0% found this document useful (0 votes)
59 views

Iot Based Smart Switch App For Home Automation Update

Uploaded by

aliahbayrante286
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

Iot Based Smart Switch App For Home Automation Update

Uploaded by

aliahbayrante286
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

IOT BASED SMART SWITCH APP FOR HOME AUTOMATION

A Capstone Project Proposal

Presented to the Faculty of the

College of Computer Studies

Lyceum of Alabang

In Partial Fulfillment

of the Requirements for the Degree

Bachelor of Science in Information Technology

by

Villafuerte, Matthew
Caballes, Carl
Bayrante, Aliah
Llantos, Marygrace
Atos, Erika

2024

i
LYCEUM OF ALABANG
COLLEGE OF COMPUTER STUDIES

CERTIFICATE OF READINESS

This Capstone Project titled Iot based Smart Switch App Home Automation is

prepared and submitted by Villafuerte Matthew A., Caballes Carl, Bayrante Aliah,

Llantos Marygrace R., and Atos Erika A. in partial fulfillment of the requirements of

the degree of BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY has

been adequately prepared and submitted by the researchers and is hereby

endorsed by the undersigned for oral examination.

Deladia, Bobby

Technical Adviser

KM 30 National Road, Tunasan, Muntinlupa City


ii
TABLE OF CONTENTS

Preliminaries

Title Page i

Certificate of Readiness ii

Table of Contents iii

List of Figures v

List of Tables vi

Chapter 1. INTRODUCTION

Project Context 1

Purpose and Description 2

Objectives of the Study 3

Significance of the Study 4

Scope and Limitations 5

Chapter 2. REVIEW OF RELATED LITERATURE AND SYSTEMS

Security and Control 7

Internet of Things 12

Microcontrollers 19

App Development Tools 24

Related Systems 28

Synthesis 38

iii
Conceptual Model of the Study 39

Definition of Terms 40
Chapter 3. DESIGN AND METHODOLOGY

Software Development Methodology 42

Requirements Analysis 45

Requirements Documentation 49

Project Design 52

Evaluation Procedure 55

Testing Procedure 58

REFERENCES

APPENDICES

Appendix A. Communications

Appendix B. Instrument Tool

Appendix C. Work Breakdown and Gantt Chart

Appendix D. Curriculum Vitae

iv
LIST OF FIGURES

No Title Page

1 Power Consumption 28

2 Home Design 29

3 Register 30

4 On/Off 31

5 Login 32

6 Authentication` 33

7 Plug 34

8 Add Devices 35

9 Setting 36

10 App Front Design 37

11 Input Process Output 39

12 Scrum 42

13 Use Case Diagram 46

14 Sequence Diagram 47

15 Case Diagram 48

16 Sign In 52

17 Signup 53

18 Home 54

v
LIST OF TABLE

No Title Page

1 Software Evaluation Rating 56

2 Ranges of Weighted Mean and Interpretation 57

vi
Chapter 1

INTRODUCTION

Project Context

In today's rapidly evolving technological landscape, the integration of

Internet of Things solutions into everyday life has become increasingly dominant,

offering outstanding convenience and efficiency. The core strength of IoT resides

in its capacity to boost efficiency and productivity. Through fostering seamless

communication among devices and systems, IoT streamlines processes and

enables automation. A notable example is within the manufacturing sector, where

IoT sensors integrated into machinery can continuously monitor performance

indicators, facilitating predictive maintenance and reducing downtime to a

minimum.

In many households, the current setup for managing appliances and

devices lacks the necessary intelligence and automation to mitigate potential risks

and enhance overall safety. Individuals might inadvertently leave appliances

running or lights on, leading to energy wastage and increased electricity bills. In

more severe cases, such as forgetting to turn off a stove or iron, there's a risk of

fire hazards, posing a serious threat to both property and lives. The existing

scenario typically involves manual control of devices through traditional switches,

which often results in forgetfulness. This lack of automated monitoring and control

mechanisms increases the likelihood of energy wastage and safety hazards. By

leveraging IoT technology, this app could offer users greater control and oversight

1
of their home environment, helping to prevent energy wastage and reduce the risk

of fire incidents. Based on the problem stated, the researchers would like to

propose a system titled IoT-based Smart Switch App Home Automation.

Purpose and Description

The IoT-based Smart Switch App for Home Automation represents a

sophisticated software solution designed to streamline and enhance the

management of household appliances and devices through IoT technology. Home

automation, facilitated by this app, refers to the integration of smart devices and

systems within a residence to enable remote monitoring, control, and automation

of various functions. The smart switch app exemplifies the principles of home

automation by providing users with intuitive controls and automation capabilities

that streamline daily routines and enhance the smart living experience.

The Smart Switch App for Home Automation using IoT technology brings

practical advantages in tackling energy waste and safety risks linked to manual

device control. With this app, users can monitor and manage their devices, solving

problems like accidentally leaving appliances on or lights switched on. This means

less energy is wasted, helping to lower electricity bills. Plus, the app's user-friendly

design makes it simple to check device status and turn them off remotely, cutting

down unnecessary energy use and making homes more energy-efficient. By

replacing manual control with automated monitoring and control mechanisms, the

2
smart switch app reduces the likelihood of safety hazards associated with

forgetfulness, contributing to a safer and more secure home environment for users.

Objectives of the Study

The general objective is to help the beneficiaries and not only that, also is

to develop a Iot based Smart Switch App Home Automation, it specifically aims to:

• To develop a system for Iot based Smart Switch App Home Automation

o portable mobile app

o tailored and efficient user experience

o monitoring energy efficiency, security, and ease of use in the context

of home automation through the IoT-based smart switch app

• To Develop for a user-friendly smart switch app

• Design the system using UML

• Create the application using Kotlin Language

• Test the functionality of the system using alpha and beta testing

• Evaluate the acceptability of the application using ISO/EIC 25010:2011.

3
Significance of the Study

The significance of developing an IoT-based Smart Switch App for Home

Automation lies in its potential to revolutionize the way people interact with and

control their living environments. The implementation of such a system contributes

to energy conservation and sustainability efforts. Homeowners are individuals who

own residential properties and are the primary beneficiaries of IoT-based smart

switch app home automation. With this technology, homeowners can conveniently

control various devices and systems within their homes remotely through a

smartphone application. With the ability to remotely monitor and manage

household devices, homeowners can streamline their daily routines, optimize

energy usage, and enhance safety. In an era where climate change and energy

efficiency are pressing concerns, initiatives like IoT-based home automation offer

tangible solutions to address these challenges.

By designing and developing a functional Smart Switch App. Researchers

are professionals or academics engaged in the study and development of IoT

technologies, particularly in the realm of home automation. Their focus is exploring

the potential of IoT-based smart switch app home automation to improve efficiency,

enhance user experience, and address challenges. Their findings contribute to the

refinement of existing technologies and the development of innovative solutions to

make a system. They experiment with new ideas and check how well they work.

They come up with creative ideas to improve a system. They build prototypes and

prepare them for careers in the rapidly evolving field of IoT and smart home

technologies.

4
Scope and Limitation

The scope of the IoT-based Smart Switch App for Home Automation

includes several essential features aimed at enhancing user experience and

functionality. The system extends to monitoring the power consumption home

appliances remotely and track how much power each appliance consumes daily

report of connected devices. Users will be able to view detailed insights into their

power consumption habits and remotely turn devices on or off as needed,

promoting energy efficiency and cost savings. The smart switch app will include

automatic computation capabilities. The app will automatically calculate and

display the daily power consumption for each connected appliance . Innovative

home automation system that allows users to control electrical plugs remotely

through an intuitive mobile application. Secure user login to ensure only authorized

access to the app. If login authentication fails, the system is designed to prevent

access to the application, ensuring that only verified users can proceed. The

application provides a "Forgot Password" feature to assist users who have

forgotten their login credentials. This feature guides users through a secure

password recovery process, where they can reset their password by correctly

answering predefined security questions. Common appliances that can be

connected include lights and fans, however, for demonstration purposes, the

project will focus on using a light, allowing users to conveniently control and

automate their home environment for enhanced comfort and efficiency. Through

features like remote on/off control. The software solution will enable users to

remotely control various electrical appliances and devices within their homes. Key

5
features of the proposed software will include intuitive energy usage tracking and

remote access capabilities. The beneficiaries of this project are homeowners, but

for demonstration purposes, the system will be tested in a laboratory setting.

