The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

Empowering Technology Towards IR4.0

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by ct.zalinamokhtar, 2020-11-01 20:28:47

JUADAH MINDA JKE 2020

Empowering Technology Towards IR4.0

Keywords: IR4.0,Technology,JuadahMinda,JKE,POLIPD

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Low Cost Smart Home System

Roselinda bt Samion1 Mohd Hafiz bin Hassan2 Karthega a/p Shanmugam³

1Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]
2Jabatan Kejuruteraan Mekanikal, Politeknik Port Dickson; [email protected]
3Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]

ABSTRACT

This paper presents a Smart Home System which can control the basic home appliances
such as light, fan and curtain smartly, automatically and remotely. For the automation
concept especially for fan and light, it is designed in order to save energy by efficient
power management employs certain controlling mechanism like LDR (light dependent
resistor) to detect change of the light intensity in the room, NTC (negative temperature co-
efficient) thermistor to detect change of room temperature and PIR sensor to detect motion
for determining absence of occupants in the room. Automatic curtains are an additional
element to strengthen the elements of comfort which is using a 12V DC motor and LDR as
it main component. This smart home system comes with manual switching for certain
circumstances (user want to swtch on the light during the day). All the mechanism manages
by AT89C52 microcontroller. By providing a simple system, it is a low cost solution where
it can be accessible to low income users.

Keywords: Smart home, automation system

1.0 INTRODUCTION

Low Cost Smart Home System is about to use sensing and control systems to boost
the comfort of its residents and meet the automation requirements of private homes. In
many applications home automation is sometimes referred to as a type of energy-saving.
Cheongseok et al. (2003) studied on the ‘Home Server for Home Digital Service
Environment’ where in home digital service environment, a home server can be considered
as a core device for connecting and managing all the information appliances within a home.
Many automated activities that include detecting a person's presence, switching on lights or
fans and turning off electrical devices when the individual leaves. Automation process
theory is simple: there are sensors that detect changes in the environment, send information
to the control unit, and then the control unit triggers devices accordingly. Usually
microprocessors or a computer are implemented for the advance automation. This low cost
Smart Home device can smartly, automatically, and remotely monitor basic home
appliances such as fan and light.

It is designed for the automation concept, especially for fans and light, to save
energy through efficient power management, using certain control mechanisms such as
LDR (light dependent resistor) to detect changes in light intensity in the room, NTC
(negative temperature coefficient) thermistor to detect changes in room temperature and

Page

94

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

PIR sensor for sensing motion to assess the absence of in-room occupants. Automatic
curtains is an additional element to strengthen the elements of comfort which is using a
12V DC motor and LDR as it main component. This smart home system comes with
manual switching for certain circumstances (user want to swtch on the light during the
day). All the mechanism manages by AT89C52 microcontroller. By providing a simple
system, it is a low cost solution where it can be accessible to low income users.

2.0 METHODOLOGY

Block diagram as in Figure 1 below, shows the inputs, control unit and outputs of
the whole system. For the automation concept, it consists of light sensor, temperature
sensor and motion sensor. For a certain circumstance such as user wants to switch on the
light during day time or wants to switch off the fan even it’s hot, they can use the remote
control for the manual switching.

SYSTEM INPUT CONTROL UNIT OUTPUT CURTAIN
LIGHT SENSOR
TEMP. SENSOR MICROCONTROLLER LIGHT
MOTION SENSOR AT89C52 FAN
DC MOTOR
USER INPUT
REMOTE CONTROL

Figure 1. Block diagram of the system

3.0 FLOWCHART

Flowchart is a type of diagram that depicts an algorithm or procedure, displays the
steps as boxes of different types and their order by connecting them to arrows. Figure
below shows the Low Cost Smart Home System step by step. Flow diagram for the basic
software programming design process is shown in Figures 2, Figure 3 and Figure 4.

Page

95

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Figure 2. Light control flowchart

Figure 3. Fan control flowchart

Page

96

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Figure 4. Curtain control flowchart
Figure 5 shows all the circuit involves in the Low Cost Smart Home System. It
consists of electronic circuits includes transmitter circuit, receiver circuit, microcontroller
system circuit, sensors circuit and output controlled circuit. While the full structure of the
Low Cost Smart Home System is shown in figure 6.

Figure 5. Circuits of Low Cost Smart Home System

Figure 6. Prototype design of Low Cost Smart Home System

Page

97

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

An analysis was performed using a prototype to perform energy-saving testing. For

convenience an assumption is made that this prototype reflects the space of a single

lecturer. This model is tested on the basis of a lecturer's timetable. Basically, during their

lecture, lab or tutorial hours the room will be left with the light switched ON. Table 1
shows the lecturer’s timetable for a week.

Day/Time Table 1. Lecturer’s Room Occupancy Hours
8-9 9-10 10-11 11-12 12-1 1–2 2-3 3-4 4-5
Monday
Tuesday OCCUPIED LUNCH OCCUPIED
Wednesday LUNCH OCCUPIED
Thursday UNOCCUPIED LUNCH UNOCCUPIED
Friday LUNCH OCCUPIED
OCCUPIED UNOCCUPIED LUNCH OCCUPIED

OCCUPIED UNOCCUPIED

UNOCCUPIED OCCUPIED

Assumption is made that there are four fluorescent lights in the lecturer’s room. For
every fluorescent light the power consumption is 40 watts (W). There is an overview of the
use of electric energy without using the smart grid, as seen below. This system could save
about 34.6 per cent of the user utility bill based on the analysis. This is for one room, if this
energy-saving system has more room installed; more savings can be achieved and the
utility costs can be reduced.

Table 2. Cost of electricity without system installation
Cost of electricity without system installation:

First 200 KW x RM 0.218 = RM43.60
Next 100 KW x RM 0.334 = RM33.40
Next 100 KW x RM 0.40 = RM40.00
Next 32 KW x RM 0.42 = RM13.44

Total for 5 working days = RM130.44
Total for one month = RM130.44 x 4 weeks

= RM521.76

Table 3. Cost of electricity with system installation
Cost of electricity with system installation:

First 200 KW x RM 0.218 = RM43.60
Next 100 KW x RM 0.334 = RM33.40
Next 20.8 KW x RM 0.40 = RM8.32

Total for 5 working days = RM85.32
Total for one month = RM85.32x 4 weeks

= RM341.28

Page

98

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

3.0 CONCLUSION
This project has, as a result, accomplished all of the goals as proposed. The low-cost

Smart Home System provided the energy-saving system as energy sources are now limited
and a global energy crisis is facing the world. Depending on the study carried out, this
program will save about 34.6 per cent of the consumer energy bill. This is a low cost option
by offering a simple system, where it can be available to low-income users. his project
brings out some useful concepts that can provide users with greater convenience and
comfort. Some of the knowledge in this project will be used for future development work
and ideally that will motivate our young generation engineers to create something new that
meets the needs of the customer and the public interest.
REFERENCES
A. Z. Alkar, J. Roach, D. Baysal, "IP-based home automation system," IEEE Consumer

Electronics Transactions, vol. 56, section 4, pp. 2201-2207, 2010.
Changseok Bae, Jinho Yoo, Kyuchang Kang, Yoonsik Choe, and Jeunwoo Lee, "Home

server for digital home service environments," International Consumer Electronics
Conference, IEEE, 2003, vol 49, pp. 1129-1135, Nov. 2003.
K.M. Kadir, M.S Forhad, M.M. Fadlullah, N. Quader, M.M.R. Al-Arif and M.A. Dhali,
Energy Saving by Automatic Control of Power in Simple Home Appliances, IEEE
Third International Conference on Communication Software and Networks
(ICCSN) 2011, pp 311 – 3
M.S. Hayat Khiyal, K. Aihab and S. Erum, SMS Based Wireles Home Appliance Control
System (HACS) For Automating Appliances and Security, Issues in Informing
Science and Information Technology, vol 6, 2009.
Y. Bai, W., and Y. T. Ku, Automated Room Light Intensity Detection and Control Using a
Microprocessor and Light Sensors, IEEE International Consumer Electronics
Symposium 2008, vol 54, No 3, pp 1173-1176, August 2008.

Page

99

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Smart Power Meter Socket

Amrah Binti Mat Safri1, Nur Amira Natasha Binti Zairol2, Norlaila Binti Ismail 3

1Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]
2Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]
3Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]

ABSTRACT

Smart power meter socket is used to support smart home for helping the homeowners to
control the home appliances and make better decisions about energy consumption. The
smart power meter socket was recently introduced as monitors and manages the power
consumption of an individual appliance. The objective is to design a system which can
controlled on or off the power meter socket from Blynk application using relay circuit.
Furthermore, to build the Arduino software that can show power consumption with power
supply 5V. Lastly, to design a circuit that can set the timer from Blynk application and
mobility using Arduino software. In hardware, this product use module WIFI ESP8266,
arduino nano, LCD circuit, relay circuit and sensor current. The smart power meter socket
can save the environment and can save the energy.

