Professional Documents
Culture Documents
Mrs.Lasitha
Assessor Internal
Verifier
Unit 13: Computing Research Project
Unit(s)
Final Research Report
Assignment title
B.M.N.D.B.Basnayake/KAN00034315
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
B.M.N.D.B.Basnayake/KAN00034315 CRP 1
Confirm action completed
Remedial action taken
Give details:
Date
Assessor signature
Date
Internal Verifier
signature
Date
Programme Leader
signature (if required)
B.M.N.D.B.Basnayake/KAN00034315 CRP 2
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID B.M.N.D.B.Basnayake/KAN00034315
Assessor Feedback:
LO2 Conduct and analyse research relevant to a chosen computing research project
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
B.M.N.D.B.Basnayake/KAN00034315 CRP 3
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
B.M.N.D.B.Basnayake/KAN00034315 CRP 4
Pearson
Higher Nationals in
Computing
Unit 13: Computing Research Project
Project Report
B.M.N.D.B.Basnayake/KAN00034315 CRP 5
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
B.M.N.D.B.Basnayake/KAN00034315 CRP 6
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it means
to copy another’s work.
B.M.N.D.B.Basnayake/KAN00034315 CRP 7
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number B.M.N.D.B.Basnayake/KAN00034315
Submission Date
Submission format
LO2. Conduct and analyse research relevant to a chosen computing research project
LO3. Communicate the outcomes of a research project to identified stakeholders
LO4. Reflect on the application of research methodologies and concepts
B.M.N.D.B.Basnayake/KAN00034315 CRP 8
Assignment Brief and Guidance:
Learner is now required to provide a comprehensive research project report based on the findings
of secondary and primary research carried out on the project proposal submitted in the previous
section.
The Learner requires to produce a detailed research project report covering following areas
Conduct primary and secondary research using appropriate methods for a computing
research project that consider costs, access and ethical issues. Carry out your research and
apply appropriate analytical tools to analyse research findings and data and discuss merits,
limitations and pitfalls experienced during data collection and analysis.
Draw conclusion based on the research findings.
Communicate the outcomes of your research project to the identified audience and a
critical evaluation of the outcomes demonstrating if the research objectives were met.
Reflect on the success of your research project and your performance at the end of the
project with the inclusion of a project evaluation and recommendations (Consider
alternative research methodologies and lessons learnt in view of the outcomes)
B.M.N.D.B.Basnayake/KAN00034315 CRP 9
B.M.N.D.B.Basnayake/KAN00034315 CRP 10
Grading Rubric
Grading Criteria Achieved Feedback
LO2 Conduct and analyse research relevant for a business research project
P3 Conduct primary and secondary research using
appropriate methods for a computing research project
that consider costs, access and ethical issues
P4 Apply appropriate analytical tools to analyse
research findings and data.
M2 Discuss merits, limitations and pitfalls of
approaches to data collection and analysis.
LO3 Communicate the outcomes of a research project to identified stakeholders
P5 Communicate research outcomes in an appropriate
manner for the intended audience.
M3 Communicate outcomes to the intended audience
demonstrating how outcomes meet set research
objectives
D2 Communicate critical analysis of the outcomes and
make valid, justified recommendations.
LO4 Reflect on the application of research methodologies and concepts
P6 Reflect on the effectiveness of research methods
applied for meeting objectives of the computing
research project.
B.M.N.D.B.Basnayake/KAN00034315 CRP 11
P7 Consider alternative research methodologies and
lessons learnt in view of the outcomes.
M4 Analyse results in recommended actions for
improvements and future research considerations
D3 Demonstrate reflection and engagement in the
resource process leading to recommended actions for
future improvement.
B.M.N.D.B.Basnayake/KAN00034315 CRP 12
Assess the Effect of IOT Based Home
Automation System on the Lifestyles of the
Households.
By
B.M.N.D.B. Basnayake
KAN00034315
DECLARATION
Field of Study:
I do solemnly and sincerely declare that:
i. I’m the sole author of this study
ii. This work is original
iii. In case of any use if any information from other sources references of copyright with its
ownership have been acknowledged in this document
iv. I do not have any actual knowledge nor do I ought reasonably to know that the making of
the work constitutes an infringement of any copyright work
v. I know that plagiarism is a punishable offence because it constitutes theft, I understand the
plagiarism and copying policy of the Edexcel UK, I know what the consequences will be
if I plagiaries or copy another’s work in this research for this program.
Supervisor’s Name:
Designation:
ACKNOWLEDGMENT
We would like to give our sincere acknowledgement to everybody responsible for the successful
completion of our research project titled “Smart Home Automation System”.
It gives us great pleasure to acknowledgement with thanks the assistance and contribution of
many individual who have been actively involved at various stages of this project to make it a
success. Firstly we are very grateful to this esteemed institute “ESOFT METRO CAMPUS” for
providing us an opportunity to our HND course.
Perfection is impossible to achieve, but hard work and dedication can achieve any goal. I have
tried my level best to fulfil the requirements of the research project, but I could not have achieved
my goal without the able guidance of our teacher, Ms.Lasitha. We indebted to Ms.Lasitha, for
providing us an opportunity to the guidance and for her constant support and encouragement.
Our gratitude towards our guide Ms.Lasitha for their keen interest and boldness encouragement,
which is received during the entire period of our project.We would also like to thank all our
lecturers.
Finally we convey our acknowledgement to all our friends and family members who directly or
indirectly associated with us in the successful completion of the project.
B.M.N.D.B.Basnayake/KAN00034315 CRP ii
iii
ABSTRACT
Artificial Intelligence (AI) is a broad branch of computer science that is generally interested in
developing smart machines that can perform tasks that require human intelligence. AI is an
intermediate science with many approaches, but advances in machine learning and in-depth
learning create a paradigm shift in every field of technology.
The Internet of Things, or IoT, refers to the billions of physical devices around the world that are
now connected to the Internet, collecting and sharing data. Thanks to inexpensive processors and
wireless networks, everything from a tablet to an airplane to a self-driving car can become a part
of IoT. It adds the level of digital intelligence to devices that would otherwise be dumb, enabling
humans to communicate real-time data without being involved and to effectively connect the
digital and physical worlds.
