence that holding people responsible for their unhealthy behaviours has costs: it undermines public support for the measures that are likely to have the most impact on these harms. I claim that these two facts—the fact that we cannot be highly confident that anyone is morally responsible and the fact that holding people responsible for their unhealthy behaviours has costs—interact. Together they give us a powerful reason for believing, or acting as if we believed, that ordinary people are not in fact responsible for their unhealthy behaviours.  相似文献   

4.
Society is confronted with an increasing number of applications making use of wireless communication. We also notice an increasing awareness about potentially harmful effects of the related electromagnetic fields on living organisms. At present, it is not realistic to expect that wireless communication will decrease or disappear within the near future. That is why we currently are investigating the mechanisms behind these effects and the effectiveness of possible solutions. In order to be efficient and effective, we designed and validated a fast and easy test on ants – these insects being used as a biological model – for revealing the effect of wireless equipments like mobile phones, smartphones, digital enhanced cordless telephone (DECT) phones, WiFi routers and so on. This test includes quantification of ants’ locomotion under natural conditions, then in the vicinity of such wireless equipments. Observations, numerical results and statistical results allow detecting any effect of a radiating source on these living organisms.  相似文献   

5.
Cooperation is a mysterious evolutionary phenomenon and its mechanisms require elucidation. When cooperators can stop interactions with defectors, the evolution of cooperation becomes possible; this is one mechanism that facilitates the evolution of cooperation. Here, stopping interactions with defectors is beneficial not only for cooperators but also for defectors. The question then arises, for whom is stopping interactions with defectors more beneficial: cooperators or defectors? By utilizing evolutionary game theory, I addressed this question using a two-player game involving four strategies: (1) cooperators who stop the interaction if the current partner is a defector, (2) cooperators who attempt to maintain a relationship with anyone, (3) defectors who stop the interaction if the current partner is a defector, and (4) defectors who attempt to maintain a relationship with anyone. Our results show that, at equilibrium, the ratio of cooperators who stop the interaction if the current partner is a defector to cooperators who attempt to maintain a relationship with anyone is larger than the ratio of defectors who stop the interaction if the current partner is a defector to defectors who attempt to maintain a relationship with anyone. Thus, cooperators rather than defectors are more likely to stop interactions with defectors at equilibrium. This result is consistent with a previous experimental study in which a positive correlation was detected between the degree of individuals’ cooperativeness and how accurately the individuals recognize whether other individuals are cooperators or defectors. Thus, the theoretical work presented in this study provides relevant insights into the natural phenomena of cooperation and recognition.  相似文献   

6.
D Y Dodek  A Dodek 《CMAJ》1997,156(6):847-852
Although patient confidentiality has been a fundamental ethical principle since the Hippocratic Oath, it is under increasing threat. The main area of confidentiality is patient records. Physicians must be able to store and dispose of medical records securely. Patients should be asked whether some information should be kept out of the record or withheld if information is released. Patient identity should be kept secret during peer review of medical records. Provincial legislation outlines circumstances in which confidential information must be divulged. Because of the "team approach" to care, hospital records may be seen by many health care and administrative personnel. All hospital workers must respect confidentiality, especially when giving out information about patients by telephone or to the media. Research based on medical-record review also creates challenges for confidentiality. Electronic technology and communications are potential major sources of breaches of confidentiality. Computer records must be carefully protected from casual browsing or from unauthorized access. Fax machines and cordless and cellular telephones can allow unauthorized people to see or overhear confidential information. Confidentiality is also a concern in clinical settings, including physicians'' offices and hospitals. Conversations among hospital personnel in elevators or public cafeterias can result in breaches of confidentiality. Patient confidentiality is a right that must be safeguarded by all health care personnel.  相似文献   