Keywords: Smart Power Meter Socket, Blynk Application

1.0 INTRODUCTION

Many of the electrical devices used in homes did not optimize energy consumption,
or to automatically or semi-automatically manage the use of electricity in the home. User
can determine the complete power consumption for a home however they cannot
individually identify and observe the energy consumption of the different devices. Thus, the
electronic devices are becoming an important source of power consumption that must
consider with their different power mode. It will support smart home for helping the
homeowners to control the home appliances and make better decisions about energy
consumption. The smart power meter socket was recently introduced as monitors and
manages the power consumption of an individual appliance.

Current generations are more to technology usage in their daily life routine. Elder
generation are also learned to adapt this situation and moving towards to the technology.
The Internet of Things (IoT) is a network of smart sensors that can control and monitor
things from anywhere over the internet (Peerasak Serikul, 2018). This product to upgrade
the traditional wall socket into the plugs connected with the internet. Hence, it will give a
lot of benefit to our user also benefit to environment.

Page

100

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

1.1 Problem Statement

The most common cause of fire in residential fires in Selangor are electrical failure
(39%) (Yi Ring Tan, 2016). Electrical failure included short circuit, resistance heating and
overcurrent of electrical distribution and electrical appliances. Thus, this device can prevent
the common cause of overcurrent user used because it can show the value of current while
using socket.

Research has shown in typical urban households in Malaysia, the highest electricity
consumption goes to the air conditioner, fridge and water heater (The Star, 2019). Hence, it
will increase the electricity bill. This device can show the estimation of price in electricity
bill that user will pay in daily.

According to a report by the World Energy Markets Observatory (WEMO),
Malaysia ranks among the highest per capita consumption of electricity in the region, with
energy usage projected to increase by 4.8% right up to 2030 (The Star, 2019). Demand for
energy consumption will increase every year, in line with the increase in population.
Therefore, new advanced meter must be developing to control and monitor energy daily
usage.

1.2 Objectives

i. User manage their power consumption by control the power meter socket from
smartphone using Blynk application.

ii. Give benefit for user to monitor their electrical usage while using the home
appliances.

1.3 Scope

i. The external smart power meter socket uses a switched socket outlet that can
accommodate currents with a voltage of 13A 250V and has 3 pins.

ii. The wire connecting between the home outlet socket and the smart power meter
socket as a power meter socket that can accommodate the current and the 13A 250V
voltage also has 3 pins and 13A fuses.

iii. The smart power meter socket can be use for household utilities such as lamps, fans,
water heater and iron.

iv. The smart power meter socket is suitable for home and building such as offices,
schools, and colleges because smart power meter socket can accommodate high
voltage 250V.

v. Smart power meter socket can be control wherever users are as long as the area or
smartphone is connected with internet.

vi. The smart power meter socket is control using Blynk application. This application is
used to turn on/off the house appliances.

Page

101

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

2.0 METHODOLOGY
2.1 Introduction

This product consists hardware and sofware part. For hardware part it consists LCD
circuit to show the value of power that user use. Thus, AC adapter circuit is the most
important circuit in smart power meter socket which is to decrease the voltage from 240V
to 12V as it suitable for arduino nano. For software part, this project using proteus version 7
and arduino software version 1.8.9. Therefore, proteus is use to troubleshoot the circuit.
2.2 Block Diagram

Figure 1. Block Diagram of Smart Power Meter Socket
2.3 Project Description

The purpose of this project is to tell the user the amount of electrical consumption
that has been used in a certain time. It also tells the user to estimate amount of cost that
should be pay by looking at the LCD. It will cut off the load if the temperature went up
excessively from the temperature that has been set. This project can be control with two
ways, manually and by Blynk application in the smartphone. For The Smart Power Meter
Socket, Arduino Nano has been installed to module wifi, relay circuit and current sensor
circuit. It will instruct the circuits to operate when the load come.
2.4 Description of Flowchart

The load will plug on Smart Power Meter Socket and the switch will turn on
manually. After that, the Smart Power Meter Socket can control on/off by using the Blynk
application and the current sensors will sense the current that have been use. Furthermore,
the result will display on the LCD when the Smart Power Meter Socket is off.

Page

102

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

2.5 Circuit Operation
LCD is use for display the result of data when the Smart Power Meter Socket in on

with the load such as lamp, fan, dan heater. In LCD it will the information such as ampere,
watt, KHW now, total KHW, price, RAW MAX, REF MAX, time and date. Thus, when
the Smart Power Meter Socket is turn on the LCD will display the result but the data will
changes follow the how long user use the Smart power meter socket. Lastly, the last result
will display when the Smart power meter socket is turn off.
2.6 Hardware Design

Figure 2. PCB Arduino Nano Base

Figure 3. PCB relay

Page

103

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Figure 4. Hardware layout

Figure 5. Experiment with the load
3.0 RESULT AND DISCUSSION
3.1 Introduction

The power meter socket will show the data of time, date, current, power, power
consumption in KWH and the total price in RM. An experiment is conducted using three
home appliances. There is fan, water heater and iron.

Page

104

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

3.2 Result and Analysis

Figure 6. The data of current and power

Figure 7. The data of total price

Figure 8. The data of KWH

Page

105

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Table 1. Table of Result

Based on the result, power consumption of house appliances depends to the value of
the current that being used. If the current is high, the amount of KWH is getting higher.
Therefore, the electricity bill will get higher.
3.3 Discussion

The device is implemented using module wifi which was programmed to control the
system. The system was successfully built and tested as specified by the objective.
Throughout development, this has gained a lot of skills such as developing interfaces,
programmes and hardware.

This smart power meter socket can be adding with the value of KWH and total
energy consumption per days. Moreover, it can be build smaller to make it easier to bring
anywhere. Furthermore, the design can be improving by cut off the smart power meter
socket automatically if the load temperature is high. Lastly, it can be design automatic cut
off if the user reach more than certain power usage that have been set.

This future recommendation stated is for develop more modern with smart power
meter socket and easier for user to monitor their electricity usage in hectic life.
4.0 CONCLUSION

As a conclusion, this device is very helpful and give benefit for the user. It can
monitor daily power consumption with difference home appliances. Futhermore, it can
monitor and control far from the device by using mobile smartphone with Blynk

Page

106

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

application. User also can estimate their electricity bill as per daily. Thus, it can save the
environment and energy consumption.
REFERENCES
Allison Lai (2019). Activist: It’s Not Cool to Waste Electricity. The Star. Retrieved from

thestar.com.my/news/nation/2019/06/02/activist-its-not-cool-to-waste-electricity
Ayush Kumar (2016). Home Automation Via Bluetooth Using the Arduino Uno

Microcontroller. California State University: Degree Master Report.
Peerasak Serikul, Nuttapun Nakpong, Nitigan Nakjuatong (2018). Smart Farm Monitoring

Via the Blynk IoT Platform: Case Study: Humidity Monitoring and Data Recording.
2018. 16th International Conference on ICT and Knowledge Engineering (ICT &
KE). 1
Tenaga Nasional Berhad (2019). Smart Step to Manage Power Usage. The Star. Retrieved
from thestar.com.my/news/nation/2019/12/13/smart-step-to-manage-power-usage
Yi Rong Tan, Farid Wajdi Akashah, Norhayati Mahyuddin (2016). The Analysis of Fire
Losses and Characteristics of Residential Fires Based On Investigation Data in
Selangor, 2012-2014. 3

Page

107

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Pigeon Hole Alert System

Maizun Binti Jamil

Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]

ABSTRACT

A pigeon-hole is a message box at academic department or office. It is commonly used
for communication in organisations, workplaces and educational institution. At
polytechnic, a pigeon hole always used to place important documents and student
assignments. A small size and open shape of a pigeon hole often leads to a lot of document
loss. Pigeon hole owners sometimes forgot to take documents in because they are too busy
with daily work. To fulfill this requirement, this project named Pigeon Hole Alert System is
introduced in order to make the pigeon hole more efficient. Now the owner of the pigeon
hole no need to worry about losing the contents because notifications will be sent to pigeon
hole owner to ensure they are aware of their pigeon hole status. System Pigeon Hole Alert
System will be able to save the lost and forgotten issue. A Short Message System or SMS
will be sent using VB,net application and SQL as a database. The user will press one of the
main buttons provided namely assignment, letters and memos. It will send a message
through radio frequency and direct to the lecturer personal computer. A pop-up message
will be appearing through the monitor such as a student assignment, letters and memos.
This system uses the PIC 16F877A as a microcontroller for transmitter circuit and RS232 to
TTL Converter for the receiver circuit.

