Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Issue Date:
Date:
Submission Format:
LO1 Analyse what aspects of IoT are necessary and appropriate when designing software applications
LO2 Outline a plan for an appropriate IoT application using common architecture, frameworks, tools,
hardware and APIs
LO3 Develop an IoT application using any combination of hardware, software, data, platforms and
Page 1
services.
LO4 Evaluate your IoT application and detail the problem your IoT application solves, the potential
impact on people, business, society and the end user and the problems it might encounter when
integrating into the wider IoT ecosystem
You currently work as a product developer for a new startup where you design IoT products for the
consumer, corporate, government and defence clients. As part of your role your manager has tasked you
to plan and develop a new IoT product, service or application for a potential client. You are required to
identify a target user and conduct tests with this user and include this feedback into multiple iterative
versions of your product.
Plan an IoT application for a specific target end user and the tests you intend to conduct with this
user. This plan will be in the form of a document and will include supporting evidence and
material, such as user personas and customer journey maps.
Create multiple iterations of your application and modify each iteration with enhancements
gathered from user feedback and experimentation. This will follow the pathway outlined in your
plan.(log book,)
Part 2 (Assignment 2): For the second part, you must produce a report to prove that:
Show evidence about Developed IoT application using any combination of hardware, software,
data, platforms and services (video or images of your IoT system with code snippet)
Evaluate your IoT application and detail the problem your IoT application solves, the potential
impact on people, business, society and the end user and the problems it might encounter when
integrating into the wider IoT ecosystem
Page 2
Learning Outcomes and Assessment Criteria
LO3 Develop an IoT application using any combination of hardware, software, data, platforms and
services.
P5 Employ an appropriate set M5 Reconcile and evaluate end D3 Critical evaluate security
of tools to develop your plan user feedback and determine risks that your application might
into an IoT application. advantages and disadvantages of encounter.
your chosen IoT techniques.
P6 Run end user experiments
and examines feedback.
LO4 Evaluate your IoT application and detail the problem your IoT application solves, the potential
impact on people, business, society and the end user and the problems it might encounter when
integrating into the wider IoT ecosystem
P7 Evaluate end user M6 Undertake a critical review D4 Critique the overall success
feedback from your IoT and compare your final application of your application. Did it solve
application. with the original plan. your problem? What is the
potential impact on people,
business, society and the end
user? What problems might it
encounter when integrating into
the wider IoT ecosystem?
Page 3
Table of content
P5. Employ an appropriate set of tools to develop your plan into an IoT application. ............................. 5
Scenario ......................................................................................................................................................... 5
Tools used in the project .............................................................................................................................. 5
Installation .................................................................................................................................................... 9
Working principle ...................................................................................................................................... 15
Code ............................................................................................................................................................. 15
Problem ....................................................................................................................................................... 17
P6. Run end-user experiments and examines feedback. ............................................................................ 18
Demonstration ............................................................................................................................................ 18
Test case ...................................................................................................................................................... 21
P7. Evaluate end user feedback from your IoT application. ..................................................................... 21
Requirements .............................................................................................................................................. 21
Feasibility .................................................................................................................................................... 22
Commercialization ..................................................................................................................................... 22
Improvement .............................................................................................................................................. 22
User feedback ............................................................................................................................................. 23
Reference ........................................................................................................................................................ 27
Page 4
Assignment 2
Scenario
The project of my group is to create a lock system using password. This lock system can provide users a lot
of benefits. To be more specific, this system can help users to protect their personal property efficiently, and
this system is also easy to use which can be environment-friendly. To create this system, there are some
tools must be prepared, and also using the Arduino IDE and API.
Hardware:
1 Arduino UNO board
1 breadboard
Page 5
Figure 2: Breadboard
Temporary circuits are constructed using a breadboard, often known as a plug-block. Designers
may quickly remove and change components because to its usefulness. It is helpful for someone
who wants to construct a circuit to show how it works before reusing the parts in another circuit.
(Bishop, 2001)
3 LEDs
Figure 3: LEDs
Small, powerful lights called LEDs (light-emitting diodes) are often utilized in electrical equipment.
