You are on page 1of 79

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC HND in Computing

Mrs.Lasitha
Assessor Internal
Verifier
Unit 13: Computing Research Project
Unit(s)
Final Research Report
Assignment title
B.M.N.D.B.Basnayake/KAN00034315
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment Y/N
criteria? Y/N
• Identifying opportunities for
improved performance? Y/N
• Agreeing actions?
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
Date
required)

B.M.N.D.B.Basnayake/KAN00034315 CRP 1
Confirm action completed
Remedial action taken
Give details:
Date
Assessor signature
Date
Internal Verifier
signature
Date
Programme Leader
signature (if required)

B.M.N.D.B.Basnayake/KAN00034315 CRP 2
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID B.M.N.D.B.Basnayake/KAN00034315

Unit Title Unit 13: Computing Research Project

Assignment Number 1 Assessor


Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO2 Conduct and analyse research relevant to a chosen computing research project

Pass, Merit & Distinction


Descripts
P3 ☐ P4 ☐ M2 ☐ D1 ☐

LO3 Communicate the outcomes of a research project to identified stakeholders

Pass, Merit & Distinction


Descripts
P5 ☐ M3 ☐ D2 ☐

LO4 Reflect on the application of research methodologies and concepts

Pass, Merit & Distinction


Descripts
P6 ☐ P7 ☐ M4 ☐ D3 ☐

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

B.M.N.D.B.Basnayake/KAN00034315 CRP 3
Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student signature Date

B.M.N.D.B.Basnayake/KAN00034315 CRP 4
Pearson
Higher Nationals in
Computing
Unit 13: Computing Research Project
Project Report

B.M.N.D.B.Basnayake/KAN00034315 CRP 5
General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

B.M.N.D.B.Basnayake/KAN00034315 CRP 6
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it means
to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson , UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

B.M.N.D.B.Basnayake/KAN00034315 CRP 7
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number B.M.N.D.B.Basnayake/KAN00034315

Unit Number and Title Unit 13 – Computing Research Project


Academic Year 2020/21
Unit Tutor

Assignment Title Final Research Project Report


Issue Date

Submission Date

IV Name & Date

Submission format

 The submission is in the form of an individual written report.


 The submission is in the form of an individual written report.
 This should be written in a concise, formal business style using single spacing and font size 12.
 You are required to make use of headings, paragraphs and subsections as appropriate, and all
work must be supported with research
 referenced using the Harvard referencing system.
 Please provide a referencing list using the Harvard referencing system.
 The recommended word limit is minimum 4,500 words
Unit Learning Outcomes:

LO2. Conduct and analyse research relevant to a chosen computing research project
LO3. Communicate the outcomes of a research project to identified stakeholders
LO4. Reflect on the application of research methodologies and concepts

B.M.N.D.B.Basnayake/KAN00034315 CRP 8
Assignment Brief and Guidance:

Learner is now required to provide a comprehensive research project report based on the findings
of secondary and primary research carried out on the project proposal submitted in the previous
section.
The Learner requires to produce a detailed research project report covering following areas

 Conduct primary and secondary research using appropriate methods for a computing
research project that consider costs, access and ethical issues. Carry out your research and
apply appropriate analytical tools to analyse research findings and data and discuss merits,
limitations and pitfalls experienced during data collection and analysis.
 Draw conclusion based on the research findings.
 Communicate the outcomes of your research project to the identified audience and a
critical evaluation of the outcomes demonstrating if the research objectives were met.
 Reflect on the success of your research project and your performance at the end of the
project with the inclusion of a project evaluation and recommendations (Consider
alternative research methodologies and lessons learnt in view of the outcomes)

B.M.N.D.B.Basnayake/KAN00034315 CRP 9
B.M.N.D.B.Basnayake/KAN00034315 CRP 10
Grading Rubric
Grading Criteria Achieved Feedback

LO2 Conduct and analyse research relevant for a business research project
P3 Conduct primary and secondary research using
appropriate methods for a computing research project
that consider costs, access and ethical issues
P4 Apply appropriate analytical tools to analyse
research findings and data.
M2 Discuss merits, limitations and pitfalls of
approaches to data collection and analysis.
LO3 Communicate the outcomes of a research project to identified stakeholders
P5 Communicate research outcomes in an appropriate
manner for the intended audience.
M3 Communicate outcomes to the intended audience
demonstrating how outcomes meet set research
objectives
D2 Communicate critical analysis of the outcomes and
make valid, justified recommendations.
LO4 Reflect on the application of research methodologies and concepts
P6 Reflect on the effectiveness of research methods
applied for meeting objectives of the computing
research project.

B.M.N.D.B.Basnayake/KAN00034315 CRP 11
P7 Consider alternative research methodologies and
lessons learnt in view of the outcomes.
M4 Analyse results in recommended actions for
improvements and future research considerations
D3 Demonstrate reflection and engagement in the
resource process leading to recommended actions for
future improvement.

B.M.N.D.B.Basnayake/KAN00034315 CRP 12
Assess the Effect of IOT Based Home
Automation System on the Lifestyles of the
Households.

By
B.M.N.D.B. Basnayake
KAN00034315

Submitted in accordance with the requirements for the


COMPUTING RESEARCH PROJECT MODULE OF PEARSON’S HND
IN NETWORK ENGINEERING PATHWAY PROGRAMME
at the
ESOFT METRO CAMPUS KANDY

Name of research Tutor: Mrs.Lasitha

05th February 2022


i

DECLARATION

Name of Research Candidate: B.M.N.D.B.Basnayake


Pearson Registration Number: KAN00034315
Programme Name: HND in computing
Research Title: Assess the Effect of IOT Based Home Automation System on the Lifestyles of
the Households.

Field of Study:
I do solemnly and sincerely declare that:
i. I’m the sole author of this study
ii. This work is original
iii. In case of any use if any information from other sources references of copyright with its
ownership have been acknowledged in this document
iv. I do not have any actual knowledge nor do I ought reasonably to know that the making of
the work constitutes an infringement of any copyright work
v. I know that plagiarism is a punishable offence because it constitutes theft, I understand the
plagiarism and copying policy of the Edexcel UK, I know what the consequences will be
if I plagiaries or copy another’s work in this research for this program.

Candidate Signature: nuwandishanthacb45@gmail.com Date: 2022.01.30

Subscribed and solemnly declared before,

Supervisor’s Name:

Designation:

Supervisor’s Signature: Date:


ii

ACKNOWLEDGMENT

We would like to give our sincere acknowledgement to everybody responsible for the successful
completion of our research project titled “Smart Home Automation System”.

It gives us great pleasure to acknowledgement with thanks the assistance and contribution of
many individual who have been actively involved at various stages of this project to make it a
success. Firstly we are very grateful to this esteemed institute “ESOFT METRO CAMPUS” for
providing us an opportunity to our HND course.

Perfection is impossible to achieve, but hard work and dedication can achieve any goal. I have
tried my level best to fulfil the requirements of the research project, but I could not have achieved
my goal without the able guidance of our teacher, Ms.Lasitha. We indebted to Ms.Lasitha, for
providing us an opportunity to the guidance and for her constant support and encouragement.

Our gratitude towards our guide Ms.Lasitha for their keen interest and boldness encouragement,
which is received during the entire period of our project.We would also like to thank all our
lecturers.

Finally we convey our acknowledgement to all our friends and family members who directly or
indirectly associated with us in the successful completion of the project.

We thank one and all.

B.M.N.D.B.Basnayake/KAN00034315 CRP ii
iii

ABSTRACT

Artificial Intelligence (AI) is a broad branch of computer science that is generally interested in
developing smart machines that can perform tasks that require human intelligence. AI is an
intermediate science with many approaches, but advances in machine learning and in-depth
learning create a paradigm shift in every field of technology.

The Internet of Things, or IoT, refers to the billions of physical devices around the world that are
now connected to the Internet, collecting and sharing data. Thanks to inexpensive processors and
wireless networks, everything from a tablet to an airplane to a self-driving car can become a part
of IoT. It adds the level of digital intelligence to devices that would otherwise be dumb, enabling
humans to communicate real-time data without being involved and to effectively connect the
digital and physical worlds.

