You are on page 1of 10

Piggle Charge: A Solar Charging Station for Cellphone and Laptop with

Wireless Charging, RFID Security and Monitoring System


EARL NORWIN A. LAYUG, earlnorwinlayug@gmail.com, Don Honorio Ventura State University
SHARA V. SARMIENTO, sharasrmnt@gmail.com, Don Honorio Ventura State University
JOVITO GERALD III S. CALIMOSO, jovigerald.calimoso@gmail.com, Don Honorio Ventura State University
JAYNEL LHAR M. GOMEZ, jaynelgomez17@gmail.com, Don Honorio Ventura State University
CATHERINE D. INFANTE, cathinfante1994@gmail.com, Don Honorio Ventura State University
KIM V. MACASPAC, macaspackim71@gmail.com, Don Honorio Ventura State University
MC KENLEY S. MATA, mhack.sawal@gmail.com, Don Honorio Ventura State University
BRYLE DRANREB V. SALAC, bryle0111@gmail.com, Don Honorio Ventura State University
JOEL B. QUIAMBAO, jbquiambao@yahoo.com, Don Honorio Ventura State University

ABSTRACT KEYWORDS:

Don Honorio Ventura State University is a well-known 1 INTRODUCTION


university college here in the province of Pampanga. One of the
departments on the Campus is the College of Computing Studies. The 21st Century era opens an opportunity for
Students of CCS, often use their mobile phones in a day everyone in using technological devices that supply the
especially that people are living in the 21st Century where mobile advantages of living and working comfortably. As the
phone is necessary and is one of the means of communication as technological generation arises, the demand of people towards
well as for entertainment purposes. With this, students could not the sufficiency and development in technology also increases.
help but to charge their phones when their battery phone is low. Nowadays, the importance of a battery is almost equivalent to
They charge their mobile phone, or sometimes their laptops inside human life as it generates electrical energy to run a device.
the room, even though they are all aware that charging inside the Besides, according to Varadarajan (2012), the number of people
premises is prohibited. In addition to the unnecessary habit of using mobile phones has increased because of its beauty and
charging gadgets inside the school campus are the cautions in unique use and the more often we use it, charging is necessary
terms of security. It may be unsafe and unsecure to charge any wherever we go.
gadget in the school and the owner worries about that factor so
much. Along with the increasing demand for electricity in
every household is the need to generate more electrical power.
The observations, experiences, interviews, and According to Rivera (2020) in her article, she said that NGCP
researches conducted by the proponents, lead to the idea of the warns of looming power shortages. The demand for electricity
design and development of Piggle Charge: A Solar Charging changes day by day. The supply of electricity is high when the
Station for Cellphone and Laptop with Wireless Charging, RFID demand is high and the supply is low when the demand is low. In
Security and Monitoring System. The study’s aim was prevention other words, the supply of electricity needs to be balanced to
from violations of the rules of the department and to have an avoid shortage and excess supply of power. If coincidentally,
alternative way of charging their mobile phones. The proponents blackouts and brownouts will occur in a particular area. This
planned to develop an eco-friendly charging station. problem makes people’s lives miserable so most companies,
factories, and households came up with an alternative solution
Quantitative research is a method used to justify a which was the use of solar power. That solution gave the
hypothesis. In this way it tests the relationship of objective theory researchers an idea to use solar power as an alternative resource
to its variables. Descriptive research design was used to for the project.
investigate one or more variables used in the study. It is design to
record data of the observations and phenomena over a period of Likewise, based on the observation and the initial data
time. Rapid application development was applied in hardware and collected, students of Don Honorio Ventura State University
software development which allows the system update and (DHVSU) used gadgets as part of the educational curriculum.
iterations. The proposed system used solar power and students One of the struggles that they face was the lack of alternative
can be at ease in terms of security as there is an RFID for safety resources to meet the needs of the students when it comes to
and security purposes. The admin of the proposed system could maximizing the use of technology. As a result, the students tend
monitor all specific areas in the system including the availability of to plug their chargers in the university power outlet. On the
per slot, battery percentage of the solar battery, coin box status, contrary, it does not guarantee that the device will charge
and the transactions made every day as the system comes with because of some problems that students often encounter while
an android application. The students do not have to worry if their charging and this includes; short-circuit and electric line might be
mobile phone’s battery is low. unsafe. CCS - DHVSU has only one power source and power