Keyword: Pigeon Hole, VB.net, PIC Microcontroller

1.0 BACKGROUND

Pigeon hole is a small box made of wood or iron for placing letters or documents.
Within the organization, each staff member should have one pigeon hole to easily place
personal documents or letters and important documents. It is a manual method used to pass
information from sender to receiver. However, the recipient forgets to retrieve the
documents in the pigeon hole because of their position away from the desk even though
they are located in the same workspace. Sometimes they forget to take it because of busy
with work business. The weakness of Pigeon Hole was staff had to check it daily. However,
due to routine commitments or unforeseen circumstances, pigeon hole may not be inspected
daily. For a lecturer, this pigeon hole is also needed because students can put their
assignment into it.

However, there are other issues that sometimes arise in the theft of assignments due
to lack of control and monitoring. So that, an innovation on pigeon hole has been developed
to monitor the receipt and delivery of student assignments, letters and document through
this pigeon hole. The owner of the pigeon hole no need to worry about losing the contents

Page

108

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

of the pigeon hole. This innovation Pigeon Hole Alert System can send notifications to the
pigeon hole owner's computer desktop which is different from the pigeon hole innovation
sold in the market. If the owner not pick up the document, notification will pop up
repeatedly on the desktop. If the document has been taken the notification will stop.
Therefore, the prototype project of the Pigeon Hole Alert System was built to solve that
problem. Users can select any of 3 types of buttons which is assignments, letters or memo
and student assignments when placing them in the pigeon hole. A desktop notification will
appear indicating that it has received some documents. At the same time, the led at the top
of pigeon hole will ON, to indicate that the pigeon hole has been filled. Hopefully, the
prototype of Pigeon Hole Alert System give it benefit to all workers.

Communication is a process delivery of information from one side to the other to
another. The process of communication usually involves individuals and their interactions
with contextual elements, messages, channels, sounds and feedback. Communication
occurs when a sender delivers the information and the recipient receives the order. If the
recipient does not receive the message, then this communication is considered failure. This
is because the recipient will not get the message delivered. With the rapid development of
technology, there are various ways to ensure that information is transmitted quickly and
accurately. One of the ways to consider this is through a Short Message System or better
known as a SMS. This is an effective if the recipient outside of the access and will be left
repeatedly to alert the lecturer or pigeon hole owner. This communication could come
about when prepared both sides have to accept and send message and no restriction among
them. If recipient not ready to accept message, so this communication can be considered
fail. This is because, recipient will not get message that was presented. With technology
development that is rapidly, there are various methods to join the recipient faster.

The Pigeon Hole Alert System give a notification to the lecturer via SMS using
VB.net application and SQL as a database. This system is to be used in lecturer room at
Department of Electrical Engineering, Polytechnic Port Dickson to help the lecturer and
student communicate between users and the alert system. Alert System means that when the
user push one of the button displayed, it will send a message through radio frequency and
direct to the lecturer personal computer. As a result, a pop-up message will come out
through the monitor. This system can identify such as a student assignment, letter arrived,
memo with the student, memo from department and important letter and others. Like a
situation at Department of Electrical Engineering this project focus where student want to
notify their lecturer that they had been submit their assignment. This application to ensure
the two-way communication can be achieved. The applications of this project will help to
overcome problems of conventional method of manually checking that is lecturer walk to
the pigeon hole and check any student assignment, letter arrived, memo with the student,
memo from department, important letter and others.

1.1 Problem Statement

Today, the Department of Electrical Engineering Polytechnic Port Dickson has
running 5 programs simultaneously that is DET (Diploma in Electrical Engineering), DEP
(Diploma in Electronic Engineering Communication), DTK (Diploma in Electronic

Page

109

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Engineering Computer), DEG (Diploma in Electrical Engineering Green Energy) and DEQ
(Diploma in Electrical Engineering Energy Efficiency). Lecturers have 16 hours a week for
teaching and follow with the other duties. Sometimes lecturers forget to pick up, do not
have time to do so and are too busy to see if there is a student assignment, letter arrived,
memo with the student, memo from department, important letter and others at pigeon hole.
The conventional method lecturer cannot notify users when a student assignment, letter
arrived, memo with the student, memo from department and important letter and others is
received. It’s also does not have a system that can remotely notify or alert users every time
when they received all this thing. The conventional method that the lecturer must walk and
go to check the pigeon are inconvenient to use. This is not really an effective way. Plus, it
is a waste of energy and time.

1.2 Objective

This project is developed to accomplish certain objectives such as below:

i. To design a compartment alert system via short message service.
ii. To give an alert to a user if there are forgetting to pick up the student assignment,

letter arrived, memo from department and important letter.
iii. To enable a new method of checking pigeon hole contents status by using short

message service.

2.0 LITERATURE REVIEW

The Pigeon Hole Alert System is design to help the lecturer and student to
communicate with each other in two-way communication. This system might be a solution
for the busy lecturer when they have no time or forgot to check their own pigeon hole. In
this project, there are three kinds of option that can be use to notify the lecturer which is
student assignment, memo and letter.

Assignment is for the student submit their assignment or lab report that had been
given by the lecturer. This will help the lecturer to identify the student submit on time and
late from the deadline. Besides that, there will no conflict between the student and the
lecturer about the submission student assignment and lab report. Memo is come from
Department of Electrical Engineering or any department from Polytechnic Port Dickson
management put the memo to inform certain lecturer that they will have important meeting,
outstation to attend courses or something else that they need to attend. Letter is for the
lecturer to notify that they would have a letter at their pigeon hole that comes from
Department of Electrical Engineering or any department from Polytechnic Port Dickson
management or other people that might be important and need to reply as soon as possible.

This system uses at ground floor lecturer room at Department of Electrical
Engineering. To make it easier to use this system, all the lecturer pigeon hole put nearest to
the lecturer work area. This system is using wireless concept where the radio frequency
transfers the signal to the computer. The pop-up also has many types of function to use it
such as he notifier, advertiser, reminder and many more. But in this project, this pop-up is

Page

110

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

using as the notifier. It will notify the lecturer about the submission of the student
assignment, letter arrived, memo with the student, memo from department and important
letter.

2.1 Comparison with the previous project:

Table 1. Comparison with the previous project

Project Pigeon Hole Alert System Automatic Mail Alert System
Title
Authorized: Polytehnic Port Dickson: Steven Institute of Technologys:
Maizun Binti Jamil 1. Jason Varianides
2. Robert Cianchetti
3. Michael Chamberlain

Objective: To help the lecturer notify about To help the user notify when
the student submission of their they have mail to be picked up in
assignment. a P.O Box or similar mail system
like those used in collages and
apartment complexes.

Scope: This system is to be used at the This system is for all individuals,
pigeon hole at lecturer room at business and household user who
ground floor Department of might have a busy schedule.
Electrical Engineering,
Polytechnic Port Dickson.

How it Student will push one of the 3 When the postman inserts the
works: button which is suitable for the mail, the microcontroller will
situation. The data will be send a wireless connection to the
transfer to another hardware that main computer which in the
will be attach to the computer and house to notify about the mail
it will be convert from TTL to through database and it will send
RS232 cable connection. Lastly a text message to notify user.
the pop-up will appear by using Besides that, it will notify the
visual basic 6.0. user through email too.

Hardware: i. 1 x Microcontroller i. 1 x microcontroller
ii. 1 x transmitter circuit ii. Weight sensor
iii. 1 x receiver circuit iii. Wireless Adapter
iv. 1 x RS232 to TTL converter iv. Related electronic component
v. Related electronic component.

Software: i. Visual Basic 6.0 for pop-up i. Database software:
PHP, MySQL, Web Server

Page

111

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

3.0 RESEARCH METHODOLOGY
This chapter consists of research methodology that will be used in developing this

project. This chapter will explain about the planning, analysis and design phase. This
chapter will explain more about the device and equipment that will be used during
developing process.
3.1 Flow Chart

Figure 1. Flow Chart Process for Pigeon Hole Alert System
Refer to the Figure 1 Flow Chart Process for Pigeon Hole Alert System. It is a
hardware system managing the mail inside the box itself. It is designed with sensor
equipped inside to detect all the mail that goes in and from the sensor it will send the
information into the panel display inside the house to notify resident about the mail
availability. With this functionality, the resident will know that got mail inside the box.
Unlike the traditional one, the residents need to check the mailbox regularly. When the mail

Page

112

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

taken out, the sensor will read the mailbox as empty and wipe the information send into the
panel display.
3.2 Block Diagram for Pigeon Hole Alert System

Figure 2. Block Diagram for Pigeon Hole Alert System
Table 2. Explanation block diagram for Pigeon Hole Alert System

Page

113

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Refer to the Figure 2 Block Diagram for Pigeon Hole Alert System. It shows that
the intergrated between hardware and software. Data transfer when user use a push button
until the pop up message appear at desktop as a receiver.
3.3 Prototype Pigeon Hole Alert System

Figure 3. Prototype Pigeon Hole Alert System
Refer to the Figure 3 This project is using RS232 to transfer a data from the pigeon
hole to the lecturer computer. This will ensure that the only data sent via the wireless
channels are valid authentication information. Coming from the systems control center, the
microcontroller will control the data flow in the opposite direction. In this case the data is
being taken from the connections between the wireless receiver and the microcontroller.