A home automation system is a technical solution that automates most of the electronic, electrical
and technology-based tasks within a home. It uses a combination of hardware and software
technologies that enables control and management over a home appliance and devices. Home
automation is also known as homeopathy, and a home with an automation system is also called
a smart home.

The main purpose of the research is to identify the impact of artificial intelligence on the Internet
of Things in Smart Home Automation. This is a case study in which data was collected through
a questionnaire. The target population is 300. The sample is 100. The sample size was determined
by the respondents to the test. The study established that the impact of artificial intelligence on
the Internet of Things.

B.M.N.D.B.Basnayake/KAN00034315 CRP iii


iv

CONTENTS
DECLARATION ............................................................................................................................. i
ACKNOWLEDGMENT ................................................................................................................. ii
ABSTRACT ...................................................................................................................................iii
CONTENTS ................................................................................................................................... iv
LIST OF ABBREVIATIONS ........................................................................................................ vi
A LIST OF TABLES .................................................................................................................... vii
LIST OF FIGURES ......................................................................................................................viii
CHAPTER 1 – INTRODUCTION ................................................................................................. 9
1.1. Introduction ...................................................................................................................... 9
1.2. Purpose of research ........................................................................................................... 9
1.3. Significance of the Research .......................................................................................... 10
1.4. Research objectives ........................................................................................................ 10
1.5. Research Sub objectives ................................................................................................. 11
1.6. Research questions ......................................................................................................... 11
1.7. Hypothesis ...................................................................................................................... 11
1.8. Thesis structure ............................................................................................................... 12
CHAPTER 1 - Introduction ................................................................................................... 12
CHAPTER 2 - Literature Review.......................................................................................... 12
CHAPTER 3 – Methodology ................................................................................................ 12
CHAPTER 4 - Presentation of Results .................................................................................. 13
CHAPTER 5 - Conclusions and Recommendations ............................................................. 13
CHAPTER 2 - LITERATURE REVIEW ..................................................................................... 15
2.1. Literature Review ........................................................................................................... 15
2.2. Conceptual framework ................................................................................................... 20
CHAPTER 3 - METHODOLOGY ............................................................................................... 22
3.1. Research philosophy ....................................................................................................... 22
3.2. Research approach .......................................................................................................... 24
3.3. Research strategy ............................................................................................................ 24
3.4. Research Choice ............................................................................................................. 26
3.5. Time frame ..................................................................................................................... 26
3.6. Data collection procedures ............................................................................................. 27
3.6.1. Type of Data ................................................................................................................... 28
3.6.2. Data Collection Method.................................................................................................. 28
3.6.3. Data Collection and Analyze Tools ................................................................................ 29

B.M.N.D.B.Basnayake/KAN00034315 CRP iv
v

3.6.4. Role of the Researcher .................................................................................................... 29


3.6.5. Data Storage ................................................................................................................... 30
3.7. Target population and sampling ..................................................................................... 30
3.8. The selection of participants ........................................................................................... 30
3.9. Reliability, Validity, and Generalizability ...................................................................... 31
3.10. Ethical issues of the research study ................................................................................ 32
CHAPTER 4 - PRESENTATION OF RESULTS ........................................................................ 33
4.1. Introduction .................................................................................................................... 33
4.1.1. Statics ...................................................................................................................... 33
4.2. Regression Analysis ....................................................................................................... 35
4.3. Descriptive Analysis ....................................................................................................... 38
4.4. Core Relation Analysis ................................................................................................... 40
4.5. Inferential Analysis......................................................................................................... 41
4.6. Hypothesis Testing ......................................................................................................... 42
4.6.1. Chapter Summary ................................................................................................... 42
CHAPTER 5 - CONCLUSIONS AND RECOMMENDATIONS ............................................... 44
5.1. Conclusion ...................................................................................................................... 44
5.1.1. RO1 ......................................................................................................................... 45
5.1.2. RO2 ......................................................................................................................... 45
5.1.3. RO3 ......................................................................................................................... 46
5.1.4. RO4 ......................................................................................................................... 46
5.2. Recommendations .......................................................................................................... 47
5.3. Limitations ...................................................................................................................... 47
5.4. Future Improvements ...................................................................................................... 48
5.5. Personnel Reflection ....................................................................................................... 49
5.5.1. Benefits for the researcher....................................................................................... 49
5.5.2. Benefits for the Industry/organization..................................................................... 50
Annexures A: Questionnaire ..................................................................................................... 52
Annexures B: Feedback Form / Question list ............................................................................ 53
Annexures C: Sample Feedback sheets ..................................................................................... 58
Referencing ................................................................................................................................... 63

B.M.N.D.B.Basnayake/KAN00034315 CRP v
vi

LIST OF ABBREVIATIONS

AI – Artificial Intelligence
IoT – Internet of Things
SHA – Smart Home Automation

B.M.N.D.B.Basnayake/KAN00034315 CRP vi
vii

A LIST OF TABLES

Table 1: Time frame ...................................................................................................................... 27


Table 2 : Target population area .................................................................................................... 30
Table 3 : Limitation areas .............................................................................................................. 48

B.M.N.D.B.Basnayake/KAN00034315 CRP vii


viii

LIST OF FIGURES

Figure 1 : Research Onion ............................................................................................................. 12


Figure 2: SMART home sensors communication through the internet of things. ........................ 17
Figure 3: Basic Setup .................................................................................................................... 19
Figure 4: Proposed Solution of IoT layer ...................................................................................... 19
Figure 5 :Conceptual Framework .................................................................................................. 20
Figure 6 : Research philosophy in the ‘research onion’ ................................................................ 23
Figure 7 : Gantt chart ..................................................................................................................... 27
Figure 8 : Descriptive Statistics on Effects of AI in IoT on Security ........................................... 34
Figure 9 : Descriptive Statistics Effects of AI in IoT on User Friendliness .................................. 34
Figure 10 : Model Summary of Regression Analysis ................................................................... 35
Figure 11 : ANOVA of Regression Analysis ................................................................................ 35
Figure 12 : Coefficients of Regression Analysis ........................................................................... 36
Figure 13 : Histogram of Dependent Variable – SHA .................................................................. 37
Figure 14 : Plot of Regression Standardized Residual Dependent Variable ................................. 37
Figure 15 : Pie chart of gender analysis ........................................................................................ 38
Figure 16 : Histogram of age analysis ........................................................................................... 39
Figure 17 : Histogram of level of education .................................................................................. 40
Figure 18 : Correlation analysis between user friendliness and smart home automation ............. 41
Figure 19 : Correlation analysis between security and smart home automation ........................... 42
Figure 20 : Correlation analysis between user friendliness and smart home automation ............. 43
Figure 23 : Gantt chart ................................................................................................................... 62

B.M.N.D.B.Basnayake/KAN00034315 CRP viii


9

CHAPTER 1 – INTRODUCTION

1.1. Introduction

Today, technology has become an integrated part of people's lives. It has, and continues to
influence many aspects of daily life and has allowed better social interaction, ease of
transportation, the ability to indulge in entertainment and media and has helped in the
development in medicine. The creation of many devices such as mobile phones and
computers have caused many people to rely on technology to communicate with their
friends, store information such as pictures, movies, documents, and music . The internet
has become a common interface that many devices use in order to simplify the daily life of
many people. The Internet has given people the ability to search for information, store their
own information in the cloud while also giving them better ways of managing information.
From the time of its introduction, the amount of people that use mobile phones and the
internet to communicate with other people has increased dramatically to become one of the
major means of communication.

Smartphones have allowed people to connect to the internet without the need for a
computer, while still offering the same functionality but through different means. With
the introduction of better hardware and better software, smartphones have become
powerful devices and have become an important part of people’s daily lives. A major
aspect is how the smartphone is able to connect and communicate with other devices. For
example, smartphones can be used as a mouse for a computer, or it can connect to the
speakers of cars allowing consumers to play their own music. There are many
applications of this sort. A field that is recently gaining popularity is home automation
which can also use smartphones as information or functionality hubs. (apigy, 2013)

1.2. Purpose of research


Scope of the study still 2030 increasing the benefits of AI in smart home and this
research is help to solve the problems of my research related topic. This research has
the positive and negative impacts. Although I am going to identifying the valid
conclusions with the help of statically evidences. It is giving by the help of SPSS
software.