A home automation system is a technical solution that automates most of the electronic, electrical
and technology-based tasks within a home. It uses a combination of hardware and software
technologies that enables control and management over a home appliance and devices. Home
automation is also known as homeopathy, and a home with an automation system is also called
a smart home.
The main purpose of the research is to identify the impact of artificial intelligence on the Internet
of Things in Smart Home Automation. This is a case study in which data was collected through
a questionnaire. The target population is 300. The sample is 100. The sample size was determined
by the respondents to the test. The study established that the impact of artificial intelligence on
the Internet of Things.
CONTENTS
DECLARATION ............................................................................................................................. i
ACKNOWLEDGMENT ................................................................................................................. ii
ABSTRACT ...................................................................................................................................iii
CONTENTS ................................................................................................................................... iv
LIST OF ABBREVIATIONS ........................................................................................................ vi
A LIST OF TABLES .................................................................................................................... vii
LIST OF FIGURES ......................................................................................................................viii
CHAPTER 1 – INTRODUCTION ................................................................................................. 9
1.1. Introduction ...................................................................................................................... 9
1.2. Purpose of research ........................................................................................................... 9
1.3. Significance of the Research .......................................................................................... 10
1.4. Research objectives ........................................................................................................ 10
1.5. Research Sub objectives ................................................................................................. 11
1.6. Research questions ......................................................................................................... 11
1.7. Hypothesis ...................................................................................................................... 11
1.8. Thesis structure ............................................................................................................... 12
CHAPTER 1 - Introduction ................................................................................................... 12
CHAPTER 2 - Literature Review.......................................................................................... 12
CHAPTER 3 – Methodology ................................................................................................ 12
CHAPTER 4 - Presentation of Results .................................................................................. 13
CHAPTER 5 - Conclusions and Recommendations ............................................................. 13
CHAPTER 2 - LITERATURE REVIEW ..................................................................................... 15
2.1. Literature Review ........................................................................................................... 15
2.2. Conceptual framework ................................................................................................... 20
CHAPTER 3 - METHODOLOGY ............................................................................................... 22
3.1. Research philosophy ....................................................................................................... 22
3.2. Research approach .......................................................................................................... 24
3.3. Research strategy ............................................................................................................ 24
3.4. Research Choice ............................................................................................................. 26
3.5. Time frame ..................................................................................................................... 26
3.6. Data collection procedures ............................................................................................. 27
3.6.1. Type of Data ................................................................................................................... 28
3.6.2. Data Collection Method.................................................................................................. 28
3.6.3. Data Collection and Analyze Tools ................................................................................ 29
B.M.N.D.B.Basnayake/KAN00034315 CRP iv
v
B.M.N.D.B.Basnayake/KAN00034315 CRP v
vi
LIST OF ABBREVIATIONS
AI – Artificial Intelligence
IoT – Internet of Things
SHA – Smart Home Automation
B.M.N.D.B.Basnayake/KAN00034315 CRP vi
vii
A LIST OF TABLES
LIST OF FIGURES
CHAPTER 1 – INTRODUCTION
1.1. Introduction
Today, technology has become an integrated part of people's lives. It has, and continues to
influence many aspects of daily life and has allowed better social interaction, ease of
transportation, the ability to indulge in entertainment and media and has helped in the
development in medicine. The creation of many devices such as mobile phones and
computers have caused many people to rely on technology to communicate with their
friends, store information such as pictures, movies, documents, and music . The internet
has become a common interface that many devices use in order to simplify the daily life of
many people. The Internet has given people the ability to search for information, store their
own information in the cloud while also giving them better ways of managing information.
From the time of its introduction, the amount of people that use mobile phones and the
internet to communicate with other people has increased dramatically to become one of the
major means of communication.
Smartphones have allowed people to connect to the internet without the need for a
computer, while still offering the same functionality but through different means. With
the introduction of better hardware and better software, smartphones have become
powerful devices and have become an important part of people’s daily lives. A major
aspect is how the smartphone is able to connect and communicate with other devices. For
example, smartphones can be used as a mouse for a computer, or it can connect to the
speakers of cars allowing consumers to play their own music. There are many
applications of this sort. A field that is recently gaining popularity is home automation
which can also use smartphones as information or functionality hubs. (apigy, 2013)
B.M.N.D.B.Basnayake/KAN00034315 CRP 9
10
RO1: Assess the effect of IOT based Home Automation System on Living standard
of the households.
B.M.N.D.B.Basnayake/KAN00034315 CRP 10
11
RQ1: What is the effect of IOT based Home Automation System on Living standard
of the households?
RQ2: What is the effect of Lightening control of Home Automation System on Living
standard of the households?
RQ3: What is the effect of Alarm system of Home Automation System on Living
standard of the households?
RQ4: What is the effect of Gate control of Home Automation System on Living
standard of the households?
1.7. Hypothesis
H0 1: There is no significant relationship between IoT based home automation system
and living standard of people.
H1 1: There is a significant relationship between IoT based home automation system
and living standard of people.
H0 2: There is no significant relationship between lightning control of the home
automation system and living standard of people.
H1 2: There is a significant relationship between lightning control of the home
automation system and living standard of people.
H0 3: There is no significant relationship between alarm system of home automation
system and living standard of people.
H1 3: There is a significant relationship between alarm system of home automation
system and living standard of people.
H0 4: There is no significant relationship between gate control of the home
automation system and living standard of people.
B.M.N.D.B.Basnayake/KAN00034315 CRP 11
12
CHAPTER 1 - Introduction
AI and the IoT are both unique technologies on their own, but what makes them even more
interesting is where they intersect. The term may be used for isolated programmable devices,
like thermostats and sprinkler systems, but SHA more accurately describes homes in which
nearly everything — lights, appliances, electrical outlets, heating and cooling systems — are
hooked up to a remotely controllable network.
Check the previous researches. I choose my research problem to fill this research gap and find
research questions and objectives.
CHAPTER 3 – Methodology
B.M.N.D.B.Basnayake/KAN00034315 CRP 12
13
Using research onion methodology to determine the project. Find the population and samples
for the project. Finding data collection method. Defining conceptual modal
This chapter researcher explains how the data collected, coded, analyzed.
Descriptive analysis and inference analysis were done by researcher.