Page

114

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

This project still uses RS232, while the microcontroller will communicate with the Lecturer
computer as a receiver. If the microcontroller receives a signal from the wireless receiver,
then the microcontroller will relay this information into whatever data will appear on the
screen monitor. This is completing process to full loop of needed communications. The
output of this project is a pop-up message will be appearing at the lecturer desktop. This
project will help the lecturer to inform that student assignment, letter arrived, memo with
the student and memo from department are in the pigeon hole. It also helps to remind the
lecturer if there is other important matter to attend such as meeting.

The software that are using in this project is WinPIC. WinPIC is a comprehensive
editor, project manager and design desktop for application development of embedded
design using Mikrochip PICmikro and dsPIC microcontrollers. It is called an Integrated
Development Environment or IDEA because it provides a single integrated “environment o
develop code for embedded microcontrollers. WinPIC provides a good platform for other
compiler language tools to be integrated. Pop-up Software 9.0 (WinPIC Software
Download) is works for window applications that would popup at the screen monitor. The
pop-up that use is from the visual basic 6.0 programming. There are many kinds of pop-up
code such as from html, flash and java script.

4.0 DATA ANALYSIS

This project is using wireless frequency to transfer a data from the pigeon hole to
the lecturer computer. The output of this project is a pop-up message will be appearing at
the lecturer desktop. This project will help the lecturer to inform that student assignment,
letter arrived, memo with the student and memo from department are in the pigeon hole. It
also helps to remind the lecturer if there is other important matter to attend such as meeting.

CMOS LSIs use the HT 12D ICs and HT 12E Encoder ICs for Remote Control
System Applications. They system capable encode 12 bit of information which consists of
N address bits and 12-N data bits. Each address/data input is externally trinary
programmable if bonded out. This ICs are paired with each other. The encoder/decoder
with the same number of address and data format should be selected to make the operation
successfull. The encoder receives the serial address and data from its corresponding
decoder, transmitted by a carrier using an RF transmission medium and gives output to the
output pins after processing the data. The short range radio frequency data will be receiving
at the receiver circuit. The HT12D (decode) will process the data and the output which
contain the 5v will be send from the port C7/C6/C5. And then it will be send through the 3
relay circuit based on its output before it goes to the PIC 16F877A circuit. On the relay
circuit, the magnet will be ON when the coil being pulled because of the 5v from the
HT12D (decode) passing circuit.

After passing the relay circuit, the data will be input to the port D0/D1/D2. The PIC
circuit use 12V of power supply. There, the data that have been receive from the port will
be processing by matching the words. After matching the words, the data will be send to the
output port which is C6 and C7. The data will be go to the RS323 circuit and the input port
is in pin 9 and pin 10. The circuit will convert the data to TTL signal. When the convert

Page

115

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

process is done, the signal will be transfer through a cable that will be attached to the
computer. The Pin 5 for (GND), 2 and 3 also used from connector DB9. Now the data at
the computer and it will be process by the software which is Visual Basic 6. The visual
basic has its own source code to detect the data that will be show to the monitor.

4.1 Transmitter Circuit and Receiver Circuit

The circuit using PIC 16F877A (as a microcontroller) and RS232 to TTL Converter

Table 3. Transmitter Circuit and Receiver Circuit using in Pigeon Hole Alert System

Transmitter Circuit Receiver Circuit

PIC 16F877A (as a microcontroller) RS232 to TTL Converter

This PIC that are using have 40 pin which The data from the relay circuit will be send
contain the 4 main component: 1. Power to the RS232 to TTL Converter. When the
supply, 2.Reset, 3.Oscillator and 4. Port. data receive on pin 9 and 10, the converter
will do the job by convert the data into TTL
SIGNAL. The output signal will be send it
through the cable to the DB9 connector. Pin
number 2 and 3 to send the data to the
computer that we attach and pin number 5 as
a GND.

This circuit use 12v of power supply. The This circuit using 2.4v – 12v of power
input that we use in this circuit is the push supply. When the signal receives from the

Page

116

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

button. The following button is like: transmitter, it will be process by the IC
Assignment=port 11, Memo=port 10, HT12D (decode). The signal will be
Letter=port 12. each port has a signal to decoding by the IC. After processing the
send a data to the receiver. The frequency is data, it will be transfer to output which in
315 MHz and supported with antena to port 10, 11 and 12.
strengthen the signal.

4.2 Software

The software that are using in this project is Visual Basic 6, WinPIC 800, PIC C
Compiler and Protel 99 SE.

Table 4. Software that are using in Pigeon Hole Alert System

WinPIC 800 WinPIC Setting Mode Interface

PIC C Compiler is a software that we use User has to configure the COM port by
to compile a source code that have been clicking setting-hardware and windows as
written and to detect any error before above will be appearing. Choose JDM
burn it into the IC. This software is programmer and choose the right comport
helpful show the error in each line. that being use.

Visual Basic 6.0 PIC C Compiler

Visual Basic is a software that use in this The PIC C compiler will handle any of the
project for interface and insert the source current 14 bit PIC's and future devices may

Page

117

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

code and burn it. be added by changes to initialisation files
which will be provided free of charge on
handled by standard C header files.

5.0 CONCLUSION

The Pigeon Hole Alert system has been able to make a significant contribution to
the management of a lecturer's activities. Quickly information received and prompt action
can solve many problems. The procedure need to follow by sender when put a document
into the Pigeon Hole. They need to press the command button provided. A notification will
automatically appear on the computer's pop-up view. Every document placed at Pigeon
Hole needs to be retrieved immediately and there are many things to resolve. If no action
from lecturer, the system will always reminder as a notification. The notification will
automatically stop while the document has been retrieved and the pigeon hole is an empty
state. This quick action completed the submission or receipt the document and furthered the
administrative duties of a lecturer. It is providing an easy and efficient platform for
information and notifications. Users feel comfortable managing memos, letters and other
related documents without delay and can act quickly and efficiently. Hope, this project will
contribute to the innovation of mobile computing applications in organization management.

REFERENCES

Ajtai, M (2007) “The complexity of the pigeon hole principle, combinatorical14(4) 417-
433

Paul Beame , Russell Impagliazzo , Jan Krajíček , Toniann Pitassi , Pavel Pudlák , Alan
Woods, Exponential lower bounds for the pigeonhole principle, Proceedings of the
twenty-fourth annual ACM symposium on Theory of computing, p.200-220, May
04-06, 2006, Victoria, British Columbia, Canada [doi>10.1145/129712.129733].

Thapen, N. (2002), The Weak Pigeonhole Principle in Models of Bounded Arithmetic, PhD
thesis, Oxford University.

http://www.superstructuregroup.com/Resources/AQD_Automatic_Email_Alerts_Overview

http://www.google.com.my/search?q=image+transmitter+and+receiver

http://articlebrain.com/category/pigeonhole/

http://pigeonhole.dovecot.org/

Page

118

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Implementation of Variable Frequency Driver (VFD) for
Induction Motor Acceleration

Thiruchelve Ramasamy1, Mohd. Zaini Bin Kemon2, Wong Kee Meng3

1Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]
2Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]

3Jabatan Kejuruteraan Mekanikal, Politeknik Port Dickson; [email protected]

ABSTRACT

This paper discusses on the design and implementation of a Variable Frequency Driver
(VFD) for an induction motor acceleration conducted by students at Port Dickson
Polytechnic during the laboratory session. The laboratory session focuses on the
fundamental theory and operation of a VFD. The designed problem requires students to
learn and understand the concept of VFD and verify the simulation results. Implementing
the laboratory experiment reveals that the induction motor acceleration can be regulated by
changing the frequency of VFD.

Keywords: Variable Frequency Drive (VFD), induction motor, acceleration

1.0 INTRODUCTION

In this modern industrial revolution, induction motors are widely used due to its
high efficiency, robustness and ability to operate in a wide range of velocity and torque.
Induction motor plays a vital role in regulating the velocity of pumps, blowers and
conveyor systems that require variable speed and torque.