B.M.N.D.B.Basnayake/KAN00034315 CRP 9
10

1.3. Significance of the Research


This project revolves around creating a home automation system prototype with the main
focus being the ability to lock/unlock a door through the internet. The system consists of a
central device, a server and an Android application.
The central device is a microprocessor, in this case, a Raspberry Pi that connects to the
Internet and receives an order to control a motor which in turn turns the lock with the help
of gears. The ability to rotate the motor in both directions is achieved by the use of an H-
bridge. The server manages users and devices, and handles the communication between the
application and the central device. Users and devices are stored in a database on the server.
The application is a frontend which presents the user with a list of devices to interact with.
The main prototype where the Raspberry Pi acted as a central device was abandoned due
to time and resource constraints. It was instead used to control the motor directly. This
brought up some problems concerning powering the device using batteries. The software
of the prototype is mostly working but due to the same time limitations not all planned
features could be implemented.
As you probably know, smart home gadgets and home automation are getting a lot of
attention these day by large companies like Samsung, Apple and Google. But there can be
a wide gap between the ability to link DIY gadgets together across a wireless network and
a true custom home automation system. Choosing the best smart home system takes time
and research.
The ability to manage your home’s electronic systems from one main control system can
make your household run smoother, feel better and save energy. The trick is to find a
solution that will meet all the demands of your household, now and in the future. Most
custom home automation systems can be tailored by a professional to provide all the
benefits you desire, but there are some key features that will make the job easier and your
interaction with your system more enjoyable. (electronichouse, 2014)

1.4. Research objectives

RO1: Assess the effect of IOT based Home Automation System on Living standard
of the households.

B.M.N.D.B.Basnayake/KAN00034315 CRP 10
11

1.5. Research Sub objectives


RO2: Assess the effect of Lightening control of the Home Automation System on
Living standard of the households.
RO3: To identify the effect of Alarm system of the Home Automation System on
Living standard of the households.
RO4: To identify the effect of Gate control of Home Automation System on Living
standard of the households.

1.6. Research questions

RQ1: What is the effect of IOT based Home Automation System on Living standard
of the households?
RQ2: What is the effect of Lightening control of Home Automation System on Living
standard of the households?
RQ3: What is the effect of Alarm system of Home Automation System on Living
standard of the households?
RQ4: What is the effect of Gate control of Home Automation System on Living
standard of the households?

1.7. Hypothesis
H0 1: There is no significant relationship between IoT based home automation system
and living standard of people.
H1 1: There is a significant relationship between IoT based home automation system
and living standard of people.
H0 2: There is no significant relationship between lightning control of the home
automation system and living standard of people.
H1 2: There is a significant relationship between lightning control of the home
automation system and living standard of people.
H0 3: There is no significant relationship between alarm system of home automation
system and living standard of people.
H1 3: There is a significant relationship between alarm system of home automation
system and living standard of people.
H0 4: There is no significant relationship between gate control of the home
automation system and living standard of people.

B.M.N.D.B.Basnayake/KAN00034315 CRP 11
12

H1 4: There is a significant relationship between gate control of the home automation


system and living standard of people.

1.8. Thesis structure

CHAPTER 1 - Introduction

AI and the IoT are both unique technologies on their own, but what makes them even more
interesting is where they intersect. The term may be used for isolated programmable devices,
like thermostats and sprinkler systems, but SHA more accurately describes homes in which
nearly everything — lights, appliances, electrical outlets, heating and cooling systems — are
hooked up to a remotely controllable network.

CHAPTER 2 - Literature Review

Check the previous researches. I choose my research problem to fill this research gap and find
research questions and objectives.

CHAPTER 3 – Methodology

Research methodology is the specific procedures or techniques used to identify, select,


process, and analyze information about a topic. In a research paper, the methodology section
allows the reader to critically evaluate a study’s overall validity and reliability.

Figure 1 : Research Onion

B.M.N.D.B.Basnayake/KAN00034315 CRP 12
13

Using research onion methodology to determine the project. Find the population and samples
for the project. Finding data collection method. Defining conceptual modal

CHAPTER 4 - Presentation of Results

 This chapter researcher explains how the data collected, coded, analyzed.
 Descriptive analysis and inference analysis were done by researcher.

CHAPTER 5 - Conclusions and Recommendations

CONCLUSION
This chapter includesfull work done by researcher start to end. The researcher chooses the
problem “Impact of AI in IoT special reference to smart home automation”.
In the Introduction chapter researcher clearly explains about background of study, problem
statement, justification, delimitation and chapter profile. In this chapter researcher finds two
independent variables and one dependent variable and defines the scope of the study In the
Literature review chapter researcher clearly explains about previous researches according to
the same research problem. And research questions and research objectives were defined by
the researcher.
In the research methodology chapter researcher choose research onion methodology for the
research. Researcher defines population and sampling for the research. Researcher choose the
questionnaire for primary data collection and old researcher, articles for secondary data
collection. Defines the role of the researcher.
In the investigations of results and analysis chapter, first researcher clearly explains how the
data collected, coded and analyzed in introduction and field survey. Researcher use SPSS 22
for the data analysis. On descriptive analysis researcher analyses the demographic variables
such as gender, age, level of education. Inference analysis has been carried out with the
descriptive statistics to test the independent variables such as security and user friendliness. In
the 4.2 segment, the investigator explained the relevant proof with the screenshots of study.
On the descriptive statistic’s independent variables security and user friendliness were
evaluated by definition. The mean value for security is 4.1635 with the standard deviation
0.62100. And the skewness (-.214) shows that the data is lightly skewed, and the kurtosis (-
1.009) indicates a lighter tail of the distribution. With the standard deviation of 0.64654the user
friendliness has a mean value of 3.9167. And the skewness of 0.034 indicates that the data are

B.M.N.D.B.Basnayake/KAN00034315 CRP 13
14

moderately skewed and the value of kurtosis is (-0.918), suggesting that the distribution's tail
is lighter.
Nature of Dependent variable was analyzed by test of normality using Shapiro – Wilk test.
Because there are more than 100 sample in the population. Result od the test of normality the
significant value is 0.000. So, this clearly shows that the null hypothesis could be rejected.
On the correlation analysis the findings of the study indicate that the independent variable
security (0.839) and user friendliness (0.760) are very good with their dependent variable
output in the smart home automation.
On the regression analysis researcher used multiple regression analysis for the two independent
variables and one dependent variable. The result shows Regression analysis reveals 79.1% of
variations in dependent variable to two independent variables. The ANOVA table results
reveals the significant value is 0.000, which shows that the data perfectly fit for the model. The
histogram and plot chart show how the data perfectly fit for the model.

RECOMMANDATIONS
Security
A smart security system does more than alert you if a burglar tries to break into your home.
Smart home security uses your Wi-Fi network to connect entry sensors and sirens to devices
like smart door locks, smart thermostats, and smart light bulbs. Once connected, these devices
can talk to each other and integrate with your security system to make your life more convenient
and more secure.
One of the most important features you should look for in a smart security system is a mobile
app that lets you keep tabs on your home from anywhere. If you have indoor and outdoor
security cameras or a smart video doorbell, you should be able to access live or recorded video
from the app. This is important to help you tell a real emergency from a false alarm.
Other features to consider in a smart security system are detailed below.
 Cloud storage for video and still photos
 Types of notifications and push alerts
 System requirements for IOS and Android apps
 Night vision capabilities
 Customized settings for contact sensors, motion detectors, and glass break detectors
 Wi-Fi network requirements
Finalize the result give summary of the total research start to end

B.M.N.D.B.Basnayake/KAN00034315 CRP 14
15

CHAPTER 2 - LITERATURE REVIEW

2.1. Literature Review

What is IOT

IoT means the Internet of Things. It is very tough to define IoT precisely. The topic IoT has
been used by Kevin Ashton who is an expert on digital innovation. Then it became very
popular. IoT is a network of internet-linked action capable of gather and barter of data or
information. Many computing devices are embedded with our necessary appliances to the
internet through IoT.
IoT term has two major parts:
 Internet is the backbone of connectivity
 Things meaning objects

The term internet of things is a concept but it is not specific hardware or software or
electronics.
With the introduction of IoT, The home automation systems are becoming more famous at
present days research.
Most of the devices are monitored and controlled for the people. Through the internet of
things, it is possible to control and monitor home appliances. With the internet of things, the
physical world is becoming one big information systems. To enhance the living value of our
life IoT technology is used to get novelty concepts.