The Smart Switch App is dependent on WIFI connectivity solely for remote

control functionality, limiting them to outlets. This means that if there are issues

with the WIFI network, users may lose the ability to remotely manage their devices

until the problem is resolved. Additionally, the reliance on WIFI coverage may

restrict the effectiveness of smart switches in areas with poor signal strength or

outdoor settings, potentially impacting their usability and convenience. The system

requires that the app connects to the Wi-Fi network If the app is not connected to

this specific network, it will not be able to communicate and control the smart

switches. The system may have limitations on the number of devices it can

effectively manage due to processing and memory constraints. As the number of

connected devices increases, the response time might increase, and performance

could degrade. The app is developed for Android devices; users with iOS devices

cannot use the app unless an iOS version is developed. A significant limitation of

the application is its exclusive compatibility with lighting systems, restricting its

utility to users who seek to control other types of smart home devices. Users need

to familiarize themselves with the app and the smart switch setup, which might be

challenging for non-technical users. Potential vulnerabilities in the home network

could be exploited to gain unauthorized access to the smart switches. The

effectiveness of the Wi-Fi network might be limited by physical obstructions and

the distance

6
Chapter 2

REVIEW OF RELATED LITERATURE AND SYSTEMS

Security and Control

Local

Security and control in an organizational context refer to the systematic

measures and protocols implemented to safeguard information, assets, and

personnel. This encompasses a broad range of strategies including physical

security, cybersecurity, access control, and monitoring systems. Effective security

and control mechanisms are critical for protecting against unauthorized access,

data breaches, and other threats that could compromise the integrity and

confidentiality of sensitive information. According to Liu et al. (2023), The rapid

expansion of Internet technology has given rise to intelligent lifestyles, with the

Internet of Things (IoT) becoming increasingly widespread. Smart homes, a

hallmark of this era, signify a transition from traditional home setups to intelligent,

interconnected environments. However, this interconnectedness also introduces

security challenges such as hacker attacks and malware, posing risks to user data

and privacy. Consequently, effective network security threat detection is essential

for smart home applications to enhance system security and stability [1]. The

research by Lagunzad et al. (2023), A secure file transfer solution for local area

networks (LANs) using a Raspberry Pi 4 and the Advanced Encryption Standard

(AES) algorithm. This solution addresses common security issues in institutions

where maintaining file transfer confidentiality is critical. The researchers

7
implemented a duplicate server system with a Raspberry Pi 4 and a WIFI router,

encrypting all uploaded files with AES to ensure data security. The system includes

a user-friendly web page interface for administrators to manage user access.

Experiments confirm the system's effectiveness, with AES encryption securing

files and limiting access to authorized users. The file transfer speed performance

is comparable to traditional LAN methods. The study underscores the role of

encryption in mitigating security risks and recommends further research to assess

scalability and performance in larger LAN environments [2]. As previously stated

by Ecarma et al. (2022), The security implications of rooting an Android device,

enable users to unlock the operating system and perform various customizations.

Focusing on Android 7 Nougat, the researchers aimed to assess the

security of rooted devices. They conducted penetration tests using tools such as

msfvenom, meterpreter, and Metasploit, successfully compromising the rooted

Android phone. Despite the rooting process granting superuser permissions, the

device's security measures failed to detect and protect against malicious files,

revealing potential vulnerabilities that persist even after rooting [3]. As Shown by

Parocha and Macabebe (2019) The growth of the home automation industry, is

driven by the increased usage of smartphones and smart devices. Despite this

growth, interoperability issues remain due to the lack of standardized protocols in

the application layer. The researchers implemented a home automation system

using the OpenHAB framework, focusing on integrating diverse smart devices and

backend technologies. They emphasized creating a modular and flexible smart

home solution framework to accommodate devices with different communication

8
protocols. The system uses the RESTful protocol to integrate devices like smart

bulbs, plugs, and TVs, and the MQTT protocol for sensors monitoring room

conditions. Additionally, the study compares this framework to Samsung's

SmartThings in terms of user-friendliness, security, and compatibility with various

smart devices [4]. Cendana et al. (2018) the Internet of Things (IoT) across various

sectors, particularly focusing on enhancing quality of life and economic growth

through its applications in homes and businesses. Emphasizing Smart Home

technology, the study highlights how IoT can improve living standards. The

research investigates the relationship between energy consumption and a Smart

Home IoT framework. The findings show a monthly decrease of 30 kWh in energy

usage after deploying the Multiple Appliances Remote Controller for Home

(MARCHome) in a two-story house, compared to the average household

consumption of 240 kWh over three months. This reduction suggests significant

potential benefits of IoT in energy management and in preventing incidents like

fires. The results also indicate that energy consumption reduction can range from

10% to 30% per kilowatt, influenced by factors such as Internet connectivity and

active smartphone usage [5].

9
Foreign

Security and control within an organization involve the implementation of

comprehensive measures to protect data, assets, and personnel. According to the

study by Othman et al. (2021), the significance of Bring Your Own Device (BYOD)

settings in enhancing work flexibility and technological compatibility, while also

addressing the challenges of securing corporate data on personal devices. It

underscores the importance of Information System (IS) audits in evaluating mobile

device security after BYOD implementation, particularly in identifying risks and

vulnerabilities. The researchers investigate how IS audits can assess mobile

device security and discuss Information System management's perspectives on

this issue. By analyzing existing literature, the paper provides a foundation for

future developments in mobile device audit practices [6]. As shown by Saračević

et al. (2021), a data encryption technique designed for Internet of Things (IoT)

applications, leveraging Catalan objects as cryptographic keys.

This encryption method uses combinatorial structures with noncrossing or

nonnested matching, offering enhanced security compared to traditional

algorithms like DES. The experimental analysis includes a comparative study with

DES, demonstrating the difficulty in identifying ciphertext generated by the Catalan

method. Additionally, the study evaluates the quality of the generated Catalan key

through statistical testing recommended by the National Institute of Standards and

Technology. The proposed encryption method shows promise for e-Health IoT

applications and smart city data storage and processing [7]. Dustgeer et al. (2017),

The Internet of Things (IoT) is transforming information networks and services by

10
linking physical objects like smart home appliances, providing users with

innovative and intelligent services. Smart home technology leverages Information

Communication Technology (ICT) to enhance comfort and convenience through

automated and intelligent services. However, the dynamic and interconnected

nature of smart home environments introduces new security challenges. This

paper investigates security attacks in smart homes and their implications for

system security, outlining security requirements and proposing potential solutions.

Through the analysis of various scenarios, it recommends establishing security

objectives for smart home environments. Additionally, historical data is utilized to

predict security attacks such as malware and viruses, estimating their anticipated

frequency in the future [8].

11
Internet of Things

Local

This interconnectedness allows for seamless communication and

automation across various systems, leading to enhanced efficiency, productivity,

and convenience in both personal and professional settings. According to study by

Baccay et al. (2021) The microcontroller was programmed to manage the ventilator

fan and electromechanical gate valve based on various conditions. These include

manual control via a web-based interface, allowing users to turn the system on/off

using any internet-connected device, as well as scheduling predetermined

operating times set by personnel. Additionally, the system activates based on

predetermined temperature thresholds for the ventilator fan and soil moisture

content of crops. Sensor data collected by the node was stored in .csv format on

an external drive for backup purposes. Data transmission utilized the Message

Queue Telemetry Transport Protocol, enabling graphical presentation via the Wi-

Fi module. The study participants included PSAU Project staff/laborers, agriculture

and IT experts, and students. Assessments of the system's functionality,

dependability, usability, and connectivity yielded satisfactory results.

