Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (89)

Search Parameters:
Keywords = IT and telecommunication equipment

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 744 KiB  
Article
Three-Dimensional Trajectory Optimization for UAV-Based Post-Disaster Data Collection
by Renkai Zhao and Gia Khanh Tran
J. Sens. Actuator Netw. 2025, 14(3), 63; https://doi.org/10.3390/jsan14030063 - 16 Jun 2025
Viewed by 596
Abstract
In Japan, natural disasters occur frequently. Serious disasters may cause damage to traffic networks and telecommunication infrastructures, leading to the occurrence of isolated disaster areas. In this article, unmanned aerial vehicles (UAVs) are used for data collection instead of unavailable ground-based stations in [...] Read more.
In Japan, natural disasters occur frequently. Serious disasters may cause damage to traffic networks and telecommunication infrastructures, leading to the occurrence of isolated disaster areas. In this article, unmanned aerial vehicles (UAVs) are used for data collection instead of unavailable ground-based stations in isolated disaster areas. Detailed information about the damage situation will be collected from the user equipment (UE) by a UAV through a fly–hover–fly procedure, and then will be sent to the disaster response headquarters for disaster relief. However, mission completion time minimization becomes a crucial task, considering the requirement of rapid response and the battery constraint of UAVs. Therefore, the author proposed a three-dimensional UAV flight trajectory, discussing the optimal flight altitude and placement of hovering points by transforming the original problem of K-means clustering into a location set cover problem (LSCP) that can be solved via a genetic algorithm (GA) approach. The simulation results have shown the feasibility of the proposed method to reduce the mission completion time. Full article
Show Figures

Figure 1

8 pages, 3282 KiB  
Proceeding Paper
Design and Development of 35–4.4 GHz Inset-Fed 2 × 2 Phased Array Microstrip Patch Antenna for Intentional Electromagnetic Interference Testing
by John Joshua O. Gutierrez, Jervin D. Louis and Jennifer C. Dela Cruz
Eng. Proc. 2025, 92(1), 63; https://doi.org/10.3390/engproc2025092063 - 12 May 2025
Viewed by 360
Abstract
Communication devices are frequency-operating electronics equipment that utilizes analog modulation, frequency modulation, shortwave frequency, and even higher frequencies in telecommunications. We designed an antenna to transmit interfering frequencies for testing equipment and components based on the effects and conditions of achieving electromagnetic interference. [...] Read more.
Communication devices are frequency-operating electronics equipment that utilizes analog modulation, frequency modulation, shortwave frequency, and even higher frequencies in telecommunications. We designed an antenna to transmit interfering frequencies for testing equipment and components based on the effects and conditions of achieving electromagnetic interference. Ansys 2024 was used to design the 35 to 4.4 GHz 2 × 2 patch antennas and simulate the response using a sample frequency of 35 MHz to determine the antenna’s polarization. The polarization was circular, in contrast to the results of the phases Phi and Theta observed in the radial field 3D polar plot, which are completely out of phase and different in magnitude by 5.4 in Phi and 5402.01 in Theta. The measurements from Ansys were congruent to the 2D model dimensions in AutoCAD 2024. The antenna was fabricated under a double-layered photosensitive FR-4 copper board. The antenna connected to the signal generator ADF 4351 effectively was interfered with by a frequency near the actual frequency with a maximum distance of 7.5 m in a room. The frequencies that interfered were from 91.5 to 102.7 MHz. Strong electromagnetic waves for interference disrupted frequency-operating devices due to high signal power achieving destructive interference. Full article
(This article belongs to the Proceedings of 2024 IEEE 6th Eurasia Conference on IoT, Communication and Engineering)
Show Figures