An LED light is a polarized component, which means that for it to function correctly, it must be
connected to a circuit in a certain way. Each LED has a positive leg and a negative leg, specifically.
These may be recognized visually because to the lengthened negative leg.
(idew, 2018)
3 220ohm resistors
Page 6
A 220Ω resistor has red, red, and brown stripes in that order. The last stripe represents the
tolerance. Gold means ±5%.
The TTL logic signals are received by the L298 motor drive chip, which operates at high voltage
and current.
(Yida, 2019)
1 infrared receiver
1 DC gear motor
Page 7
Figure 7: DC gear motor
A gear motor combines a motor and gearbox into one unit. When a gear head is added to a motor,
the speed is decreased but the production of torque is increased. In terms of gear motors, speed
(rpm), torque (lb-in), and efficiency (%) are the most crucial variables.
(ISL Products, 2022)
1 9v battery
Figure 8: 9V battery
The 9V battery, which is quite popular nowadays, was initially used in transistor radios. It has
two snap connections that are placed at the top of the battery and has a rectangular prism form.
The 9V battery is produced by a huge variety of battery manufacturers, both big and small.
(MicroBattery.com, 2022)
1 IR remote
Figure 9: IR remote
Page 8
(InfraRed remote control) A portable, wireless device that uses light signals in the infrared (IR)
spectrum to control audio, video, and other electronic equipment inside a room.
(Ziff Davis, 2022)
Software:
Arduino IDE
The open-source software known as the Arduino IDE is used to create and upload code to Arduino
boards. For different operating systems, including Windows, Mac OS X, and Linux, the IDE program
is appropriate. The programming languages C and C++ are supported. Integrated Development
Environment is referred to in this sentence.
(JavaTpoint, 2021)
API:
IRremote
Installation
Step 1:
Page 9
Figure 12: Step 1
Install the 3 led lights onto the breadboard and place 3 220ohm resistors on the positive side of each led
light. Ensure that the LED lights are placed correctly with the long pin on the side where the resistor makes
contact.
Step 2:
Connect the negative side of the LED to the negative line of the breadboard using breadboard wires.
Step 3:
Page 10
Figure 14: Step 3
Connect the negative line of the breadboard to the GND of the Arduino board, and the positive line to the 5v
pin of the board.
Step 4:
Page 11
Figure 16: Step 4
Prepare the IR module with the right connection. Put the positive pin of the module to the positive line, the
negative to the negative line of the breadboard, and the signal pin to pin 3 of the Arduino board.
Step 5:
Next, connect the positive side of the LED lights to the appropriate pin on the Arduino board. The red light
will use pin 9, the yellow use pin 11, and the green use 13.
Step 6:
Page 12
Figure 18: Step 6
Prepare the L298 Dual H-Bridge with the right connection. We will be using the following port: port Out1
and Out2 will be used to control the motor, pin N1 and N2 will be used to receive the signal from the
Arduino board, the 12V+ and GND port will be connected to the 9V battery, the GND port of the bridge will
also connect with the GND port of the Arduino. The 9v battery will be used to power the module and the
motor.
Step 7:
Make the appropriate connect from the module to the Arduino board. The N1 and N2 port will be connected
to ports 7 and 6 of the Arduino board.
Step 8:
Page 13
Figure 20: Step 8
Connect ports Out1 and Out2 to the DC motor's connections. Makes sure that the pin does not make contact
with the metal housing of the motor to prevent a short circuit. As mentioned before, the motor can alter the
direction of its spinning if we change the way the electric current move. The Out1 should always be
connected to the positive side of the motor.
Step 9:
Now we connect the 9v battery to port 12V+ and GND of the module. By doing this, we now can power the
module and the motor.
Page 14
Working principle
When the system starts, users should press the reset password button, and then they should input the 4-digit
password.
After the setup process is completed by users, if the users input the correct password, the green LED will
shine and the door will be opened. The door will be kept opening for 4 seconds before closing. However, if
users input the wrong password, the red LEDs will blink 4 times to announce the incorrect password.