1
interruption is inevitable. Knowing the significance of battery life in Ever since even in the 7th century B.C solar power has
devices, most of the students seldom bring their chargers to been used as an alternative resources. In its primitive state, the
school and would end up borrowing chargers from their friends. energy from the sun that gave light to our world gave many
opportunities to man. In the 1950's, solar power gave astronauts
With the given problems, it opens a great opportunity the ability to orbit space. Since then there have been a series of
for the proponents of this study to come up with an idea of a Solar space explorations that have given us more knowledge about
Charging Station. It is a machine that has the ability to generate what is outside the earth. (Vivint.solar, 2021). This proves how
electricity without harming the environment. This is to provide a powerful and useful the sun's energy is.
charging station for every student in the College of Computing
Studies as an alternative way to recharge their devices whenever Proponents of this study used RFID to ensure the
they will encounter power interruption. It guarantees that all the safety and security of the device. According to Cobb (2011), the
students will have a safe charging experience. Given the solar- scope of use of RFID is wide, it can be used in stock control and
powered charging station, people may restrain using it because of so far it is also used as ID cards for personnel. One of its
the fear that they might lose their device or someone would steal advantages is contactless authentication where there is no need
it. The proponents put themselves in the shoes of the students to even touch the doorknob to open the door. With RFID, hands
where the needs and hazards of using it are highly considered. free operation has become possible which is also used in
The application and development of an enhanced and efficient barcodes, proximity readers and magnetic stripes. To use RFID,
security system using RFID are highly considered in this you need to hold and place the user's badge close to the scanner
research. With the use of radio frequency identification, the because it uses straight shot technology. Only one badge can be
students will not worry about the safety and security of their read by the scanner and simultaneous readings will not work. It
gadgets as this RFID-generated solar-powered charging station cannot modify the embedded information. RFID badges can come
was developed. RFID or "radio-frequency identification" is proudly in a variety of shapes, can be clipped on, neck loop, or fond of
developed by science. it possesses the ability to automatically with a wrist bond. RFID badges can be read by a scanner over a
recognize anything that can be picked up by its radio frequency. distance and do not require a tag unlike other types of technology.
The microchip with the antenna is called a tag reader and the
To elaborate more about the features of the study, antenna with the access control server is the typical RFID
solar power is the energy emitted by the sun that can be system. The tags have the ability to draw power from the
converted into electricity. it is said to be the cleanest and most magnetic field generated by the reader and use this power to turn
available source of energy. United States is a developed country on the microchip that will deliver the data back to the reader.
known for its wealth in solar resources. Solar technology can be
used in various things such as generating electricity, providing The activated RFID tag has its own power that
light to households and various establishments, operating transmits data accumulated over a specified period of time to the
machinery used in factories and industrialization. Solar power is RFID reader.the range of the reader depends on the frequency
an alternative way to run different appliances where it converts and type of the tag. There are readers that can cover 30000
solar energy, particularly from the sun into electricity. Through the square feet in a total area (Cobb, 2011) . setting a serial number
years, Solar Power is improving where you can now supply that only one user can use is the most common way to secure
electricity to devices and batteries, and is called Solar Charger. and authenticate it using the RFID system. RFID systems can be
modified in most environments that require restrictions on access
On the other hand, there are different types of to information. RFID technology has an automated data capture
renewable energy we have in the world and one of them is solar solution and convenient and has hands free access control that is
energy from the sun. the earth as it is the third planet from the sun versatile over traditional control badges.
receives 1x1012 MW of energy year after year from it which will
be converted and become the electricity we use every day. Not to mention, wireless was already used in the late
Converting sunlight into electricity is a smart way to reduce 19th century where Nikola Tesla, an electicity pioneer
electricity costs and prevent pollution. our world is rich in energy demonstrated a magnetic resonant coupling capable of
from the sun and whether it is used to generate electricity, it is transmitting electricity through the air using a magnetic field
without a doubt the most approved and safest renewable between two cuircuits, a transmitter and a reciever.we are now
resources that can be used. At the core of the sun comes the approaching the age where we no longer have to use cable
energy it releases where hydrogen turns into helium by because the era of wireless charging technology that we can use
thermonuclear reaction. the radiant energy in the core will travel in smartphones and laptops to kitchen appliances and cars is
outward over the sun and out into space in the form of light more emerging. (Mearian 2018)
(Akram and Hassan, 2014).sunlight can be directly converted to
electricity through solar cells and photovolatic systems. this 1.1 Conceptual Framework
system was first used in Malaysia in the 1980’s and continues to
be used by other countries today. the application of this system is Figure 1 presents the conceptual framework that the
centered on the transmission of electricity to rural areas. proponents have adopted to guide our efforts and structure the
(Pandian, 2009). report. The proponents used the IPO model is a functional graph
showing the entire research process. It shows the input, output