7.
The number of people complaining about different symptoms that may be associated with exposure to electromagnetic fields (EMF) has increased rapidly during past years. Students use both mobile phones and video display terminals frequently. The purpose of this study was to investigate the association of mobile phone use and EMF health hazards. Basic demographic data and self-reported symptoms were sought using a questionnaire administered to all apparently healthy students at Rafsanjan University of Medical Sciences (RUMS) and Vali-e-Asr University (VAU). Questions about some major confounding factors such as age, gender, amount of video display terminal work were also included. Exact Fischer Test was used for data analysis. Among self-reported symptoms, headache (53.5%), fatigue (35.6%), difficulties in concentration (32.5%), vertigo/dizziness (30.4%), attention disorders (28.8%), nervousness (28.1%), palpitation (14.7%), low back pain (14.3%), myalgia (12.4%), and tinnitus (9.9%) were the main self-reported symptoms. No significant differences in the prevalence of these symptoms were found between CRT users and those who did not use CRTs. A significant association was found between cordless phone use and difficulties in concentration (P < .05) or attention disorders (P < .05). However, after correction of the gender role, these differences were not significant. No association was found between mobile phone use and the above-mentioned symptoms. No significantly higher prevalence of self-reported symptoms was found in individuals who had used mobile phones, video display terminals or cordless phones more frequently than others. Mass-media's lack of interest in the possible hazards of exposure to EMF in developing countries can explain the difference observed between the results of this study and those of other researchers in some developed countries who have shown an association between EMF exposure and the prevalence of self-reported subjective symptoms. This finding can confirm the results obtained in provocative studies which indicated the role of psychological factors in electromagnetic hypersensitivity. More research is needed to clarify whether daily environmental EMF may cause health problems.  相似文献   

8.
The safety guidelines of ICNIRP on bio-effects of low energy fields are based absorption and transformation into thermal effects. These guidelines are much higher than for acute reactions and long time exposure. It is pointed out that the guidelines for cordless telephone and mobile phone should correspond to long time exposure to low energetic electromagnetic fields.  相似文献   

9.
In this review I hope to give a short account of the development and present state of the art of microcomputers. In addition I will describe some of the uses that microcomputers have already been put to in the biochemistry laboratory and what they may be used for in the future. Finally and perhaps more importantly, for anyone who has (or is) thinking about purchasing a microcomputer but finds the jargon and acronyms in manufacturers catalogues meaningless a short glossary is provided. As this review is of a general nature few specific references are supplied. Instead a selected bibliography containing introductory texts is given. This list is not exhaustive and is not meant to be; rather it contains works that this author has found to be particularly useful.  相似文献   

10.

Background

We evaluated if exposure to RF-EMF was associated with reported quality of sleep in 2,361 children, aged 7 years.

Methods

This study was embedded in the Amsterdam Born Children and their Development (ABCD) birth cohort study. When children were about five years old, school and residential exposure to RF-EMF from base stations was assessed with a geospatial model (NISMap) and from indoor sources (cordless phone/WiFi) using parental self-reports. Parents also reported their children’s use of mobile or cordless phones. When children were seven years old, we evaluated sleep quality as measured with the Child Sleep Habits Questionnaire (CSHQ) filled in by parents. Of eight CSHQ subscales, we evaluated sleep onset delay, sleep duration, night wakenings, parasomnias and daytime sleepiness with logistic or negative binomial regression models, adjusting for child’s age and sex and indicators of socio-economic position of the parents. We evaluated the remaining three subscales (bedtime resistance, sleep anxiety, sleep disordered breathing) as unrelated outcomes (negative control) because these were a priori hypothesised not to be associated with RF-EMF.

Results

Sleep onset delay, night wakenings, parasomnias and daytime sleepiness were not associated with residential exposure to RF-EMF from base stations. Sleep duration scores were associated with RF-EMF levels from base stations. Higher use mobile phones was associated with less favourable sleep duration, night wakenings and parasomnias, and also with bedtime resistance. Cordless phone use was not related to any of the sleeping scores.

Conclusion

Given the different results across the evaluated RF-EMF exposure sources and the observed association between mobile phone use and the negative control sleep scale, our study does not support the hypothesis that it is the exposure to RF-EMF that is detrimental to sleep quality in 7-year old children, but potentially other factors that are related to mobile phone usage.  相似文献   

11.
The urinary excretion of (an) odorous substance(s) after eating asparagus is not an inborn error of metabolism as has been supposed. The detection of the odour constitutes a specific smell hypersensitivity. Those who could smell the odour in their own urine could all smell it in the urine of anyone who had eaten asparagus, whether or not that person was able to smell it himself. Thresholds for detecting the odour appeared to be bimodal in distribution, with 10% of 307 subjects tested able to smell it at high dilutions, suggesting a genetically determined specific hypersensitivity.  相似文献   

12.
Networked electronic publication is a relatively new development that has already begun to change the way in which medical information is exchanged. Electronic publications can present ideas that would be impossible in printed text, using multimedia components such as sound and movies. Physicians who use the World Wide Web (WWW) on a regular basis may recognize the value of electronic publication and decide to become information providers. Nearly anyone with a computer and modem can create a WWW resource on a Web server at a hospital or on a commercial hosting service. Medical publication on the Internet demands a high level of quality control because the information will be available to anyone who cares to look. Creating a peer-review system for electronic information may, therefore, help to enhance academic recognition of Internet medical resources. Resources containing medical information must be continually available and protected from system failures and unauthorized access. As Internet technology matures and these problems are solved, electronic publication may become the predominant method of communication between medical professionals.  相似文献   