In this chapter, the relevant literature for this study is reviewed. The purpose of this chapter is
to provide an understanding of the independent variables and dependent variables used in this
study. According to the Gregory Miller (2019) argued Smart Home technology is Making life
easier with automation, AS technology advances and access increases, smart homes will be a
very common sight in the future. Whether it be home security, smart lighting, or temperature
control, Artificial intelligence is making home life simpler. Mundane tasks that took time out
of people’s lives will become completely automated and painless. By doing so, Artificial
Intelligence is making the goal of home automation — limiting human involvement — a
reality. Beyond this, future possibilities are endless. Moreover Arjun S. (2019) argued the
future of smart home automation is changing lives of humans and more importantly, saving
money. However, Mucheol Kim (2018) argued Smart home service, one of the representative

B.M.N.D.B.Basnayake/KAN00034315 CRP 15
16

emerging technologies in the IoT era, has changed house equipment into being more intelligent,
remote controllable, and interconnected Moreover Gyu Myoung Lee, (2018) argued about the
security of Iot devices, AI plays an important role.
Recently, the increasing amount of data as well as the rich metadata brought by large‐scale
Web applications (e.g., social media, e‐commerce, recommender systems) has led to a new
trend of applying formerly unutilized machine learning methodologies, such as deep learning,
to more precisely model trust. In this report, we have discussed potential benefit of integrating
machine learning and other AI technologies with trust and security concepts and its crucial role
in data‐driven applications, service composition, social networking, recommendation systems
and security aspects. Further, it is observed that there is an emerging trend in scientific
community in developing many research activities at the junction of trust and AI techniques.
To understand the prevailing issues related to trust, and provide more smart solutions, it is
essential to bring researchers in these two communities closer to each other.
According to Calum McClelland (2017) disagreed about AI that The Impact of Artificial
Intelligence will be the reason for Job Losses, moreover he argued the impact of artificial
intelligence and automation will be profound. But we need to prepare for a future in which job
loss reaches 99 percent. Moreover, Kelly Potter, (2018) argued Positive and Negative Effects
have with the of IoT. According to Ann Johnson (2018) argued about the ai cyber security, and
IoT devices is one of the core scenarios security professionals must provide solutions for now
and in the very near future.

Importance of IOT

The internet of things helps people live and work smarter, as well as gain complete control
over their lives. In addition to offering smart devices to automate homes, IoT is essential to
business. IoT provides businesses with a real-time look into how their systems really work,
delivering insights into everything from the performance of machines to supply chain and
logistics operations.
IoT enables companies to automate processes and reduce labor costs. It also cuts down on
waste and improves service delivery, making it less expensive to manufacture and deliver
goods, as well as offering transparency into customer transactions.

B.M.N.D.B.Basnayake/KAN00034315 CRP 16
17

As such, IoT is one of the most important technologies of everyday life, and it will continue
to pick up steam as more businesses realize the potential of connected devices to keep them
competitive. (Alexander S. Gillis, 2021)
Internet of Things can create information about the connected objects, analyze it, and make
decisions; in other words, one can tell that the Internet of Things is smarter than the Internet.
Security cameras, sensors, vehicles, buildings, and software are examples of things that can
exchange data among each other. (Yasser Ismail, 2019)

Applications of IOT

The Internet of Things is recognized as one of the most important areas of future technologies
and is gaining vast recognition in a wide range of applications and fields related to smart
cities, military, education, hospitals, homeland security systems, transportation and
autonomous connected cars, agriculture, intelligent shopping systems, and other modern
technologies. The smart home is one of the main applications that use the Internet of Things
infrastructure to connect several sensors. The sensors can sense and collect surrounding
information that is used to fully control different home systems such as lighting and security
as seen in Figure 1.

Figure 2: SMART home sensors communication through the internet of things.

There are many other applications that use the Internet of Things infrastructures such as smart
bridges and smart tunnels. Temperature and vibration sensors, as well as video surveillance
cameras, can be fixed on a bridge to detect any abnormal activity and send warnings via SMS.

B.M.N.D.B.Basnayake/KAN00034315 CRP 17
18

Also video processing analysis can be performed to control the traffic density on a bridge.
The smart tunnel can use several sensors to monitor humidity, displacement, and temperature
to call for appropriate maintenance if a problem is detected. All of these applications are using
sensors to detect and collect data that are used to give a proper decision that maintains a high
level of security of the installations. (Yasser Ismail, 2019)

IOT based Home Automation System

The IoT based home automation consist of several smart devices for different applications of
lighting, security, home entertainment etc. All these devices are integrated over a common
network established by gateway and connected in a mesh network. This means that it gives
users the flexibility to operate one sensor based followed by the action of the other. For e.g.
you can schedule to trigger the living room lights as soon as the door/windows sensor of your
main door triggers after 7pm in the evening.
Thus all the sensors within a common network can perform cross-talk via the main controller
unit. As shown in the figure, some of the smart sensors in home automation acts as sensor
hubs. These are basically the signal repeaters of signal bouncers which that are located in the
midway between the hub installation location and the sensors that are at a distant location.
For such long distances, these sensor hubs play an important role to allow easy transmission
of signals to sensors that are far away from the main controller but in closer proximity to the
sensor hub. The commonly used sensor hubs in IoT based Home Automation system are
Smart Plugs. (smartify, 2021)

B.M.N.D.B.Basnayake/KAN00034315 CRP 18
19

Figure 3: Basic Setup

Figure 4: Proposed Solution of IoT layer

B.M.N.D.B.Basnayake/KAN00034315 CRP 19
20

2.2. Conceptual framework

Lightening Control Living Standard of


Alarm System the
Gate Control Households

Figure 5 :Conceptual Framework

The dependent variable in this research is the living standard of the households. On the other
hand lighting controlling, alarm system and gate control being the independent variables

Lightning Control

Lighting control systems create the ability for all of a home’s lighting to be controlled
together. For example, one press of a button can turn on 8 separate lights, illuminating an area
with the ideal level of brightness for the task at hand. Whether that be watching tv, cooking,

B.M.N.D.B.Basnayake/KAN00034315 CRP 20
21

or reading a book, lighting control systems allow you to set the perfect mood for your
occasion.
An important thing to note: Lighting control systems aren’t limited to controlling a single
room or area. With an intelligent lighting control system, you can control the lights throughout
your entire home with a single push of a button. For example, this allows you to set a
‘bedtime’ mode that could switch off all lights across your home. This eliminates the need to
go from room to room manually switching them off. (Greg Devenish, 2020)

Alarm System

The smart home promises a futuristic home experience where everything you need is just a
simple voice command away, even when you’re far from home. There are some very cool
gadgets that let you do a lot with home automation, many of which are incorporated into home
security systems. These include smart doorbells, smart locks, smart cameras, smart
thermostats, smart lights, and smart smoke alarms. (Celeste Tholen, 2021)

Gate Control

Automatic gates are used to control access into a secured area. Most commonly, automatic
gates are used at the entrance to the facility, and are used to control vehicular access on and
off of the site. For example, a manufacturing plant may use an automatic gate at its main
entrance. All vehicles entering and exiting the plant must do so through the automatic gate.
Automatic gates are also used at interior areas within a facility. For example, automatic gates
are commonly used within the inside of a parking garage to separate employee parking areas
from public areas of the garage. (Silva Consultants, 2021)

Living Standard of the Household


IoT has been perpetuated by the constant innovation of smart technologies that transform
ordinary households into smart homes. These technologies have transformed the lives of
homeowners in a variety of ways.
IoT has been perpetuated largely by the creation of products such as the Amazon Echo and
Google Home, which have played a major role in transforming ordinary households into smart
homes. These technologies, combined with other smart appliances, have transformed the lives
of homeowners in a variety of ways. (Neville Chamunorwa, 2019)

B.M.N.D.B.Basnayake/KAN00034315 CRP 21
22

CHAPTER 3 - METHODOLOGY

3.1. Research philosophy


Research philosophy is a vast topic and here we will not be discussing this topic in great
details. In business and economics dissertations at Bachelor’s level, you are not
expected to discuss research philosophy in a great level of depth, and about one page
in methodology chapter devoted to research philosophy usually suffices. For a business
dissertation at Master’s level, you may need to provide more discussion of the
philosophy of your study, but even there, about two pages of discussions has to be
accepted as sufficient by your supervisor.