2
and the actual process of making the input into output. The model Also, proponents used Relay Modules to separate
also sometimes includes things that can happen within the hardware devices used for remote device switching. One can
process. The input represents the future flow of data and access and control the machine through the use of the internet.
materials to be used for research. The processing step will outline Proponents added GSM Module to establish communication
the steps to be taken in a research that will affect its outcome. between the machine and mobile device. Jumper wires are simple
The output content is data and materials that are used or will wires that have connector pins at each end, allowing them to
happen at the end of the research. connect two points to each other without soldering. Jumper wires
are often used in conjunction with breadboards and other
Input reflects the perceived problems encountered by prototyping tools to facilitate circuit diversification if necessary.
most of the students in DHVSU. These problems include:
charging prohibition inside the school premises, security issues For keeping the system up to date, proponents used
while charging, and electrical consumption. These problems and the RTC Module that has a battery setup in the absence of
issues encountered by the students were processed through the external power that could keep the module running.
data that was collected by the proponents to be analyzed.
Software and hardware development tools were used to organize To help users be comfortable in using the machine,
the system. It was processed through system planning, analysis, proponents used Nextion 7” touch screen LCD. Based on
design, deployment implementation, and testing. After the computation and research, proponents used 50 watts solar panel,
analysis of the hypothesis and the data collected from the 12v 20 amp batteries, and AC to DC inverter to give the machine
procedure, a solar charging station with several high-tech features electric power. Using a Solenoid lock and a 50 cm Linear
for cell phones and laptops was developed. The breakdown of Actuator, the solar panel rotates with the help of a Light
system development is elaborated below. Dependent Resistor (LDR) or Photo resistor. This passive device
is capable of converting light energy to visible or infrared parts of
the spectrum to become electrical signals output. To convert and
1.2 Software Development Tools reduce the voltage, the researchers used the step-down DC to
DC. Lastly, 12 V Relay for Chanel is used to control the solenoid
The software comprises to the whole set of programs, lock, cell phone adaptor, and linear actuator.
procedures, and routines related to the operation of the computer
system. To offer a collection of instructions on to a computer's
hardware to perform a task is termed a program or software
program. The several phases that provide methods for building
products that meet user requirements and technical
specifications.

With the outcome of gathered information, the


proponents used C and C++ to create an instruction for Arduino
boards to be able to read inputs and produce outputs to the
machine. However, the proponents used the Visual Studio IDE
together with Xamarin Forms for the software development
(interface and program logic) of android based application in
monitoring the status of the machine, for the Graphic User
Interface (GUI) design of the LCD touchscreen the proponents
used the Nextion Editor LTS, for the system website and for the
multimedia materials the proponents used Adobe Illustrator and
Adobe Photoshop.

