Académique Documents
Professionnel Documents
Culture Documents
By
April 2019
ii
APPROVAL SHEET
ACKNOWLEDGEMENT
We, the researchers will be forever grateful to the following because this thesis
First and foremost, this study would not be possible without the guidance of
Almighty God for whom we owe everything. We thank Him for guiding and bestowing
us knowledge and wisdom through this journey. Truly, nothing is impossible with Him.
To our beloved parents, our deepest gratitude for supporting us morally and
To our beloved technical adviser, Engr. Richard Y. Dela Cruz, who guided and
suggested brilliant ideas for the improvement of our study, he gave us his precious time
despite of his hectic schedule and supported us during our final defense until the
To Engr. Albert C. Cruz Jr., our subject adviser, for giving us knowledge on
writing a quality paper, for constant weekly reminders about deadlines and tasks, and for
his patience not only for the team but for everyone in our class. Thank you, Sir!
Besides our adviser and subject teacher, we also like to thank the rest of our thesis
committee: Engr. Robert Justin Chavez, Engr. Alexander M. Aquino, Engr. Maria Lorena
SP. Villena, and Engr. Amanda Fe H.Abelardo, for their suggestions and
Morales and Marjoe Vince F. Sumaray for last minute cramming sessions from the
iv
beginning until our defense, to sleepless nights catching up for deadlines, to spending
quality time playing mobile legends, and to a year full of memories. Thank you!
Lastly, our earnest gratitude to our peers who motivated us to the point of berating
us that kept our fire of desire to complete the bachelor’s degree burning.
v
DEDICATION
especially those who were very close to our heart. My humble effort I dedicate to my
loving mama and papa, who supported me in every possible way they can and the reason
why I became today. Thanks for the great support and continuous care. To my relatives,
friends and classmates, who helped our group in many ways and extended their helping
hands without any hesitation. I dedicate this humble work to all of you (MRBG, 2019).
I would like to take this opportunity to express my heartfelt gratitude to all those
who helped us to finish our thesis work. To my Mama and Tito Randy who supported me
morally and financially, thanks to the both of you, without you two this little achievement
will not be possible. To my support system who always cheer me up during my worst days
and believed me when no one can. Thank you, you guys are amazing (IRMM, 2019).
At the very beginning, of all things up to this study and way more ahead of time,
the passion and the strong will to overcome everything life has thrown at me was and
always be for those who always believed in me and for my real friends who stayed during
my darkest days. I, would never be the same as I am now without those people. Thank
last January and to my “Nanay” who also died last March. They are the source of my
inspiration and my strength of doing this study and not to give up despite all the trials,
difficulties, problems that I encounter in my day-to-day living. I offer you this finished
ABSTRACT
Monitoring and controlling of things being placed across quite a distance have
now gone to be an essential necessity in our society, given the growing range of our
technology, we disperse the more complex things into a simpler one. The manual
operation of switching devices on and off takes a lot of time, let alone the time it would
take on crossing the distance from place to place. Given this common problem of
monitoring and controlling of components, a reliable and convenient way regarding this
problem is indeed necessary, which gave the researcher the will to conduct a study that
will be a reliable solution for the stated problem which was encountered by many and
specifically, by the university. This study aims to design and develop LAN-based control
and monitoring mechanism which can lessen the time that it would take on doing such
things manually. The design consists of Relays, Arduino Mega, Ethernet Shield,
Terminal Blocks, LAN Cable and Router that can turn on and off the components
installed in a room through LAN-based website and can monitor their real-time status
with the help of CCTV camera. The researcher conducted a six test trial that will
proposed Internet of Things (IoT) based Monitoring and Controlling System of CIT
Based from the tests conducted on the system, the researcher came up with the following
hardware and software specifications: The respondents evaluated the system as good in
from the research that it can help the university to monitor and control electronic units
TABLE OF CONTENTS
TITLE PAGE i
APPROVAL PAGE ii
ACKNOWLEDGEMENT iii
DEDICATION v
ABSTRACT vi
TABLE OF CONTENTS vii
LIST OF TABLES ix
LIST OF FIGURES x
LIST OF EQUATIONS xi
Introduction 1
Statement of the Problem 2
Significance of the Study 3
Scope and Delimitation 4
Relevant Theories 5
Related Literature 6
Related Studies 13
Conceptual Framework 15
Definition of Terms 17
Chapter III: RESEARCH METHODOLOGY 18
TABLE OF CONTENTS