Figure 1

26 pages, 2803 KiB  
Article
End of Life Management Sustainability of Waste Electrical and Electronic Equipment Generated in Romania
by Anisoara Enache Talpalaru, Daniela Gavrilescu and Carmen Teodosiu
Sustainability 2025, 17(9), 4105; https://doi.org/10.3390/su17094105 - 1 May 2025
Viewed by 515
Abstract
Waste electrical and electronic equipment (WEEE) is a continuously growing concern, with issues arising from intensive resource consumption and the environmental and human impacts being caused by inadequate practices. The purpose of this study is to evaluate the impacts of end-of-life management options [...] Read more.
Waste electrical and electronic equipment (WEEE) is a continuously growing concern, with issues arising from intensive resource consumption and the environmental and human impacts being caused by inadequate practices. The purpose of this study is to evaluate the impacts of end-of-life management options generated by Information Technology (IT) and telecommunication equipment in Romania during the period of 2018–2021 from a sustainability point of view, including environmental aspects, such as greenhouse gas emissions (GHG) and energy consumption, economic aspects, considering workforce earnings and revenues collected for the public budget, and social impacts through job creation. To achieve the main objective, a two-step methodology is used, with one step to determine the relevant quantities of WEEE generated by the subcategories of IT and telecommunication equipment, using the European Union’s WEEE Calculation Tool based on two approaches, WEEE reported in Eurostat (Scenario 1) and apparent consumption (Scenario 2), and a second step to evaluate the environmental, economic, and social impacts of the WEEE management system by applying Waste Reduction Model (US EPA WARM). Regarding the six WEEE categories evaluated, in both scenarios, Flat-Panel Displays is the category with the lowest environmental impact and highest economic and social benefits, while, on the opposite side, the Cathode-Ray Tube (CRT) category displays the highest environmental impact and lowest economic and social benefits. Full article
Show Figures

Figure 1

27 pages, 5252 KiB  
Article
Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries
by Fahim Sufi and Musleh Alsulami
Mathematics 2025, 13(4), 655; https://doi.org/10.3390/math13040655 - 17 Feb 2025
Cited by 2 | Viewed by 1153
Abstract
The escalating prevalence of cyber threats across industries underscores the urgent need for robust analytical frameworks to understand their clustering, prevalence, and distribution. This study addresses the challenge of quantifying and analyzing relationships between 95 distinct cyberattack types and 29 industry sectors, leveraging [...] Read more.
The escalating prevalence of cyber threats across industries underscores the urgent need for robust analytical frameworks to understand their clustering, prevalence, and distribution. This study addresses the challenge of quantifying and analyzing relationships between 95 distinct cyberattack types and 29 industry sectors, leveraging a dataset of 9261 entries filtered from over 1 million news articles. Existing approaches often fail to capture nuanced patterns across such complex datasets, justifying the need for innovative methodologies. We present a rigorous mathematical framework integrating chi-square tests, Bayesian inference, Gaussian Mixture Models (GMMs), and Spectral Clustering. This framework identifies key patterns, such as 1150 Zero-Day Exploits clustered in the IT and Telecommunications sector, 732 Advanced Persistent Threats (APTs) in Government and Public Administration, and Malware with a posterior probability of 0.287 dominating the Healthcare sector. Temporal analyses reveal periodic spikes, such as in Zero-Day Exploits, and a persistent presence of Social Engineering Attacks, with 1397 occurrences across industries. These findings are quantified using significance scores (mean: 3.25 ± 0.7) and posterior probabilities, providing evidence for industry-specific vulnerabilities. This research offers actionable insights for policymakers, cybersecurity professionals, and organizational decision makers by equipping them with a data-driven understanding of sector-specific risks. The mathematical formulations are replicable and scalable, enabling organizations to allocate resources effectively and develop proactive defenses against emerging threats. By bridging mathematical theory to real-world cybersecurity challenges, this study delivers impactful contributions toward safeguarding critical infrastructure and digital assets. Full article
(This article belongs to the Special Issue Analytical Frameworks and Methods for Cybersecurity, 2nd Edition)
Show Figures