CONCLUSION
This chapter includesfull work done by researcher start to end. The researcher chooses the
problem “Impact of AI in IoT special reference to smart home automation”.
In the Introduction chapter researcher clearly explains about background of study, problem
statement, justification, delimitation and chapter profile. In this chapter researcher finds two
independent variables and one dependent variable and defines the scope of the study In the
Literature review chapter researcher clearly explains about previous researches according to
the same research problem. And research questions and research objectives were defined by
the researcher.
In the research methodology chapter researcher choose research onion methodology for the
research. Researcher defines population and sampling for the research. Researcher choose the
questionnaire for primary data collection and old researcher, articles for secondary data
collection. Defines the role of the researcher.
In the investigations of results and analysis chapter, first researcher clearly explains how the
data collected, coded and analyzed in introduction and field survey. Researcher use SPSS 22
for the data analysis. On descriptive analysis researcher analyses the demographic variables
such as gender, age, level of education. Inference analysis has been carried out with the
descriptive statistics to test the independent variables such as security and user friendliness. In
the 4.2 segment, the investigator explained the relevant proof with the screenshots of study.
On the descriptive statistic’s independent variables security and user friendliness were
evaluated by definition. The mean value for security is 4.1635 with the standard deviation
0.62100. And the skewness (-.214) shows that the data is lightly skewed, and the kurtosis (-
1.009) indicates a lighter tail of the distribution. With the standard deviation of 0.64654the user
friendliness has a mean value of 3.9167. And the skewness of 0.034 indicates that the data are
B.M.N.D.B.Basnayake/KAN00034315 CRP 13
14
moderately skewed and the value of kurtosis is (-0.918), suggesting that the distribution's tail
is lighter.
Nature of Dependent variable was analyzed by test of normality using Shapiro – Wilk test.
Because there are more than 100 sample in the population. Result od the test of normality the
significant value is 0.000. So, this clearly shows that the null hypothesis could be rejected.
On the correlation analysis the findings of the study indicate that the independent variable
security (0.839) and user friendliness (0.760) are very good with their dependent variable
output in the smart home automation.
On the regression analysis researcher used multiple regression analysis for the two independent
variables and one dependent variable. The result shows Regression analysis reveals 79.1% of
variations in dependent variable to two independent variables. The ANOVA table results
reveals the significant value is 0.000, which shows that the data perfectly fit for the model. The
histogram and plot chart show how the data perfectly fit for the model.
RECOMMANDATIONS
Security
A smart security system does more than alert you if a burglar tries to break into your home.
Smart home security uses your Wi-Fi network to connect entry sensors and sirens to devices
like smart door locks, smart thermostats, and smart light bulbs. Once connected, these devices
can talk to each other and integrate with your security system to make your life more convenient
and more secure.
One of the most important features you should look for in a smart security system is a mobile
app that lets you keep tabs on your home from anywhere. If you have indoor and outdoor
security cameras or a smart video doorbell, you should be able to access live or recorded video
from the app. This is important to help you tell a real emergency from a false alarm.
Other features to consider in a smart security system are detailed below.
Cloud storage for video and still photos
Types of notifications and push alerts
System requirements for IOS and Android apps
Night vision capabilities
Customized settings for contact sensors, motion detectors, and glass break detectors
Wi-Fi network requirements
Finalize the result give summary of the total research start to end
B.M.N.D.B.Basnayake/KAN00034315 CRP 14
15
What is IOT
IoT means the Internet of Things. It is very tough to define IoT precisely. The topic IoT has
been used by Kevin Ashton who is an expert on digital innovation. Then it became very
popular. IoT is a network of internet-linked action capable of gather and barter of data or
information. Many computing devices are embedded with our necessary appliances to the
internet through IoT.
IoT term has two major parts:
Internet is the backbone of connectivity
Things meaning objects
The term internet of things is a concept but it is not specific hardware or software or
electronics.
With the introduction of IoT, The home automation systems are becoming more famous at
present days research.
Most of the devices are monitored and controlled for the people. Through the internet of
things, it is possible to control and monitor home appliances. With the internet of things, the
physical world is becoming one big information systems. To enhance the living value of our
life IoT technology is used to get novelty concepts.
In this chapter, the relevant literature for this study is reviewed. The purpose of this chapter is
to provide an understanding of the independent variables and dependent variables used in this
study. According to the Gregory Miller (2019) argued Smart Home technology is Making life
easier with automation, AS technology advances and access increases, smart homes will be a
very common sight in the future. Whether it be home security, smart lighting, or temperature
control, Artificial intelligence is making home life simpler. Mundane tasks that took time out
of people’s lives will become completely automated and painless. By doing so, Artificial
Intelligence is making the goal of home automation — limiting human involvement — a
reality. Beyond this, future possibilities are endless. Moreover Arjun S. (2019) argued the
future of smart home automation is changing lives of humans and more importantly, saving
money. However, Mucheol Kim (2018) argued Smart home service, one of the representative
B.M.N.D.B.Basnayake/KAN00034315 CRP 15
16
emerging technologies in the IoT era, has changed house equipment into being more intelligent,
remote controllable, and interconnected Moreover Gyu Myoung Lee, (2018) argued about the
security of Iot devices, AI plays an important role.
Recently, the increasing amount of data as well as the rich metadata brought by large‐scale
Web applications (e.g., social media, e‐commerce, recommender systems) has led to a new
trend of applying formerly unutilized machine learning methodologies, such as deep learning,
to more precisely model trust. In this report, we have discussed potential benefit of integrating
machine learning and other AI technologies with trust and security concepts and its crucial role
in data‐driven applications, service composition, social networking, recommendation systems
and security aspects. Further, it is observed that there is an emerging trend in scientific
community in developing many research activities at the junction of trust and AI techniques.
To understand the prevailing issues related to trust, and provide more smart solutions, it is
essential to bring researchers in these two communities closer to each other.
According to Calum McClelland (2017) disagreed about AI that The Impact of Artificial
Intelligence will be the reason for Job Losses, moreover he argued the impact of artificial
intelligence and automation will be profound. But we need to prepare for a future in which job
loss reaches 99 percent. Moreover, Kelly Potter, (2018) argued Positive and Negative Effects
have with the of IoT. According to Ann Johnson (2018) argued about the ai cyber security, and
IoT devices is one of the core scenarios security professionals must provide solutions for now
and in the very near future.
