The word ‘automatic’ is unavoidable in this modern technical era. Automation facilitates not only technical advancement and time reduction to several processes, but also provides protection in various aspects. Delivery scam is a commonly occurring crime and it has to be reduced. Product delivery is a long process which involves various people to ensure correct delivery to the customer, providing chances for scam to occur. This paper discusses on an automatic delivery-scam prevention system with the help of Raspberry-Pi controller. This system provides safety to the ordered goods by limiting the authorisation of opening the packages to company and the customer only. It assures the safe and correct delivery of the ordered product
Communication, product protection and presentation are three key aspects in the world of packaging n...
Last-mile delivery has gained much popularity in recent years, it accounts for about half of the who...
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from st...
Abstract:- Soft-products are intangible products such as software, music, video and phone cards whos...
Controlling the authenticity of a product in the supply chain has been a struggle formanufacturers, ...
To protect people from thefts, especially businessmen who have important files are wary of losing th...
In this current situation, the degree of security is feeble. So there is a lot of robbery, theft goi...
Counterfeiting is a challenge to companies, cus-tomers and markets all over the world. Besides the e...
International audienceSending sensitive documents or parcels over a delivery service can be a hazard...
Counterfeiting is a challenge to companies, customers and marketsall over the world. Besides the eco...
A user places an order for delivery in a building that uses a telephone-based call box system instal...
Counterfeit trade developed into a severe problem for many industries. While established security fe...
The main objective of this project is to illustrate the technology used for security systems. This w...
The number of discovered vulnerabilities rapidly increases. For example in 2019 there were discovere...
This paper gives the depiction of the new way to deal with wards the security of ATM (Automatic Tell...
Communication, product protection and presentation are three key aspects in the world of packaging n...
Last-mile delivery has gained much popularity in recent years, it accounts for about half of the who...
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from st...
Abstract:- Soft-products are intangible products such as software, music, video and phone cards whos...
Controlling the authenticity of a product in the supply chain has been a struggle formanufacturers, ...
To protect people from thefts, especially businessmen who have important files are wary of losing th...
In this current situation, the degree of security is feeble. So there is a lot of robbery, theft goi...
Counterfeiting is a challenge to companies, cus-tomers and markets all over the world. Besides the e...
International audienceSending sensitive documents or parcels over a delivery service can be a hazard...
Counterfeiting is a challenge to companies, customers and marketsall over the world. Besides the eco...
A user places an order for delivery in a building that uses a telephone-based call box system instal...
Counterfeit trade developed into a severe problem for many industries. While established security fe...
The main objective of this project is to illustrate the technology used for security systems. This w...
The number of discovered vulnerabilities rapidly increases. For example in 2019 there were discovere...
This paper gives the depiction of the new way to deal with wards the security of ATM (Automatic Tell...
Communication, product protection and presentation are three key aspects in the world of packaging n...
Last-mile delivery has gained much popularity in recent years, it accounts for about half of the who...
A computer hijacked by a malware may pretend that it is normal as usual and retrieve secrets from st...