VFD is a power-electronic device that able to regulate the frequency and voltage of
an induction motor. Frequency (or hertz) is directly proportional to the motor’s speed
(RPM). Therefore, the greater the frequency, the greater the RPM. The frequency and
voltage in VFD are varied to fulfil the requirement of the electrical motor load. This
purpose of this paper is to provide an essential understanding of the operation of VFD and
to verify that VFD is a technique used to regulate the acceleration of an induction motor
based on the simulation result obtained by students of Port Dickson Polytechnic during
laboratory session.

2.0 VFD OPERATION

The VDF controller system consist of three distinct sub-systems. These three sub-
systems are a rectifier bridge converter, a Direct Current (DC) bus and an inverter. Figure 1
shows the typical VFD block diagram.

Page

119

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Figure 1. VFD block diagram
A single phase or three phase AC input is fed into the converter. This converter
converts the AC input supply to DC fixed voltage. It is also known as AC to DC rectifier.
The 3-phase full wave diode bridge rectifier consists of six diodes shown in Figure 2. Only
a single phase of input and output waveforms are shown in Figure 2 for the purpose of
simplicity of illustration.

Figure 2. Three Phase VFD circuit diagram
The converter permits the current to flow in one direction only. L1-phase diode
opens for current to flow while L2 and L3-phase diodes are closed when L1-phase voltage
is more positive compared to L2 and L3-phase voltages. Similarly, when L2-phase voltage
comparatively more positive than L1 and L3- phase voltages, the L2-phase diodes open
while the L1 and L3-phase diodes will be closed. The same goes for the 3 diodes on the
negative side of the bus. Therefore, due to the opening and closing of the 6 diodes, a six
current “pulses” is produced. This is known as a “six-pulse VFD”.
The following phase of VFD is the DC bus. The DC bus segment filters and
smooths through the waveform which has been created after the rectification procedure.
Normally, a modest quantity of ripples known as harmonics is distinguished alongside DC
voltage delivered by the AC to DC converter. These waves cause mutilation and forestall

Page

120

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

smooth working of electrical machines so they should be expelled utilizing a filter. The
capacitor (C) and inductor (L) filter through every AC portion of the DC waveform. The
smoother the DC waveform, the better the waveform performance of the driver.

Suppose that a driver is functioning on a 480V (line voltage) system, peaks of 679V
is produced out of that 480V system. It tends to be determined as line voltage (480V) times
1.414. The measured voltage at the VFD DC bus runs roughly between 580V to 680V. This
voltage is with an AC ripples. A smooth DC voltage is delivered when the capacitor
absorbs the AC ripples. In this manner, an average DC bus voltage roughly becomes
650VDC as appeared in Figure 3.

Figure 3. Output waveform of VFD at DC bus for 480V power system
The last phase of the VFD is alluded to as an "inverter." It changes over fix or
variable DC voltage to variable AC voltage. The “Insulated Gate Bipolar Transistor”
(IGBT) is a typical decision in present day VFD. Figure 2 shows three-phase VFD inverter
having IGBT as switching device. The IGBT can turn on and off a few thousand times each
second and exactly control the force conveyed to the motor. The IGBT utilizes a technique
named “Pulse Width Modulation” (PWM) to simulate a current sine wave at the desired
frequency to the motor.
The inverter switches are utilized to isolate the reproduced sine-wave output
waveform into a progression of narrow voltage pulses and regulate the width of the pulses
with PWM technique. The output of the VDF does not give an accurate imitation of AC
input sine waveform. Rather, it gives constant magnitude of voltage pulses as appeared in
Figure 4.

Page

121

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Figure 4. VFD Output waveform using PWM technique
Theoretically, the speed (rpm) of an AC Induction Motor is directly proportional to
frequency. The formulation is as given below:
Speed, N (rpm) = Frequency, f (hertz) x 120 / Number of motor poles, P
Therefore, by varying the VFD frequency output the acceleration of an induction
motor can be regulated as per requirements of motor load.
VFD needs to modify the applied voltage to AC motor proportionally whenever the
frequency varies. Suppose, if the motor is desired to work at 480V at 60 Hertz, the applied
voltage must be decreased at 230V when the frequency is reduced to 30 Hertz.
Subsequently, the ratio of the volts per hertz (V/F) must be a constant value (480/60 = 8 for
this situation) as appeared in Figure 5.

Figure 5. Output waveform of VFD with constant volts per hertz ratio

Page

122

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

3.0 PARAMETERS SETTINGS OF VFD

At Port Dickson Polytechnic, the students had constructed VFD circuit connection
for a 3-phase squirrel-cage induction motor. The purpose of this laboratory experiment is to
design a set up that would serve an introduction to VFD. This would give students a chance
to understand and practice controlling motors with VFD which could be useful in many
industrial applications.

In this laboratory session, an input of 250VAC (single-phase) with 50Hz fed into
the rectifier. A 3-phase full wave diode bridge rectifier consists of 6 diodes and “Insulated
Gate Bipolar Transistor” (IGBT) as switching device were used in this experiment. The

operating data of the VFD with appropriate parameters used in this laboratory work is as

appeared in Table 1 The variation in speed due to frequency changes are shown in Table 2

and the corresponding graph of speed versus frequency is represented in Figure 6 below.

Table 1. The parameter of the VFD used in laboratory experiment

Display Parameter Display

setting setting

CP.0 Password input CP-on

CP.1 Actual frequency display noP

CP.2 Inverter status display noP

CP.3 Actual load 0

CP.4 Peak load 0

CP.5 Rated frequency 50.000

CP.6 Boost 2.0

CP.7 Acceleration time 10.00

CP.8 Deceleration time 10.00

CP.9 Minimal frequency 0.0000

CP.10 Maximal frequency 70.000

CP.11 Fixed frequency 1 5.0000

CP.12 Fixed frequency 2 50.000

CP.13 Fixed frequency 3 70.000

CP.14 Max. ramp currrent 140

CP.15 Max. constant current 200

CP.16 Rotation frequency search (speed search) 8

CP.17 Voltage stabilisation Off

CP.18 Slip compansation 0.00

CP.19 Autoboost 0.00

CP.20 DC-braking 7

CP.21 Braking time 10.000

CP.22 Relay output 2

CP.23 Frequency value 4.0000

CP.24 Reference signal 0

Page

123

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Table 2. The variation in speed due to frequency changes of VFD for squirrel-cage induction motor

Frequency(Hz) Speed(Rpm)

00
5 150
10 350
15 500
20 700
30 950
40 1200
50 1500
60 1750
70 2000

Figure 6. Graph shows the variation in speed due to frequency changes of VFD for squirrel-cage
induction motor

Figure 6, clearly verifies that the rotor acceleration of the squirrel-cage induction
motor is directly proportional to frequency. Thus, by regulating VFD frequency, the rotor
acceleration of the squirrel-cage induction motor also changes accordingly. This laboratory
experiment gives a very clear picture to student that the acceleration of an induction motor
can be controlled by using VFD without making any changes to the number of poles of the
motor as this would lead to a physical change of the motor. Through these laboratory work
students were able to understand the basic operation of VFD in detail and had the
opportunity to practice controlling motor with VFD. This theoretical and practical
knowledge is very essential for student when they are in industry.

3.1 Gearbox System for Induction Motor Acceleration Used in Industries

Gearboxes or also commonly called gear reducers or enclosed speed reducers are
used on many AC Induction motors drive systems as it can deliver high torque at low
power and low speed due to gearhead function. Gearboxes require periodical maintenance
but failure to regularly lubricate bearings and other components of the transmission system
will increase frictional effects and motor loading. A greater part of the maintenance

Page

124

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

resources is scheduled that gearboxes are well lubricated with the correct lubricant and
change it at the required interval and inspect drive gears for excessive wear and tear.

Figure 7. Figure shows the motor drive with gearbox system
A positive shift towards more efficient VFD drives is expected to have a significant
impact on revenue growth of the industrial market due to minimum cost of maintenance
which is competitive for industry survival. Industry 4.0-ready motor sizes up to 160 kW are
available. These VFDs are IOT, featuring PI controllers and integrated PLC. They can carry
out logical sequences and take care of process control on their own. The built-in PLC can
monitor the drive system, evaluate sensor data and assess the state of the unit
independently.

Figure 8. Figure shows Industry 4.0-ready VFDs

4.0 CONCLUSION
Advancements in technology over the past few decades have been driving advances

in automation. They are encouraging the adoption of robots and industrial automation. The
use of automation across all industrial sectors across the globe is increasing. Industry 4.0
aim for the conversion of their facilities into ‘smart factories,’ where processes will be
automated and the system will be in continuous synchronize with people, sensors, motors
and devices via the Internet of Things (IOT).

