Template JETIA
Template JETIA
1
First Author Affiliation,
Organization Address, City, Postcode, COUNTRY
2
Second Author Affiliation,
Organization Address, City, Postcode, COUNTRY
Abstract: Malaysia has seen a large yearly increase in online buying. Due to the COVID-19 Received 00 Month 2000;
Accepted 01 Month 2000;
pandemic and Malaysia's government-enacted mobility control order (MCO), the quantity of
Available online 02 Month
online purchases has skyrocketed. The volume of packages that Malaysian delivery services 2000
must deliver is influenced by the current situation. Both the household and the delivery service
were in a lot of problems as a result of the unattended parcel delivery, parcel loss, and failed
delivery efforts. In order to address these problems, this paper propose a work called Parcel Keywords: Keyword 1,
Delivery Alert app. It consists of parcel safe box which accepts deliveries without requiring the keyword 2, number of
recipient to be present and notifies the household that a delivery has been made by sending a keywords is usually 3-7, but
more is allowed if deemed
delivery notification through an application. The design and development of the parcel safe box
necessary
are discussed in this paper with an eye toward the eventual development of this system where it
consists of three sensors: weight and load sensor, image sensor and light sensor. Parcel
Delivery Alert system is made up of a mobile application and a smart safe box. The tracking
number written on the shipping label of the package can be scanned to get access to the safe
*Corresponding Author:
Name,
Author Affiliation,
Organization Address, City, Postcode, COUNTRY
Email :
the mailbox is secured with a lock or a key, thieves can connectivity, this technology is implemented in a wide
still open it [1]. People all throughout the country, range of networked goods, systems, and sensors that
including Malaysia, deal with issues like missed provide new capabilities that were not before feasible
deliveries, misplaced shipments and lengthy delivery [2]. Numerous conferences, publications, and news
procedures. articles explore and debate the potential effects of the
"IoT revolution," ranging from concerns about security,
Therefore, having a secure parcel box will protect privacy, and technological compatibility to new market
all the valuable belongings. Parcel delivery alert prospects and business models.
systems are becoming increasingly important as more
and more people shop online and have packages The IoT's devices should be interoperable, self-
delivered to their homes. These systems allow configuring, have distinct identities, and be able to
customers to track their deliveries in real-time and communicate and exchange data with other devices and
receive notifications when their packages have been systems. They should also be able to dynamically adapt
delivered. Thus, it would be ideal to develop a parcel to changing situations and perform actions based on
delivery alert system as this will help customers to their operational conditions. As a result, smart devices
better plan their schedules to receive their packages need to be network connected and context aware [3].
from the safe box. This application is developed to Thus, three sensors which are weight and load sensor,
lessen issues faced by customers and couriers. The image sensor and light sensor to employ in the parcel
initiative is also intended to offer an intelligent parcel safe box are used in this work. Overall, this system will
system that is dependable, safe, convenient and energy provide convenience, peace of mind and added security
efficient. Additionally, this system also provides an for customers.
added level of security as customers can keep an eye on
their deliveries and take action if their packages are
delayed or lost.
technique may be put into practice. The availability of Poslaju, the national courier company of Malaysia, is a
synthesis tools that assist in converting HDL logic to system that has been built that is likely identical to this
Field Programmable Gate Array (FPGA) primitives has work. It aims to provide customers with a convenient
made HDL the preferred method for digital design entry and efficient way to send and receive packages. With
[4]. Ezibox, the customers can drop off their packages at
designated Ezibox locations and track the delivery
Single cycle MIPS is a Reduced Instruction Set status of their packages online. Overall, Ezibox by
Computer (RISC) processor with a restricted instruction Poslaju is a convenient and efficient parcel delivery
set that may complete an instruction in a single cycle. service that aims to make the process of sending and
The slowest instruction sets a cycle time limit. A single receiving packages as easy as possible for customers.
clock cycle is used for single cycle implementation [5].
The RISC processor features memory words of 32 bits,
32-bit general-purpose registers, and fixed-length 32-bit 2.3 Component of the sensors
instructions based on three separate formats, J, R, and I.
The values are consumed as soon as they become 2.3.1 Weight Sensor
available, and the instruction is then carried out because A weight sensor is also known as a weight
it is a parallel execution procedure. transducer. It converts a mechanical force, such as load,
weight, tension, compression, or pressure, applied as an
To fit an instruction in a single cycle, the input, into another physical variable. In this work,
propagation delay must be sufficiently long. While weight sensor be use for detecting the weight of the
jump instructions that store and then write back the parcel by it being pressed once the parcel has been
information into register files LW, SW, and Load have place into the box. When the weight being determined
a significantly longer propagation delay. Arithmetic by the sensor, it will notify the owner that the parcel
instructions like addition and subtraction of operators, have just arrived at the designated box.
i.e., ADD, SUB, run quickly and lose time in each
cycle.
