Professional Documents
Culture Documents
ABSTRACT KEYWORDS:
1
interruption is inevitable. Knowing the significance of battery life in Ever since even in the 7th century B.C solar power has
devices, most of the students seldom bring their chargers to been used as an alternative resources. In its primitive state, the
school and would end up borrowing chargers from their friends. energy from the sun that gave light to our world gave many
opportunities to man. In the 1950's, solar power gave astronauts
With the given problems, it opens a great opportunity the ability to orbit space. Since then there have been a series of
for the proponents of this study to come up with an idea of a Solar space explorations that have given us more knowledge about
Charging Station. It is a machine that has the ability to generate what is outside the earth. (Vivint.solar, 2021). This proves how
electricity without harming the environment. This is to provide a powerful and useful the sun's energy is.
charging station for every student in the College of Computing
Studies as an alternative way to recharge their devices whenever Proponents of this study used RFID to ensure the
they will encounter power interruption. It guarantees that all the safety and security of the device. According to Cobb (2011), the
students will have a safe charging experience. Given the solar- scope of use of RFID is wide, it can be used in stock control and
powered charging station, people may restrain using it because of so far it is also used as ID cards for personnel. One of its
the fear that they might lose their device or someone would steal advantages is contactless authentication where there is no need
it. The proponents put themselves in the shoes of the students to even touch the doorknob to open the door. With RFID, hands
where the needs and hazards of using it are highly considered. free operation has become possible which is also used in
The application and development of an enhanced and efficient barcodes, proximity readers and magnetic stripes. To use RFID,
security system using RFID are highly considered in this you need to hold and place the user's badge close to the scanner
research. With the use of radio frequency identification, the because it uses straight shot technology. Only one badge can be
students will not worry about the safety and security of their read by the scanner and simultaneous readings will not work. It
gadgets as this RFID-generated solar-powered charging station cannot modify the embedded information. RFID badges can come
was developed. RFID or "radio-frequency identification" is proudly in a variety of shapes, can be clipped on, neck loop, or fond of
developed by science. it possesses the ability to automatically with a wrist bond. RFID badges can be read by a scanner over a
recognize anything that can be picked up by its radio frequency. distance and do not require a tag unlike other types of technology.
The microchip with the antenna is called a tag reader and the
To elaborate more about the features of the study, antenna with the access control server is the typical RFID
solar power is the energy emitted by the sun that can be system. The tags have the ability to draw power from the
converted into electricity. it is said to be the cleanest and most magnetic field generated by the reader and use this power to turn
available source of energy. United States is a developed country on the microchip that will deliver the data back to the reader.
known for its wealth in solar resources. Solar technology can be
used in various things such as generating electricity, providing The activated RFID tag has its own power that
light to households and various establishments, operating transmits data accumulated over a specified period of time to the
machinery used in factories and industrialization. Solar power is RFID reader.the range of the reader depends on the frequency
an alternative way to run different appliances where it converts and type of the tag. There are readers that can cover 30000
solar energy, particularly from the sun into electricity. Through the square feet in a total area (Cobb, 2011) . setting a serial number
years, Solar Power is improving where you can now supply that only one user can use is the most common way to secure
electricity to devices and batteries, and is called Solar Charger. and authenticate it using the RFID system. RFID systems can be
modified in most environments that require restrictions on access
On the other hand, there are different types of to information. RFID technology has an automated data capture
renewable energy we have in the world and one of them is solar solution and convenient and has hands free access control that is
energy from the sun. the earth as it is the third planet from the sun versatile over traditional control badges.
receives 1x1012 MW of energy year after year from it which will
be converted and become the electricity we use every day. Not to mention, wireless was already used in the late
Converting sunlight into electricity is a smart way to reduce 19th century where Nikola Tesla, an electicity pioneer
electricity costs and prevent pollution. our world is rich in energy demonstrated a magnetic resonant coupling capable of
from the sun and whether it is used to generate electricity, it is transmitting electricity through the air using a magnetic field
without a doubt the most approved and safest renewable between two cuircuits, a transmitter and a reciever.we are now
resources that can be used. At the core of the sun comes the approaching the age where we no longer have to use cable
energy it releases where hydrogen turns into helium by because the era of wireless charging technology that we can use
thermonuclear reaction. the radiant energy in the core will travel in smartphones and laptops to kitchen appliances and cars is
outward over the sun and out into space in the form of light more emerging. (Mearian 2018)
(Akram and Hassan, 2014).sunlight can be directly converted to
electricity through solar cells and photovolatic systems. this 1.1 Conceptual Framework
system was first used in Malaysia in the 1980’s and continues to
be used by other countries today. the application of this system is Figure 1 presents the conceptual framework that the
centered on the transmission of electricity to rural areas. proponents have adopted to guide our efforts and structure the
(Pandian, 2009). report. The proponents used the IPO model is a functional graph
showing the entire research process. It shows the input, output
2
and the actual process of making the input into output. The model Also, proponents used Relay Modules to separate
also sometimes includes things that can happen within the hardware devices used for remote device switching. One can
process. The input represents the future flow of data and access and control the machine through the use of the internet.