In current global industries, the VFD is the most widely used technique to control
the acceleration of an induction motors. The VFD can regulate the acceleration of the
motor, the direction of the motor rotation and the torque delivered by the motor. Moreover,

Page

125

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

VFD is also capable to reduce energy consumption, improves product quality, reduces
production cost, extend equipment life span and reduce maintenance cost. Therefore, it is
very important to educate students with the theoretical and practical knowledge of VFD
operation.
REFERENCES
Amit K, Kamdi, Kale, Yeotikar (2015). A Review Paper On Variable Frequency Drive.

International Research Journal of Engineering and Technology (IRJET),
Volume:04Issue:01,1281-1284.
Kasthuri.S (2018). Certain Investigation On Induction Motor Performance with Variable
Frequency Drive. International Research Journal of Engineering and Technology
(IRJET), Volume:05Issue:08, 480-483.
Shah, Sanas, Mahajan, Mayuresh, Gulame (2015). Literature Review on Variable
Frequency Drive. International Journal for Scientific Research & Development
(IJSRD), Volume:03Issue:08, 690-691.
What is VFD, How it works? - VFD working principle. Retrieved from
http://www.vfds.org/what-is-vfd-how-it-works-964803.html

Page

126

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Courier Safety Box

Siti Zalina Binti Mokhtar1, Nursheda Binti Zainudin2, Noor Hashima Binti Harun3

1Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]
2Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]
3Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]

ABSTRACT

Courier safety box is a project to develop to solve a problem related to delivering parcel
from any courier services in Malaysia. This project developing to make sure the entire
customer will get their parcel safely. The postmen will deliver the parcel to customer’s
house; they need to open the box which is situated at in front of the gate. The postmen will
put the parcel onto the box and just close it. Then one SMS notification will send to the
customer to inform their parcel already in the box. The SMS will receive to the customer
and to open it, customer need to key in the tracking number of the parcel. So, the postmen
no need to put sorry note letter to the post box or no need to call the owner of that parcel if
customer not at home. Customer also no need goes to the post office to get their parcel. The
objectives of this project are to facilitate courier services to send parcel or mail safely if the
recipient is not at home. Easier to the recipients receive the parcel without going to post
office and it also can save time, energy and transportation cost to the customer for receive
their parcel. This project is developing by using Microcontroller PIC18F723A as its
process. The MPLAB IDE compiler is use to embed the source code and to generate the
coding. The input of this project is keypad which is to key in the password and LED,
BUZZER, LCD display, magnet solenoid and SMS notification as its output. The impact of
this project it can save time, save cost, save space, user friendly and also environmentally
friendly to the courier service and also to the customer.

Keyword: Safety Box, PIC Microcontroller

1.0 INTRODUCTION

1.1 Background Project

This project the idea was to achieve a high level of sustainability with only a
minimum investment, well below the present standards. Courier Safety Box is one of the
project which to make postman and customer easier to get their parcel without go through
to the post office. It can save transportation cost, human energy and save time.

Courier Safety Box is developing to make sure the entire customer will get their
parcel safely. They also no need goes to the post office if not available at home. The post
man will deliver the parcel to customer’s house; they need to open the box which is situated
at in front of the gate. The postmen will put the parcel onto the box and just close it. Then
one SMS notification will send to the customer to inform their parcel already in the box.

Page

127

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

The SMS will receive to the customer and to open it, customer need to key in the tracking
number of the parcel. So, the postmen no need to put sorry note letter to the post box or no
need to call the owner of that parcel if customer not at home. Customer also no need goes
to the post office to get their parcel.

Meanwhile, when the customer back to the home, they will see the box is lock and it
now there are parcel in the box. So when they want open the box they need to key in the
tracking number password and the box will open. If the tracking number wrong entered, the
box will not open until find the right tracking number. So they didn‘t get note from the post
man and no need go to post office to get their parcel. This project is design safely, very
convenient and practical to the user.

1.2 Problem Statement

Courier Safety Box is a project to develop to solve a problem related to delivering
parcel from any courier services in Malaysia. Nowadays, the courier service as PosLaju
Malaysia, GDEX Express, Sky Net and others courier are become too busy service in
Malaysia because peoples are used to order some items or things via online order and
delivery to their home.

Customer just waits at home until the parcel deliver from the courier service. For
those who didn`t not work outside to home or housewife, to get their parcel it’s not become
a big problem. But to those which is working out of home or not available on that the
courier service coming, it’s become a big problem to them, because the postmen will put
sorry note letter to the post box. The sorry note letter which is notes from courier service
notice that we are not at home and the parcel is unsuccessful pass to the customer. So the
customers need to go courier service office by their own to collect their parcel. They need
go to the post office within 14 days from the delivery date. Not, their item will send back to
the sender. Sometimes the customer didn’t get their parcel because lack of time and too
busy with their work and daily routine. To take the parcel need follow post office`s
operating hour 8. 30a.m - 4.30p.m. So they need to rush to go there.

In others case, the sorry note letter was lost or damage because of exposed to
something bad like heavy rain, postbox damage or others. So how the people know about
their parcel have deliver or not. Beside that’s, there is no notification alert by their phone,
when the delivering parcel is done. Nowadays, people just only can check the status of
parcel by enter the tracking number to the courier service website. From that, they can
know the flow of their parcel delivery. It’s become a problem when people don’t have
internet or not online to check their status of parcel.

So with this reason, project was developing. There is a Courier Box Security which
is to solve delivery parcel to the customer. With this project the parcel safely deliver to the
customer and parcel should be in a good condition. In addition of safety element, one SMS
from courier service will send to the customer to alert the parcel is safely delivered in the
box.

Page

128

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

1.3 Objectives

i. To facilitate courier services to send parcel or mail safely if the recipient is not at
home

ii. Easier to the recipients receive the parcel without going to post office
iii. Save time, energy and transportation cost to the customer for receive their parcel

1.4 Questions of Project

i. How far this project will facilitate courier services to send parcel or mail safely if
the recipient is not at home?

ii. How far easier to the recipients receive the parcel without going to post office?
iii. How far save time, energy and transportation cost to the customer for receive their

parcel?

1.5 Scopes of Project

Limit the scope of project should be made as a reference to ensure that every
implementation. Projects do not deviate from the objective to be achieved. One of them is:

i. Limited size - only one item (25cm x 25cm) in one time
ii. Limited weight – one item (5kg)
iii. Limited place – residential building

To key-in the security password only courier services and customer know the
tracking numbers.

2.0 LITERATURE REVIEW

2.1 Introduction

In this chapter will describe about fact finding that had searched. There are a lot of
research about courier safety system. Will review with the same fact of Courier Safety Box.

2.2 Previous Research

i. Home delivery services: Innovations and emerging needs

Demand for purchase parcel or items by online and send to the home delivery
services has rapidly increased in recent years, largely due to the growth of online shopping.
Based on research from Maliheh G et al. (2016), New technologies and innovations being
developed according the increasing of logistics service provider propose a digital home
service delivery system for small business. That innovations in this field can support the
efficiency operations of large companies. From the research, they aim to provide an

Page

129

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

exploratory analysis of existing home delivery innovative services and requirements and
issues that users are experiencing.

The content of research also reviews the main features of innovative services and
compare with others findings. The studies involved 58 companies, operating in 9 countries,
exploring the practical and economic providing services. The method that uses in this
research identify innovative services, requirements and issues experienced by users was
performed by review home delivery service. Then conduct online survey to investigate the
habits and perception of delivery service.

Analysis data from the survey showed that, respondants difficult to collect the
parcel during office hour and take several time to go to the post office. The effectiveness of
delivery service not so comprehensive after office hour. So that, the real time tracking and
some innovation product must be provide to solve this problem of delivery services.

ii. Pakman Parcel Box

The new technologies designed and patented in Australia had lunch the first and
high innovation security mail box for residential properties. The Pakman Parcel Delivery
Box will hit the shelves nationwide in Bunnings Warehouse store from Disember 2013. The
manufacture of that innovation, Mayo Hardware is the leading supplier of outdoor lifestyle
and security products.

This innovation is a convenient and secure alternative to guarantee parcel deliveries
at customer’s home. That product has a secure chute with scannable barcode registered to
customer’s house that allows couriers to send an email or SMS to let customers know the
parcel was arrived at their home.

Figure 1. Pakman Parcel Box

Page

130

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Thomas (2013) mentioned from its article that, many peoples find themselves
setting aside time to collect their parcels or sending their online purchases to their
workplace because when they not at home, the parcel will return to the post office or the
postman will put notice mentioned unsuccessful delivery. It become more problem when
the post office just close at office hour. So that this technology will rise in online shopping,
save online shoppers time and money and delivered safely and securely to residential
properties.