2.3.2 Image Sensor
Using this sensor, the image of the parcel or item
that occurs into to the box is captured, and a notification
is sent to the application to notify the user that their
item is already in the designated box. Sensors are
classified according to their structure (CCD or CMOS),
chroma type (color or monochromatic), and shutter type
(global or rolling shutter). They are also classified based
on their resolution, frame rate, pixel size, and sensor
format.
3
Published by MBOT Publishing
https://jetia.mbot.org.my/index.php/jetia/index
Anne, A. et al., Journal of Emerging Technologies and Industrial Applications, Vol. 1 No. 1 (2022) p. 1-10
As shown on Figure 6, OSI Model is an open layer, internet involve network layer and network
access system interconnection reference model, is a interface involve datalink and physical layer.
very good agreement defined protocol specifications.
OSI model has seven layers; each layer can have When the end user used the system, it involves the
several sub-layers. According to the comparison of OSI application layer which in this case it creates http packet
and TCP/IP, and research based on the OSI model that will be sent later. The HTTP packet will initiate the
implementation models and protocols of the Internet, TCP (Transmission Control Protocol) process in the
and the OSI model of data transmission between the Transport Layer protocol. This is an adjacent layer
layers [6]. In this work, a parcel delivery alert system interaction on the same device, in which the higher
can use a network such as Wi-Fi to communicate with layer (HTTP) requests the next lower-layer protocol
the delivery company's servers, receive updates and (TCP) to perform the service, and the lower layer
they will notify the customer on the status of a package. performs the service for the layer above it. This
For example, in this work, a package that have been interaction continues until the data reaches the final
placed in the locker being sense by all the sensor layer.
involved, then it will be updated in the system. Once it
is being updated, it will send the notification of the TCP's primary function is to communicate with the
package’s details to the owner of the package or the TCP process running on the server in order to establish
customer. a session. TCP creates a pipe between the end user and
the server so that the end user can receive the data sent
In all of this process, it will use the Wi-Fi which in via the pipe. TCP then adds its own information to the
this case it involves the Physical Layer (Layer 1) and top of the HTTP packet. These details are required to
Datalink Layer (Layer 2) of OSI Model. The 802.11 keep the session/pipe running. When the packet is still
protocol operates in two distinct OSI layers: Layer 1 in the pending state, TCP transfers it to an IP process
and Layer 2. The fact that Layer 1 is labelled "Physical" (Internet Protocol), which is an Internet Layer protocol.
does not imply that it must be physical cabling; radio The primary function of IP is to address and route
transmissions are often used here. Layer 1 describes the packets from the end user to the appropriate IP address.
frequency and modulation forms applied in this case, as It has two addresses (senders and receivers), and they
well as the pre-amble to lets the transmissions to route and deliver the packet to different destinations. IP
optimise. Layer 2 is where MAC addresses and BSSIDs is now at the top of the TCP packet. It is required for
are used. Layers 3 and above do not directly apply here, internet routing. The packet is now passed to the
but they are completely reliant on Layers 1 and 2 network access/network interface layer by IP. The
functioning smoothly. network access layer specifies the protocols and
hardware needed to transport data across a physical
network. Ethernet is used by the majority of end user.
5
Published by MBOT Publishing
https://jetia.mbot.org.my/index.php/jetia/index
Anne, A. et al., Journal of Emerging Technologies and Industrial Applications, Vol. 1 No. 1 (2022) p. 1-10
3. Methodology (Section 3)
3.1 Flowchart
6
Published by MBOT Publishing
https://jetia.mbot.org.my/index.php/jetia/index
Journal of Emerging Technologies and Industrial Applications, Vol. 1 No. 1 (2022) p. 1-10
7
Published by MBOT Publishing
https://jetia.mbot.org.my/index.php/jetia/index
Anne, A. et al., Journal of Emerging Technologies and Industrial Applications, Vol. 1 No. 1 (2022) p. 1-10
8
Published by MBOT Publishing
https://jetia.mbot.org.my/index.php/jetia/index
Journal of Emerging Technologies and Industrial Applications, Vol. 1 No. 1 (2022) p. 1-10
9
Published by MBOT Publishing
https://jetia.mbot.org.my/index.php/jetia/index