When users want to adjust the password, they should press the reset password button. After that, the yellow
LED will shine, and users should input the default password. If users input the correct password, the yellow
LED will turn into dark color and the green LED will shine, and users will input a new 4-digit password.
After that, the green LED will stop shining and spring back to the standby phase. However, if users input the
wrong password, the red LED will blink 4 times and stop the password modification process.
Code
Start-up mode
First, it takes the first user's input and set that input to be recognized as calling for the password reset
function.
Next, the next four signal received by the system will be recognized by the system as password. If the user
enters these four inputs when in standby mode, the door will open
When it detects these changes are done, it set the variable "startUp" to false to exit out of setup mode.
Page 15
Standby mode
If it is the same array, it opens the door. The door will return to standby mode when the user clicks a button
to close the door.
If it is not the same, it blinks the LED light rapidly and return to standby mode again waiting for input.
Page 16
First, it requires the user to input the original password that was in startup mode.
If the input is not the same as the one in startup mode, it will blink the light rapidly and return the
user back to standby mode.
If the input is correct, it will allow the user to set up a new password.
When the new password setup is completed, it will return the user back to standby mode.
Problem
A slight difficulty occurred during the motor's manufacture. The motor can be controlled with the low and
high outputs from the Arduino's pins, thus we didn't need to utilize a separate power supply (9V battery) and
the L298 Dual H-Bridge while modeling on Tinkercad. This was not the case in reality since the Arduino pin
can only generate 40 mA whereas the motor needs up to 100 mA to operate. In order to somewhat alter the
design, we acquired a l298 Dual H-Bridge to control the motor and a separate power supply to power both
the motor and the H-Bridge.
Page 17
P6. Run end-user experiments and examines feedback.
Demonstration
Figure 22
Figure 23
Page 18
Figure 24
Password set, yellow light off. The system goes into standby mode, the door stays close.
Figure 25
Page 19
Figure 26
Password reset mode. The user needs to input the original password.
Figure 27
Page 20
Test case
The conclusion from the test case: When the door is fully closed, the motor can continue to rotate and make
a sound.
Requirements
The product can adapt to the safety requirement of the users. This is because in order to open the door, users
must enter the correct password. And the door is also tough enough to not be broken by bad guys.
This product is also very convenient because it uses the remote to control, so users can control the system
from far away.
The price of this product is also very reasonable, which can be affordable for most users from different
financial classes.
This product is also very easy to use, and can also be easily used by different ages from children to the
elderly.
Page 21
Feasibility
Regarding the technical aspect, the steps to create and prepare this product are not too difficult, so it is
possible for technicians from beginners to seniors to set up. The tools required for this product can be easily
found in some local technical stores.
Regarding the economic aspect, the prices of those tools are also reasonable for organizations to buy. If the
project is fully developed, the expected revenue of the project can be high. Therefore, the profit and return
on investment of companies can be significantly boosted.
Based on the 2 aspects above, I believe that the project can be suitable for most organizations. For some
companies that focus on increasing annual profits, this project can be fully adaptable. So, I firmly believe
that this project can be feasible.
Commercialization
Budget to prepare for the system: roughly 262000 VND. (without model)
The product can be scale up and apply in real world.
The product can be easily set up and prepared with a redundance of hardware tools. Therefore, the mass
production of the system can be feasible. With the expansion of the population, a lot of people are pushed to
the verge of unemployment, so they have no choice but to resort to illegal activities to earn basic needs. This
issue increases the number of crimes, which can threaten local dwellers’ lives. The presence of an efficient
lock system can make a huge difference. Thus, the demand for this system is very high to prevent crimes to
pose threat to residents’ lives and property.
Improvement
To improve capacity and provide longer uptime, we should ideally be utilizing a series of six 1.5V
batteries.
Because we employ a specified time delay, the motor may continue to operate after the door has
finished shutting. This results in a loud noise from the motor rotating and being pulled away from the
door rail. If the project is reworked, we should add a method to manage motor speed when the door is
about to close in order to stop the motor from turning.