1.3 Hardware development tools

Hardware is a common term or part of a computer that


refers to machinery and parts located outside the computer or the
physical part of a computer itself. The RFID tag as one of the
outstanding features of Piggle Charge served as the security
system of the devices. Proponents used Arduino Uno, Arduino
Mega, and Arduino Nano; an open-source microcontroller boards
to set digital and analog (I/O) pins. The microcontroller provides
access to the Wi-Fi network where it has the ability to host an
application or offload all Wi-Fi networks in the Piggle Charge
application. Figure 1: Conceptual Framework Using IPO (input-process-
output) Paradigm

3
1.4 Objectives of the Study 1.6 Significance of the Study

The study about Piggle Charge: A solar charging This study was significant to the following:
station for cellphone and laptop with wireless charging, RFID
Security and Monitoring System seek to attain the following Student. The study benefits the students of DHVSU
objectives: because the study provides a secure charging station for the
student.
 To conduct a research of the alternative resources that
DHVSU. The study contributed to the university in
supplies the needs of DHVSU students.
terms of the growth in technology. This is to lessen the risk of
 To develop an enhanced and efficient security system
danger when a student recharge in the university power outlet.
using RFID.
Also it lessens the electricity consumption.
 To design a machine that has the ability to generate
electricity without harming the environment.
Academic researchers. The study enhanced the critical
thinking of the researchers with regards to system development.
1.5 Scope and Delimitation
The findings of this study could also provide information and data
that researchers need to support or contradict similar studies and
Piggle Charge: A solar charging station for cell phone
enrich its finding. In addition, the study could be a forerunner on
and laptop with wireless charging, RFID Security and Monitoring
future researchers. It can help them provide ideas on how to
System solely for the benefit of the students of Don Honorio
develop a more complex but more effective android based and
Ventura State University. It has two user levels of access namely
solar charging machine in the future.
admin and students. It uses the LAN/WLAN database where the
information/data/records should be stored. One of the main
2 METHODS
features of the system is the rotatable solar panel that has a light
sensor so it can follow the sunlight from time to time. It also has a
This chapter contains research methodology. Written
hibernate system where the machine automatically shut down at
in this section are the author's points about the research strategy,
7:00 o’clock PM and automatically turn on at 6:00 o’clock am
research method, and research approach, method of data
every day. The Coin counter only accepts one peso, five pesos,
collection and how the research participants were selected wisely.
and ten pesos coins in BSP 1995 to New Generation Currency
The flow of research, and type of data analysis, ethical insights
Coin series 2018. Second incredible feature of this project also
and limitations to the research conducted are also present in this
includes the RFID technology where every slot has a key card
chapter.
tag. When the student chose his/her charging slot, the student
has to get an RFID key card tag so he/she could get the
2.1 Research Approach 
assurance that he/she will be the only one who can open the
chosen slot. However, if the student did not or forgot to return the
With this study, the researchers used quantitative
RFID key card tag after charging his/her device the machine’s
approach for it is an approach that dissects and tests objective
alarm will automatically ring for 10 seconds. Moreover, the
theories by analyzing the relationship of variables. These
Administrators could check vacant and occupied slots in the
variables on the other hand, can be measured by
machine using an android based application. The admin could
instrumentations in which the collected data are analyzed by
also monitor the coin inserted in the machine and also the admin
statistical procedures. Qualitative and quantitative research are
was capable to identify if the coin counter was full, so that they
almost identical, like other researchers who engage in this form of
could manually reset the coin counter. Admins could check the
inquiry, they have assumptions regarding testing theories
battery life of the machine as well. In addition, the android based
deductively, avoiding bias, controlling for alternative explanations
application has a web-based version, but this web-based version
and opinions that have no clear basis and have ability to
cannot be viewed using a mobile phone because it cannot
generalize and replicate findings. (Cresswel, 2014) In order to
automatically adjust its size.
satisfy the objectives of the dissertation, a quantitative research
was held. The main characteristics of quantitative research are: it
This one of a kind wireless solar charging station was
is the most appropriate form in measuring large samples, it is
designed and developed only for the students of DHVSU. Paper
measurable and quantifiable. Quantitative research contains
bills cannot be accepted because it was designed for coins only.
information that revolves around numerical data, quantities and
Paper bills lack in durability and it won’t have any value after it
numbers. In this way quantitative research has become unique to
was destroyed.  The student cannot check his/her device while
the qualitative approach where it is known as the inferential
charging; this is for security purposes only. Once someone
process which aims to ascertain the object through observation
opened the door lock charging time will automatically stop. If
and description.
anyone loses the key tag, only the admin can reopen the slot. If
the battery life is 20% below, all slots will be disabled, so only the
This research will apply the systematic approach that
remaining device inside the machine is to be accommodated.
will be based on the empirical investigation of observable
Hardly, an android platform can run the application.
4
phenomena. It will use statistical models, computational particular place, person or event is discussed and chosen to
techniques and mathematics to form and employ a hypothesis or provide or convey important information that cannot be obtained
theory about a particular idea. It is important to measure ideas by with other choices. It is a non-probability sampling technique
numbers. The success of a study is based on this type of where a group of samples are selected by the researchers based
research. This method is known to be used in psychology, on their knowledge and judgment. It was used in choosing the
sociology, and marketing as a way to verify that an intelligent respondents and gathering information thus the chance of being
guess is true and correct without being based on an individual’s chosen as a respondent was reasonable and based only on
opinion and instinct. This method digs into the facts before giving specific purposes. 
suggestions or information about the outcome. Therefore, this
research involves the use of the scientific method in which the
variables must first be tested and the hypothesis verified to be
correct and reliable. (Miller 2020)    2.4 Population