Consequently, end-users expressed confidence in the system's suitability for use

and customization in their respective projects and areas of responsibility [9]. As

previously stated by Mendoza et al. (2020), Home automation represents a

significant stride in technological progress, enabling the management of lighting,

security, temperature, alarms, and appliances. Initially encompassing devices like

washing machines, refrigerators, water heaters, and dishwashers, home

12
automation has evolved with the incorporation of the Internet of Things (IoT)

concept. This expansion has broadened the scope of appliances that can be

automated and controlled [10]. Perilla et al (2018), Integrate the Internet of Things

(IoT) into an Arduino-based fire safety system, aiming to provide alerts to fire-

fighting facilities, authorities, and building occupants.

This integration seeks to potentially prevent fire occurrences or minimize

the damages they may inflict. The study involved comprehensive literature reviews

and technology assessments to refine the understanding of the topic and identify

the latest technologies suitable for implementing an advanced fire safety system.

Smart appliances are household devices equipped with internet connectivity and

advanced sensors, allowing for remote monitoring, control, and automation via

smartphone applications or voice commands. These appliances, ranging from

refrigerators and washing machines to thermostats and lighting systems, offer

users greater convenience, energy efficiency, and customization options. Through

features such as energy consumption tracking, automated scheduling, and remote

diagnostics, smart appliances empower users to optimize their resource usage and

reduce utility costs. According to the study by Garcia et al. (2017), The expansive

consumer base offers a significant opportunity for intelligent energy management

systems to serve as a crucial component of the nation's energy sustainability

strategy. Research indicates that supplying households with intelligent energy

monitoring solutions, coupled with meaningful appliance consumption feedback,

can lead to substantial energy savings of up to 12% of total energy consumption.

Consequently, the micro-scale management of residential and commercial power

13
usage could make a significant difference in the long term, creating a vast potential

market for intelligent energy monitoring systems. Although commercially available

household monitoring solutions exist, comprising wireless sensor networks and

smart plugs with accompanying software packages offering appliance-level data

and visual interfaces, they come with drawbacks such as high costs per appliance

monitor and installation complexity. Surprisingly, some of these energy monitoring

solutions overlook the collective consumption of devices, inadvertently leading to

an increase in energy usage by as much as 15.9%. Smart utility meters present

an attractive solution due to their ubiquity, low cost, minimal maintenance, and

installation effort. However, they lack appliance-level feedback. Therefore, this

paper introduces the development of an energy disaggregation method to enhance

a custom embedded smart utility meter, transforming it into an intelligent home

energy management system capable of providing appliance-level feedback and

personalized recommendations to homeowners [11].

14
Foreign

Automated devices encompass a wide array of technologies designed to

perform tasks without direct human intervention. These devices leverage sensors,

actuators, and control systems to automate processes across various domains,

including manufacturing, transportation, and home automation. According to the

study by Picard et al. (2024), The advent of Industry 4.0 in construction is

characterized by the automation and robotization of construction processes

through innovative constructs like intelligent factories, alongside the digitalization,

simulation, and modeling of objects and projects. This emergence has sparked a

notable surge in construction research, particularly in onsite construction. Modular

construction stands out among various onsite construction methods, with

prefabricated modules delivered to sites exhibiting significant completion levels.

Currently, intense research focuses on methods for assembling prefabricated

modules, with inter-modular connections (IMCs) being a critical aspect. Existing

research identifies 25 IMCs, none of which fully meet all requirements for onsite

construction, highlighting the necessity for automated or semi-automatic

connections to address both constructional and functional needs. Comprehensive

full-scale testing of IMCs is essential as it profoundly impacts onsite construction

and opens avenues for enhancing automation in construction processes. In this

context, two recent research groups have proposed automated connecting devices

(ACDs) for onsite construction. An ACD refers to a self-locking device designed to

streamline construction processes [12]. Security systems encompass a range of

technologies and protocols designed to protect assets, information, and individuals

15
from unauthorized access, intrusion, and harm. These systems include physical

security measures such as surveillance cameras, access control systems, and

perimeter barriers, as well as cybersecurity solutions like firewalls, encryption, and

intrusion detection systems. Through a combination of preventive, detective, and

responsive measures, security systems help organizations and individuals

safeguard against various threats, including burglary, vandalism, cyber attacks,

and data breaches. According to the research conducted by Pietrick et al. (2023),

The escalating phenomenon of cybercrime poses an increasingly significant threat

to twenty-first-century security. This growing challenge requires legislative action

to establish appropriate legal regulations and places additional pressure on law

enforcement agencies to both ensure security and combat cybercrime effectively.

The pertinent question is not if, but when, a cyberattack will occur, underscoring

the need for proactive measures for early detection and swift response.

Consequently, organizations are compelled to reassess their approach to

designing and operating information processing systems within secure

cyberspace. The profound impact of this reality on information security within

organizations cannot be overstated, as every decision, no matter how small, relies

on the flow of information, particularly within ICT systems [13]. Frameworks

provide a structured approach to building scalable, reliable, and secure software

solutions. Commonly utilized frameworks include Arduino, Raspberry Pi, and

Node-RED, each offering unique advantages in terms of hardware compatibility,

ease of programming, and community support. Platform-specific frameworks such

as AWS IoT, Google Cloud IoT, or Microsoft Azure IoT are also valuable resources

16
for cloud integration and device management capabilities. Moreover, frameworks

like MQTT and CoAP facilitate efficient communication between IoT devices and

the application backend. According to the research conducted by Dubey et al.

(2023), Web applications have become integral to various industries, catering to

the needs of businesses of all sizes to attract a wider audience.

The field of web development boasts a rich history characterized by

continuous evolution. The dynamic nature of the internet, coupled with evolving

user and developer requirements, has driven significant changes in web

development practices over recent decades. This review paper offers a

comprehensive analysis of the evolutionary trajectory of web development

frameworks, spanning from the early era of static web pages to the sophisticated,

feature-rich web applications of today. Effective user engagement relies heavily on

captivating and well-designed interfaces, achievable through the utilization of

robust design frameworks. Frameworks, comprising libraries and classes offering

a diverse range of functionalities, lay the groundwork for robust architecture,

forming the basis for application development. They serve as the fundamental

building blocks of web applications, supporting various programming languages.

Within this review, we delve into some of the most prominent frameworks for web

development, covering both front-end and back-end frameworks, as well as

database environments. By examining the insights provided in this review,

stakeholders can make informed decisions regarding the most suitable framework

for enhancing user engagement [14]. Aheleroff et al. (2020), Smart appliances

serve as the foundation for larger systems, such as smart home and smart building

17
systems, ultimately contributing to the realization of smart cities. The emergence

of Industry 4.0 has spurred the transformation of conventional homes into smart

homes. The evolution from a single conventional home appliance to a network of

interconnected smart systems aligns with the objectives outlined in the United

Nations Agenda for Sustainable Development. The Internet of Things (IoT) holds

immense potential for real-time data collection, offering valuable insights and

enabling predictive maintenance at minimal cost, thereby ushering in a data-driven

approach to generate additional value. Through IoT connectivity, a diverse array

of sensors facilitates personalized services through Big Data analytics.

Recognizing the significant advantages afforded by smart devices, industries are

increasingly embracing digital transformation by adopting IoT technology for

reasons such as energy efficiency, personalization, and advanced predictive

maintenance [15].