materials to be used for research. The processing step will outline Proponents added GSM Module to establish communication
the steps to be taken in a research that will affect its outcome. between the machine and mobile device. Jumper wires are simple
The output content is data and materials that are used or will wires that have connector pins at each end, allowing them to
happen at the end of the research. connect two points to each other without soldering. Jumper wires
are often used in conjunction with breadboards and other
Input reflects the perceived problems encountered by prototyping tools to facilitate circuit diversification if necessary.
most of the students in DHVSU. These problems include:
charging prohibition inside the school premises, security issues For keeping the system up to date, proponents used
while charging, and electrical consumption. These problems and the RTC Module that has a battery setup in the absence of
issues encountered by the students were processed through the external power that could keep the module running.
data that was collected by the proponents to be analyzed.
Software and hardware development tools were used to organize To help users be comfortable in using the machine,
the system. It was processed through system planning, analysis, proponents used Nextion 7” touch screen LCD. Based on
design, deployment implementation, and testing. After the computation and research, proponents used 50 watts solar panel,
analysis of the hypothesis and the data collected from the 12v 20 amp batteries, and AC to DC inverter to give the machine
procedure, a solar charging station with several high-tech features electric power. Using a Solenoid lock and a 50 cm Linear
for cell phones and laptops was developed. The breakdown of Actuator, the solar panel rotates with the help of a Light
system development is elaborated below. Dependent Resistor (LDR) or Photo resistor. This passive device
is capable of converting light energy to visible or infrared parts of
the spectrum to become electrical signals output. To convert and
1.2 Software Development Tools reduce the voltage, the researchers used the step-down DC to
DC. Lastly, 12 V Relay for Chanel is used to control the solenoid
The software comprises to the whole set of programs, lock, cell phone adaptor, and linear actuator.
procedures, and routines related to the operation of the computer
system. To offer a collection of instructions on to a computer's
hardware to perform a task is termed a program or software
program. The several phases that provide methods for building
products that meet user requirements and technical
specifications.
3
1.4 Objectives of the Study 1.6 Significance of the Study
The study about Piggle Charge: A solar charging This study was significant to the following:
station for cellphone and laptop with wireless charging, RFID
Security and Monitoring System seek to attain the following Student. The study benefits the students of DHVSU
objectives: because the study provides a secure charging station for the
student.
To conduct a research of the alternative resources that
DHVSU. The study contributed to the university in
supplies the needs of DHVSU students.
terms of the growth in technology. This is to lessen the risk of
To develop an enhanced and efficient security system
danger when a student recharge in the university power outlet.
using RFID.
Also it lessens the electricity consumption.
To design a machine that has the ability to generate
electricity without harming the environment.
Academic researchers. The study enhanced the critical
thinking of the researchers with regards to system development.
1.5 Scope and Delimitation
The findings of this study could also provide information and data
that researchers need to support or contradict similar studies and
Piggle Charge: A solar charging station for cell phone
enrich its finding. In addition, the study could be a forerunner on
and laptop with wireless charging, RFID Security and Monitoring
future researchers. It can help them provide ideas on how to
System solely for the benefit of the students of Don Honorio
develop a more complex but more effective android based and
Ventura State University. It has two user levels of access namely
solar charging machine in the future.
admin and students. It uses the LAN/WLAN database where the
information/data/records should be stored. One of the main
2 METHODS
features of the system is the rotatable solar panel that has a light
sensor so it can follow the sunlight from time to time. It also has a
This chapter contains research methodology. Written
hibernate system where the machine automatically shut down at
in this section are the author's points about the research strategy,
7:00 o’clock PM and automatically turn on at 6:00 o’clock am
research method, and research approach, method of data
every day. The Coin counter only accepts one peso, five pesos,
collection and how the research participants were selected wisely.
and ten pesos coins in BSP 1995 to New Generation Currency
The flow of research, and type of data analysis, ethical insights
Coin series 2018. Second incredible feature of this project also
and limitations to the research conducted are also present in this
includes the RFID technology where every slot has a key card
chapter.