2.2 Research Design The respondents of this study were the students
enrolled under the College of Computing Studies of DHVSU. They
The researchers used a descriptive type of research were selected by the researchers because they were the people
which according to (McCombes, 2020) is used to observe, involved or the subject in the proposed study. It is also because
describe and record aspects of the situation that occur naturally. It they widely used gadgets for their school works. There were 200
involves collecting data that will describe the population, situation respondents from Don Honorio Ventura State University's College
and research circumstances. It answers what, where, when and of Computing Studies
how questions, but not why questions. This research design used
a wide variety of research methods to investigate variables. This 2.5 Statistical Treatment 
method is used to find some related topics regarding the
proposed system which served as the starting point of the The Data gathered from the survey administered by
researcher in collecting different information needed. the researchers through an online platform were analyzed using
Likert scale.
2.3 Data Gathering Procedure
The strength/intensity of an attitude is assumed to be
In this study, the proponents gathered data using linear on a Likert scale. On a scale of strong agreement to strong
quantitative surveys wherein the proponents distributed survey disagreement, and assumes that attitudes can be calculated. The
forms using an online platform. It is often used in business Likert Scale is a psychometric tool that measures how often
research which allows to have access to a large number of people people agree with a statement or group of statements. Likert
to take part in the research. The availability of online sites opened scales are one-dimensional (only measure a single trait) and non-
up opportunities for extensive and inexpensive distribution of comparative scaling techniques. Respondents were asked to use
survey and organization responses. an ordinal scale to show their degree of agreement with a given
argument.
Online surveys were conducted to collect data from
students of DHVSU. The respondents answered 2 surveys for the Statistics is a tool for interpreting numerical data
study: Pre survey and post survey. The main respondents for this obtained by various methods such as interviews or
study are the College of Computing (CCS) students. They were questionnaires. The statistical procedure made it possible to
given questionnaires through Google forms. The collected data classify all the information given to respondents in various
was then used for data functionality, accessibility, reliability, categories. In statistical procedure, the developers classified all
usability and maintainability for the main concerns of the students. the data in a group which were derived from the respondents. For
However, researchers used descriptive study including valid and reliable interpretation of data, the following statistical
questionnaires, and data analysis as their instruments. methods were used in presenting the effectiveness of data of the
  existing proposed system. 
According to LeCompte and Schensul, as the process
the researchers used a research data analysis for reducing data A weighted mean average is one in which each
to a story and interpreting it to derive insights. Which makes quantity to be averaged is given a numerical value. On average,
sense, this process helps in reducing a large amount of data into these weightings determine the relative importance of each
smaller fragments. The purpose of this study is to give quantity. Weightings are the equivalent of including that many
convenience to the students of the College of Computing Studies similar items in the average of the same value.
at Don Honorio Ventura State University in charging their gadgets
with a high level of security and also, to maximize the use of non- The frequency for each category is multiplied by the
renewable resources, specifically the solar energy. category to get the weighted mean of each item. After that, the
items were added together and separated by the number of
The respondents of the study were selected using instances.
purposive or judgmental sampling. It is a strategy used in which a