Design a device that can turn off and on the devices inside for room
automation 23
Develop web-based process of monitoring and controlling devices 31
LIST OF TABLES
Table 4.9: Respondent’s Overall Assessment of the Monitoring and Controlling System
LIST OF FIGURES
Figure 3.1: Project Development based on the Iterative Model Project Design 19
Figure 4.1: Block Diagram of Internet of Things (IoT) based Monitoring and
Figure 4.2: The Design Prototype of Internet of Things (IoT) based Monitoring
Figure 4.4: Web Page flowchart of Internet of Things (IoT) based Monitoring
LIST OF EQUATIONS
Chapter I
Introduction
Monitoring of a place across a distance have now has been an essential necessity
in our society, given the growing range of our technology. The manual operation of
switching devices on and off takes a lot of time, so there is a need to come up with a
Bulacan State University (BulSU) was established in the year 1904 and became
into a university in 1993 by virtue of Republic Act 7665. It is one of the leading
special instruction for special purpose. It has to promote research and extension services,
advanced studies and extension services, advanced studies and progressive leadership.
Remote access over things between places is one of the problems being
encountered by the university. CCTV surveillance cameras are not enough to monitor
what is happening inside the new 310 room from the COE building itself. Not only the
students are having a hard time travelling from place to place within a given period but
The Internet of Things (IOT) based Monitoring and Controlling System of CIT
rooms through world wide web. It will also provide complete automation of switching
The general problem of this study is: How to design and develop an Internet of
providing effective and reliable way of securing and monitoring the rooms in Alvarado
Hall?
1. How to design a device that will turn on and off the devices inside for
room automations?
following study:
criteria:
4.1 Functionality;
4.2 Reliability;
4.3 Efficiency;
4.4 Maintainability;
3
4.5 Portability?
The significance of this study is to focus in developing a device that will monitor
and control the laboratory rooms in AH building through BulSU-MIS lan connection.
Faculty Member. The college secretary will benefit in this study because he can
Researchers. The researchers would also benefit in this study because this will
enhance the skills and work performance while inheriting knowledge throughout the
development of the system. And as for the future researchers, the system will serve as an
inspiration to those who wanted to develop and improve the existing system. The said
idea will also serve as a stepping stone in developing a system using different devices and
approaches. They can also use this research as a reference for whatever study they will be
venturing. Further revision of this study to improve the system will be intensely promoted
The study is focused on the design and development of Internet of Things (IOT)
through BulSU-MIS Lan Connection to monitor and control the laboratory rooms in
Alvarado Hall building. Also, the study focuses on the room automation and web based.
The entire system is divided into four (4) main functions: (1) Computer room
automation of AH-COE Computer lab rooms (2) Can control (turn on/off) the lights,
outlets and AC units of AH-COE rooms (3) A CCTV that will give real time footages to
monitor what is happening inside the classroom (4) A server to PC access through local
area network.
It works only on the MIS Lan connection. Though it will provide access to the
lighting and all the electric equipment in the computer laboratory, it will not cover the
access of the adjustments within the said equipment. For instance, the temperature
adjustments of the air-condition and electric fans.It will not feature an intruder detector
alarm system for the smart door locks. Also, the study focuses on the web-based room
automation.
5
CHAPTERII
THEORETICAL FRAMEWORK
This chapter provides review of related concepts, principles, and studies that are
relevant in examining the problem and serves as guide to examine the relationships
among the different factors that affect the study. This includes the conceptual principles
of the study, research framework, and definition of terms. Different media are used to
collate information that utilizes different materials found from books, articles and internet
Relevant Theories
This part of the chapter contains synopsis of the theories relevant to the present
study. It serves as a guide for further understanding about the system as a whole and
paradigm for modelling and analyzing Home Automation. A rich and versatile
environment for Home Automation System simulation is constructed for investigating the
performances of the system. The exploitation of limited resources (electricity, gas, hot
with the problem of developing systematic design and validation procedures for control
strategies, global performance indices for the system are introduced. Different strategies
for allocating resources and establishing priorities in their use can therefore be tested and
compared.