Importance of IOT
The internet of things helps people live and work smarter, as well as gain complete control
over their lives. In addition to offering smart devices to automate homes, IoT is essential to
business. IoT provides businesses with a real-time look into how their systems really work,
delivering insights into everything from the performance of machines to supply chain and
logistics operations.
IoT enables companies to automate processes and reduce labor costs. It also cuts down on
waste and improves service delivery, making it less expensive to manufacture and deliver
goods, as well as offering transparency into customer transactions.
B.M.N.D.B.Basnayake/KAN00034315 CRP 16
17
As such, IoT is one of the most important technologies of everyday life, and it will continue
to pick up steam as more businesses realize the potential of connected devices to keep them
competitive. (Alexander S. Gillis, 2021)
Internet of Things can create information about the connected objects, analyze it, and make
decisions; in other words, one can tell that the Internet of Things is smarter than the Internet.
Security cameras, sensors, vehicles, buildings, and software are examples of things that can
exchange data among each other. (Yasser Ismail, 2019)
Applications of IOT
The Internet of Things is recognized as one of the most important areas of future technologies
and is gaining vast recognition in a wide range of applications and fields related to smart
cities, military, education, hospitals, homeland security systems, transportation and
autonomous connected cars, agriculture, intelligent shopping systems, and other modern
technologies. The smart home is one of the main applications that use the Internet of Things
infrastructure to connect several sensors. The sensors can sense and collect surrounding
information that is used to fully control different home systems such as lighting and security
as seen in Figure 1.
There are many other applications that use the Internet of Things infrastructures such as smart
bridges and smart tunnels. Temperature and vibration sensors, as well as video surveillance
cameras, can be fixed on a bridge to detect any abnormal activity and send warnings via SMS.
B.M.N.D.B.Basnayake/KAN00034315 CRP 17
18
Also video processing analysis can be performed to control the traffic density on a bridge.
The smart tunnel can use several sensors to monitor humidity, displacement, and temperature
to call for appropriate maintenance if a problem is detected. All of these applications are using
sensors to detect and collect data that are used to give a proper decision that maintains a high
level of security of the installations. (Yasser Ismail, 2019)
The IoT based home automation consist of several smart devices for different applications of
lighting, security, home entertainment etc. All these devices are integrated over a common
network established by gateway and connected in a mesh network. This means that it gives
users the flexibility to operate one sensor based followed by the action of the other. For e.g.
you can schedule to trigger the living room lights as soon as the door/windows sensor of your
main door triggers after 7pm in the evening.
Thus all the sensors within a common network can perform cross-talk via the main controller
unit. As shown in the figure, some of the smart sensors in home automation acts as sensor
hubs. These are basically the signal repeaters of signal bouncers which that are located in the
midway between the hub installation location and the sensors that are at a distant location.
For such long distances, these sensor hubs play an important role to allow easy transmission
of signals to sensors that are far away from the main controller but in closer proximity to the
sensor hub. The commonly used sensor hubs in IoT based Home Automation system are
Smart Plugs. (smartify, 2021)
B.M.N.D.B.Basnayake/KAN00034315 CRP 18
19
B.M.N.D.B.Basnayake/KAN00034315 CRP 19
20
The dependent variable in this research is the living standard of the households. On the other
hand lighting controlling, alarm system and gate control being the independent variables
Lightning Control
Lighting control systems create the ability for all of a home’s lighting to be controlled
together. For example, one press of a button can turn on 8 separate lights, illuminating an area
with the ideal level of brightness for the task at hand. Whether that be watching tv, cooking,
B.M.N.D.B.Basnayake/KAN00034315 CRP 20
21
or reading a book, lighting control systems allow you to set the perfect mood for your
occasion.
An important thing to note: Lighting control systems aren’t limited to controlling a single
room or area. With an intelligent lighting control system, you can control the lights throughout
your entire home with a single push of a button. For example, this allows you to set a
‘bedtime’ mode that could switch off all lights across your home. This eliminates the need to
go from room to room manually switching them off. (Greg Devenish, 2020)
Alarm System
The smart home promises a futuristic home experience where everything you need is just a
simple voice command away, even when you’re far from home. There are some very cool
gadgets that let you do a lot with home automation, many of which are incorporated into home
security systems. These include smart doorbells, smart locks, smart cameras, smart
thermostats, smart lights, and smart smoke alarms. (Celeste Tholen, 2021)
Gate Control
Automatic gates are used to control access into a secured area. Most commonly, automatic
gates are used at the entrance to the facility, and are used to control vehicular access on and
off of the site. For example, a manufacturing plant may use an automatic gate at its main
entrance. All vehicles entering and exiting the plant must do so through the automatic gate.
Automatic gates are also used at interior areas within a facility. For example, automatic gates
are commonly used within the inside of a parking garage to separate employee parking areas
from public areas of the garage. (Silva Consultants, 2021)
B.M.N.D.B.Basnayake/KAN00034315 CRP 21
22
CHAPTER 3 - METHODOLOGY
Research philosophy deals with the source, nature and development of knowledge. In
simple terms, a research philosophy is belief about the ways in which data about a
phenomenon should be collected, analyzed and used.
Although the idea of knowledge creation may appear to be profound, you are engaged
in knowledge creation as part of completing your dissertation. You will collect
secondary and primary data and engage in data analysis to answer the research question
and this answer marks the creation of new knowledge.
B.M.N.D.B.Basnayake/KAN00034315 CRP 22
23
A research philosophy refers to the set of beliefs concerning the nature of the reality being
investigated (Bryman, 2012). It is the underlying definition of the nature of knowledge. Also,
Research philosophies can differ on the goals of research and on the best way that might be
used to achieve these goals (Goddard & Melville, 2004). These are not necessarily different,
but the choice of research philosophy is defined by the type of knowledge being investigated
in the research project (May, 2011).
There are four main philosophies that are significant in the research process.
Pragmatism - Pragmatism emphasizes the need to use the best available methods to
study phenomena. The basic goal of pragmatism is to conduct research from a practical
perspective, in which information is constantly questioned and understood, rather than fixed.