18
Microcontrollers

Local

The RP10, building upon the capabilities of its predecessors, offers

enhanced processing power, improved connectivity options, and expanded

memory capacity, making it well-suited for handling complex tasks in IoT

applications. With its GPIO pins, USB ports, and wireless connectivity features, the

RP10 enables seamless integration with sensors, actuators, and other peripherals

essential for home automation projects. The Clock and Timer System is a

fundamental component of various devices and applications, enabling accurate

timekeeping, scheduling, and synchronization of tasks. In electronic devices, such

as smartphones, computers, and appliances, the clock system typically comprises

a crystal oscillator that generates precise timing signals, along with circuitry for

dividing and distributing these signals to drive the device's internal operations. The

research conducted by Dengler et al. (2023), A real-time irrigation management

system is developed utilizing web and Wireless Sensor Network (WSN)

technologies to automate irrigation procedures for upland and lowland crops. The

web interface, developed using Flutter and DART, accommodates various user

platforms. Meanwhile, advanced sensors integrated into the WSN monitor soil

moisture, water levels, and weather conditions in real-time. These sensors form a

low-power mesh network, transmitting data to a central server for analysis. This

setup aims to enhance irrigation efficiency and agricultural productivity in both

upland and lowland crop production systems [16]. According to the study Morite et

al. (2023), By employing developmental research methodologies, an instructional

program is developed for the energy controller, utilizing Proteus 7, Arduino Uno
19
microcontroller, and other electronic components. Statistical analysis methods,

including mean, frequency count, and standard deviation, are employed. Findings

indicate that televisions and light bulbs are frequently utilized in households

averaging four occupants, with monthly electric bills ranging from P500 to P1000.

The programmable energy controller enables automated scheduling of devices,

achieved by uploading source code from a computer. This leads to significant

energy savings of 61.35% and efficient control over four specific appliances with

varying usage times. Additionally, the system offers data logging capabilities for

total time calculation. The program receives positive feedback from practitioners

and users alike [17].

The ESP32/82CC represents a versatile and powerful hardware platform.

Combining the capabilities of the ESP32 microcontroller with potential

enhancements denoted by the 82CC designation, this platform offers developers

a robust foundation for building connected devices and IoT applications. The

ESP32's dual-core processing, integrated Wi-Fi and Bluetooth connectivity, and

support for various communication protocols make it well-suited for implementing

smart home solutions. Banjao et al. (2020), The impact of abiotic conditions, or

non-living factors, on aquaponic system growth, underscores the importance of

monitoring to maintain a nurturing environment. This study focuses on

programming and designing a monitoring system for abiotic factors in aquaponics.

The system incorporates an array of sensors to measure dissolved oxygen,

electrical conductivity, pH, water temperature, and water level in the aquarium. By

providing ease of monitoring for aquaponics system owners, who typically rely on

20
manual testing of these parameters, the developed system enables real-time

assessment of abiotic factors. This allows users to view parameter values through

Internet-of-Things platforms [18]. The energy sensor plays a pivotal role in

providing real-time insights into energy consumption patterns. Typically integrated

into the smart switch or connected to the electrical circuit, the energy sensor

measures power usage, voltage, and current flowing through the system. This data

is then transmitted to the smart switch app, allowing users to monitor energy

usage, identify trends, and optimize their electricity consumption. As outlined in the

investigation of Dugay et al. (2019), As the demand for ratings systems to gauge

energy consumption in buildings rises, the necessity to accurately measure and

reduce plug loads has gained prominence. While ample research exists on

implementing such systems for homes and buildings, this study shifts focus

towards their application in Micro and Small Enterprise Establishments. This

approach is advantageous as it allows for the simulation of both motor loads and

lighting loads, exemplified by appliances such as dryers, washers, and lighting

fixtures. The research is structured around two schemes: Energy Saving and

Energy Monitoring. The energy-saving scheme involves eliminating phantom loads

as a means of conserving energy [19].

21
Foreign

The ESP32/82CC represents a robust and versatile hardware platform

tailored to meet the demands of connected devices. Combining the advanced

features of the ESP32 microcontroller with potential enhancements denoted by the

82CC designation, this platform offers developers an ideal foundation for building

innovative home automation solutions. According to the study by Aghenta and

Iqbal (2019), Field Instrumentation Devices (FIDs), including sensors and

actuators, which are integral components of distributed process plants. Remote

Terminal Units (RTUs), such as single-board computers, serve to receive, process,

and transmit remote data from these FIDs. Master Terminal Units (MTUs) handle

data processing and facilitate human-machine interactions. SCADA

Communication Channels play a vital role in connecting RTUs to MTUs and

parsing acquired data. SCADA hardware and software generally fall into two

categories: Proprietary (Commercial) and Open Source. This paper introduces the

design and implementation of a low-cost, Open Source SCADA system utilizing

the Thinger.IO local server IoT platform as the MTU and ESP32 Thing micro-

controller as the RTU. Over the years, SCADA architectures have evolved from

monolithic (stand-alone) systems to distributed and networked architectures,

culminating in the latest Internet of Things (IoT) architecture [20]. In line with the

findings of the study by kohafi et al. (2019), The energy consumption of five

commonly used microcontroller (MCU) boards during the execution of various

functions and operations.

22
It explores the influence of factors such as clock speed, serial bit rate, ADC

sampling rate, compiler optimizations, and the utilization of on-chip floating-point

units (FPU) on energy consumption. The findings reveal that subtraction consumes

slightly more energy than addition across all boards, while division demands

significantly more energy than other operations. Additionally, MCUs equipped with

an FPU demonstrate lower energy consumption for operations utilizing the FPU.

Overall, the comprehensive results presented provide valuable insights for

designers and developers aiming to enhance the energy efficiency of embedded

systems [21].

23
App Development Tools

Local

Development frameworks serve as essential tools for structuring and

expediting the software development process. These frameworks, such as

Arduino, Raspberry Pi, and Node-RED, provide developers with pre-built

functionalities and libraries tailored to IoT applications. According to the study by

Arcega (2022), This involves planning and strategizing to pave the way for the

successful execution of the project. Just as in various endeavors, whether simple

or complex, meticulous planning is essential to initiate any action. This principle

holds true in the realm of Data Frameworks as well. Therefore, Strategic Planning

for Data Frameworks emerges as a crucial aspect, The planning process follows

Cassidy's framework, comprising four key stages: Visioning, Analysis, Direction,

and Recommendation. Moreover, the project integrates recommended tools and

methodologies with the DICT-MITHI ISSP development framework [22].

The Integrated Development Environment (IDE) serves as a crucial

software tool for writing, debugging, and managing code efficiently. Popular IDEs

like VIM and Visual Studio Code (VS Code) offer developers a comprehensive set

of features tailored to their coding preferences and project requirements. VIM,

known for its lightweight and highly customizable nature, provides advanced text

editing capabilities and extensive plugin support, making it well-suited for

experienced developers who prefer keyboard-centric workflows. By the

investigation by Anciro et al. (2021), The constant evolution of technology

significantly impacts agricultural practices. Mobile devices, particularly

24
smartphones, have proven instrumental in revolutionizing farming due to their

portability and accessibility. the IoT-based Smart Switch app for home automation

seeks to streamline household management and energy efficiency through

innovative technology solutions. Both projects highlight the transformative

potential of mobile applications in different domains, emphasizing the importance

of user-centric design, functionality, and performance evaluation in ensuring their

effectiveness and adoption [23].

Foreign

According to the study by Chaubey and Sharma (2023), developers were

constrained by limited development environments, relying on a handful of

programming software for application creation. However, with the launch of

Android Studio, these limitations were alleviated to a certain extent. Unlike

previous development kits that primarily consisted of command-line tools and build

scripts, Android Studio offered a comprehensive Integrated Development

Environment (IDE) equipped with features such as code hinting, design layouts,

and integrated debugging functionalities. This transition not only simplified the

coding process but also accelerated application development by providing

developers with essential tools and templates. This paper delves into the

fundamental components of Android applications and explores the features of

Android Studio, shedding light on its significance in modern application

development [24].