Figure 1

22 pages, 5257 KiB  
Article
Modbus RTU Protocol Timing Evaluation for Scattered Holding Register Read and ModbusE-Related Implementation
by Vasile Gheorghiță Găitan, Ionel Zagan and Nicoleta Cristina Găitan
Processes 2025, 13(2), 367; https://doi.org/10.3390/pr13020367 - 28 Jan 2025
Cited by 2 | Viewed by 2440
Abstract
In parallel with the development of data transmission in the telecommunications sector to connect peripheral devices, hardware engineers have defined interfaces for independent communication systems. The basic idea of having standardized interfaces for external devices was quickly extended to control and instrumentation equipment, [...] Read more.
In parallel with the development of data transmission in the telecommunications sector to connect peripheral devices, hardware engineers have defined interfaces for independent communication systems. The basic idea of having standardized interfaces for external devices was quickly extended to control and instrumentation equipment, as the real-time characteristic of distributed systems became a challenge in the field. The proposed Modbus Extension (ModbusE) builds on these new techniques introduced in the UART interface, so that the newly introduced extension retains all the characteristics of the Modbus RTU except for the character bit structure. The validation of the ModbusE protocol allowed the proposal of a new communication message structure, a description of Modbus devices, an acquisition cycle to attain a deterministic temporal response behavior and the definition of an architecture for IIoT integration. In this work, practical research is based on data update times in SMARTConvert software when between 1 and 50 registers are accessed. These registers can, in the most favorable case, be at consecutive addresses and can all be read in a single bus query request, or at addresses 1 to 50, or the registers must be read in separate requests. The contributions of this paper are related to highlighting cases where Modbus modules are incorporated, the addressed registers are not consecutive and the Modbus reads 1 or more holding register records and the ModbusE proposal. As these registers must not be on consecutive addresses, it is necessary to make several requests, defining the function of a Modbus acquisition cycle, adapting the equations to the purpose of the tests carried out, measuring the Modbus communication signals and describing the ModbusE communication concept. Full article
Show Figures

Figure 1

24 pages, 1256 KiB  
Article
Automatic Cleaning of Time Series Data in Rural Internet of Things Ecosystems That Use Nomadic Gateways
by Jerzy Dembski, Agata Kołakowska and Bogdan Wiszniewski
Sensors 2025, 25(1), 189; https://doi.org/10.3390/s25010189 - 1 Jan 2025
Cited by 1 | Viewed by 849
Abstract
A serious limitation to the deployment of IoT solutions in rural areas may be the lack of available telecommunications infrastructure enabling the continuous collection of measurement data. A nomadic computing system, using a UAV carrying an on-board gateway, can handle this; it leads, [...] Read more.
A serious limitation to the deployment of IoT solutions in rural areas may be the lack of available telecommunications infrastructure enabling the continuous collection of measurement data. A nomadic computing system, using a UAV carrying an on-board gateway, can handle this; it leads, however, to a number of technical challenges. One is the intermittent collection of data from ground sensors governed by weather conditions for the UAV measurement missions. Therefore, each sensor should be equipped with software that allows for the cleaning of collected data before transmission to the fly-over nomadic gateway from erroneous, misleading, or otherwise redundant data—to minimize their volume and fit them in the limited transmission window. This task, however, may be a barrier for end devices constrained in several ways, such as limited energy reserve, insufficient computational capability of their MCUs, and short transmission range of their RAT modules. In this paper, a comprehensive approach to these problems is proposed, which enables the implementation of an anomaly detector in time series data with low computational demand. The proposed solution uses the analysis of the physics of the measured signals and is based on a simple anomaly model whose parameters can be optimized using popular AI techniques. It was validated during a full 10-month vegetation period in a real Rural IoT system deployed by Gdańsk Tech. Full article
(This article belongs to the Special Issue Application of UAV and Sensing in Precision Agriculture)
Show Figures