Discussion of research philosophy in your dissertation should include the following:


You need to specify the research philosophy of your study. Your research philosophy
can be pragmatism, positivism, realism or interpretivism as discussed below. The
reasons behind philosophical classifications of the study need to be provided. You need
to discuss the implications of your research philosophy on the research strategy in
general and the choice of primary data collection methods in particular.

The Essence of Research Philosophy

Research philosophy deals with the source, nature and development of knowledge. In
simple terms, a research philosophy is belief about the ways in which data about a
phenomenon should be collected, analyzed and used.

Although the idea of knowledge creation may appear to be profound, you are engaged
in knowledge creation as part of completing your dissertation. You will collect
secondary and primary data and engage in data analysis to answer the research question
and this answer marks the creation of new knowledge.

In essence, addressing research philosophy in your dissertation involves being aware


and formulating your beliefs and assumptions. As it is illustrated in figure below, the
identification of the research philosophy is positioned at the outer layer of the ‘research
onion, accordingly it is the first topic to be clarified in research methodology chapter
of your dissertation. (Dudovskiy, 2012)

B.M.N.D.B.Basnayake/KAN00034315 CRP 22
23

Figure 6 : Research philosophy in the ‘research onion’

A research philosophy refers to the set of beliefs concerning the nature of the reality being
investigated (Bryman, 2012). It is the underlying definition of the nature of knowledge. Also,
Research philosophies can differ on the goals of research and on the best way that might be
used to achieve these goals (Goddard & Melville, 2004). These are not necessarily different,
but the choice of research philosophy is defined by the type of knowledge being investigated
in the research project (May, 2011).
There are four main philosophies that are significant in the research process.
Pragmatism - Pragmatism emphasizes the need to use the best available methods to
study phenomena. The basic goal of pragmatism is to conduct research from a practical
perspective, in which information is constantly questioned and understood, rather than fixed.
Since researchers will not evaluate from different angles, pragmatism is not appropriate.
Realism - Realism casts doubt on the validity of scientific knowledge and claims
that new methods can be used to change the theory to obtain more reliable results. Since
researchers do not intend to review theories, realism is not enough.
Interpretivism - Interpretationism emphasizes the use of qualitative rather than
quantitative methods. This position combines human interest in research projects. Since
researchers do not intend to review theories, realism is not suitable.
Positivism - Positivism is a philosophical position based on the fact that scientific
knowledge is the only acceptable knowledge and is defined by evaluating assumptions

B.M.N.D.B.Basnayake/KAN00034315 CRP 23
24

derived from current theories. As a researcher’s plan to evaluate accepted knowledge,


positivist philosophy will be used.

3.2. Research approach


Deductive and inductive are the two terms that the second layer of the research onion
includes. Here, the previous layer of the onion has an effect on this one so it is important
to know the research aim and its limitations.
Deductive - The deductive method goes from broad to specific. Start with a theory
and gradually come up with a hypothesis that will be tested during the data analysis process.
Therefore, researchers will use deductive methods as methods that will test current theories.
Inductive - Inductive reasoning starts with observations and builds theories, so
inductive methods cannot be used because researchers are not building theories.

A home automation system monitors and / or controls household characteristics such as


lighting, climate, entertainment systems and equipment. This includes home security such
as access control and alarm systems. Home devices are an integral part of the Internet of
Things ("IoT") when connected to the Internet.
A home automation system typically connects controlled devices to the hub or "gateway".
The user interface for controlling the computer uses a web interface that can access wall-
mounted terminals, tablet or desktop computers, a mobile phone application, or an Internet
interface via the Internet.
While there are many competing vendors, efforts toward open-source systems are on the
rise. However, there are problems with the current state of home automation, which
includes the lack of standardized safety measures and the removal of old devices without
backwards compatibility. Home automation has the potential to share data between family
members or trusted individuals for personal protection and will lead to energy saving
activities with a positive environmental impact in the future. (Dudovskiy, 2012)

3.3. Research strategy


Smart technology involves integrating various home systems such as lighting, climate
control, and security to improve the comfort, convenience and economy of the home
for its users. It is unknown at this time what he will do after leaving the post. This study
used the market value of home sales and the attitude of homeowners to determine the

B.M.N.D.B.Basnayake/KAN00034315 CRP 24
25

increased value of homes with smart technology. The results proved that significant
price premiums were paid for incorporating technology into new homes. In addition,
research suggests that the use of this technology is not limited to high-income earners
or other demographic stereotypes. Instead, it has a broader market system and the
potential to save a great deal of energy for the community. Smart technology involves
integrating various home systems such as lighting, climate control, and security to
improve the comfort, convenience and economy of the home. Its users. It is unknown
at this time what he will do after leaving the post. This study used the market value of
home sales and the attitude of homeowners to determine the increased value of homes
with smart technology. The results proved that significant price premiums were paid
for incorporating technology into new homes. In addition, research suggests that the
use of this technology is not limited to high-income earners or other demographic
stereotypes. Instead, it has a broader market system and the ability to save energy for
the community. (Mills, 2001)

The research strategy describes how the researcher intends to carry out the work (Saunders et
al., 2007). The strategy can include a number of different approaches, such as experimental
research, action research, case study research, interviews, surveys, or a systematic literature
review.
Experimental
Experimental research refers to the strategy of creating a research process that examines the
results of an experiment against the expected results. It can be used in all areas of research,
and usually involves the consideration of a relatively limited number of factors. As the
researcher is not conducting a experiment, so an experimental research cannot be used.
Survey
Survey strategy of the research onion is often linked with the deductive approach. It is one of
the finest and economic research strategy. You can collect rich and reliable data through this
method. Surveys tend to be used in quantitative research projects, and involve sampling a
representative proportion of the population (Bryman & Bell, 2011). The Survey strategy is
mostly used to observe contributing variables among different data. It permits the collection
of vast data that will be used to answer the research question. Therefore, researcher will use
a survey as the strategy.

B.M.N.D.B.Basnayake/KAN00034315 CRP 25
26

Case Study
This strategy is focused on a one or more people or a single area. You can provide information
about the unique characteristics of any example and explain the role of culture and
environment in determining the difference between the cases. In financial research, this
method is most useful. Therefore, case study is not suitable.
Action research
This form of research is common in professions such as teaching or nursing, where the
practitioner can assess ways in which they can improve their professional approach and
understanding (Wiles et al., 2011). This strategy is used mainly to find the solution that can
be used to solve a certain problem. As the researcher is not identifying a solution, an action
research will not be suitable.

3.4. Research Choice


The choice of a specific research philosophy is impacted by practical implications.
There are important philosophical differences between studies that focus on facts and
numbers such as an analysis of the impact of foreign direct investment on the level of
GDP growth and qualitative studies such as an analysis of leadership style on employee
motivation in organizations.
The choice between positivist and interpretivist research philosophies or between
quantitative and qualitative research methods has traditionally represented a major
point of debate. However, the latest developments in the practice of conducting studies
have increased the popularity of pragmatism and realism philosophies as well.
Moreover, as it is illustrated in table below, there are popular data collection methods
associated with each research philosophy. (Dudovskiy, 2012)

3.5. Time frame


Milestone Propose completion data
Study of the topic 28 June 2021
Introduction 05 July 2021
Literature review 19 August 2021
Research Methodology 20 August 2021
Prepare and submit first proposal 27 September 2021
Creating questionnaire 05 November 2021

B.M.N.D.B.Basnayake/KAN00034315 CRP 26
27

Data Collection (questionnaire) 10 November 2021


Data Code 16 December 2021
Investigation of results & analysis 25 December 2021
Conclusion 05 January 2022
Recommendation 31 January 2022
Preparing final proposal and submit 05 February 2022