tag. When the student chose his/her charging slot, the student
has to get an RFID key card tag so he/she could get the
2.1 Research Approach
assurance that he/she will be the only one who can open the
chosen slot. However, if the student did not or forgot to return the
With this study, the researchers used quantitative
RFID key card tag after charging his/her device the machine’s
approach for it is an approach that dissects and tests objective
alarm will automatically ring for 10 seconds. Moreover, the
theories by analyzing the relationship of variables. These
Administrators could check vacant and occupied slots in the
variables on the other hand, can be measured by
machine using an android based application. The admin could
instrumentations in which the collected data are analyzed by
also monitor the coin inserted in the machine and also the admin
statistical procedures. Qualitative and quantitative research are
was capable to identify if the coin counter was full, so that they
almost identical, like other researchers who engage in this form of
could manually reset the coin counter. Admins could check the
inquiry, they have assumptions regarding testing theories
battery life of the machine as well. In addition, the android based
deductively, avoiding bias, controlling for alternative explanations
application has a web-based version, but this web-based version
and opinions that have no clear basis and have ability to
cannot be viewed using a mobile phone because it cannot
generalize and replicate findings. (Cresswel, 2014) In order to
automatically adjust its size.
satisfy the objectives of the dissertation, a quantitative research
was held. The main characteristics of quantitative research are: it
This one of a kind wireless solar charging station was
is the most appropriate form in measuring large samples, it is
designed and developed only for the students of DHVSU. Paper
measurable and quantifiable. Quantitative research contains
bills cannot be accepted because it was designed for coins only.
information that revolves around numerical data, quantities and
Paper bills lack in durability and it won’t have any value after it
numbers. In this way quantitative research has become unique to
was destroyed. The student cannot check his/her device while
the qualitative approach where it is known as the inferential
charging; this is for security purposes only. Once someone
process which aims to ascertain the object through observation
opened the door lock charging time will automatically stop. If
and description.
anyone loses the key tag, only the admin can reopen the slot. If
the battery life is 20% below, all slots will be disabled, so only the
This research will apply the systematic approach that
remaining device inside the machine is to be accommodated.
will be based on the empirical investigation of observable
Hardly, an android platform can run the application.
4
phenomena. It will use statistical models, computational particular place, person or event is discussed and chosen to
techniques and mathematics to form and employ a hypothesis or provide or convey important information that cannot be obtained
theory about a particular idea. It is important to measure ideas by with other choices. It is a non-probability sampling technique
numbers. The success of a study is based on this type of where a group of samples are selected by the researchers based
research. This method is known to be used in psychology, on their knowledge and judgment. It was used in choosing the
sociology, and marketing as a way to verify that an intelligent respondents and gathering information thus the chance of being
guess is true and correct without being based on an individual’s chosen as a respondent was reasonable and based only on
opinion and instinct. This method digs into the facts before giving specific purposes.
suggestions or information about the outcome. Therefore, this
research involves the use of the scientific method in which the
variables must first be tested and the hypothesis verified to be
correct and reliable. (Miller 2020) 2.4 Population
2.2 Research Design The respondents of this study were the students
enrolled under the College of Computing Studies of DHVSU. They
The researchers used a descriptive type of research were selected by the researchers because they were the people
which according to (McCombes, 2020) is used to observe, involved or the subject in the proposed study. It is also because
describe and record aspects of the situation that occur naturally. It they widely used gadgets for their school works. There were 200
involves collecting data that will describe the population, situation respondents from Don Honorio Ventura State University's College
and research circumstances. It answers what, where, when and of Computing Studies
how questions, but not why questions. This research design used
a wide variety of research methods to investigate variables. This 2.5 Statistical Treatment
method is used to find some related topics regarding the
proposed system which served as the starting point of the The Data gathered from the survey administered by
researcher in collecting different information needed. the researchers through an online platform were analyzed using
Likert scale.
2.3 Data Gathering Procedure
The strength/intensity of an attitude is assumed to be
In this study, the proponents gathered data using linear on a Likert scale. On a scale of strong agreement to strong
quantitative surveys wherein the proponents distributed survey disagreement, and assumes that attitudes can be calculated. The
forms using an online platform. It is often used in business Likert Scale is a psychometric tool that measures how often
research which allows to have access to a large number of people people agree with a statement or group of statements. Likert
to take part in the research. The availability of online sites opened scales are one-dimensional (only measure a single trait) and non-
up opportunities for extensive and inexpensive distribution of comparative scaling techniques. Respondents were asked to use
survey and organization responses. an ordinal scale to show their degree of agreement with a given
argument.
Online surveys were conducted to collect data from
students of DHVSU. The respondents answered 2 surveys for the Statistics is a tool for interpreting numerical data
study: Pre survey and post survey. The main respondents for this obtained by various methods such as interviews or
study are the College of Computing (CCS) students. They were questionnaires. The statistical procedure made it possible to
given questionnaires through Google forms. The collected data classify all the information given to respondents in various
was then used for data functionality, accessibility, reliability, categories. In statistical procedure, the developers classified all
usability and maintainability for the main concerns of the students. the data in a group which were derived from the respondents. For
However, researchers used descriptive study including valid and reliable interpretation of data, the following statistical
questionnaires, and data analysis as their instruments. methods were used in presenting the effectiveness of data of the
existing proposed system.