In addition, a laser system that determines whether the door has fully closed or not might be enabled,
stopping the motor. This might also serve as a safety feature to stop the door from shutting if
something is in the way.
Page 22
User feedback
From the above figure, we can see that all the feedback takers agreed that the project work as intended.
From the above figure, we can see that most of the feedback takers agreed with the view that the project’s
usability is high. With the presence of only 40% of total feedback takers believed that the project is very
usable.
Page 23
Figure 30: User feedback 3
From the above figure, we can see that the 80% of feedback takers believed that the project is highly
accessible, with only 20% of the total thought that this project is accessible.
From the above figure, we can see that most of feedback takers believed that this project’ s working
principle is very easy to understand, with only 1/5 of total response is this principle can be understood.
Page 24
Figure 32: User feedback 5
From the above figure, we can see that the device is very easy to control (based on 80% of feedback takers),
with only 1/5 of total feedback takers believe that the system is quite easy to control.
From the above figure, we can see that the device can be possibly scale-up, with 100% of total number of
feedback takers agreed with this view.
Page 25
Figure 34: User feedback 7
From the above figure, we can see that the project sees 100% of total number of feedback takers believed
that the system is economically viable.
From the figure, we can see that the 100% of total number of feedback takers thought that the project has
satisfied all requirements.
Page 26
Reference
Indeed Editorial Team, (2021). What Is Project Feasibility and Why Is It Important? [online] Available at:
https://www.indeed.com/career-advice/career-development/project-feasibility [Accessed 14th Dec. 2022].
Makar, A., (2022). Five Steps to Determine Project Feasibility. [online] Available at:
https://www.tacticalprojectmanagement.com/five-steps-to-determine-project-feasibility/
[Accessed 14th Dec. 2022].
THE INVESTOPEDIA TEAM, (2022). Feasibility study. [online] Available at:
https://www.investopedia.com/terms/f/feasibility-study.asp [Accessed 14th Dec. 2022].
Tutorialspoint, (2022). Test case. [online] Available at:
https://www.tutorialspoint.com/software_testing_dictionary/test_case.htm [Accessed 14th Dec. 2022].
Rana, K., (2022). Test Case – Definition, Attributes, and Examples. [online] Available at:
https://artoftesting.com/test-case [Accessed 14th Dec. 2022].
Pololu, 2022. Arduino UNO R3. [online] Available at: https://www.pololu.com/product/2191
[Accessed 21st Dec. 2022].
Bishop, O., (2001). From components to circuits. [online] Available at:
https://www.sciencedirect.com/topics/engineering/breadboard [Accessed 21st Dec. 2022].
Idew, (2022). LED light. [online] Available at: https://docs.idew.org/internet-of-things-project/references-
for-wiring-and-coding/led-light [Accessed 21st Dec. 2022].
Yida, 2019. L298, a Dual H-Bridge Motor Driver module. [online] Available at:
https://www.seeedstudio.com/blog/2019/10/08/l298-all-about-l298-motor-driver/ [Accessed 21st Dec. 2022].
Infratec, (2022). Infrared Sensor - IR Sensor. [online] Available at: https://www.infratec.eu/sensor-
division/service-support/glossary/infrared-sensor/ [Accessed 21st Dec. 2022].
ISL, (2022). DC MOTOR & SMALL GEAR MOTORS – BASICS. [online] Available
at:https://islproducts.com/design-note/dc-motor-dc-gear-motor-basics/ [Accessed 21st Dec. 2022].
MicroBattery, (2022). What are 9V batteries?[online] Available at:
https://www.microbattery.com/blog/post/battery-bios:-everything-you-need-to-know-about-the-9v-battery/
[Accessed 21st Dec. 2022].
Ziff Davis, (2022). IR remote. [online] Available at: https://www.pcmag.com/encyclopedia/term/ir-remote-
control [Accessed 21st Dec. 2022].
JavaTpoint, (2021). Arduino IDE. [online] Available at: https://www.javatpoint.com/arduino-ide [Accessed
21st Dec. 2022].
Page 27
Page 28