Table 1: Time frame

Figure 7 : Time frame

3.6. Data collection procedures


This is the sixth and last layer of the research onion; it is the innermost layer of Saunders
research onion. The process used at this stage of the research contributes significantly to the
study overall reliability and validity (Saunders et al., 2007). Data collection and analysis is
dependent on the methodological approach used (Bryman, 2012). This layer explains how the
data used in the research are collected and analyzed. It also explains the source of data, the
research design, the sample, the sample size, sample ethics, sample limitations, the research
reliability and validity. The data collected could be primary data or secondary data. Primary
data is a direct data, it is obtained directly from the source. Secondary data is the opposite of
primary data, secondary data is indirect data.
Data collection is defined as the procedure of collecting, measuring and analyzing accurate
insights for research using standard validated techniques. A researcher can evaluate their

B.M.N.D.B.Basnayake/KAN00034315 CRP 27
28

hypothesis on the basis of collected data. In most cases, data collection is the primary and
most important step for research, irrespective of the field of research. The approach of data
collection is different for different fields of study, depending on the required information.
The most critical objective of data collection is ensuring that information-rich and reliable
data is collected for statistical analysis so that data-driven decisions can be made for research.
(Bhaskaran, 2021)
 Primary Data is defined as data collected from the source or first hand. This can be done
via the use of several instruments questionnaires, oral or written interviews, etc
 Secondary Data is derived from the work or opinions of other researchers (Newman,
1998).
 Therefore the researcher will use Primary data collection method.
 Data Collection Methods: Phone vs. Online vs. In-Person Interviews.
 Essentially there are four choices for data collection – in-person interviews, mail, phone
and online. There are pros and cons to each of these modes.
 I used primary data and secondary data to get the information

3.6.1. Type of Data


PRIMARY DATA
To get the data I utilized the essential information assortment techniques. They are the
questionnaire.

SECONDARY DATA
In the optional information assortment, I utilized web articles, old looks into.

3.6.2. Data Collection Method


In-Person Interviews
Pros: In-depth and a high degree of confidence on the data
Cons: Time consuming, expensive and can be dismissed as anecdotal

Mail Surveys
Pros: Can reach anyone and everyone – no barrier
Cons: Expensive, data collection errors, lag time

B.M.N.D.B.Basnayake/KAN00034315 CRP 28
29

Phone Surveys
Pros: High degree of confidence in the data collected, reach almost anyone
Cons: Expensive, cannot self-administer, need to hire an agency

Web/Online Surveys
Pros: Cheap, can self-administer, very low probability of data errors
Cons: Not all your customers might have an email address/be on the internet, customers
may be wary of divulging information online.

Survey Design for Data Collection


1. Writing Great Questions for data collection
2. Avoid loaded or leading words or questions
3. Misplaced questions
4. Mutually non-overlapping response categories
5. Avoid the use of confusing/unfamiliar words
6. Non-directed questions give respondents excessive leeway
7. Never force questions
8. Unbalanced answer options in scales
9. Questions which cover two points
10. Dichotomous questions
11. Avoid the use of long questions

3.6.3. Data Collection and Analyze Tools


In my research survey were considered as an essential strategy for gathering
information, its one sort of information assortment strategies which upgrade the
legitimacy of information gathered.

3.6.4. Role of the Researcher


The role of the researcher is to conduct a research to assess the Assess the Effect of IOT Based
Home Automation System on the Lifestyles of the Households in the Kandy city area. All the
activities including preparing questionnaires, data collection, data analysis and writing the
report is done by the author who is the researcher. While conducting the research the author
has ensured that the results are unbiased and fair in all aspects.

B.M.N.D.B.Basnayake/KAN00034315 CRP 29
30

3.6.5. Data Storage


While Research, project data will be stored and used for easy access to research details
and data on mobiles and laptops. Research details and data stored on my mobile and
laptops will be used to have an easily accessible laptop and mobile phone, and
interviews with participants will be recorded in document format. after conducting and
finalize the research project data will be stored on Esoft metro campus lecture panel
access LMS at Kandy branch. Data will be recorded in the form of a Microsoft word
document and it kept on more than a month.

3.7. Target population and sampling


This study population consists by Kandy district. Those are 100 random samples are
taken over 4 areas in the Kandy district.
Areas Population Sample
Kandy 150 50
Peradeniya 5 5
Digana 50 20
Teldeniya 100 25
Total 305 100
Table 2 : Target population area

I can get the data from the quantitative information through the information assortment
techniques. Quantitative information gathered; also, composed and coded .and they
were checked. Additionally, Mistakes and unanswered inquiries are stayed away from
by checking before to enter the information to The Statistical Packages for Social
Sciences (SPSS 22.0) programming.

3.8. The selection of participants


Many of the users who use Smart home automation co are within the selected area, in
which identifying eligible participants are sufficiently sample-based recruitment to
adequately explain the study to potential participants. Businesses and users who use
automation home technology as home automation in the selected area according to the
research topic were selected for recruitment and included in the research. Participants
will be informed about what we do about the research depending on the situation. In

B.M.N.D.B.Basnayake/KAN00034315 CRP 30
31

other situations, participants were informed of what we were doing about the research
by obtaining an accurate report from the participants.

3.9. Reliability, Validity, and Generalizability


Validity
Validity in qualitative research means "appropriateness" of the tools, processes, and data.
Whether the research question is valid for the desired outcome, the choice of methodology
is appropriate for answering the research question, the design is valid for the methodology,
the sampling and data analysis is appropriate, and finally the results and conclusions are
valid for the sample and context.

Reliability
In quantitative research, reliability refers to exact reliability of the processes and the results.
In qualitative research with diverse paradigms, such definition of reliability is challenging
and epistemologically counter-intuitive. Hence, the essence of reliability for qualitative
research lies with consistency. (ncbi, 2015)

Generalizability
Generalizability is the extent to which the findings of a study can be applicable to other
settings. It is also known as external validity. Generalizability requires internal validity as
well as a judgment on whether the findings of a study are applicable to a particular group.
There are three types of generalizability, population, environmental and temporal
generalizability. (healthknowledge, 2021)

The questionnaire is the reasonable one for testing the legitimacy and unwavering quality
with the measure the from information assortment. Through my discoveries of research
will can be generalizability of one investigation to another under comparable hypothetical
and which can use in to the comparable businesses and the social settings.

B.M.N.D.B.Basnayake/KAN00034315 CRP 31
32

3.10. Ethical issues of the research study


Ethically approved investigations will differ on several issues. In any case, they focus on
the benefits of research and the risk-benefit ratio of participants.
When conducting data collection, researchers cannot force participants to provide the
required information. Respondents must give them their informed consent to participate.
The principle of informed consent means that researchers provide sufficient information
and guarantees of participation so that people can fully understand the meaning of
participation and make informed, considerate and free decisions about participation without
any pressure or coercion. Authors must always protect the confidentiality of collected data.
In this case, the data cannot be passed on to anyone else. Confidentiality also ensures that
such identifying information is not included in any published reports or documents. Given
the small number of people participating in peer-to-peer programs, it is important to
consider how to write reports to ensure that no one can be identified even without a name.
Researchers must also ensure that the data protection of the collected information is also
taken care of.
In addition, researchers must ensure that the data collected is used only for academic
purposes.

B.M.N.D.B.Basnayake/KAN00034315 CRP 32
33

CHAPTER 4 - PRESENTATION OF RESULTS

4.1. Introduction
The results of the survey data are presented in this chapter. In order to Impact AI in IoT
Special Reference to Smart Home Automation, this study included conducting
questionnaire survey. The findings are systematically summarized to discuss research
goals and objectives and to answer questions. The quantitative information analysis
involved the use of the SPSS 22 system, in which results from the information have
been checked, updated and enters, coded and categorized and both descriptive and
inferential measurements have been developed.
In order to ensure the collected data is described explicitly using charts, percentages
and graphs, a survey questionnaire used in this retrospective study was carefully
analyzed. A retrospective diagram analysis was carried out to collect the data required
for achieving the research goals. Data analysis accompanied by research results
discussion. Data analysis the findings contribute to the research concerns guiding the
analysis.
All data is incorporated in the data analysis. And delivered in a way that promotes data
analysis.
In this analysis two parts are included, such as descriptive analyzes and interference
analyses.

4.1.1. Statics
Descriptive statistics are used to describe or summarize data in ways that are
meaningful and useful. For example, it would not be useful to know that all of the
participants in our example wore blue shoes. However, it would be useful to know how
spread out their anxiety ratings were. Descriptive statistics is at the heart of all
quantitative analysis.