Since researchers will not evaluate from different angles, pragmatism is not appropriate.
Realism - Realism casts doubt on the validity of scientific knowledge and claims
that new methods can be used to change the theory to obtain more reliable results. Since
researchers do not intend to review theories, realism is not enough.
Interpretivism - Interpretationism emphasizes the use of qualitative rather than
quantitative methods. This position combines human interest in research projects. Since
researchers do not intend to review theories, realism is not suitable.
Positivism - Positivism is a philosophical position based on the fact that scientific
knowledge is the only acceptable knowledge and is defined by evaluating assumptions
B.M.N.D.B.Basnayake/KAN00034315 CRP 23
24
B.M.N.D.B.Basnayake/KAN00034315 CRP 24
25
increased value of homes with smart technology. The results proved that significant
price premiums were paid for incorporating technology into new homes. In addition,
research suggests that the use of this technology is not limited to high-income earners
or other demographic stereotypes. Instead, it has a broader market system and the
potential to save a great deal of energy for the community. Smart technology involves
integrating various home systems such as lighting, climate control, and security to
improve the comfort, convenience and economy of the home. Its users. It is unknown
at this time what he will do after leaving the post. This study used the market value of
home sales and the attitude of homeowners to determine the increased value of homes
with smart technology. The results proved that significant price premiums were paid
for incorporating technology into new homes. In addition, research suggests that the
use of this technology is not limited to high-income earners or other demographic
stereotypes. Instead, it has a broader market system and the ability to save energy for
the community. (Mills, 2001)
The research strategy describes how the researcher intends to carry out the work (Saunders et
al., 2007). The strategy can include a number of different approaches, such as experimental
research, action research, case study research, interviews, surveys, or a systematic literature
review.
Experimental
Experimental research refers to the strategy of creating a research process that examines the
results of an experiment against the expected results. It can be used in all areas of research,
and usually involves the consideration of a relatively limited number of factors. As the
researcher is not conducting a experiment, so an experimental research cannot be used.
Survey
Survey strategy of the research onion is often linked with the deductive approach. It is one of
the finest and economic research strategy. You can collect rich and reliable data through this
method. Surveys tend to be used in quantitative research projects, and involve sampling a
representative proportion of the population (Bryman & Bell, 2011). The Survey strategy is
mostly used to observe contributing variables among different data. It permits the collection
of vast data that will be used to answer the research question. Therefore, researcher will use
a survey as the strategy.
B.M.N.D.B.Basnayake/KAN00034315 CRP 25
26
Case Study
This strategy is focused on a one or more people or a single area. You can provide information
about the unique characteristics of any example and explain the role of culture and
environment in determining the difference between the cases. In financial research, this
method is most useful. Therefore, case study is not suitable.
Action research
This form of research is common in professions such as teaching or nursing, where the
practitioner can assess ways in which they can improve their professional approach and
understanding (Wiles et al., 2011). This strategy is used mainly to find the solution that can
be used to solve a certain problem. As the researcher is not identifying a solution, an action
research will not be suitable.
B.M.N.D.B.Basnayake/KAN00034315 CRP 26
27
B.M.N.D.B.Basnayake/KAN00034315 CRP 27
28
hypothesis on the basis of collected data. In most cases, data collection is the primary and
most important step for research, irrespective of the field of research. The approach of data
collection is different for different fields of study, depending on the required information.
The most critical objective of data collection is ensuring that information-rich and reliable
data is collected for statistical analysis so that data-driven decisions can be made for research.
(Bhaskaran, 2021)
Primary Data is defined as data collected from the source or first hand. This can be done
via the use of several instruments questionnaires, oral or written interviews, etc
Secondary Data is derived from the work or opinions of other researchers (Newman,
1998).
Therefore the researcher will use Primary data collection method.
Data Collection Methods: Phone vs. Online vs. In-Person Interviews.
Essentially there are four choices for data collection – in-person interviews, mail, phone
and online. There are pros and cons to each of these modes.
I used primary data and secondary data to get the information
SECONDARY DATA
In the optional information assortment, I utilized web articles, old looks into.
Mail Surveys
Pros: Can reach anyone and everyone – no barrier
Cons: Expensive, data collection errors, lag time
B.M.N.D.B.Basnayake/KAN00034315 CRP 28
29
Phone Surveys
Pros: High degree of confidence in the data collected, reach almost anyone
Cons: Expensive, cannot self-administer, need to hire an agency
Web/Online Surveys
Pros: Cheap, can self-administer, very low probability of data errors
Cons: Not all your customers might have an email address/be on the internet, customers
may be wary of divulging information online.
B.M.N.D.B.Basnayake/KAN00034315 CRP 29
30
I can get the data from the quantitative information through the information assortment
techniques. Quantitative information gathered; also, composed and coded .and they
were checked. Additionally, Mistakes and unanswered inquiries are stayed away from
by checking before to enter the information to The Statistical Packages for Social
Sciences (SPSS 22.0) programming.
B.M.N.D.B.Basnayake/KAN00034315 CRP 30
31
other situations, participants were informed of what we were doing about the research
by obtaining an accurate report from the participants.
Reliability
In quantitative research, reliability refers to exact reliability of the processes and the results.
In qualitative research with diverse paradigms, such definition of reliability is challenging
and epistemologically counter-intuitive. Hence, the essence of reliability for qualitative
research lies with consistency. (ncbi, 2015)
Generalizability
Generalizability is the extent to which the findings of a study can be applicable to other
settings. It is also known as external validity. Generalizability requires internal validity as
well as a judgment on whether the findings of a study are applicable to a particular group.
There are three types of generalizability, population, environmental and temporal
generalizability. (healthknowledge, 2021)
The questionnaire is the reasonable one for testing the legitimacy and unwavering quality
with the measure the from information assortment. Through my discoveries of research
will can be generalizability of one investigation to another under comparable hypothetical
and which can use in to the comparable businesses and the social settings.