5
The following formulas were used. development methods. It belongs to the parent category of agile
development techniques.

WM=ΣWV Figure 2 represents the RAD Diagram. The


N researchers used this rapid application development model
because it provides a system for the users to interact with, even if
WM is the weighed mean, WV is the weighed value, N it is not ready for wide-spread organizational use at first. It also
is the number of case and E is the sum. informs users that developers worked on the system, and it
assisted in the rapid refining of real-world system specifications
rather than trying to comprehend a system specification on
To get the overall assessment for the security, paper. Users were able to communicate with the device and gain
reliability and efficiency of the existing/current and proposed a deeper understanding of its capabilities and limitations. The
system, the weighted mean was computed. The following technique also helped developers save money on development
conversion was used and tabulated. by exposing them to potential system improvements.

Table 1: Rating Scale and Point Value System.


Rating Scale Point Value

Excellent 4

Good 3

Fair 2 Figure 2: Rapid Application Development Model Diagram

Poor 1
More features and components were designed, coded,
tested and added to the software on every next procedure.
To get the overall evaluation of the efficiency, security However, in the process, researchers learned that with the use of
and reliability of the existing and proposed system, the following a microcontroller, it can code and test the components used in the
conversion table for computed mean was used:  development of the study. Every procedure and update must be
completed so that more features and capabilities would be
accomplished than that of the previous one. Multiple
Table 2: Numerical Rating and Descriptive Rating development, implementation, and analysis iteration was applied
in this study.
Mean Descriptive Rating
The researchers arranged all the system requirements,
4.00 – 3.26 Excellent specification documents, developing hardware, software
requirements, and prepared for all the other changes and updates
3.25 – 2.51 Good of the system. Following the completion of the planning stage, an
investigation was carried out in the design stage, which included
2.50 – 1.76 Fair
procedures such as defining any technical specifications such as
1.75 – 1.00 Poor data layers, languages, facilities, and so on, which were ultimately
used to satisfy the needs of the analysis stage.
This study was conducted at Don Honorio Ventura
Somehow proponents used lots of components to
State University (DHVSU), Bacolor Main Campus. The
make the project because it is important to have proper
proponents chose this place to help and contribute to the school
information and knowledge about all the hardware and software
premises as well as to the students. The researchers used these
components of the project. Specifications of hardware and
instruments to achieve the main purpose of the research in
software were presented in this chapter. They were shown to
coming up with detailed data for building the proposed system.
feature important factors considered in the implementation of the
proposed system (see table 1 for hardware and software
According to the article of Powell-Morse in 2016, the
development tools).
development model prioritized rapid prototyping and quick
assessment over long drawn out invention and testing cycle is
Table 3: Hardware and Software Development Tools
called Rapid Application Development (RAD). This concept was
applied to hardware development as well. With this model, Hardware Specification Software Specification
developers can make numerous iterations and updates to the
software without having to re-create the development schedule Arduino Uno Arduino IDE
each time. RAD is one of the most prevalent and influential
Arduino Mega Visual Studio 2019

