ROUTERMASTER: A Full-Stack Route and Logistics Management System using Java Spring Boot
Authors
CSE Student, BUIT Bhopal (India)
CSE Student, BUIT Bhopal (India)
CSE Student, BUIT Bhopal (India)
CSE Student, BUIT Bhopal (India)
Co-Guide, BUIT Bhopal (India)
Guide, BUIT Bhopal (India)
CSE HOD, BUIT Bhopal (India)
Article Information
DOI: 10.51584/IJRIAS.2026.110200110
Subject Category: Computer Science
Volume/Issue: 11/2 | Page No: 1232-1238
Publication Timeline
Submitted: 2026-02-22
Accepted: 2026-02-28
Published: 2026-03-17
Abstract
This paper presents RouterMaster, a full-stack route and logistics management system developed to streamline trans- portation processes including route creation, vehicle assignment, and delivery monitoring. Traditional route management sys- tems rely heavily on manual coordination, leading to delays, inefficiency, and poor tracking. RouterMaster leverages Java Spring Boot for backend development, MySQL for relational data storage, and a modern web frontend to automate logistics workflows. The system provides secure user authentication, CRUD operations for routes and vehicles, driver assignment management, and a centralized dashboard accessible through REST APIs. The application was tested using Postman and validated for correctness, data integrity, and API compliance. RouterMaster demonstrates how modern enterprise Java tech- nologies can replace manual logistics operations with scalable and efficient digital solutions.
Keywords
Spring Boot, Java, Route Management
Downloads
References
1. R. Kapoor and S. Mehta, Digital Transformation in Logistics and Supply Chain Management, Journal of Industrial Engineering, 2021. [Google Scholar] [Crossref]
2. C. Walls, Spring Boot in Action. Manning Publications, 2019. [Google Scholar] [Crossref]
3. C. Bauer and G. King, Java Persistence with Hibernate, 2nd ed. Manning Publications, 2015. [Google Scholar] [Crossref]
4. L. Richardson and M. Amundsen, RESTful Web APIs. O’Reilly Media, 2013. [Google Scholar] [Crossref]
5. P. DuBois, MySQL, 5th ed. Addison-Wesley Professional, 2013. [Google Scholar] [Crossref]
6. L. Spilca, Spring Security in Action. Manning Publications, 2020. [Google Scholar] [Crossref]
Metrics
Views & Downloads
Similar Articles
- What the Desert Fathers Teach Data Scientists: Ancient Ascetic Principles for Ethical Machine-Learning Practice
- Comparative Analysis of Some Machine Learning Algorithms for the Classification of Ransomware
- Comparative Performance Analysis of Some Priority Queue Variants in Dijkstra’s Algorithm
- Transfer Learning in Detecting E-Assessment Malpractice from a Proctored Video Recordings.
- Dual-Modal Detection of Parkinson’s Disease: A Clinical Framework and Deep Learning Approach Using NeuroParkNet