25
Imulators and emulators such as IoTIFY play a crucial role in testing and

validating the application's functionality and performance. IoTIFY provides a virtual

environment that mimics real-world IoT scenarios, allowing developers to simulate

various devices, network conditions, and user interactions. In line with the findings

with the study by Khaled et al (2022), Our living and working environments are

becoming increasingly populated with smart devices, including appliances and

sensors, collectively referred to as "things," driving the technological advancement

of the Internet of Things (IoT). The IoT ecosystem represents a paradigm shift in

connectivity, wherein these "things" are interconnected to create intelligent spaces

aimed at enhancing the quality of life. However, IoT devices vary significantly in

terms of processing power, sensing capabilities, communication protocols, and

functionalities they offer. While IoT applications leverage this diverse ecosystem

across various domains, the development process is often hindered by the need

for physical access to real IoT devices for deployment and testing. Given the

multitude of heterogeneous devices involved, this requirement is not only costly

but also impractical in many scenarios [25]. Mahmud et al. (2022), Payment

Service Providers (PSPs) offer software development kits (SDKs) to facilitate the

integration of complex payment processing code into applications. However,

security vulnerabilities in payment SDKs can pose significant risks to numerous

applications. In this study, a solution called AARDroid is proposed for statically

assessing payment SDKs against the industry standard for mobile application

security outlined by the Open Web Application Security Project (OWASP) Mobile

Application Security Verification Standard (MASVS). AARDroid is developed by

26
adapting application-level requirements and employing program analysis tools for

SDK-specific analysis [26].

According to the study by Angeles et al. (2023), The Automated water

irrigation system using soil moisture sensor. The automated water irrigation system

using a soil sensor moisture sensor was developed using C++ and Arduino. The

set of point converted into an inputs where it processed by the microcontrollers

[27].

27
Related Systems

Local Systems

Sense Home

Figure 1: Power Consumption

Sense Home, developed by Sense lab (2019), power consumption

monitoring system stands out as an exemplary reference for other systems due to

its comprehensive functionality and user-friendly interface. Sense Home offers

users detailed insights into their energy usage patterns through intuitive

visualizations and real-time data tracking. Users can easily monitor their electricity

consumption at a glance, thanks to the clear and informative interface provided by

Sense Home. Sense Home sets a high standard for other systems to follow,

making it an invaluable reference for designing effective energy management

systems in smart home environments.

28
Smart Light

Figure 2: Home Design

Smart Light App, developed by Smart home solutions (2019), it has a

minimalist style for home which it makes simpler and the layout is intuitive and well-

organized, providing users with easy access to essential functions and information.

Users can quickly navigate through different sections of the system. This makes it

easy for users to explore different products and find solutions that meet their needs

without feeling overwhelmed by excessive clutter or distractions. The homepage

responsive design ensures a seamless experience across various devices, This

accessibility is crucial for reaching a broad audience and accommodating users

with different preferences and browsing habits.

29
Tuya Smart

Figure 3: Register

Tuya Smart created by Tuya inc. (2018). Tuya’s Smart registration process

serves as an excellent reference for other systems due to its user-friendly design

and comprehensive features. Tuya Smart offers a streamlined registration process

that guides users through creating an account with ease. The interface is intuitive,

featuring clear prompts and instructions that simplify the registration steps. This

flexibility ensures that users can choose the registration method that best suits

their needs, enhancing the overall user experience and accessibility of the

platform.

30
Geeni

Figure 4: On/Off

Geeni, developed by Merkury Innovations (2017), Geeni’s on/off

functionality stands out as a noteworthy reference for other systems due to its

simplicity. Geeni offers users an intuitive interface for controlling various smart

devices, allowing them to effortlessly turn devices on or off with just a tap of a

button. This straightforward approach to on/off control ensures a seamless user

experience, minimizing confusion and frustration. Additionally, Geeni's on/off

feature is highly reliable, providing users with consistent and responsive control

over their connected devices. Whether it's turning off lights, fans, or appliances,

users can rely on Geeni's on/off functionality to work reliably every time, enhancing

convenience and efficiency in their smart home.

31
Philips Hue

Figure 5: Login

Philips Hue developed by Signify (2017), Philips Hue's login system serves

as an exemplary reference for other systems due to its seamless user experience

and robust security features. the login process is intuitive and straightforward,

allowing users to access their accounts with ease. The interface is designed with

user convenience in mind, featuring clear prompts and instructions that guide

users through the login process step by step. Additionally, Philips Hue offers

multiple login options, including email and password, as well as social media

authentication, catering to a wide range of user preferences. This flexibility ensures

that users can choose the authentication method that best suits their needs,

enhancing the overall user experience. The researchers want to use the design as

inspiration from their simple design.

32
Foreign Systems

SmartThings

Figure 6: Authentication

SmartThings, developed by Samsung in (2022), SmartThings

Authentication has a simple design for the user. The interface is designed with

clarity and ease of use in mind, providing clear prompts and instructions to guide

users through the authentication steps. By focusing on simplicity and user-

friendliness, SmartThings Authentication design sets a high standard for other

systems to emulate, fostering positive user interactions and promoting widespread

adoption. The interface is thoughtfully designed with attention to detail, employing

cohesive color schemes, an intuitive layout, and visually appealing elements. This

aesthetic appeal enhances user engagement and contributes to a positive overall

experience. The researchers want to take an inspiration from their simple design

33
HomeMate Smart

Figure 7: Plug

HomeMate Smart, created by HomeMate (2021), The HomeMate Smart

Plug design is often praised for its simplicity and user-centric approach, making it

an ideal reference for other systems. Its straightforward setup process allows users

to effortlessly connect their devices to the plug without the need for extensive

technical knowledge. The plug's intuitive interface and user-friendly mobile app

further enhance the user experience by providing easy control and monitoring

capabilities. Additionally, the design incorporates features like scheduling and

remote access, empowering users to customize their smart home ecosystem

according to their preferences. By prioritizing simplicity and ease of use, the

HomeMate Smart Plug 10A design ensures that users can seamlessly integrate

smart technology into their daily lives.

34
Kasa Smart

Figure 8: Add Devices

Kasa Smart, launched by TP-Link (2020), The Kasa Smart Add Devices

design stands out for its simplicity. The step-by-step instructions and clear prompts

ensure that even those with limited technical expertise can quickly add new

devices to their smart home network. Additionally, the design incorporates features

like device discovery and automatic pairing, further streamlining the setup process

and reducing the time required to get devices up and running. By prioritizing

simplicity and ease of use, Kasa Smart Add Devices design enhances the user

experience and encourages wider adoption of smart home technology.

35
LG ThinQ

Figure 9: Setting

LG ThinQ, developed by LG Electronics (2019), The LG ThiQ Setting Its

intuitive layout and clear categorization of settings streamline the user experience,

ensuring that users can easily navigate through various options without feeling

overwhelmed. The design prioritizes accessibility, with commonly used settings

prominently displayed and advanced options readily accessible for those seeking

more customization. Additionally, the inclusion of helpful tooltips and explanations

further enhances user understanding, empowering users to make informed

choices without confusion.

36
TP-Link, Tether

Figure 10: App Front Design

TP-Link Tether, developed by TP-Link (2018), TP-Link, Tether design is a

prioritizes ease of use, with clearly labeled buttons and intuitive navigation menus

that guide users seamlessly through various functions. the app offers a clean

layout and minimalist design, ensuring that users can quickly access the tools they

need without distraction. By focusing on simplicity and usability, the TP-Link Tether

App front design enhances the overall user experience and encourages users to

engage more effectively with their TP-Link devices.

37
Synthesis

In this chapter, the researchers present evidence and information to bolster

their study. They furnish both local and foreign systems as points of reference for

their project's development. The data gathered from internet sources indicates the

utility of IoT-based Smart Switch App Home Automation due to its user-friendly

nature, facilitating seamless management of connected devices.