B.M.N.D.B.Basnayake/KAN00034315 CRP 31
32
B.M.N.D.B.Basnayake/KAN00034315 CRP 32
33
4.1. Introduction
The results of the survey data are presented in this chapter. In order to Impact AI in IoT
Special Reference to Smart Home Automation, this study included conducting
questionnaire survey. The findings are systematically summarized to discuss research
goals and objectives and to answer questions. The quantitative information analysis
involved the use of the SPSS 22 system, in which results from the information have
been checked, updated and enters, coded and categorized and both descriptive and
inferential measurements have been developed.
In order to ensure the collected data is described explicitly using charts, percentages
and graphs, a survey questionnaire used in this retrospective study was carefully
analyzed. A retrospective diagram analysis was carried out to collect the data required
for achieving the research goals. Data analysis accompanied by research results
discussion. Data analysis the findings contribute to the research concerns guiding the
analysis.
All data is incorporated in the data analysis. And delivered in a way that promotes data
analysis.
In this analysis two parts are included, such as descriptive analyzes and interference
analyses.
4.1.1. Statics
Descriptive statistics are used to describe or summarize data in ways that are
meaningful and useful. For example, it would not be useful to know that all of the
participants in our example wore blue shoes. However, it would be useful to know how
spread out their anxiety ratings were. Descriptive statistics is at the heart of all
quantitative analysis.
B.M.N.D.B.Basnayake/KAN00034315 CRP 33
34
The table 2, shows the descriptive statistics for the SEC. When observing the statistics, the SEC
has a mean value of 4.1635 with the standard deviation of 0.62100. the skewness score (-.214)
shows that the data distribution is lightly skewed and the kurtosis score of (-1.009) rivals that
the data set has a lighter Tail.
The table 3, shows the descriptive statistics for the independent variable UF. When observing
the statistics, the UF has a mean value of 3.9167 with the standard deviation of 0.64654. The
skewness score 0.264 shows that the data distribution is moderately skewed and the kurtosis
score of (-0.918) rivals that the data set has a lighter Tail.
B.M.N.D.B.Basnayake/KAN00034315 CRP 34
35
Model Summary
ANOVA
B.M.N.D.B.Basnayake/KAN00034315 CRP 35
36
Coefficients
B.M.N.D.B.Basnayake/KAN00034315 CRP 36
37
B.M.N.D.B.Basnayake/KAN00034315 CRP 37
38
Descriptive analysis is an important first step for conducting statistical analyses. It gives
you an idea of the distribution of your data, helps you detect outliers and typos, and
enable you identify associations among variables, thus preparing you for conducting
further statistical analyses.
GENDER ANALYSIS
B.M.N.D.B.Basnayake/KAN00034315 CRP 38
39
AGE ANALYSIS
The distribution of the respondent's age is shown in Figure 2. According to Fig. 2 of the 100
samples along to the large no of respondents were between the ages of 20 – 25 years (40.38%),
followed by the ages of 15 – 20 years (25%). There are other age group of respondents
following 25 – 30 years (17.31%), 30 – 35 years (13.46%), and least no of respondents in 35 –
40 years (3.846%).
B.M.N.D.B.Basnayake/KAN00034315 CRP 39
40
The distribution of the respondent's level of education is shown in Figure 3. According to Fig.
3 of the 100 samples along to the large no of respondents were in HND (30.77%), followed by
the diploma (26.92%). There are other level of education respondents following A/L’s
(13.46%), degree (11.54%), O/L’s (9.615%) and least no of respondents in masters (7.692%).
B.M.N.D.B.Basnayake/KAN00034315 CRP 40
41
Correlations
The correlation analysis shows that there is a Positive Impact of independent variable in the
Dependent Variable. The Correlation value is 0.801 which shows the strong positive
relationship and the sig. value is 0.000, which shows that the relationship is significant.
B.M.N.D.B.Basnayake/KAN00034315 CRP 41
42
Correlations
The correlation analysis shows that there is a Positive Impact of independent variable in the
Dependent Variable. The Correlation value is 0.839 which shows the strong positive
relationship and the sig. value is 0.000, which shows that the relationship is significant.
B.M.N.D.B.Basnayake/KAN00034315 CRP 42
43
Correlations
The correlation analysis shows that there is a Positive Impact of independent variable in the
Dependent Variable. The Correlation value is 0.801 which shows the strong positive
relationship and the sig. value is 0.000, which shows that the relationship is significant.
B.M.N.D.B.Basnayake/KAN00034315 CRP 43
44
5.1. Conclusion
This chapter includes full work done by researcher start to end. The researcher chooses the
problem “Assess the Effect of IOT Based Home Automation System on the Lifestyles of the
Households”.
In the Introduction chapter researcher clearly explains about background of study, problem
statement, justification, delimitation and chapter profile. In this chapter researcher finds two
independent variables and one dependent variable and defines the scope of the study.
In the Literature review chapter researcher clearly explains about previous researches
according to the same research problem. And research questions and research objectives were
defined by the researcher.
In the research methodology chapter researcher choose research onion methodology for the
research. Researcher defines population and sampling for the research. Researcher choose the
questionnaire for primary data collection and old researcher, articles for secondary data
collection. Defines the role of the researcher.
In the investigations of results and analysis chapter, first researcher clearly explains how the
data collected, coded and analyzed in introduction and field survey. Researcher use SPSS 22
for the data analysis. On descriptive analysis researcher analyses the demographic variables
such as gender, age, level of education. Inference analysis has been carried out with the
descriptive statistics to test the independent variables such as security and user friendliness.
In the 4.2 segment, the investigator explained the relevant proof with the screenshots of study.
On the descriptive statistic’s independent variables security and user friendliness were
evaluated by definition. The mean value for security is 4.1635 with the standard deviation
0.62100. And the skewness (-.214) shows that the data is lightly skewed, and the kurtosis (-
1.009) indicates a lighter tail of the distribution. With the standard deviation of 0.64654the
user friendliness has a mean value of 3.9167. And the skewness of 0.034 indicates that the
data are moderately skewed and the value of kurtosis is (-0.918), suggesting that the
distribution's tail is lighter.
Nature of Dependent variable was analyzed by test of normality using Shapiro – Wilk test.
Because there are more than 100 sample in the population. Result od the test of normality the
significant value is 0.000. So, this clearly shows that the null hypothesis could be rejected.