6
In this part of the study, the proponents presented and
interpreted the results that they gathered from the students of
Arduino Nano Xamarin CCS. The result showed how the proposed system was
developed as well as what part of the system has to be to be
RFID Tag Notepad ++ improved in the existing manual process. The data analysis is all
about finding how the existing manual process is secure, reliable,
RTC Module Adobe Photoshop
and efficient. On the data gathering procedure, the proponents
Jumper Wires Adobe Illustrator used 200 questionnaires that serve as instruments during the
length of the study.
Microsoft SQL Server Management
WiFi Module
Studio The following are the some screenshots, 3D Design
and Logo of the proposed system.
Solenoid Lock XAMPP

5V 2 Channel Relay
Nextion
Module

Nextion 7” Touch Screen


LCD

12.5VDC to 115VAC
Inverter

50 Watts Solar Panel

30amp Charge Controller

GSM Module

LDR Photoresistor

Linear Actuator 50cm

Switching Power Supply

12V 20amp Battery

12V Relay for Chanel Figure 3: Piggle Charge Logo

Coin Slot

Step Down DC to DC

Following the researchers previous phases, the


implementation phase was responsible for the actual coding of
the device modules created during the design phase. Based on
the framework and architectural specifications, the best
programming language was selected. The coding was performed
based on the coding guidelines and standards. The code goes
through numerous code reviews and was optimized for best
performance before the final build was checked into the repository
then things were coded and implemented into this initial iteration
of the project. The testing process followed, with unit tests
generated during the module design phase being run on the code
during this validation phase. Once all previous phases have been Figure 4: LCD Touch Screen GUI
completed, it is time for a thorough evaluation of development up
to this point, which means the researchers, as well as locale
staffs, must examine where the project is at, where it needs to be,
what may or should change, and if any changes can be made.

3 RESULTS

7
Figure 6: Main Admin Home Page

Figure 7: Status Page


Figure 5: Login Page

8
proposed system got an efficient degree with computed value of
3.3. While the efficiency got a 3.35 average weighted mean.

4.2 Conclusion
Figure 8: Coin Counter Page
Piggle Charge: A Solar Charging Station for Android,
iPhone and Laptop with Wireless Charging and RFID Security
and Monitoring System offers more advantageous than the
existing system. The students feel safer to leave their devices
because of the security measures given by the proponents in the
station. There’s another alternative way to supply power electricity
to recharge phones and laptop whenever there is power
interruption in an eco-friendly way. With the proposed system,
violating the rules in DHVSU mainly in CCS will be avoided
because there is already a charging station.

4.3 Recommendations

The proposed system was intended for Don Honorio Ventura


Figure 9: 3D Model of Charging Station Mahcine State University (DHVSU). It was created to improve the existing
system of the locale. The following recommendations can be
considered for future development and improvement of the Piggle
Charge: A Solar Charging Station for Android, iPhone and Laptop
with Wireless Charging and RFID Security and Monitoring
System.