From the literature review, every technology that was produce have their own
implementation. From the survey effectiveness of delivery services, we can build and
develop the product of delivery service which is will make people become easier in their
lifestyle. The courier safety box is different with pakman parcel box implementation
because the courier safety box is using PIC18F723A microcontroller. Need to embed the
software and connect with GSm Module.
3.0 METHODOLOGY
3.1 Design of Project

Courier Safety Box operation with 12 Voltan Direct Current. This system is
developing with output LCD Display for display the information about the status of the
box, LED will display mode ON/True (Green LED) or OFF/False (Red LED) and Short
Message Service (SMS) for Postman and user get the information about the status of the
parcel. This system use PIC18f723A microcontroller for embed the program to control
what the application of the box and its function.

This system also use Global System for Mobile Communications (GSM) which is
need to setting for deliver and transmit the sms. For commercial purpose, this innovation
use for easier the user knows the status of the parcel, the security of the parcel, no wasting
time to go to the post office and queqe for get their parcel when they not at home. Easier for
courier service company to send the parcel and without bring back the parcel to the office.

Figure 2. Courier Safety Box (Front Side)

Page

131

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Figure 3. Courier Safety Box (Front Side with parcel)
3.2 Block Dagram

INPUT PROCESS OUTPUT
Keypad
Microcontroller LED
PIC18F723A Buzzer
LCD Diplay
Magnet
Mobile Phone

Figure 4. Block Diagram

mag
Block diagram show the three important element when to build Courier Safety Box.

For the input element, this system is use Keypad for enter the information such as the
courier information, place, time and worker’s Identification Card. Process of this system is

use Microcontroller PIC18F723A for control all the system. This controller can manage all

the input and output device to operate its well. The output of this system is use LED for on

the indicator, Buzzer to make its sound when open the box, LCD Display to display the
keypad’s key in, Magnet for lock and release the door and Mobile Phone to get the

notification from the courier.

Page

132

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

3.3 Circuit and Control

Figure 5. Circuit Diagram

Page

133

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

The schematic circuit draw by using Proteus Software which is can do simulation
and PCB layout. The circuit in this schematic include power supply circuit, PIC circuit, and
LCD Display circuit.

3.4 Software and Operating

This system is use MPLAB IDE software which is the compiler and linker
customize and can be controlled completely with it. MPLAB IDE is providing a full
graphical front end for this powerful compiler. The text errors in source code and
breakpoints instantly switch to corresponding lines in the proper file, watch windows to
show data structures with defined data types, including point, arrays and structures.

3.5 Flowchart Figure 6. The MPLab Software

Start

Key-in tracking number use
a keypad

Pic received instruction and to send to
output

Solenoid lock on Led turn red from
green Buzzer turns on LCD display
output, SMS will send to the user

End
Figure 7. FlowChart

Page

134

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

The flowchart of this system is show in figure 7. The courier will key in the tracking
number by using the keypad. Then the courier will receive the instruction and send to the
output. The solenoid lock will on LED and turn it to Green Colour to show its already in
ON mode. The buzzer turns ON and LCD display show the output. Customer will get the
Short Messingin System on their Mobile Phone.
4.0 DATA ANALYSIS
4.1 Introduction

The application of Courier Safety Box is when the postmen will deliver the parcel to
customer’s house; they need to open the box which is situated at in front of the gate. The
postmen will put the parcel onto the box and just close it. Then one SMS notification will
send to the customer to inform their parcel already in the box. The SMS will receive to the
customer and to open it, customer need to key in the tracking number of the parcel.
4.2 Results and Analysis

Figure 8. Result of LCD Display from step 1 to step 12

Page

135

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Figure 9. Result of output from SMS notification
4.3 Discussion

The device is implemented using GSM Module to connect with SMS notification.
So to setup that implementation, the user must have a mobile phone with the simcard. So
that the notification from courier company will send to the user through messanging. From
this result, this product was successfully function and easy to maintenance.
5.0 SUGGESTION

Proposed improvements for the future are to be made in various forms, for example:
i. Using solar panels to save on electricity usage
ii. Using a stronger such as iron
iii. Owner have own passwords
6.0 CONCLUSION

The conclusion obtain from courier safety box system it can help merchants and
online shoppers to get the items purchase and deliver safetly by courier company. This
product also can facilitate courier services to send parcel or mail safely if the recipient is
not at home. Also, it easier to the recipients receive the parcel without going to post office.
It can save time, energy and transportation cost to the customer for receive their parcel.

Page

136

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

REFERENCES
Asas Kejuruteraan Elektrik. Universiti Teknologi Malaysia. Fakulti Kejuruteraan Elektrik.
Kamus Dewan. Edisi Keempat Cetakan Kedua(2007). Kuala Lumpur. Dewan Bahasa dan

Pustaka.
Maliheh Ghajargar, Giovanni Zenezini, Teodoro Montanaro (2016). Department of

Management and Production Engineering, Politecnico di Torino, Italy. IFAC-
PapersOnline Conference Paper Archive.
Mohd. Isa bin Idris, Sabariah binti Hj.Bohanudin. et.al (2002). Pengajian Kejuruteraan
Elektrik dan Elektronik Tingkatan 4. Kuala Lumpur. Dewan Bahasa dan Pustaka.
Thomas (2013). Review of Pakman Parcel Box in Australia.
https://www.pinterest.com/pin/445715694347955788. Retrive 14th Julai 2020.
Zakaria Osman (1998). Kamus Kejuruteraan Elektrik. Kuala Lumpur. Golden Book Centre
Sdn.Bhd.

Page

137

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Encryption Challenges in Today’s Time

Rabindra A/L Gandhi Thangarajoo1, Nurfarhanah Binti Omar2

1Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]
2Jabatan Kejuruteraan Elektrik, Politeknik Port Dickson; [email protected]

ABSTRACT

This article aims to review current literature regarding all the problems affecting encryption
of data and communications in various devices. Current examples of the technical as well
moral issues surrounding this topic is discussed which deals with ethical issues which
sometimes involves the government, judiciary and the user in general. The basic theory
behind the algorithms commonly used in the process of encryption is discussed as well
where there are two theoretical concept of symmetric and asymmetric encryption. The final
issues will reflect the difficulty in implementing encryption among the general public.
Issues range from user apathy, choice of algorithm by hardware designers and also the
moral issue faced by encryption system’s designer when finding a balance between
protecting the user’s right to privacy and yielding to law enforcer’s demand to decrypt that
same user’s data, which would spawn a privacy right crisis. As a conclusion, the broad area
of application for encryption is reviewed.

Keywords: Encryption Challenges

1.0 INTRODUCTION TO CRYPTOLOGY

Mention the names of Kevin Mitnick, Edward Snowden or Ross Ulbricht to those
working in the web security industries and they can quickly tell you a nightmarish stories of
the worst internet hack crisis the world has ever seen. These are only three names in a long
list of hackers who had their brushes with the law when they committed their security
related offences. Even though all three of them were finally captured, only Kevin Mitnick
have enjoyed a better life since coming clean of his hacking days. He is currently the Chief
Hacking Officer (yes, there are such jobs now) of Mitnick Security Consulting LLC, a
company dealing with teaching and solving security related issues for other organization.
This includes doing penetration testing in determining an organization and government
agency’s reliability in dealing with security breaches. (Webster EM,2019)

Snowden was an ex-employee with the National Security Agency, USA and was
wanted for leaking confidential CIA documents when he became disillusioned on their
global surveillance program. He currently lives in exile in Russia, being granted to what
amounts to a temporary asylum. (Ashley; Black, Phil et al,2013). Ulbricht who was wanted
for running an illegal online market, is incarcerated in a correctional facility in the United
States. (Fish,2019)

Page

138

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

If there is one thing that can be learned from all three of these men, is that any
organization need to learn, implement and always upgrade their security infrastructures for
their services if they rely heavily of the internet and mobile services when dealing with
their customers. Or else they run the risk of being hacked by trained criminals who could
compromise their systems using something as simple as a computer terminal and a network.

This is where the field of cryptography and cryptanalysis have been used to defeat
digital thieves bent on stealing information. Basically this technique came about by taking
information which was supposed to be sent through a channel eg. internet, e-mail or mobile
devices and passing them through a mathematical algorithm so that the original information
is changed before sending them to anyone via a communication medium. This is done so
that anyone who tried to eavesdrop on that communication and were able to steal that
information will only get what you call a garbled garbage, which is useless information.
This is because only the information’s intended receiver will have the corresponding
algorithm to retrieve back the original information.