B.M.N.D.B.Basnayake/KAN00034315 CRP 33
34

Effects of AI in IoT on Security


Descriptive Statistics

Figure 8 : Descriptive Statistics on Effects of AI in IoT on Security

The table 2, shows the descriptive statistics for the SEC. When observing the statistics, the SEC
has a mean value of 4.1635 with the standard deviation of 0.62100. the skewness score (-.214)
shows that the data distribution is lightly skewed and the kurtosis score of (-1.009) rivals that
the data set has a lighter Tail.

Effects of AI in IoT on User Friendliness


Descriptive Statistics

Figure 9 : Descriptive Statistics Effects of AI in IoT on User Friendliness

The table 3, shows the descriptive statistics for the independent variable UF. When observing
the statistics, the UF has a mean value of 3.9167 with the standard deviation of 0.64654. The
skewness score 0.264 shows that the data distribution is moderately skewed and the kurtosis
score of (-0.918) rivals that the data set has a lighter Tail.

B.M.N.D.B.Basnayake/KAN00034315 CRP 34
35

4.2. Regression Analysis


Regression analysis is a powerful statistical method that allows you to examine the
relationship between two or more variables of interest.

Model Summary

Figure 10 : Model Summary of Regression Analysis

a. Predictors: (Constant), UF, SEC


b. Dependent Variable: SHA
R square statistics indicates that 3 independent variables in the regression model
account 71.6% of total variations impact of AI on IoT special reference to Smart Home
Automation.
In other words, 79.5% of the variation in impact of AI on IoT special reference to Smart
Home Automation. Are explain security and user friendliness.
The adjusted R square 79.1% indicates penalize or remove the additional unnecessary
predicates of the model.

ANOVA

Figure 11 : ANOVA of Regression Analysis

B.M.N.D.B.Basnayake/KAN00034315 CRP 35
36

c. Dependent Variable: SHA


d. Predictors: (Constant), UF, SEC
Significant value is 0.000, which shows that the data perfectly fit for the model.

Coefficients

Figure 12 : Coefficients of Regression Analysis

a. Dependent Variable: SHA

 B coefficients for security (SEC) is 0.547 this mean that on average is


go up 1 unit on scale of healthcare effectiveness will increase by 0.547
unit
 B coefficients for user friendliness is 0.407 this mean that on average is
go up 1 unit on scale of your dependent variable will increase by 0.407
unit

B.M.N.D.B.Basnayake/KAN00034315 CRP 36
37

Figure 13 : Histogram of Dependent Variable – SHA

Figure 14 : Plot of Regression Standardized Residual Dependent Variable

B.M.N.D.B.Basnayake/KAN00034315 CRP 37
38

4.3. Descriptive Analysis

Descriptive analysis is an important first step for conducting statistical analyses. It gives
you an idea of the distribution of your data, helps you detect outliers and typos, and
enable you identify associations among variables, thus preparing you for conducting
further statistical analyses.

GENDER ANALYSIS

Figure 15 : Pie chart of gender analysis

The distribution of the respondent's gender is shown in Figure 1. The questionnaires


received 100 respondents. 100 respondents the distribution of gender in my work is
shown in Figure 1. In the figure 1 it indicates that 58.82%werebmales and 41.18% were
females. The proportion of men respondents indicates that they are much higher than
the women polled.

B.M.N.D.B.Basnayake/KAN00034315 CRP 38
39

AGE ANALYSIS

Figure 16 : Histogram of age analysis

The distribution of the respondent's age is shown in Figure 2. According to Fig. 2 of the 100
samples along to the large no of respondents were between the ages of 20 – 25 years (40.38%),
followed by the ages of 15 – 20 years (25%). There are other age group of respondents
following 25 – 30 years (17.31%), 30 – 35 years (13.46%), and least no of respondents in 35 –
40 years (3.846%).

B.M.N.D.B.Basnayake/KAN00034315 CRP 39
40

Figure 17 : Histogram of level of education

The distribution of the respondent's level of education is shown in Figure 3. According to Fig.
3 of the 100 samples along to the large no of respondents were in HND (30.77%), followed by
the diploma (26.92%). There are other level of education respondents following A/L’s
(13.46%), degree (11.54%), O/L’s (9.615%) and least no of respondents in masters (7.692%).

4.4. Core Relation Analysis

Correlation analysis is performed to identify the strength of relationships between a pair


of variables. The correlation coefficient r varies between −1 and +1 where a perfect
correlation is ±1 and 0 is the absence of correlations. Values of r between 0 and 1 reflect
a partial correlation, which can be significant or not.

B.M.N.D.B.Basnayake/KAN00034315 CRP 40
41

Correlations

**.Correlation is significant at the 0.01 level (2-tailed).


Figure 18 : Correlation analysis between user friendliness and smart home automation

The correlation analysis shows that there is a Positive Impact of independent variable in the
Dependent Variable. The Correlation value is 0.801 which shows the strong positive
relationship and the sig. value is 0.000, which shows that the relationship is significant.

4.5. Inferential Analysis


Inference analysis important in order to analyze data properly. Indeed, proper data
analysis is necessary to interpret research results and to draw appropriate conclusions.
In this chapter, three basic statistical concepts are presented: effect estimate, confidence
interval, and P-value, and these concepts are applied to the comparisons of proportions,
means, and medians. Regression models are the most commonly used method in
medicine and the biological sciences to describe the relationship between an outcome
variable and one or more exposure variables. This chapter will demonstrate how to
perform descriptive statistics, correlation analysis, median regression, and regression
analyses.

B.M.N.D.B.Basnayake/KAN00034315 CRP 41
42

4.6. Hypothesis Testing

4.6.1. Chapter Summary

Correlation analysis is performed to identify the strength of relationships between a pair


of variables. The correlation coefficient r varies between −1 and +1 where a perfect
correlation is ±1 and 0 is the absence of correlations. Values of r between 0 and 1 reflect
a partial correlation, which can be significant or not.

Correlations

**. Correlation is significant at the 0.01 level (2-tailed).


Figure 19 : Correlation analysis between security and smart home automation

The correlation analysis shows that there is a Positive Impact of independent variable in the
Dependent Variable. The Correlation value is 0.839 which shows the strong positive
relationship and the sig. value is 0.000, which shows that the relationship is significant.

B.M.N.D.B.Basnayake/KAN00034315 CRP 42
43

Correlations

**. Correlation is significant at the 0.01 level (2-tailed).


Figure 20 : Correlation analysis between user friendliness and smart home automation

The correlation analysis shows that there is a Positive Impact of independent variable in the
Dependent Variable. The Correlation value is 0.801 which shows the strong positive
relationship and the sig. value is 0.000, which shows that the relationship is significant.

B.M.N.D.B.Basnayake/KAN00034315 CRP 43
44

CHAPTER 5 - CONCLUSIONS AND RECOMMENDATIONS

5.1. Conclusion
This chapter includes full work done by researcher start to end. The researcher chooses the
problem “Assess the Effect of IOT Based Home Automation System on the Lifestyles of the
Households”.
In the Introduction chapter researcher clearly explains about background of study, problem
statement, justification, delimitation and chapter profile. In this chapter researcher finds two
independent variables and one dependent variable and defines the scope of the study.
In the Literature review chapter researcher clearly explains about previous researches
according to the same research problem. And research questions and research objectives were
defined by the researcher.
In the research methodology chapter researcher choose research onion methodology for the
research. Researcher defines population and sampling for the research. Researcher choose the
questionnaire for primary data collection and old researcher, articles for secondary data
collection. Defines the role of the researcher.
In the investigations of results and analysis chapter, first researcher clearly explains how the
data collected, coded and analyzed in introduction and field survey. Researcher use SPSS 22
for the data analysis. On descriptive analysis researcher analyses the demographic variables
such as gender, age, level of education. Inference analysis has been carried out with the
descriptive statistics to test the independent variables such as security and user friendliness.
In the 4.2 segment, the investigator explained the relevant proof with the screenshots of study.
On the descriptive statistic’s independent variables security and user friendliness were
evaluated by definition. The mean value for security is 4.1635 with the standard deviation
0.62100. And the skewness (-.214) shows that the data is lightly skewed, and the kurtosis (-
1.009) indicates a lighter tail of the distribution. With the standard deviation of 0.64654the
user friendliness has a mean value of 3.9167. And the skewness of 0.034 indicates that the
data are moderately skewed and the value of kurtosis is (-0.918), suggesting that the
distribution's tail is lighter.
Nature of Dependent variable was analyzed by test of normality using Shapiro – Wilk test.
Because there are more than 100 sample in the population. Result od the test of normality the
significant value is 0.000. So, this clearly shows that the null hypothesis could be rejected.

