Learn More
We present a 3-D model for the simulation of a realistic clinical situation during magnetic stimulation. The electromagnetic problem is solved by reconstructing the inhomogeneous head tissues from magnetic resonance images and associating relative values of conductivity to each tissue. Application of Maxwell's equations in the integral form leads to an(More)
In the present study the third generation wireless technology of the Universal Mobile Telecommunication System (UMTS) signal was investigated for the induction of genotoxic effects in human leukocytes. Peripheral blood from six healthy donors was used and, for each donor, intermittent exposures (6 min RF on, 2 h RF off) at the frequency of 1950 MHz were(More)
The aim of this study was to investigate the nonthermal effects of radiofrequency (RF) fields on human immune cells exposed to a Global System for Mobile Communication (GSM) signal generated by a commercial cellular phone and by a sinusoidal non-modulated signal. To assess whether mobile phone RF-field exposure affects human immune cell functions,(More)
OBJECTIVE To assess clinical outcomes associated with the implementation of the sepsis management guideline in a community-based hospital. In addition, evaluate the utility and effectiveness of a Sepsis Education Program. RESEARCH DESIGN AND METHODS This is an observational cohort study of patients presenting to the Emergency Department at a(More)
The kinematic survey with GNSS measurements has known a good diffusion in Italy especially after the new Italian laws about road cadastre. The Laboratory of surveying of Perugia University has deepened the aspect of the road axis survey with GNSS measurements. The analysis has started from a kinematic survey with GNSS measurements at a sampling rate up to(More)
  • A. Schiavoni
  • 2007
Exposure assessment to the electromagnetic field generated by wireless devices are based on experimental and computational procedures. In both cases the FDTD technique plays a key role in the determination of experimental conditions, computational methodologies and applicability limits. The paper performs an analysis of the usage of the technique that has(More)
  • 1