13.
This is one of many recently published books describing theproduction and application of GMOs. It is pitched at ‘studentsand anyone concerned or curious about GMOs’ and, althougha attempt has been  相似文献   

14.
The advancement of science, as well as scientific careers, depends upon good and clear scientific writing. Science is the most democratic of human endeavours because, in principle, anyone can replicate a scientific discovery. In order for this to continue, writing must be clear enough to be understood well enough to allow replication, either in principle or in fact. In this paper I will present data on the publication process in Evolutionary Ecology, use it to illustrate some of the problems in scientific papers, make some general remarks about writing scientific papers, summarise two new paper categories in the journal which will fill gaps that appear to be expanding in the literature, and summarise new journal policies to help mitigate existing problems. Most of the suggestions about writing would apply to any scientific journal.  相似文献   

15.
Hero, Hawk, and Open Hand rated as a must-see for anyone with an interest in art of the ancient Americas or ancient art in general—an exhibition whose breadth and depth in terms of visual material would be difficult, if not impossible, to replicate. This review takes a look beyond the immediate frame of the exhibition at some additional context related to the appreciation of these objects as ancient art, including some reflection on the original objectives of the exhibition and what appeared, at least to this anthropologist, as palpably missing or unspoken.  相似文献   

16.
Rob Lawlor 《Bioethics》2016,30(5):353-357
John Harris claims that is it ‘palpable nonsense’ to suggest that ‘a child (or anyone) might competently consent to a treatment but not be competent to refuse it.’ In ‘Transitional Paternalism: How Shared Normative Powers Give Rise to the Asymmetry of Adolescent Consent and Refusal’ Neil Manson aims to explain away the apparent oddness of this asymmetry of consent and refusal, by appealing to the idea of shared normative powers, presenting joint bank accounts as an example. In this article, I will argue that Manson's account fails to explain away the oddness. Rather, I will argue that there are ambiguities to which Manson has not paid sufficient attention. In fact, as odd as it may sound, I argue that Manson actually agrees with Harris (at least in relation to the asymmetry of competence). He fails to recognize that he agrees with Harris because he is not careful enough to distinguish between different asymmetries, which I have labelled the asymmetries of choice, permissibility and competence.  相似文献   

17.
An approach to modelling in immunology   总被引:1,自引:0,他引:1  
Like most other fields in biology, immunology has been revolutionised by the techniques of molecular biology and the resulting explosion in available experimental data. It is argued that efforts to integrate the data to gain insight into how various subsystems in the immune system interact and function require mathematical modelling and computer simulation in close collaboration with experimentalists. This paper illustrates some of the techniques available for modelling immune systems, and highlights the issues that should be borne in mind by anyone starting down the modelling path.  相似文献   

18.
Intraosseous line In cases of emergency an intravenous line is necessary to administer live‐saving infusions and drugs. In hemorrhagic shock, hypothermia or circulatory arrest it can be difficult to get access to systemic circulation. An alternative is an intraosseous line by inserting a needle into the medullary cavitiy in the epiphysis of a long bone. With a system working with a cordless screw‐driver the canula can be administered save and in a few seconds. Via the osteons drugs and infusions reach the circulation. Pharmacokinetics are comparable to an intravenous line. Anatomical basics of the technique are 300, first practical work nearly 100 years old. New technologies facilitate the easily application of intraosseous lines in medicine.  相似文献   

19.
Aggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature (IBAS) scheme that supports full aggregation since it can reduce the total transmitted data by using an identity string as a public key and anyone can freely aggregate different signatures. Constructing a secure IBAS scheme that supports full aggregation in bilinear maps is an important open problem. Recently, Yuan et al. proposed such a scheme and claimed its security in the random oracle model under the computational Diffie-Hellman assumption. In this paper, we show that there is an efficient forgery on their IBAS scheme and that their security proof has a serious flaw.  相似文献   

20.
Charlotte Gray 《CMAJ》1996,154(2):233
The federal government''s National Forum on Health is organizing a series of discussion groups across the country to focus on problems facing Canada''s health care system. Although a great deal of time and money is being spent on this and other forum projects, Charlotte Gray asks whether anyone is listening. She says many provincial governments are treating the forum with “elaborate disdain” and the only governments that appear willing to give it a chance to work are found in have-not provinces that rely on Ottawa for handouts in the form of transfer payments.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号