Figure 1

18 pages, 4090 KiB  
Review
Fusion of Telecommunications and IT Services Boosted by Application Programming Interfaces
by Máté Ákos Tündik, Zsolt Szabó, Attila Hilt and Gábor Járó
Signals 2024, 5(4), 756-773; https://doi.org/10.3390/signals5040042 - 12 Nov 2024
Cited by 1 | Viewed by 2528
Abstract
Our long journey on the road of telecommunications is continuously evolving. We have experienced several technological changes, modernizations, optimizations, and various mergers in the past decades. Virtualization and ‘cloudification’ of legacy telecommunication equipment has made communication networks not only more flexible, but also [...] Read more.
Our long journey on the road of telecommunications is continuously evolving. We have experienced several technological changes, modernizations, optimizations, and various mergers in the past decades. Virtualization and ‘cloudification’ of legacy telecommunication equipment has made communication networks not only more flexible, but also opened new doors. Brand new types of services have become available thanks to the ongoing fusion of the two domains of telecommunications and IT (Information Technology). This overview paper first discusses the evolution of services with an enhanced focus on mobile networks. Then, the possibilities offered by IT are shown. Finally, some examples are given of how Communication Service Providers and end users can benefit from these recent changes. Full article
Show Figures

Figure 1

13 pages, 6726 KiB  
Article
A Software-Defined Radio Platform for Teaching Beamforming Principles
by Annamaria Sârbu, Robert Papa, Angela Digulescu and Cornel Ioana
Appl. Sci. 2024, 14(22), 10386; https://doi.org/10.3390/app142210386 - 12 Nov 2024
Viewed by 1506
Abstract
This paper presents the development and validation of a hybrid beamforming system based on software-defined radio (SDR), designed for telecommunications engineering education. The system provides an agile and user-friendly platform that allows students to observe, test, and evaluate beamforming techniques in real time. [...] Read more.
This paper presents the development and validation of a hybrid beamforming system based on software-defined radio (SDR), designed for telecommunications engineering education. The system provides an agile and user-friendly platform that allows students to observe, test, and evaluate beamforming techniques in real time. The platform integrates a multichannel SDR device (USRP N310) with traditional radiofrequency equipment and open-source software, facilitating hands-on learning experiences. The paper details the proposed hardware and software architecture and documents the calibration and validation phases. The testing and validation processes were conducted using a 3.5 GHz antenna array in both indoor and outdoor environments. The results demonstrated the system’s effectiveness in achieving the desired beam orientations, with experimental results aligning closely with simulation and theoretical predictions. Significant differences in the radiation patterns observed between the indoor and outdoor measurements were documented, highlighting the impact of environmental factors on beamforming performance. The insights gained from this research provide valuable contributions to the education of future telecommunications engineers, enhancing their understanding of practical beamforming applications and the integration of modern SDR technology. Full article
Show Figures

Figure 1

17 pages, 5166 KiB  
Article
Integration of Metrology in Grinding and Polishing Processes for Rotationally Symmetrical Aspherical Surfaces with Optimized Material Removal Functions
by Ravi Pratap Singh and Yaolong Chen
Micromachines 2024, 15(10), 1276; https://doi.org/10.3390/mi15101276 - 21 Oct 2024
Cited by 1 | Viewed by 1504
Abstract
Aspherical surfaces, with their varying curvature, minimize aberrations and enhance clarity, making them essential in optics, aerospace, medical devices, and telecommunications. However, manufacturing these surfaces is challenging because of systematic errors in CNC equipment, tool wear, measurement inaccuracies, and environmental disturbances. These issues [...] Read more.
Aspherical surfaces, with their varying curvature, minimize aberrations and enhance clarity, making them essential in optics, aerospace, medical devices, and telecommunications. However, manufacturing these surfaces is challenging because of systematic errors in CNC equipment, tool wear, measurement inaccuracies, and environmental disturbances. These issues necessitate precise error compensation to achieve the desired surface shape. Traditional methods for spherical optics are inadequate for aspherical components, making accurate surface shape error detection and compensation crucial. This study integrates advanced metrology with optimized material removal functions in the grinding and polishing processes. By combining numerical control technology, computer technology, and data analysis, we developed CAM software (version 1) tailored for aspherical surfaces. This software uses a compensation correction algorithm to process error data and generate NC programs for machining. Our approach automates and digitizes the grinding and polishing process, improving efficiency and surface accuracy. This advancement enables high-precision mass production of rotationally symmetrical aspherical optical components, addressing existing manufacturing challenges and enhancing optical system performance. Full article
(This article belongs to the Special Issue Recent Advances in Micro/Nano-Fabrication)
Show Figures