B.M.N.D.B.Basnayake/KAN00034315 CRP 44
45
On the correlation analysis the findings of the study indicate that the independent variable
security (0.839) and user friendliness (0.760) are very good with their dependent variable
output in the smart home automation.
On the regression analysis researcher used multiple regression analysis for the two
independent variables and one dependent variable. The result shows Regression analysis
reveals 79.1% of variations in dependent variable to two independent variables. The ANOVA
table results reveals the significant value is 0.000, which shows that the data perfectly fit for
the model. The histogram and plot chart show how the data perfectly fit for the model.
5.1.1. RO1 : Assess the effect of IOT based Home Automation System on Living
standard of the households.
Regression : According to the data analysis, there is a significant relationship between the
Home automation and the convenience of people. That means, the Home automation system
impacts on the convenience of the people. Based on this analysis, researcher will accept H
1.1 (there is a significant impact of the IoT based Home automation system to improve the
convenience of people) and will reject H 0.1 (there is no significant impact of the IoT based
Home automation system to improve the convenience of people).
5.1.2. RO2 : Assess the effect of Lightening control of the Home Automation
System on Living standard of the households.
Correlation : According to the correlation analysis, there was a strong positive relationship
between Lightning control and Home automation for the convenience of people. That means,
when Lightning control increases, the Home automation and the convenience of people will
increase. When Lightning control decreases, the Home automation system and the convenience
of people will decrease.
Regression : According to the data analysis, there is a significant relationship between the
Lightning control and the convenience of people. That means, the Lightning control system
impacts on the convenience of the people. Based on this analysis, researcher will accept H 1.2
(there is a significant impact of the Lightning control system to improve the convenience of
people) and will reject H 0.2 (there is no significant impact of the Lightning control System to
improve the convenience of people).
B.M.N.D.B.Basnayake/KAN00034315 CRP 45
46
5.1.3. RO3 : To identify the effect of Alarm system of the Home Automation
System on Living standard of the households.
Correlation : According to the correlation analysis, there was a moderate positive relationship
between pedestrian Alarm system and home automation for the convenience of people. That
means, when pedestrian alarm system increases, the home automation system and the
convenience of people will increase. When Home alarm system decreases, the home
automation system and the convenience of people will decrease.
Regression : According to the data analysis, there is a significant relationship between the
Home alarm system and the convenience of people. That means, the home alarm system and
its safety impacts on the convenience of the people. Based on this analysis, researcher will
accept H 1.3 (there is a significant impact of the alarm system and their safety of the home
automation system to improve the convenience of the people) and will reject H 0.3 (there is no
significant impact of the alarm system and their safety of the home automation system to
improve the convenience of the people).
5.1.4. RO4 : To identify the effect of Gate control of Home Automation System
on Living standard of the households.
Correlation : according to the correlation analysis, there was a moderate positive relationship
between Gate control system and home automation system for the convenience of people. That
means, when proper gate control increases, the home automation and the convenience of people
will increase. When gate control system decreases, the home automation system and the
convenience of people will decrease.
Regression ; according to the data analysis, there is a significant relationship between the
gate control system and the convenience of people. That means, the gate control impacts on
the convenience of the people. Based on this analysis, researcher will accept H 1.4 (there is a
significant impact of the gate control system of the home automation system to improve the
convenience of the people) and will reject H 0.4 (there is no significant impact of the gate
control system of the home automation system to improve the convenience of the people).
B.M.N.D.B.Basnayake/KAN00034315 CRP 46
47
5.2. Recommendations
Security
A smart security system does more than alert you if a burglar tries to break into your
home. Smart home security uses your Wi-Fi network to connect entry sensors and sirens
to devices like smart door locks, smart thermostats, and smart light bulbs. Once
connected, these devices can talk to each other and integrate with your security system
to make your life more convenient and more secure.
One of the most important features you should look for in a smart security system is a
mobile app that lets you keep tabs on your home from anywhere. If you have indoor
and outdoor security cameras or a smart video doorbell, you should be able to access
live or recorded video from the app. This is important to help you tell a real emergency
from a false alarm.
5.3. Limitations
The aim of qualitative analysis is a complete, detailed description. No attempt is made
to assign frequencies to the linguistic features which are identified in the data, and rare
phenomena receives (or should receive) the same amount of attention as more frequent
phenomena. Qualitative analysis allows for fine distinctions to be drawn because it is
not necessary to shoehorn the data into a finite number of classifications.
Ambiguities, which are inherent in human language, can be recognized in the analysis.
B.M.N.D.B.Basnayake/KAN00034315 CRP 47
48
For example, the word "red" could be used in a corpus to signify the color red, or as a
political categorization (e.g. socialism or communism). In a qualitative analysis both
senses of red in the phrase "the red flag" could be recognized.
B.M.N.D.B.Basnayake/KAN00034315 CRP 48
49
This is important to help you tell the real emergency from a false alarm.
B.M.N.D.B.Basnayake/KAN00034315 CRP 49
50
9. Helps you to connect with the nature, habitat, ecosystem, connectors of the subject.
10. Expands your views about individuals related to the subject being researched
(Gorani, 2018)
B.M.N.D.B.Basnayake/KAN00034315 CRP 50
51
Analysis is necessary because without it, companies will fly blind and try to move into
a competitive landscape without any foresight. If you do not know the size and trend of
the markets in which you operate, it will be difficult to determine whether to expand,
contract, go public or buy a new company.
Most businesses today are truly global. In order for any company to be competitive,
they must have access to high-quality, reliable market research that will guide
everything from investments to product development. Understanding the competitive
environment of a given industry and its growth potential allows companies to develop
strong short-term and long-term growth strategies. Numerous industries and markets
are maturing, and market research will help identify areas of future growth, highlight
disruptive trends, and uncover important product innovations and research among key
competitors in an industry.