6
Internet Theory. According to Hans Dieter Huber (1995), the internet theory
provides a structural coupling between the Net and its support from the environment. The
environment "holds" the system and provides the relevant resources and supports to
Related Literature
The following are the literature which the researchers used in developing the system:
Internet of Things (IoT). The Internet of things (IoT) is a system that has the
and digital machines, objects, animals or people that are provided with unique identifiers
(UIDs). Internet of things was first mentioned by a presentation by Kevin Ashton, co-
founder of the Auto-ID Center at MIT, at Procter & Gamble (P&G) in 1999. Ashton
addressed his presentation as “Internet of Things” not only by his desire to bring radio
incorporate the cool new trend of 1999 which was the Internet. It is also a natural
application program for process control, the gathering of data in real time from remote
locations to control equipment and conditions. SCADA systems has both hardware and
software components. The hardware component gathers and feeds data into a computer
7
that has SCADA software installed, where it is then processed and presented it in a timely
manner.
desktops, laptops, smartphones and tablets, to any range of traditionally dumb or non-
internet-enabled physical devices and everyday objects. IoT ecosystem consists of web-
enabled smart devices that use embedded processors, sensors and communication
hardware to collect, send and act on data they acquire from their environments. These IoT
devices share the sensor data being collected through connecting to an IoT gateway or
other type of edge devices where data is either sent to the cloud to be analyzed or
analyzed locally.
Things. It has been around for many decades in terms of lighting and simple appliance
control. Recently, technology caught up with the idea of the interconnected world at the
touch of your fingertips or a simple voice command to Alexa, Google Assistant, Siri and
Cortana. A home automation system will control lighting, climate, entertainment systems,
and appliances. It may also include home security such as access control and alarm
systems. When connected with the Internet, home devices are an important constituent of
"gateway". The user interface for control of the system uses either wall-mounted
circuit which is dedicated to perform one task and execute one specific application. It
8
Microcontrollers are mostly designed for embedded applications and are heavily used in
“brain” or “control center” in a robot since it is usually responsible for all computations,
decision making and communications. (Coleman Benson, 2010). He added that, in order
to interact with the outside world, a microcontroller possesses a series of pins (electrical
signal connections) that can be turned HIGH (1/ON) or LOW (0/OFF) through
programming instructions. He also said that, these pins can also be used to read electrical
signals (coming from sensors or other device) and tell whether they are HIGH or LOW.
In similar way, he said that, microcontrollers can be used to control other electrical
devices such as actuators (when connected to motor controllers), storage devices (such as
microcontroller kits for building digital devices and interactive objects that can sense and
control objects in the physical and digital world. Arduino is an open-source hardware and
software company, project and user community that designs and manufactures single-
board microcontrollers and microcontroller kits for building digital devices and
interactive objects that can sense and control objects in the physical and digital world. Its
products are licensed under the GNU Lesser General Public License (LGPL) or the GNU
General Public License (GPL), permitting the manufacture of Arduino boards and
9
instructions used to produce various kinds of output. Programming languages are used to
It is based on the Wiznet W5100 Ethernet chip (datasheet). The Wiznet W5100 provides
a network (IP) stack cable of both TCP and UDP. It supports up to four simultaneous
socket connections. Use the Ethernet library to write sketches which connect to the
CCTV camera. also known as video surveillance is the use of video cameras to
transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast
television in that the signal is not openly transmitted, though it may employ point to
point, point to multipoint, or mesh wired or wireless links. Though almost all video
cameras fit this definition, the term is most often applied to those used for surveillance in
areas that may need monitoring such as banks, stores, and other areas where security is
needed. Though Video telephony is seldom called "CCTV" one exception is the use of
video in distance education, where it is an important tool. Surveillance of the public using
CCTV is common in many areas around the world. In recent years, the use of body worn
video cameras has been introduced as a new form of surveillance, often used in law
has generated significant debate about balancing its use with individuals' right to privacy
for automatically screening closed circuit television (CCTV) cameras for large and small
scale security systems, as used for example in parking garages. The system includes six