Figure 1

25 pages, 21311 KiB  
Article
Experimental Study on Seismic Performance Evaluation of a Multi-Story Steel Building Model with Rolling-Type Seismic Base Isolation
by Hakan Öztürk, Erkan Çelebi and Cemalettin Kaya
Buildings 2024, 14(10), 3268; https://doi.org/10.3390/buildings14103268 - 15 Oct 2024
Cited by 1 | Viewed by 1622
Abstract
Critical structures such as hospitals, high-precision manufacturing facilities, telecommunications centers, and fire stations, especially, need to maintain their functionality even during severe earthquakes. In this sense, seismic isolation technology serves as a vital design method for preserving their functionality. Seismic isolators, also known [...] Read more.
Critical structures such as hospitals, high-precision manufacturing facilities, telecommunications centers, and fire stations, especially, need to maintain their functionality even during severe earthquakes. In this sense, seismic isolation technology serves as a vital design method for preserving their functionality. Seismic isolators, also known as earthquake isolation systems, are used to reduce the effects of earthquakes on buildings by isolating them from the ground they are located on. By ensuring that less acceleration and force demand is transmitted to the superstructure, both the building and the equipment and the devices in the building are prevented from being damaged by earthquakes. This experimental study aims to conduct vibration tests on a small-scale multi-story steel-building model equipped with a specially designed rolling-type seismic base isolation system. The relationship between the test model and the prototype was achieved by frequency simulation. The tests will be performed on a shake table under six different earthquake accelerations to examine the model’s dynamic behavior. The primary goal is to evaluate the isolation performance of the rolling-type seismic base isolator under seismic loads, with a focus on recording the vibrations at the top of the test building. It has been observed that the isolator placed at the base of the building significantly reduced the peak acceleration and displacement values of the floor motion. Under the most severe earthquake record applied to the shake table, the acceleration at the top of the building with the isolator was found to be reduced by approximately 50%, compared to the non-isolated case. Full article
(This article belongs to the Section Building Structures)
Show Figures

Figure 1

23 pages, 916 KiB  
Article
Fake Base Station Detection and Link Routing Defense
by Sourav Purification, Jinoh Kim, Jonghyun Kim and Sang-Yoon Chang
Electronics 2024, 13(17), 3474; https://doi.org/10.3390/electronics13173474 - 1 Sep 2024
Cited by 1 | Viewed by 4262
Abstract
Fake base stations comprise a critical security issue in mobile networking. A fake base station exploits vulnerabilities in the broadcast message announcing a base station’s presence, which is called SIB1 in 4G LTE and 5G NR, to get user equipment to connect to [...] Read more.
Fake base stations comprise a critical security issue in mobile networking. A fake base station exploits vulnerabilities in the broadcast message announcing a base station’s presence, which is called SIB1 in 4G LTE and 5G NR, to get user equipment to connect to the fake base station. Once connected, the fake base station can deprive the user of connectivity and access to the Internet/cloud. We discovered that a fake base station can disable the victim user equipment’s connectivity for an indefinite period of time, which we validated using our threat prototype against current 4G/5G practices. We designed and built a defense scheme which detects and blacklists a fake base station and then, informed by the detection, avoids it through link routing for connectivity availability. For detection and blacklisting, our scheme uses the real-time information of both the time duration and the number of request transmissions, the features of which are directly impacted by the fake base station’s threat and which have not been studied in previous research. Upon detection, our scheme takes an active measure called link routing, which is a novel concept in mobile/4G/5G networking, where the user equipment routes the connectivity request to another base station. To defend against a Sybil-capable fake base station, we use a history–reputation-based link routing scheme for routing and base station selection. We implemented both the base station and the user on software-defined radios using open-source 5G software (srsRAN v23.10 and Open5GS v2.6.6) for validation. We varied the base station implementation to simulate legitimate vs. faulty but legitimate vs. fake and malicious base stations, where a faulty base station notifies the user of the connectivity disruption and releases the session, while a fake base station continues to hold the session. We empirically analyzed the detection and identification thresholds, which vary with the fake base station’s power and the channel condition. By strategically selecting the threshold parameters, our scheme provides zero errors, including zero false positives, to avoid blacklisting a temporarily faulty base station that cannot provide connectivity at the time. Furthermore, our link routing scheme enables the base station to switch in order to restore the connectivity availability and limit the threat impact. We also discuss future directions to facilitate and encourage R&D in securing telecommunications and base station security. Full article
(This article belongs to the Special Issue Multimedia in Radio Communication and Teleinformatics)
Show Figures