1. The system can be implemented in other University or


Business Establishment around the globe
2. The system can make a payment via online bank,
Figure 10: 3D model of the Solar Panel debit card and any e-payment services available.
3. The machine can accept not just coins but also paper
4 DISCUSSION bills as payment.
4. A system application used by administrators that can
be used both cell phone and laptop.
4.1 Summary of Findings 5. An added security feature for RFID key tag so that
even lost, the slot cannot be open by another
The proposed study aims to lessen the electricity costumer. Finally, this research is open for the
usage in terms of charging android, iPhone, laptop, and other reference of the future researchers.
devices of the students in Don Honorio Ventura State University
specifically in College of Computing Studies. Based on the
observation of the proponents, CCS - DHVSU has only one power ACKNOWLEDGEMENT
source, and power interruption is inevitable. The students tend to
plug their charger in the university power outlet that does not
First of all, we are grateful to The Almighty God for
guarantee the device will charge because of some problem that
lending us the strength and wellbeing that enabled the completion
students often encounter while charging and this includes; short-
of this study and for his guiding light at the times when we were
circuit and electric line might be unsafe.
lost.
The proponents conducted interviews and preliminary
We wish to extend our deepest and sincerest gratitude
questionnaire to know the need of charging station needed and
to Ms. Julieta Umali, our research coordinator, for the guidance
based on the result some of the students agreed on the proposed
and encouragement in carrying out this project work, to our
system though not all the students supported the idea. With the
research adviser, Mr. Joel Quiambao, for his expertise,
help of the respondents who tested the proposed system and
assistance, guidance, and patience throughout the process of
validate if the proposed system is secured, efficient, and reliable.
writing this thesis. His guidance helped us in the time of our
The proponents computed average of weighted mean for the
research and we could not have hoped for a better adviser. We
security of the proposed system which was 3.38 described as
want to thank Mr. Arvee Domingo, and Mr. Oliver Santos, owner
having the secure degree of the compliance among the aspects
of LanceGo Electronic Parts, we are extremely grateful and
or the characteristics of the proposed system that the proponents
indebted to them for their expert, sincere, and valuable guidance
considered in developing the system. The reliability of the
9
regarding the hardware. A special thanks to Ms. Giselle Olaguir frequency-identification?_ga=2.180439790.892099537.1602063820-
1729799982.1601516902
Torio, our thesis grammarian, for helping us in making this
manuscript done. To Ms. Jenny Naral-Calimoso for being our
photographer in our documentation and for unending support to  Varadajan, M.S. (2012) “Coin Based Universal Mobile Battery
Charger” www.iosjen.org
our group. We are eternally grateful to the faculty members of
College of Computing Studies of Don Honorio Ventura State
University for their help and encouragement.  McCombes, S. (2019) “Descriptive Research”
https://www.scribbr.com/methodology/descriptive-research/
To all the graduating students of College of Computing
Studies Academic Year 2020-2021, for the most part, Bachelor of
Science in Information Technology 4B, thank you for all the joy  Solar Energy Industries Association (2021) “Solar Energy”
https://www.seia.org/initiatives/about-solar-energy
and laughter we’ve imparted to each and every one for the past
four years of stay in DHVSU, despite all the trials and anxieties
that passes unto us. This will be forever cherished. Our warmest  Vivint solar (2021), “History of Solar Energy: Who Invented Solar
Panels?” https://www.vivintsolar.com/learning-center/history-of-solar-
thanks are due to the Infante Family, who showed their selfless energy
hospitality for accommodating us wholeheartedly into their homes.

Lastly, our parents/guardians, we also offer our


sincerest gratitude for their untiring support, financial, emotional,
and spiritual needs, and unconditional love, which is more than
enough, as we hurdle all the obstacles in the completion of this
research study.

REFERENCES

 Cobb, M. (2011), “RFID projects: Implementation Considerations, RFID


Security Concerns” https://www.computerweekly.com/tip/RFID-projects-
Implementation-considerations-RFID-security-concerns

 Rivera, D. (2020) “NGCP Warns of Looming Power Shortage” The


Philippine Star

 Taherdoost, H. (2016) “Sampling Methods in Research Methodology;


How to Choose a Sampling Technique for Research”
https://www.researchgate.net/publication/319998246_Sampling_Meth
ods_in_Research_Methodology_How_to_Choose_a_Sampling_Techn
ique_for_Research

 Husson University Online (2021),”What Is the Software Development


Life Cycle?” https://online.husson.edu/software-development-cycle/

 Ahsan, I. (2014) “Solar Power as Renewable Energy for Home


Systems in Bangladesh”

 Pandian, JJ. (2009) “Solar Powered Battery Charger with State of


Charge Indicator Circuit”

 Creswell, J. (2014) “Research Design – Qualitative, Quantitative and


Mixed Methods Approces 4th Edition”

 Let’s Talk Science, (2019) “Understanding Electricity Supply and


Demand” https://letstalkscience.ca/educational-
resources/backgrounders/understanding-electricity-supply-and-
demand

 Lucas, M. (2018) “Wireless Charging explained: What is it and How


does it Work?”
https://www.computerworld.com/article/3235176/wireless-charging-
explained-what-is-it-and-how-does-it-work.html

 Rouse, M. (2012) “RFID: Radio Frequency Identification”


https://internetofthingsagenda.techtarget.com/definition/RFID-radio-
10

You might also like