primary software elements, each of which performs a unique function within the
operation of the security system to provide intelligent camera selection for operators,
analysis of video data is performed wherein a single pass of a video frame produces a
terrain map which contains parameters indicating the content of the video. Based on the
parameters of the terrain map, the system is able to make decisions about which camera
an operator should view based on the presence and activity of vehicles and pedestrians,
compatible with existing CCTV (closed circuit television) systems and is comprised of
electromagnetic switch that can turn on and off a much bigger electric current. An
electromagnet, a coil of wire that becomes temporary magnet when electricity flows
through it, acts as the heart of relays. A relay is somehow a kind of electric lever, switch
it on and with a tiny current and it switches on another appliance using a much bigger
current. It controls one electrical circuit by opening and closing contacts in another
electromagnet, an armature, a spring and a set of electrical contacts. Relays are necessary
when there must be electrical isolation between controlled and control circuits, or when
for computers, although there are programmable machines that use a limited set of
computers. Early ones preceded the invention of the digital computer, the first probably
being the automatic flute player described in the 9th century by the brothers Musa in
Baghdad, during the Islamic Golden Age. From the early 1800s, programs were used to
direct the behavior of machines such as Jacquard looms, music boxes and player pianos.
However, their programs (such as a player piano's scrolls) could not produce different
Web Programming. Web programming refers to the writing, markup and coding
involved in Web development, which includes Web content, Web client and server
scripting and network security. The most common languages used for Web programming
are XML, HTML, JavaScript, Perl 5 and PHP. Web programming is different from just
can then be viewed by anyone else connected to the internet. He added in his tutorial that
it is easy to learn, with the basics being accessible to most people in one sitting, and quite
evolution to meet demands and requirements of the growing internet audience under
direction of the W3C, the organization charged with designing and maintaining the
CSS. Stands for "Cascading Style Sheet." Cascading style sheets are used to
format the layout of Web pages. They can be used to define text styles, table sizes, and
other aspects of Web pages that previously could only be defined in a page's HTML. CSS
is designed to enable the separation of presentation and content, including layout, colors,
and fonts. This separation can improve content accessibility, provide more flexibility and
share formatting by specifying the relevant CSS in a separate .css file, and reduce
networks, computing devices exchange data with each other using connections (data
links) between nodes. These data links are established over cable media such as wires or
optic cables, or wireless media such as Wi-Fi. Network computer devices that originate,
route and terminate the data are called network nodes. Nodes are identified by network
addresses and can include hosts such as personal computers, phones, servers as well as
networking hardware. Two such devices can be said to be networked together when one
device is able to exchange information with the other device, whether or not they have a
protocols are layered over other more general communications protocols. This formidable
running reliably.
called sketches. These sketches are written in the text editor and are saved with the file
13
extension. The editor has features for cutting/pasting and for searching/replacing text.
The message area gives feedback while saving and exporting and also displays errors.
The console displays text output by the Arduino Software (IDE), including complete
contains a text editor for writing code, a message area, a text console, a toolbar with
buttons for common functions and a series of menus. It connects to the Arduino hardware
Related Studies
Connection there are many related studies which were taken into consideration to
compare the similarities and differences. Studies that involve on line information systems
Web-based learning extends beyond the confines of the classroom. Not only is
delivery of educational content uncoupled from classroom schedules and locations, a new
experiment, students can gain an understanding and experience beyond that which the
web allows direct control of physical processes and observation of noise and practical
physical processes in their non-ideal conditions, students can gain a deeper physical
14
intuition. On-line laboratories offer the ability to remotely and independently observe
students’ progress without interfering with their learning process. Data can be collected
about the learning process, the operation of equipment, andmethods used to tackle
problems. Though CyberLab features remote access to laboratories through the world
wide web, it doesn’t provide access to the electric equipment installed in the said
laboratory.