Figure 1

20 pages, 20687 KiB  
Article
Fly-around-the-World Near-Space Picosatellite for Cost-Effective School Space Projects
by Pirada Techavijit, Polkit Sukchalerm, Natthapong Wongphuangfuthaworn and Sureepon Kiyapaet
Aerospace 2024, 11(7), 557; https://doi.org/10.3390/aerospace11070557 - 6 Jul 2024
Cited by 2 | Viewed by 1157
Abstract
This research presents the design and development of a near-space picosatellite platform intended to operate at high altitudes between 20–40 km above sea level. These picosatellites function similarly to orbital satellites but float and travel with the wind in the atmosphere instead of [...] Read more.
This research presents the design and development of a near-space picosatellite platform intended to operate at high altitudes between 20–40 km above sea level. These picosatellites function similarly to orbital satellites but float and travel with the wind in the atmosphere instead of orbiting the Earth. The platform utilizes a super-pressure balloon to provide buoyancy, allowing the picosatellite to remain airborne and operational for several days to months, capable of flying around the world multiple times. This study focuses on the cost-effective design of high-altitude platforms, telecommunication systems, and energy consumption for the picosatellite, enabling it to communicate with ground stations from anywhere in the world while consuming low power. The use of common COTS (Commercial Off-The-Shelf) equipment aims to enhance accessibility for educational applications. This research gathered data from our previous studies for over 20 high-altitude platform flights, analyzed the necessary factors for whole system design, and developed a new prototype that has been successfully built and tested. Full article
(This article belongs to the Section Astronautics & Space Science)
Show Figures

Figure 1

19 pages, 3465 KiB  
Article
Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks
by Zeeshan Ashraf, Adnan Sohail and Muddesar Iqbal
Electronics 2024, 13(13), 2649; https://doi.org/10.3390/electronics13132649 - 5 Jul 2024
Cited by 3 | Viewed by 1935
Abstract
With the fast growth of the Industrial Internet of Everything (IIoE), computing and telecommunication industries all over the world are moving rapidly towards the IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV). NFV provides networking services like routing, [...] Read more.
With the fast growth of the Industrial Internet of Everything (IIoE), computing and telecommunication industries all over the world are moving rapidly towards the IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV). NFV provides networking services like routing, security, storage, etc., through software-based virtual machines. As a result, NFV reduces equipment costs. Due to the increase in applications on Industrial Internet of Things (IoT)-based networks, security threats have also increased. The communication links between people and people or from one machine to another machine are insecure. Usually, critical data are exchanged over the IoE, so authentication and confidentiality are significant concerns. Asymmetric key cryptosystems increase computation and communication overheads. This paper proposes a lightweight and certificateless end-to-end secure communication scheme to provide security services against replay attacks, man-in-the-middle (MITM) attacks, and impersonation attacks with low computation and communication overheads. The system is implemented on Linux-based Lubuntu 20.04 virtual machines using Java programming connected to NFV-based large-scale hybrid IPv4-IPv6 virtual networks. Finally, we compare the performance of our proposed security scheme with existing schemes based on the computation and communication costs. In addition, we measure and analyze the performance of our proposed secure communication scheme over NFV-based virtualized networks with regard to several parameters like end-to-end delay and packet loss. The results of our comparison with existing security schemes show that our proposed security scheme reduces the computation cost by 38.87% and the communication cost by 26.08%. Full article
(This article belongs to the Special Issue Cyber-Physical Systems in Industrial IoT)
Show Figures