According to LeCompte and Schensul, as the process
the researchers used a research data analysis for reducing data A weighted mean average is one in which each
to a story and interpreting it to derive insights. Which makes quantity to be averaged is given a numerical value. On average,
sense, this process helps in reducing a large amount of data into these weightings determine the relative importance of each
smaller fragments. The purpose of this study is to give quantity. Weightings are the equivalent of including that many
convenience to the students of the College of Computing Studies similar items in the average of the same value.
at Don Honorio Ventura State University in charging their gadgets
with a high level of security and also, to maximize the use of non- The frequency for each category is multiplied by the
renewable resources, specifically the solar energy. category to get the weighted mean of each item. After that, the
items were added together and separated by the number of
The respondents of the study were selected using instances.
purposive or judgmental sampling. It is a strategy used in which a
5
The following formulas were used. development methods. It belongs to the parent category of agile
development techniques.
Excellent 4
Good 3
Poor 1
More features and components were designed, coded,
tested and added to the software on every next procedure.
To get the overall evaluation of the efficiency, security However, in the process, researchers learned that with the use of
and reliability of the existing and proposed system, the following a microcontroller, it can code and test the components used in the
conversion table for computed mean was used: development of the study. Every procedure and update must be
completed so that more features and capabilities would be
accomplished than that of the previous one. Multiple
Table 2: Numerical Rating and Descriptive Rating development, implementation, and analysis iteration was applied
in this study.
Mean Descriptive Rating
The researchers arranged all the system requirements,
4.00 – 3.26 Excellent specification documents, developing hardware, software
requirements, and prepared for all the other changes and updates
3.25 – 2.51 Good of the system. Following the completion of the planning stage, an
investigation was carried out in the design stage, which included
2.50 – 1.76 Fair
procedures such as defining any technical specifications such as
1.75 – 1.00 Poor data layers, languages, facilities, and so on, which were ultimately
used to satisfy the needs of the analysis stage.
This study was conducted at Don Honorio Ventura
Somehow proponents used lots of components to
State University (DHVSU), Bacolor Main Campus. The
make the project because it is important to have proper
proponents chose this place to help and contribute to the school
information and knowledge about all the hardware and software
premises as well as to the students. The researchers used these
components of the project. Specifications of hardware and
instruments to achieve the main purpose of the research in
software were presented in this chapter. They were shown to
coming up with detailed data for building the proposed system.
feature important factors considered in the implementation of the
proposed system (see table 1 for hardware and software
According to the article of Powell-Morse in 2016, the
development tools).
development model prioritized rapid prototyping and quick
assessment over long drawn out invention and testing cycle is
Table 3: Hardware and Software Development Tools
called Rapid Application Development (RAD). This concept was
applied to hardware development as well. With this model, Hardware Specification Software Specification
developers can make numerous iterations and updates to the
software without having to re-create the development schedule Arduino Uno Arduino IDE
each time. RAD is one of the most prevalent and influential
Arduino Mega Visual Studio 2019
6
In this part of the study, the proponents presented and
interpreted the results that they gathered from the students of
Arduino Nano Xamarin CCS. The result showed how the proposed system was
developed as well as what part of the system has to be to be
RFID Tag Notepad ++ improved in the existing manual process. The data analysis is all
about finding how the existing manual process is secure, reliable,
RTC Module Adobe Photoshop
and efficient. On the data gathering procedure, the proponents
Jumper Wires Adobe Illustrator used 200 questionnaires that serve as instruments during the
length of the study.
Microsoft SQL Server Management
WiFi Module
Studio The following are the some screenshots, 3D Design
and Logo of the proposed system.
Solenoid Lock XAMPP
5V 2 Channel Relay
Nextion
Module
12.5VDC to 115VAC
Inverter
GSM Module
LDR Photoresistor
Coin Slot
Step Down DC to DC
3 RESULTS
7
Figure 6: Main Admin Home Page
8
proposed system got an efficient degree with computed value of
3.3. While the efficiency got a 3.35 average weighted mean.
4.2 Conclusion
Figure 8: Coin Counter Page
Piggle Charge: A Solar Charging Station for Android,
iPhone and Laptop with Wireless Charging and RFID Security
and Monitoring System offers more advantageous than the
existing system. The students feel safer to leave their devices
because of the security measures given by the proponents in the
station. There’s another alternative way to supply power electricity
to recharge phones and laptop whenever there is power
interruption in an eco-friendly way. With the proposed system,
violating the rules in DHVSU mainly in CCS will be avoided
because there is already a charging station.
4.3 Recommendations
REFERENCES