Remote patient monitoring service through world wide web presents a real-
time remote patient monitoring service through the world wide web (www) which allows
physicians to monitor their patients in remote sites using popular Web browsers. The
real-time patient monitoring consists of two services: The Patient Locator Service (PLS)
and the Vital Sign Monitoring Service (VSMS). The PLS provides information about the
patients currently being monitored. The VSMS allows the user to observe a stream of
vital sign data, such as ECG, respiration, temperature, SpO/sub 2/, invasive blood
pressure, non-invasive blood pressure, etc., from a specific patient in real-time. The
difference between the proposed study and remote patient monitoring service through
world wide web is that it is medical related and requires more complicated techniques to
achieve the desired results (Ho Sung Lee et. al, 2002.)
Method for Monitoring the Location of Individuals via the World Wide Web using a
a subscriber’s mobile cellular telephone and for providing the location information to an
15
authorized user through the world wide web. The geographical location of the
over the control channel by the cellular telephone. This information is supplied to a
for the cellular telephone. A database stores the geographical location information along
with a subscriber's telephone number and account code. The database is updated to track
Conceptual Framework
designing and evaluating the acceptability of the Internet of Things (IOT) based
BulSU-MIS Lan Connection. The study adopted the IPO Model, which stands for input,
output, and process. The inputs necessary for the development of the proposed study are
gathering of data through interview and observation, studying and reviewing Internet,
studying related and similar systems. The process by which the software is to be
debugging and acceptance. The output referred to in this research is the proposed Internet
This represents the steps in the development of Internet of Things (IOT) based
BulSU-MIS Lan Connection. The study must characterize the proposed system and cite
16
the possible problems which may be encountered in the development of the project.
Working plan should be carefully follow ed so that it will lead to the development of the
project. Testing and evaluation should be done to determine whether the specified goals
and objectives are met by the system, thus necessary modifications if needed.
Definition of Terms
is classified as an application software that was designed and developed for Bulacan State
University.
Room Automation. This system is used to monitor and control the devices inside
the room.
LAN. Stands for Local Area Network, which serves as data path.
devices embedded in everyday objects, enabling them to send and receive data.
anyone.
.
18
CHAPTER III
RESEARCH METHODOLOGY
This chapter presents the methods and techniques used in pursuing the proposed
study and include how the data are gathered to meet the objectives of the study. This
section also includes the population and sample of the study, research instrument, and
statistical treatment.
and products that must meet criteria of internal consistency and effectiveness.
process is analyzed and described, and the final product is evaluated. The consistency and
System of CIT Computer Laboratory Rooms through BulSU-MIS Lan Connection, the
researcher followed these steps in building the system: 1) Requirements, 2) Analysis and
Design, 3) Testing, 4) Implementation, and 5) Evaluation. The study follows the iterative
model in constructing the Internet of Things (IOT) based Monitoring and Controlling
System of CIT Computer Laboratory Rooms through BulSU-MIS Lan Connection. This
makes sure that the system will have minimum errors once the construction is finished.
Figure 3.1 shows how the model will be implemented in the study.
19
Figure 3.1 Project Development Based on the Iterative Model Project Design
much of errors on the software, therefore, provides short development time and better
applicable for different types of system. A complex system needs a systematic complex
in terms of methodology. This ensures that all the requirements and the function of the
This research collected the data through literature review, observation and
benchmarking. It sprang from an observation that the BulSU COE faculty was interested
in this technology and wanted to use this to monitor and control the laboratory rooms in
Alvarado Hall building. Comparison to some existing studies also inspired the
researchers to go on with this study. This gives the idea and direction for the researchers
in creating something new. Through this, actual operation was observed, and hardware
Lastly, the evaluation of the system by selected participants through the use of
survey instrument was done. The survey instrument that was used in the study is based on
ISO 9126. ISO 9126 is an international standard for the evaluation of software. The
survey instrument covered the five quality factors namely, functionality, reliability,
with the ranking system 4.50 – 5.00 Strongly Agree, 3.50 – 4.49 Agree, 2.50 – 3.49
The data from the study were gathered from the population of the Bulacan State
University main campus. Purposive Technique was used to determine the number of the
identified as follows: (1) in relation of mechanical and computer - 5, (2) and Future
Researchers – 15.