From this point onward, the algorithm used for encryption will be called the cipher,
the original information is known as the “plaintext” while the changed or encrypted
information after it passes through the algorithm(cipher) is known as the “cyphertext”. And
this sets into motion the whole field of cryptology where a cat and mouse game between IT
administrator and IT hackers is well played where security experts try to find a perfect
encryption algorithm that in due time will be attacked by a well-seasoned hacker.

2.0 HISTORY OF CRYPTOGRAPHY

Though modern cryptology began before the 70’s, surprisingly this topic has been
dealt with even from as far as 4000 years ago. Ancient Egyptian hieroglyphic artwork
would show messages in the form of artwork where only the scribes who are involved will
know the meaning of the artwork. Thus any messages delivered to the king would have
been made by one scribe and then translated by another scribe. Both must know the same
method of translating the hieroglyph (aka encrypting / decrypting method).

Moving on to a more modern form of encryption algorithm, every cryptographer
scholar can’t run from learning the Ceaser’s Shift Chiper, basically the first mono-
alphabetic algorithm anyone ever start with in the class. As the name suggest, it was
developed by none other than Julius Ceaser, the famous Roman general and statesman. As
there was the need to deliver written communication between him and the entire kingdom,
he came up with a simple method to encrypt his letters. Each alphabet in his letter were
shifted by some agreed upon numbers between 0 and 25 and replaced with another
alphabet.

For example, if “A” was shifted with the cipher “3 – ” it will be replaced by the
alphabet “D”. Only the receiver who knows the same cipher could decrypt the original
message. Figure 1 here shows the ancient device Romans would have used for the
encryption process.

Page

139

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Figure 1. Ceaser’s Shift Cipher that ancient Romans would have used to encrypt their messages.
However, with only 26 possible cipher shifts, a determined hacker could do an

exhaustive trial hack before finding the original message. But this proves how encryption is
useful at least to make it harder for someone to steal messages during the Roman era.
(Raynard,1996)
3.0 CURRENT ENCRYPTION ALGORITHM

There is a myriad of ciphers available today, just google the word “Cryptography”
in Wikipedia and there are tons of information on this topic, and even more when you begin
clicking on the links available at the bottom page. So to make thing simpler and narrow this
article to ciphers that are current, let’s begin to understand the two types of encryption
method used. They are the symmetric key encryption and the asymmetric key encryption.
3.1 The Symmetric Key Encryption

Remember the Egyptian Hieroglyphs? They are the symmetric key encryption
equivalent for the modern era. Both the scribes are the key holder who knows how to
translate the artwork. Thus that is how a symmetric key encryption works.

The plaintext will be encrypted and decrypted by the same cipher. One of the most
widely used symmetric cipher today is called the Advanced Encryption Standard (AES). It
was developed by Rijndael back in the year 2000 and has been adopted by the National
Institute of Standards and Technology. The AES standard works with 128-bit block
(Rijndael’s version also works with different block size but was not included once it was
standardized.)

Page

140

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Figure 2a. The standard schematic of the AES Figure 2b. The 4 sub-processes in each

structure round that was shown on the left in

Figure 2a

In figure 2a, Rijndael’s original version is shown to have 3 different key sizes. The
128-bit plaintext goes through a pre-round encryption process, the result is then put towards
another round of encryption with a different key. This process is repeated till a set number
of rounds until the ciphertext is obtained. The processes of each round is shown in Figure
2b. The decryption process to find the original plaintext is inexact reverse as that of Figure
2b. This would be the process from AddRoundKey, Mixcolumns, ShiftRows and finally
Bytes Substitution. (TutorialPoint,2014)

AES has found its application in firewalls and routers and as a standard cipher, its
effectiveness is always tested to find vulnerabilities. This includes the brute force attack as
well as other techniques. It has been found to be reliable and practical.

AES is simple to use and well liked because it is complex enough that information

confidentiality is maintained without the risk of intrusion while the algorithm itself does not
degrade the quality of the system if it’s used in communication or network devices.

However, this also means that a hacker will only have to deal with one same cipher as it is

used in both the encryption and decryption process.

3.2 The Asymmetric Key Encryption

From this comes the second technology which is asymmetric key encryption which
means that two keys are separately needed, one for encryption called the public key and the
other is for decryption which is called the private key. Both keys are related
mathematically and thus the challenge here is to have both keys maintained by the system
so that information transfer is secure but a hacker will not know how to mathematically
relate both keys in order to crack the cipher.

Figure 3 shows the basic structure of how this type of encryption looks like. Bear in
mind that during the decrypt process, the Recipient’s public key will be generated by a third

party which is not shown in the figure. This type of system thus had put the responsibility
of authenticating the Recipient’s public key on the side of the third party.

Page

141

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

Figure 3. Symmetric Key Encryption Method

RSA is one such asymmetric cipher that is now widely used in protection of web
browser transaction, for example SSH authentication, encryption and confidentiality
protection. It was developed by Ron Rivest, Adi Shamir and Leonard Adleman in 1977.
(TutorialPoint, (2014)

In a simple way to understand, the RSA encryption key is generated by taking 2
large prime numbers. The public key is calculated from these two numbers and further
derivation will also provide the private key. The encryption process is a simple
mathematical process where the ciphertext is raised to a predetermined power factor and
divided by a modulo. Though slower than the symmetric method, it is well worth it due to
the added security of having a private key which makes it more secure than symmetric
method.

4.0 THE BEST CIPHER? SECURITY FACTORS ORGANIZATIONS SHOULD
HEED.
Now that we are done with the basics of what encryption algorithm are, let’s look at

the issues surrounding its use. It’s not as simple as saying that asymmetric encryption uses
more number of bits and uses more processing power and therefore it takes longer. This is
not the case. Depending on the algorithm, even if it works on more byte blocks, the
processing method could be faster and its use could be advantageous if clients like using a
more secure encryption that doesn’t necessarily degrade their entire system. Here are some
of the issues that arises when applying encryption methods to your system.
4.1 User’s Responsibility in Encrypting Their Data

With the advent of cloud computing, numerous work now can be done using the
internet where once you need a software installed to do the same work. Even engineering
students could simulate a circuit or compile a microcontroller code on the cloud. However,
editing your online documents is also becoming prevalent and securing your document is
becoming an issue now. It is important to realize that the majority responsibility of your on-
the-cloud document’s security falls on you, and not the security provider. This is the case
of reading the provider’s fine print contract before uploading your content to the provider’s

Page

142

JUADAH MINDA JKE 2020 / EMPOWERING TECHNOLOGY TOWARDS IR 4.0

cloud as the providers are more inclined to secure their cloud infrastructure from outside
attack but do not provide encryption services to the stored data itself. That work falls under
the client’s responsibility. (Guez,2016)

4.2 Understanding Timing Factors for Your Cryptosystems

Another thing a client has to do is understanding how and when the encryption
actually kicks-in to secure you system. This goes a long way in saving you from the hassle
of having to deal with breaches later on. If the system uses low-level encryption, the data is
only encrypted when the system is turned off, not when you are still using your machine.
US law enforcement agents know this fact pretty well since capturing a fugitive together
with the evidence inside a laptop can only be done if the suspect is logged in the system.
Closing the laptop is enough to encrypt the evidence, making the process of decryption
impossible. Some encryption also works after you logged out of the system, so it no help if
a hacker gains access to your database while you are logged in to it. (Guez,2016)

4.3 Wrong Practices in Implementing Cryptosystems

The wrong choice of cipher modes or algorithms can also be disastrous to a system.
Undoubtedly there are a myriad of choices when it comes to cryptographic ciphers, but
some choices just don’t make sense. The ciphers use keys, which are random numbers used
to convert the plaintext into the cipher text. However, choosing a weak key is not advisable
for example using a constant. Some algorithm that uses Initialization Vector (IV) becomes
an unusable process if the IV is reused multiple times instead of being regenerated
randomly. Some application such as encrypted databases mustn’t make the mistake of using
deterministic encryption to make sensitive data searchable since they are then vulnerable to
dictionary types of attacks. (Guez,2016)

4.4 Key Management Issues.

Speaking about choosing the best key, key management is also something that has
to be taken care of for a secure system. Once your plaintext is encrypted, storing your key
is an issue. Storing in the database, on the file system or in an application configuration file
is just plain bad. That is why there are such thing as Public Key Infrastructure which is
actually the hardware and software required to handle Key Management issues when there
is encrypted communications involved between a sender and a receiver. The main
infrastructure here which manages all this is called the Certificate Authority. This means
key management issues now can be handled by an external but trusted platform to
guarantee security.

Finally, developers can employ tricks like using different keys for different part of
your system and even changing of the keys at different intervals. This is not trivial since the
key used together with its intended data combination must be closely tracked by the
cryptographer developer. (Guez,2016)

Page

143


Click to View FlipBook Version