Our studies look at the industry as a whole and we expect future growth to be in an
unbiased manner. It is important to know that just because a company is growing or
shrinking does not mean that the entire industry is following the same path. By using
market research, companies can compare their own growth with the growth of the
industry, as well as better understand the ways in which they can improve or see what
improvements their competitors have made. (Cowley, 2021)
B.M.N.D.B.Basnayake/KAN00034315 CRP 51
52
Annexures A: Questionnaire
Yours truly,
……………………
SECTION A
Please select the suitable answer by ticking (v) correctly in the provided brackets
B.M.N.D.B.Basnayake/KAN00034315 CRP 52
53
B.M.N.D.B.Basnayake/KAN00034315 CRP 53
54
B.M.N.D.B.Basnayake/KAN00034315 CRP 54
55
B.M.N.D.B.Basnayake/KAN00034315 CRP 55
56
B.M.N.D.B.Basnayake/KAN00034315 CRP 56
57
B.M.N.D.B.Basnayake/KAN00034315 CRP 57
58
B.M.N.D.B.Basnayake/KAN00034315 CRP 58
59
B.M.N.D.B.Basnayake/KAN00034315 CRP 59
60
B.M.N.D.B.Basnayake/KAN00034315 CRP 60
61
B.M.N.D.B.Basnayake/KAN00034315 CRP 61
62
B.M.N.D.B.Basnayake/KAN00034315 CRP 62
63
Referencing
B.M.N.D.B.Basnayake/KAN00034315 CRP 63
64
Neville Chamunorwa, HOME AUTOMATION, How IoT and Smart Home Technology is
Shaping Our Lives/https://getmysa.com/blogs/home-automation/how-iot-and-smart-home-
technology-is-shaping-our-lives/2019.
‘Stainton, Hayley. (2018) Lifeasabutterfly.’/https://tourismteacher.com/research-onion-
beginners/31/08/2021.
Bryman, A. (2012). Social research methods (5th ed.). Oxford: Oxford University Press.
May, T. (2011). Social research: Issues, methods and research. London: McGraw-Hill
International.
Goddard, W. & Melville, S. (2004). Research Methodology: An Introduction, (2nd ed.)
Oxford: Blackwell Publishing.
Saunders, M., Lewis, P., & Thornhill, A. (2007). Research Methods for Business Students,
(6th ed.) London: Pearson.
Wiles, R., Crow, G., & Pain, H. (2011). Innovation in qualitative research methods: a
narrative review. Qualitative Research, 11(5), pp.587-604.
Goddard, W. & Melville, S. (2004). Research Methodology: An Introduction, (2nd ed.)
Oxford: Blackwell Publishing.
ZIKMUND 2002. Business research methods, Dryden, Thomson Learning.
BROWN, G. H. 1947. A comparison of sampling methods. Journal of Marketing, 6, 331-337.
DAVIS, D. 2005. Business Research for Decision Making, Australia, Thomson South-
Western.
QuestionPro Products Audience 2021 QuestionPro Survey
https://www.questionpro.com/blog/non-probability-sampling/2021.
Stephanie Glen. "Correlation in Statistics: Correlation Analysis Explained" From
StatisticsHowTo.com: Elementary Statistics for the rest of us!
https://www.statisticshowto.com/probability-and-statistics/correlation-analysis/2021.
Prashanth Ashok, Great Learning Team, https://www.mygreatlearning.com/blog/what-is-
regression/Jul 26, 2021.
J Family Med Prim Care, Validity, reliability, and generalizability in qualitative research,
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4535087/2015 Jul-Sep;
Saran Shantikumar 1a - Epidemiology Validity, reliability and generalisability,
https://www.healthknowledge.org.uk/content/validity-reliability-and-
generalisability/2018/2021
B.M.N.D.B.Basnayake/KAN00034315 CRP 64
65
Assignment Help UK (2017) Research Onion – Made easy to understand and follow.
Retrieved from https://www.allassignmenthelp.co.uk/blog/research-onion-made-easy-to-
understand-and-follow/?share=twitter&nb=1
Feilzer, M. Y. (2010). Doing mixed methods research pragmatically: Implications for the
rediscovery of pragmatism as a research paradigm. Journal of Mixed Methods Research, 4(1),
pp.6-16.
Gulati, P. M. (2009). Research Management: Fundamental and Applied Research, New Delhi:
Global India Productions.
Newman, I. (1998). Qualitative-quantitative research methodology: Exploring the interactive
continuum. Carbondale: Southern Illinois University Press.
Podsakoff, P. M., MacKenzie, S. B., & Podsakoff, N. P. (2012). Sources of method bias in
social science research and recommendations on how to control it. Annual Review of
Psychology, 63, pp.539-569.
Bhaskaran, V. ( 2021). https://www.questionpro.com/. Retrieved from Home Consumer
Insights Market Research: https://www.questionpro.com/blog/data-collection/Cowley, A.
(2021). Research and Development. Retrieved from www.sabp.nhs.uk:
https://www.sabp.nhs.uk/research/about-research/benefits-research
Dudovskiy, J. (2012). research-philosophy. Retrieved from research-
methodology.ne:https://research-methodology.net/research-philosophy/
Gorani, Y. (2018, April 12). What are the advantages of doing research? Retrieved from
https://www.quora.com/: https://www.quora.com/What-are-the-advantages-of-doing-
researchManish Prakash Gupta, N. S. (2018). Literature Review on Home Automation.
International
Research Journal of Engineering and Technology (IRJET), 07.
Miller, G. (2019, August 23). https://jaxenter.com/. Retrieved from IoT solutions:
https://jaxenter.com/smart-home-ai-iot-160479.html
Mills, A. (2001, December ). Analysis of the value of home automation systems. Retrieved
from https://www.researchgate.net/:
https://www.researchgate.net/publication/240257404_Analysis_of_the_value_of_home_a
utomation_systems
Norouzzadeh, M. S. (2018, June 19). RESEARCH ARTICLE. Automatically identifying,
counting, and describing wild animals in camera-trap images with deep learning, p. 2.
B.M.N.D.B.Basnayake/KAN00034315 CRP 65
66
Physician, M. F. (2006 , Aug 31). Common Ethical Issues In Research And Publication.
Retrieved from https://www.ncbi.nlm.nih.gov/:
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4453117/
Raza, S. N. (2019, June 28). Artificial Intelligence based Camera. Artificial Intelligence based
Camera Calibration, pp. 2-3.Schmidt, S. (2019, April 22). Why Is Market Research Important
for Companies Today? Retrieved from https://blog.marketresearch.com/:
https://blog.marketresearch.com/why-is-market-research-important-for-companies-today
B.M.N.D.B.Basnayake/KAN00034315 CRP 66