Research Instrument
After the development of the proposed system, it will pass through several testing
procedures, specifically alpha, beta and white box. After the code is mostly completed the
researchers which happened to be the programmer will do the alpha testing. A group of
selected possible users were involved for their comments and suggestions. The next
testing that was done is the beta testing, for which large number of possible users were
White box testing was implemented also and it refers to the use of program source
code as a test basis and was based on internal structures of the software. White box
21
testing, on its own, cannot recognize problems caused by mismatches between the actual
requirements or specification and the code as implemented but it can help identify some
After the testing has been done, the proposed system went through evaluation
using the Quality Model of ISO 9126. The system was introduced to the respondents who
are randomly picked using stratified random technique. They were given a structured
questionnaire and were asked to evaluate the developed system. The researcher presented
and established the developed system to the respondents and let them use the system
Statistical Treatment
The data that were obtained from this research were analyzed using
mathematical equations. The data analysis was generally descriptive and quantitative. For
the results presentation, analysis and presentation of data, the following statistical tools
were utilized: (1) performance of the device in terms of response time of the components,
command, (3) performance of the device in terms of data transfer of the files, and (4)
weighted mean in determining the level of the system’s acceptability concerning the
different criteria. Mean is obtained by adding all scores in the set divided by the number
of Things (IOT) based Monitoring and Controlling System of CIT Computer Laboratory
To compute the value of the mean, researchers used the equation presented below.
𝑴 = 𝜮𝑻⁄𝑵 (𝟑. 𝟏)
Where:
M –Mean
CHAPTER IV
This chapter discusses the analysis and interpretation of data attained in the study
respondents.
Design a device that can turn off and on the devices inside for room automation.
Figure 4.1: Block Diagram of Internet of Things (IoT) based Monitoring and Controlling
Wide Web
24
Isometric View
Figure 4.2: The Design Prototype ofInternet of Things (IoT) based Monitoring and
652.78mm, length of 1193.8mm and height of 508mm. The components were plotted
inside the rooms with the panel box attached at the back of the prototype. The panel box
held all the electronic components such as relays, Arduino, terminal blocks, etc., which
took part in controlling the components plotted in the laboratory rooms miniature through
The identification of materials that were acquired was based on the block
diagram. The researchers studied and analyzed the required components and materials for
continuous workflow when the prototyping and system development started. The
26
following materials were considered by the researchers in order to develop the proposed
project:
A relay is an electromagnetic
translation.
reset button.
28
another.
DC-DC Regulator
Circuit Breaker
29
network connect.
Router
The prototyping gives a chance to the researchers to conduct a research for new
alternatives and test the existing design to confirm the machine’s functionality and
compatibility with respect to the production. The advantage of prototyping is; it can avoid
larger cost if ever the actual project already started without the prototype. Also the
developer and implementer can get feedback from the user. Figure 4.1, Figure 4.2 and
Figure 4.3 shows how to design the hardware prototype. Table 4.1 is the list of all
Connection/World Wide Web the researchers consider the Iterative Model for the
Based on the review of the literature and existing studies, the researchers were
able to identify the problem, objectives and design parameters of the project. Then, the
researchers developed an overview of the proposed system. This stage included the initial
block diagram that has shown the principal parts or functions which were then
blocks.
Requirements. The first phase is the requirements, in which the features required
for the software is defined. The software requirements in the programming language is
identified on this stage. The researchers used the microcontroller Arduino Mega, which
of the project. The researchers believe that if this stage was completed successfully, it
will ensure a smooth working of the remaining iterative model phases and this would not
have burdened the programmer to make changes at later stages because of changing
requirements. The software and hardware for the proper completion of the project was
Analysis and Design. After the planning was completed, block diagram and
flowchart of the study was created in order to analyze what was the flow of the process in
32
the system. Before starting the actual coding, it is highly important to foresee what the
result of software and hardware interaction and what it will look like in actual must
defined. The researchers have chosen the methods for the construction of the actual
system. The researchers considered the hardware, software, and software development
Implementation. This is the third and important phase of the iterative model.