38
Conceptual Framework

Knowledge Requirements Software Development


Methodology
IoT based smart switch app
• IoT Protocols for home automation
• Mobile App
- Scrum
Criteria
Development

• Security tools Project Development • Functionality

Software Requirements • Reliability


• Android Studio • Initiation • Usability
• ESP8266 • Planning & Estimates
• Implementation • Performance
• Programing • Review & Efficiency
Language kotlin Retrospective
• Compatibility
• Cloud Services • Release
• Security
Hardware Requirements
• Maintability
• Personal Computer
or Laptop
• Wifi speed utilized of
maximum of 50
Mbps
• Processor (CPU)
Qualcomm
Snapdragon 720G
• Higher RAM at least
6GB
• 128 Internal Storage


OUTPUT
INPUT PROCESS

Evaluation/Performance
Testing:

ISO/EIC 25010:2011.

Figure 11 Input - Process – IoT based Smart Switch App for Home Automation

39
Definition of Terms

API:

An API is a set of rules, protocols, and tools that allows different software
applications to communicate with each other. It defines the methods and data
formats that developers can use to interact with a software component, service, or
system.

ESP8266:

This is the main module, which integrates a Wi-Fi chip and a microcontroller unit
(MCU) on a single board. It's capable of connecting to Wi-Fi networks and
executing code.

Heterogeneity:

Presents challenges in integration, interoperability, and maintenance of software


systems. APIs and middleware solutions are often used to address these
challenges by providing abstraction layers, standardization mechanisms, and
transformation capabilities to bridge the gaps between heterogeneous
components or systems.

Interoperability:

Interoperability is the capability of different systems, components, or devices to


exchange and use information seamlessly. It ensures that disparate systems can
work together without requiring extensive modifications or manual intervention.

Mobile Device:
Through the mobile device, users can remotely control and manage connected
devices within their homes. The mobile device serves as the primary interface for
interacting with the smart switch app, enabling users to monitor energy
consumption.

40
Raspberry Pi:

Raspberry Pi is a series of small, affordable single-board computers developed by


the Raspberry Pi Foundation. These credit-card-sized computers are equipped
with various hardware components, including a CPU, RAM, GPIO (General
Purpose Input/Output) pins, USB ports, HDMI output, and networking capabilities.

41
Chapter 3

DESIGN AND METHODOLOGY

Software Development Methodology

In the development of the software, Scrum is chosen by the researchers for

their project because of its ability to handle the complexity and uncertainty inherent

in IoT projects. Scrum promotes collaboration and transparency among team

members and stakeholders, essential for the success of a project like this. Daily

stand-up meetings keep everyone aligned on progress and any challenges faced,

while sprint reviews and retrospectives provide opportunities for continuous

improvement.

Figure 12: Scrum


Product Backlog Phase
The researchers create a product backlog phase Smart Switch App, which

is a prioritized list of all the desired features and functionalities needed to build the

application. This list includes essential user functionalities such as account

creation (signup), secure user login (login), and verification processes (login

authentication). It also covers core IoT features like remote control of the smart

switch (on/off) and monitoring power consumption of connected devices. Each

42
backlog item is detailed with specific requirements, user stories, and acceptance

criteria, guiding the development team throughout the project.

Sprint Backlog Phase

The researchers create a sprint backlog from the product backlog, selecting

a subset of items to be completed in the upcoming sprint. For example, in the initial

sprint, the focus might be on implementing the user authentication features. This

includes developing the signup process, creating secure login mechanisms, and

ensuring proper login authentication. The sprint backlog provides a clear and

actionable set of tasks that the development team commits to delivering within the

sprint duration, usually two to four weeks, ensuring a focused and manageable

workload.

Sprint Phase

The researchers create a sprint, which is a time-boxed period, typically

lasting between one to four weeks, during which the development team works on

the items in the sprint backlog. For the smart switch app, a sprint might start with

a sprint planning meeting to define the sprint goal and the tasks needed to achieve

it. The team collaborates daily in stand-up meetings to track progress and address

any issues. At the end of the sprint, a sprint review is conducted to demonstrate

completed features, such as a working signup and login system, to stakeholders

43
and gather their feedback. This is followed by a sprint retrospective to reflect on

the process and identify improvements for future sprints.

Working Increment of the Software Phase

The researchers create a working increment of the software at the end of

each sprint, aiming to deliver a potentially shippable product. It includes a fully

functional user authentication module, allowing users to sign up, log in, and

authenticate their credentials. Additionally, it may feature initial IoT functionalities,

such as basic on/off control for the smart switch. This increment represents a

concrete step towards the final product, ensuring that each functionality is

integrated, tested, and ready for further enhancements in subsequent sprints.

44
Requirements Analysis

In the Requirement Analysis for the capstone project titled IoT-based Smart

Switch App for Home Automation, the researchers adopted various data-gathering

techniques to comprehensively understand the encountered problem. Firstly, an

interview was conducted with the homeowner Mr. Jix Capalos, to gauge their

familiarity with existing home automation solutions and to identify common

challenges and preferences regarding smart home technologies.

The data gathered showed evidence that user-friendly interfaces and

seamless integration were lacking in the home automation systems that are

available today. Consumers criticized the lack of control they had over their smart

home products. The suggested solution, in response to these results, intends to

create an easy-to-use, mobile-device-accessible smart switch application that is

based on the Internet of Things. Through the resolution of these issues and the

integration of user input, the suggested approach aims to provide customers with

a more proficient and pleasurable home automation encounter.

45
Figure 13: Use Case Diagram

The Figure above shows the encapsulates the key features of the system,

it provides a comprehensive overview of the system's capabilities and user

interactions, guiding the design and development process of the IoT-based Smart

Switch App Home Automation system.

46
Figure 14: Sequence Diagram

The Figure above it provides a portrays the sequential flow of events

between various components, detailed representation of the communication flow

between the user, the application, and the underlying hardware components,

elucidating the orchestration of commands and data exchanges in the IoT-based

Smart Switch App Home Automation system.

47
Figure 15: Case Diagram

The Figure above shows the visual representation depicts various

components necessary for the system's functionality. provided outlines the

structure and relationships between various components essential for the

development of an IoT-based Smart Switch App for Home Automation. Through

this structure, offering users convenient control over their devices while promoting

energy efficiency through power consumption monitoring.

This structured analysis of hardware requirements forms a crucial aspect of

the overall requirement analysis process. By delineating clear specifications for

smart switches, mobile devices, and server infrastructure, the researchers aim to

48
establish a robust foundation for the development and deployment of the IoT-

based smart switch app.

Requirements Documentation

The system is composed of 5 Functions namely: login, signup, power

consumption, on/off, authentication

Sign In - the login process serves as the gateway for users to access the

application's functionalities. Upon launching the app, users are prompted to input

their credentials, typically a username and password combination, into the

designated fields. Once entered, the app verifies the authenticity of the provided

information against its database. If the credentials are valid, users gain access to

the app's features, including controlling smart switches for home automation

purposes.

Signup - the signup process is the initial step for users to create an account

and access the application's features. When users first open the app, they are

presented with a signup interface where they are required to provide certain

information, such as their name, email address, and a secure password.

Additionally, users may be prompted to agree to terms of service and privacy

policies before proceeding with the signup process.

Authentication – authentication plays a crucial role in ensuring the security

and integrity of user accounts and their connected devices. Upon launching the

49
application, users are required to authenticate themselves through a secure login

process. This typically involves entering their credentials, such as a username and

password, into the designated fields provided by the app. Once the user submits

their login information, the application verifies the authenticity of the provided

credentials against its internal database. This verification process involves

checking the entered username/email and password combination for correctness

and validity. If the credentials match those stored in the database, the user is

granted access to the app's functionalities, including the ability to control smart

switches for home automation purposes.