Figure 1

25 pages, 9966 KiB  
Article
Development of a Multi-Radio Device for Dry Container Monitoring and Tracking
by Mariano Falcitelli, Misal, Sandro Noto and Paolo Pagano
IoT 2024, 5(2), 187-211; https://doi.org/10.3390/iot5020010 - 2 Apr 2024
Cited by 2 | Viewed by 2424
Abstract
Maritime shipping companies have identified continuous tracking of intermodal containers as a key tool for increasing shipment reliability and generating important economies of scale. Equipping all dry containers with an Internet-connected tracking device is a need in the global shipping market that is [...] Read more.
Maritime shipping companies have identified continuous tracking of intermodal containers as a key tool for increasing shipment reliability and generating important economies of scale. Equipping all dry containers with an Internet-connected tracking device is a need in the global shipping market that is still waiting to be met. This paper presents the methods and tools to build and test a prototype of a Container Tracking Device (CTD) that integrates NB-IoT, BLE Mesh telecommunication and low-power consumption technologies for the massive deployment of the IoT. The work was carried out as part of a project to build the so-called “5G Global Tracking System”, enabling several different logistic applications relying on massive IoT, M2M standard platforms, as well as satellite networks to collect data from dry containers when the vessel is in open sea. Starting from a preliminary phase, in which state-of-the-art technologies, research approaches, industrial initiatives and developing standards were investigated, a prototype version of the CTD has been designed, verified and developed as the first fundamental step for subsequent industrial engineering. The results of specific tests are shown: after verifying that the firmware is capable of handling the various functions of the device, a special focus is devoted to the power consumption measurements of the CTD to size the battery pack. Full article
Show Figures

Figure 1

19 pages, 3160 KiB  
Article
Greening Service Capacity in Telecom Supply Chain under Environmental Regulation
by Ying Shi, Tianjian Yang, Yu Zhang and Rong Ma
Sustainability 2024, 16(7), 2924; https://doi.org/10.3390/su16072924 - 31 Mar 2024
Viewed by 1536
Abstract
Comprehensive understandings about how to realize service capability greenness in the telecom sector are still rare. In this paper, a non-serial telecom supply chain consisting of an infrastructure supplier, a content provider and a telecom operator is formulated under environmental regulation. The telecom [...] Read more.
Comprehensive understandings about how to realize service capability greenness in the telecom sector are still rare. In this paper, a non-serial telecom supply chain consisting of an infrastructure supplier, a content provider and a telecom operator is formulated under environmental regulation. The telecom operator aims to find the optimal green procurement ratio between traditional and green equipment. Some common real-life situations are assumed, and the service capacity greenness problems are solved by game theory regarding coordination and interaction among supply chain partners. The results show that the prevailing concern of managers’ “energy saving is not money saving” is the direct reason for a mixed purchase strategy. Further, when diseconomy of purchasing energy-saving equipment reaches a certain threshold, tightening environmental regulation may cause telecom companies to reduce the proportion of energy-saving equipment purchased. Finally, the telecom sector is characterized by its booming service capacity per equipment, which benefits green purchase ratio greatly. When the other six influencing factors are relatively stable, the driving force of telecommunication technology update will push the telecom sector to a greener future. Full article
(This article belongs to the Special Issue Industry 4.0, Digitization and Opportunities for Sustainability)
Show Figures

Figure 1

Back to TopTop