Here, the actual implementation and coding process is executed. All the planning,
specification and design documents up to this point are coded and implemented into this
Testing. The software is designed and needs to go through constant testing to find
it out if there are any errors. It is done so that the user will not face any problem. After
creating the software application and assembling the hardware, testing of the system
should be done to know if it has met the goals and objectives set at the beginning of the
study.
Evaluation. The final phase of the Iterative life cycle is the evaluation phase.
This is where the researchers along with the faculty and authorized personnel, examined
the status of the system and validate whether it is per the suggested requirements.
33
Figure 4.4: Web Page flowchart of Internet of Things (IoT) based Monitoring and
Testing the performance of the device in terms of response time and data transfer of
The results indicated at the test tables are according to how the researchers tested
the device using stopwatch to determine the performance of the device within a given
range.
Table 4.2 shows the response time of each component. The devices that are
installed in the device are as follows: lights, outlet 1 for electric fan, outlet 2 for
computers, and solenoid door lock. The researchers concluded that the stability and speed
of connection can affect the response of the devices on the command from the server.
35
Table 4.3: Response time of each computer unit based on PC to PC connection through
web-based command
Restart 5 75 8 77 10 78
The researchers used two different unit of laptop. One of the laptop of the
researchers was used as a server and the other one used as a client. The results indicated
at the test table are according to how the researchers tested the command of the server
that is connected to the client unit that can be manipulated by the server. The researchers
concluded that the stability and speed of connection can affect the response of the units at
The project evaluation involved the following categories which have their
Table 4.4 shows the overall weighted mean on the category for Functionality that
gives a rating of 4.61 which signifies that the Monitoring and Controlling System of AH-
37
excellent rating from the respondents. The device implemented a system that matches the
desired or expected task as designed because the respondents gave this the highest rate of
4.80 and the lowest rate 4.00 which signifies that the device matches the desired/expected
amount as designed.
The table 4.5 below shows the result of the evaluation of the device based on its
Connection
Table 4.5 shows the overall computed mean on the category for reliability that
gives a rating of 4.15 which signifies that the Monitoring and Controlling System of AH-
excellent rating from the respondents. The device performed its functions as a monitoring
and controlling system for computer laboratories because the respondents gave the
highest rate of 4.30 and lowest rate of 3.95 for the device.
The table 4.6 below shows the result about the evaluation of the device based on
Table 4.6: Respondent’s Assessment on the Efficiency of the Monitoring and Controlling
Table 4.6 shows the overall computed mean on the category for efficiency that
gives a rating of 4.89 which signifies that the Monitoring and Controlling System of AH-
excellent rating from the respondents. The device performed its functions as a monitoring
and controlling system for computer laboratories because the respondents gave the
highest rate of 4.93 and lowest rate of 4.81 for the device.
The table 4.7 below shows the result about the evaluation of the device based on
its Maintainability.
Lan Connection
Table 4.7shows the overall computed mean on the category for maintainability
that gives a rating of 4.48 which signifies that the Monitoring and Controlling System of
very good rating from the respondents. The cleaning of the device receives the lowest
rating of 4.25 from the respondents but the highest rate of 4.75 shows that the system can
Connection
gathered data.
Table 4.8 shows the overall computed mean of the category for portability that
gives a rating of 4.45 which signifies that the Monitoring and Controlling System of AH-
COE Computer Laboratory Rooms through BulSU-MIS Lan Connection meets a very
41
good rating from the respondents. The cleaning of the device receives the lowest rating of
4.11 from the respondents but the highest rate of 4.73 by the terms of accessibility
Table 4.9: Respondents’ Overall Assessment of the Monitoring and Controlling System
Weighted
Criteria Descriptive Responses
Mean
obtained from all the computed overall mean of each category from the evaluation which
means that the device provided a very good rating to all of the users. The highest rating of
4.89 shows the efficiency of the device. The lowest rating of 4.15 implied that the device
CHAPTER V
This chapter presents the summary of the findings on the study, conclusions
drawn from the findings and recommendations offered based on the study.