On/Off - the On/Off functionality serves as the primary feature for controlling

connected devices, such as smart switches, lights, or appliances, within the home

environment. Upon accessing the app, users are presented with intuitive controls

to toggle the power state of their IoT-enabled devices. Using the On/Off

functionality is straightforward, users simply navigate to the device they wish to

control within the app's interface and tap on the corresponding On or Off button.

This action sends a command to the connected IoT device, instructing it to either

turn on or off based on the user's selection.

Power Consumption - Upon accessing the app, users can navigate to the

Power Consumption section, where they are presented with detailed data and

analytics related to the energy usage of their IoT-enabled devices. This information

may include real-time or historical data, such as power consumption trends over

time, usage patterns, and cost estimates. It empowers users to monitor and

50
manage their energy usage effectively, promoting sustainability, cost savings, and

environmental consciousness within the smart home ecosystem.

Settings - Upon navigating to the Settings menu, users encounter a range

of configurable options tailored to meet their individual preferences and optimize

the functionality of their connected devices. users can effortlessly manage their

account details, including profile information, notification preferences, and

password settings, ensuring a seamless and secure user experience.

51
Project Design

Figure 16: Sign In

The App front design principles to ensure that the app is intuitive and easy

to navigate for users of all technical backgrounds. By prioritizing simplicity and

clarity in layout and functionality. The researcher explores different visual styles,

and color schemes to establish a visually appealing design for the app.

52
Figure 17: Signup

To get started, new users need to create an account by providing their email,

setting a strong password, and confirming it. After completing these steps, clicking

the "Sign Up" button will create the account, granting access to the app's features.

For existing users, the "Sign in!" link redirects to the login page.

53
Figure 18: Home

The home screen design features a sleek and modern interface with a

predominant purple color scheme. At the center of the screen, users are greeted

with an easily identifiable on/off button, allowing for effortless control of connected

devices within the home. Beneath the on/off button, prominently displayed, is a

graph providing real-time monitoring of power consumption. This graph offers

users valuable insights into their energy usage patterns, empowering them to

make informed decisions about their electricity consumption and optimize

efficiency.

54
Evaluation Procedure

Research Instrument

The researchers will use a survey questionnaire to obtain the appropriate

data needed to evaluate the system’s capabilities. The evaluation tool will be based

on the features and sub-features provided by ISO/EIC 25010:2011. ISO/EIC

25010:2011. proposes only four software evaluation ratings (Excellent, Good, Fair,

and Poor), the researchers will use five measurement systems, in addition to Very

Good to provide a wider range of instruments.

Respondents of the Study

The survey questionnaire will be disseminated among fifty (50)

respondents, comprising forty (40) Homeowners and ten (10) information

technology specialists affiliated with Lyceum of Alabang. Two distinct sets of

questionnaires will be administered, tailored specifically for students and IT

professionals. Each questionnaire set will encompass inquiries corresponding to

the respective demographic's expertise and preferences regarding the features

offered.

Statistical Treatment

The weighted arithmetic mean will be used to compute the average

responses for each option of every item in the questionnaire and to evaluate the

acceptability of the proposed system. Each system characteristic will have an

55
arithmetic mean, and the sum of these means will be used to calculate the overall

average. The average of all data will be determined by using the numerical rating

based on ISO/EIC 25010:2011.

Table 1: Software Evaluation Rating

Numerical Rating Equivalent Measurement

5 Excellent

4 Very Good

3 Good

2 Fair

1 Poor

The table above shows the corresponding equivalent measurement of each

numerical rating.

Table 2: Ranges of Weighted Mean and Interpretation

Weighted Mean Range Interpretation

4.51 - 5.00 Excellent

3.51 - 4.50 Very Good

2.51 - 3.50 Good

1.51 – 2.50 Fair

0.00 – 1.50 Poor

56
The table depicts the ranges of weighted mean scores alongside their

corresponding interpretations. At the top end, the highest weighted mean range

falls between 4.51 and 5.00, signifying an evaluation of "Excellent." Following

closely, the range of 3.51 to 4.50 constitutes the second-highest weighted mean

range, categorized as "Very Good." Occupying the middle ground, the range

spanning from 2.51 to 3.50 represents an average evaluation and is interpreted as

"Good." Moving downwards, the range from 1.51 to 2.50 serves as the second

lowest, labeled as "Fair." Finally, the lowest weighted mean range, from 0.00 to

1.50, corresponds to an interpretation of "Poor."

57
Testing Procedure

Alpha and Beta are part of the testing procedure. the student researcher

crafts a comprehensive strategy aimed at refining and validating the application's

functionality prior to its release.

The Alpha and Beta testing phase primarily focus on discovering bugs in a

previously tested system and provide a clear picture of how the system is used by

a real-world user. They also aid in gaining system experience prior to launch and

valuable feedback is effectively implemented to improve the system usability.

Alpha Testing

The alpha testing phase involves rigorous internal testing conducted by the

research team itself. During this phase, the application is subjected to various test

scenarios to uncover any functional defects, usability issues, or inconsistencies in

performance. Testers closely monitor the app's behavior across different devices

and operating systems to identify potential compatibility issues. Additionally,

usability testing is conducted to assess the app's intuitiveness and user-

friendliness, with feedback collected through surveys and direct observation.

58
Beta Testing

The beta testing procedure extends the evaluation to a broader audience of

external users. Beta testers are recruited from the target demographic to ensure

relevance and diversity in feedback. They are provided with access to a pre-

release version of the smart switch app and are encouraged to use it in their daily

routines. Beta testers are instructed to report any issues they encounter and

provide suggestions for improvement through designated feedback channels. The

research team carefully analyzes the feedback received during the beta testing

phase to prioritize bug fixes, address usability concerns, and implement

enhancements. This iterative process allows for thorough validation of the app's

functionality and user experience, ultimately contributing to the development of a

robust and user-friendly IoT-based smart switch app for home automation

Table 2: Testing Procedure Process


(Alpha and Beta Testing Procedures)

Test Case Criteria Expected Output

No

1 User Friendliness Users can navigate the app easily without


confusion.
2 Responsiveness The app responds to user interactions,
minimizing any delays.

3 Functionality All features, such as switch control,


operate smoothly without errors.

4 On/Off Toggling switches on/off works reliably.


Functionality
5 Connection Clearly defined criteria for device pairing.

59
References

[1] E. B. B. a. M. A. B. Liu, "Application of Network Security Threat Detection in The Smart


Home," 2023 3rd International Symposium on Computer Technology and Information
Science (ISCTIS), pp. pp. 19-24, 2023.

[2] H. Lagunzad, M. V. Gonzaga and C. M. Samonteza, "Development and Implementation of


File Security Using Raspberry pi with an Advanced Encryption Standard (AES) Algorithm,"
2023 IEEE 6th International Conference on Pattern Recognition and Artificial Intelligence
(PRAI), 2023.

[3] B. J. C. Ecarma and et al., "Vulnerability Assessment and Attack Simulation on a Rooted
Android Device," 2022 5th International Conference on Information and Computer
Technologies (ICICT), pp. pp. 90-94, 2022.

[4] R. C. P. a. E. Q. B. Macabebe, "Implementation of Home Automation System Using


OpenHAB Framework for Heterogeneous IoT Devices," 2019 IEEE International Conference
on Internet of Things and Intelligence System (IoTaIS), Bali, Indonesia, pp. pp. 67-73, 2019.

[5] D. I. Cendana, N. V. Bustillo, T. D. Palaoag, M. A. Marcial and A. E. Perreras, "Harnessing


Energy Consumption in a Smarthome IoT Framework," 2018 IEEE International Conference
on Internet of Things (iThings) and IEEE Green Computing and Communications
(GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data
(SmartData), pp. pp. 88-96, 2018.

[6] N. A. A. Othman, A. A. Norman and M. L. M. Kiah, "Information System Audit for Mobile
Device Security Assessment," 2021 3rd International Cyber Resilience Conference (CRC), pp.
pp. 1-6, 2021.