Summary
The Internet of Things (IoT) based Monitoring and Controlling System of CIT
consists of relays, terminal blocks, and a circuit breaker to ensure the safety of the
hardware during maintenance. Arduino Mega is also used to transfer operations to the
relays which acted as switches for the entire automation process. These relays were
connected to the terminal blocks, which is then connected to the devices to be controlled.
To assure that the system will execute desired commands properly, Arduino IDE
The researchers believe that the implementation of the system will lessen the time
advanced as being developed in other countries. But somehow it will serve as a step in
1. How to design a device that will turn on and off the devices inside for
room automations?
following study?
criteria?
4.1 Functionality;
4.2 Reliability;
4.3 Efficiency;
4.4 Maintainability;
4.5 Portability?
The software development was guided by the Iterative Model because this ensures
that all the requirements and the function of the system have an error-free performance.
The following were utilized during the development of the system. (1) Web
Programming, (2) HTML, (3) CSS, (4) Arduino IDE, and (5) Software Development
Model.
Summary of Findings
Based from the tests conducted on the system, the researcher came up with the
functionality (4.61), maintainability (4.48), portability of the system (4.45). Very good in
efficiency (4.89). Overall, the respondents evaluated the system very good (4.52).
Conclusions
Based on the mentioned findings of the study, the following conclusions were drawn:
1. To design a device that will turn on and off the devices inside for room
change the status (on and off) of a device through world wide web using
served as switches, Ethernet for building up connection with LAN, and terminal
blocks that acted as the physical connection between the internal and external
components.
IDE is used by the researchers to develop a program that utilizes the automation
3. To test the performance of the proposed system in terms of response time and data
transfer. The researchers conducted a series of test to determine how fast and
4. To test the level of acceptability of the system that will meet its desired
Recommendations
Based on the findings and conclusions of the study the following are hereby
2. Thermostat control and ventilation adjustments for air-condition and electric fans.
4. A more secured smart door lock that uses RFID tap card that will include
References
G. Conte, G. Morganti, A.M Perdon and D. (2009). Scaradozzi Multi Agent System
Agents
https://www.researchgate.net/publication/2366591_CyberLab_Remote_access_to_laborat
ories_through_the_world-wide-web
Electrical Tape 1 35 35
Extension 1 300 300
Web Cam 1 250 250
Mini Fan 1 170 170
4.5v Transformer 1 269 269
Arduino Mega Kit 1 1,499 1,499
Pilot light 220vac 1 30 30
Ethernet Shield 1 550 550
16-Channel Relay 1 468 468
Circuit Breaker 1 380 380
Paint Brush 1 30 30
Ply Wood 1 875 875
Plug 1 50 50
Multi-tester 1 280 280
Electronic driver kit 1 150 150
Crimping Tool Set 1 318 318
LM2596 DC-DC 1 90 90
Wood Parquet 1 160 160
Lever Switch 2 30 60
12V Solenoid Lock 2 350 700
2 gang outlet 2 110 220
PVC Plastic 2 40 80
Molding
Terminal Blocks 2 190 380
Power Supply 3 180 540
Capacitor 3 28 84
Double Adhesive 3 25 75
Flexible Hose 3m 20 60
2x2Receptacle 4 25 100
3W LED Bulb 5 75 375
Paint 4 75 300
Caster Wheels 4 60 240
Hinge (Small) 4 13 52
Hinge (Medium) 4 30 120
Sandpaper 4 35 140
No. 12 Flat cord 4m 30 120
RJ45 10 5 50
2.0 Stranded Wire 10m 17 170
Cat5 Cable 11m 25 275
M/F Jumper Wires 40 157 157
Wood Screw 60 0.50 30