[7] M. H. S. et al, "Data Encryption for Internet of Things Applications Based on Catalan
Objects and Two Combinatorial Structures," in IEEE Transactions on Reliability, pp. pp. 819-
830, June 2021.

[8] W. Ali, D. G, M. Awais and M. A. Shah, "IoT based smart home: Security challenges, security
requirements and solutions," 2017 23rd International Conference on Automation and
Computing (ICAC), pp. pp. 1-6, 2017.

[9] J. B. Baccay, C. Vicente and M. Bravo, "IoT-based Automated Greenhouse with Monitoring
and Control using MQTT Protocol IoT-based Automated Greenhouse with Monitoring and
Control using MQTT Protocol," June 2021.

60
[10] I. C. P. Mendoza, S. M. Timbol, M. J. C. Samonte and E. B. Blacaflor, "ImHome: An IoT for
Smart Home Appliances," 2020 IEEE 7th International Conference on Industrial Engineering
and Applications (ICIEA), pp. pp. 761-765, 2020.

[11] F. C. C. Garcia and et al., "Development of an Intelligent System for Smart Home Energy
Disaggregation Using Stacked Denoising Autoencoders," Procedia Computer Science, 2017.

[12] L. Picard and et al., "Full-Scale Implementation of an Automated Connecting Device for
Modular Construction," 2024.

[13] G. Pietrick and et al., "CYBERSECURITY AND THE SCOPE OF DESIGNING INFORMATION
SECURITY SYSTEMS IN THE ORGANIZATION," Journal of Modern Science, July 2023.

[14] A. Dubey and et al., "Evolution of Web Development Frameworks," International Journal
for Research in Applied Science and Engineering Technology, November 2023.

[15] S. Aheleroff et al., "IoT-enabled smart appliances under industry 4.0: A case study,"
Advanced Engineering Informatics, January 2020.

[16] E. Dengler et al, "FusionClock: Energy-Optimal Clock-Tree," 2023.

[17] A. S. Morite, G. Z. Gamboa et al., "PROGRAMMABLE ENERGY CONTROLLER FOR


HOUSEHOLD APPLIANCES," 2023.

[18] J. P. P. Banjao, K. S. Villafuerte and e. al., "Development of Cloud-Based Monitoring of


Abiotic Factors in Aquaponics using ESP32 and Internet of Things," 2020 IEEE 12th
International Conference on Humanoid, Nanotechnology, Information Technology,
Communication and Control, Environment, and Management (HNICEM), 2020.

[19] A. O. U. a. B. E. P. V. K. D. Dugay, "Energy Monitoring and Consumption Reduction by


Automated Branch Circuit Actuation for Tertiary Mainstreet Establishments," 2019 2nd
World Symposium on Communication Engineering (WSCE), pp. pp. 195-199, 2019.

[20] L. Aghenta and T. M. Iqbal, "Low-cost, open source IoT-based SCADA system design using
thinger.IO and ESP32 thing," July 2019.

[21] M. M. Al-Kofahi and M. Y. Al-Shorman, "Toward energy efficient microcontrollers and


Internet-of-Things systems," Computer & Electical Engineetring, 2019.

[22] A. A. Arcega, "Information systems strategic plan for Duty Free Philippines Corporation,"
2022.

[23] M. E. M. Anciro, J. Z. Dela Cruz et al., "Mobile-Based Application for Agricultural Crops of
Silang, Cavite," American Journal of Agricultural Science , 2021.

[24] C. Chaubey and A. Sharma, "The integrated development environment (IDE) for application
development: Android studio and its tools," 2023.

61
[25] M. A. a. S. P. S. A. E. Khaled, "E-IoT: Emulator to Develop and Test IoT Application," 2022
IEEE 8th World Forum on Internet of Things (WF-IoT), 2022.

[26] S. Y. Mahmud, K. V. English et al., "Analysis of Payment Service Provider SDKs in Android,"
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications Conference,
2022.

[27] J. M. B. Angeles et al, "Development of Automated water Irregation System using soil
Moisture Sensor," 2023.

62
APPENDIX B. Instrument Tool

ISO/EIC 25010:2011

General Direction: Please accomplish this questionnaire very carefully and honestly. Please rest
assured that any information that you supply will be treated with the greatest confidentiality and
anonymity.

Name (optional) : ____________________________________________


Position : __________________
Sex (optional) : ___ Male ___ Female

Software Evaluation
Kindly put a check mark at the right of the software evaluation characteristics under the proper
heading to indicate your assessment on the software product based on the specific factor.

NUMERICAL RATING EQUIVALENT


5 Excellent
4 Very Good
3 Good
2 Poor
1 Very Poor

SOFTWARE EVALUATION CHARACTERISTICS 5 4 3 2 1


FUNCTIONAL SUITABILITY
1. Set of functions covers all the specified tasks and user objectives
(Completeness)
2. Provides the correct results with the needed degree of precision
(Correctness)
3. Functions facilitate the accomplishment of specified tasks and objectives
(Appropriateness )
PERFORMANCE EFFICIENCY
4. Response and processing times and throughput rates of a system, when
performing its functions, meet requirements (Time behavior)
5. Amounts and types of resources used by a system, when performing its
functions, meet requirements (Resource utilization)
6. Maximum limits of a system parameter meet requirements (Capacity)
COMPATIBILITY
7. Perform its required functions efficiently while sharing a common
environment and resources with other system, without detrimental impact on
any other system (Co-existence)
8. Two or more systems or components can exchange information and use
the information that has been exchanged (Interoperability)
USABILITY
9. Users can recognize whether a product or system is appropriate for their
needs (Appropriateness recognizability)
10. System can be used by specified users to achieve specified goals of
learning to use the system with effectiveness, efficiency, freedom from risk
and satisfaction in a specified context of use (Learnability)
11. System has attributes that make it easy to operate and control
(Operability)
12. System protects users against making errors (User error protection)

63
13. User interface enables pleasing and satisfying interaction for the user
(User interface aesthetics)
14. System can be used by people with the widest range of characteristics
and capabilities to achieve a specified goal in a specified context of use
(Accessibility)
RELIABILITY
15. System meets the needs for reliability under normal operation (Maturity)
16. System is operational and accessible when required for use (Availability)
17. System operates as intended despite the presence of hardware or
software faults (Fault tolerance)
18. System can recover the data directly affected and re-establish the desired
state of the system, in the event of an interruption or a failure (Recoverability)
SECURITY
19. System ensures that data are accessible only to those authorized to have
access (Confidentiality)
20. System prevents unauthorized access to, or modification of, computer
programs or data (Integrity)
21. Actions or events can be proven to have taken place, so that the events
or actions cannot be repudiated later (Non-repudiation)
22. Actions of an entity can be traced uniquely to the entity (Accountability)
23. Identity of a subject or resource can be proved to be the one claimed
(Authenticity)
MAINTAINABILITY
24. System is composed of discrete components such that a change to one
component has minimal impact on other components (Modularity)
25. Asset can be used in more than one system, or in building other assets
(Reusability)
26. Degree of effectiveness and efficiency in which it is possible to assess the
impact on system of an intended change to one or more of its parts, or to
diagnose a system for deficiencies or causes of failures, or to identify parts to
be modified (Analysability)
27. System can be effectively and efficiently modified without introducing
defects or degrading existing product quality (Modifiability)
28. Degree of effectiveness and efficiency in which test criteria can be
established for a system, product or component and tests can be performed
to determine whether those criteria have been met (Testability)
PORTABILITY
29. System can effectively and efficiently be adapted for different or evolving
hardware, software or other operational or usage environments
(Adaptability)
30. Degree of effectiveness and efficiency in which system can be
successfully installed and/or uninstalled in a specified environment
(Installability)
31. System can replace another specified software product for the same
purpose in the same environment (Replaceability)

64
65

You might also like