B.M.N.D.B.Basnayake/KAN00034315 CRP 44
45

On the correlation analysis the findings of the study indicate that the independent variable
security (0.839) and user friendliness (0.760) are very good with their dependent variable
output in the smart home automation.
On the regression analysis researcher used multiple regression analysis for the two
independent variables and one dependent variable. The result shows Regression analysis
reveals 79.1% of variations in dependent variable to two independent variables. The ANOVA
table results reveals the significant value is 0.000, which shows that the data perfectly fit for
the model. The histogram and plot chart show how the data perfectly fit for the model.

5.1.1. RO1 : Assess the effect of IOT based Home Automation System on Living
standard of the households.
Regression : According to the data analysis, there is a significant relationship between the
Home automation and the convenience of people. That means, the Home automation system
impacts on the convenience of the people. Based on this analysis, researcher will accept H
1.1 (there is a significant impact of the IoT based Home automation system to improve the
convenience of people) and will reject H 0.1 (there is no significant impact of the IoT based
Home automation system to improve the convenience of people).

5.1.2. RO2 : Assess the effect of Lightening control of the Home Automation
System on Living standard of the households.
Correlation : According to the correlation analysis, there was a strong positive relationship
between Lightning control and Home automation for the convenience of people. That means,
when Lightning control increases, the Home automation and the convenience of people will
increase. When Lightning control decreases, the Home automation system and the convenience
of people will decrease.
Regression : According to the data analysis, there is a significant relationship between the
Lightning control and the convenience of people. That means, the Lightning control system
impacts on the convenience of the people. Based on this analysis, researcher will accept H 1.2
(there is a significant impact of the Lightning control system to improve the convenience of
people) and will reject H 0.2 (there is no significant impact of the Lightning control System to
improve the convenience of people).

B.M.N.D.B.Basnayake/KAN00034315 CRP 45
46

5.1.3. RO3 : To identify the effect of Alarm system of the Home Automation
System on Living standard of the households.
Correlation : According to the correlation analysis, there was a moderate positive relationship
between pedestrian Alarm system and home automation for the convenience of people. That
means, when pedestrian alarm system increases, the home automation system and the
convenience of people will increase. When Home alarm system decreases, the home
automation system and the convenience of people will decrease.
Regression : According to the data analysis, there is a significant relationship between the
Home alarm system and the convenience of people. That means, the home alarm system and
its safety impacts on the convenience of the people. Based on this analysis, researcher will
accept H 1.3 (there is a significant impact of the alarm system and their safety of the home
automation system to improve the convenience of the people) and will reject H 0.3 (there is no
significant impact of the alarm system and their safety of the home automation system to
improve the convenience of the people).

5.1.4. RO4 : To identify the effect of Gate control of Home Automation System
on Living standard of the households.
Correlation : according to the correlation analysis, there was a moderate positive relationship
between Gate control system and home automation system for the convenience of people. That
means, when proper gate control increases, the home automation and the convenience of people
will increase. When gate control system decreases, the home automation system and the
convenience of people will decrease.
Regression ; according to the data analysis, there is a significant relationship between the
gate control system and the convenience of people. That means, the gate control impacts on
the convenience of the people. Based on this analysis, researcher will accept H 1.4 (there is a
significant impact of the gate control system of the home automation system to improve the
convenience of the people) and will reject H 0.4 (there is no significant impact of the gate
control system of the home automation system to improve the convenience of the people).

B.M.N.D.B.Basnayake/KAN00034315 CRP 46
47

5.2. Recommendations

Security
A smart security system does more than alert you if a burglar tries to break into your
home. Smart home security uses your Wi-Fi network to connect entry sensors and sirens
to devices like smart door locks, smart thermostats, and smart light bulbs. Once
connected, these devices can talk to each other and integrate with your security system
to make your life more convenient and more secure.
One of the most important features you should look for in a smart security system is a
mobile app that lets you keep tabs on your home from anywhere. If you have indoor
and outdoor security cameras or a smart video doorbell, you should be able to access
live or recorded video from the app. This is important to help you tell a real emergency
from a false alarm.

Other features to consider in a smart security system are detailed below.


 Cloud storage for video and still photos
 Types of notifications and push alerts
 System requirements for iOS and Android apps
 Night vision capabilities
 Customized settings for contact sensors, motion detectors, and glass break detectors
Wi-Fi Network requirements

5.3. Limitations
The aim of qualitative analysis is a complete, detailed description. No attempt is made
to assign frequencies to the linguistic features which are identified in the data, and rare
phenomena receives (or should receive) the same amount of attention as more frequent
phenomena. Qualitative analysis allows for fine distinctions to be drawn because it is
not necessary to shoehorn the data into a finite number of classifications.
Ambiguities, which are inherent in human language, can be recognized in the analysis.

B.M.N.D.B.Basnayake/KAN00034315 CRP 47
48

For example, the word "red" could be used in a corpus to signify the color red, or as a
political categorization (e.g. socialism or communism). In a qualitative analysis both
senses of red in the phrase "the red flag" could be recognized.

 The main disadvantage of qualitative approaches to corpus analysis is that their


findings cannot be extended to wider populations with the same degree of
certainty that quantitative analyses can.
 This is because the findings of the research are not tested to discover whether
they are statistically significant or due to chance.
 This study population consists by Kandy district not all of country or world this
is too a limitation of area.
 Those are 100 random samples are taken over 4 areas in the Kandy district.

Areas Population Sample


Kandy 150 50
Peradeniya 5 5
Digana 50 20
Teldeniya 100 25
Total 305 100

Table 3 : Limitation areas

5.4. Future Improvements


The smart security system is more than alert you if a burglar tries to break into your
home. Smart Home Security connects entrance sensors and sirens to devices such as
smart door locks, smart thermostats, and smart light bulbs using your WiFi network.
Once connected, these devices can talk to each other and integrate with your security
system to make your life more comfortable and safer.
One of the most important features you should look for in a smart security system is the
mobile app, which allows you to keep tabs anywhere in your home. If you have indoor
and outdoor security cameras or smart video doorbells, you can access the live or
recorded video from the app.

B.M.N.D.B.Basnayake/KAN00034315 CRP 48
49

This is important to help you tell the real emergency from a false alarm.

Other features to consider in a smart security system are described below.


 Video Cloud storage for video and static photos
 Not Types of Announcements and Bush Alerts
 System Requirements for iOS and Android applications
 Night vision skills
 Contact Customized Systems for Contact Sensors, Motion Detectors, and Glass
Break Detectors
 WiFi Network Requirements

5.5. Personnel Reflection


According to this project I learned the skills about how to study a topic and make
research.
Strengths
 Lecturer Support
 Resources
Weakness
 Deadline
 Lot of time taken

5.5.1. Benefits for the researcher


The advantages of research in my humble opinion are:
1. Self-learning
2. Deeper understanding of the subject.
3. Finding out important things connected to the topic of research.
4. Finding out the fallacies that exist related to the topic of research.
5. Understanding the media biases surrounding the subject.
6. False claims around the subject.
7. Research gives you the ability to form a stance on the subject and take sides.
8. It helps one find flaws in other people's research (secondary sources) so that you can
add to it.

B.M.N.D.B.Basnayake/KAN00034315 CRP 49
50

9. Helps you to connect with the nature, habitat, ecosystem, connectors of the subject.
10. Expands your views about individuals related to the subject being researched
(Gorani, 2018)

The benefits of research are:


 During a research study your condition is usually monitored more closely so
any changes can be detected earlier. You may also have access to expert medical
care that you otherwise would not.
 Staff will keep you updated on your progress and how the study is doing. This
allows you to learn about your condition, and gives you more access to
professionals and advice. Research improves services and treatments not just
for you but also for future generations. It helps develop new tests for diagnosis,
treatments and processes that could eventually help your children, or even your
grandchildren.
 You may gain access to treatments that are not yet readily available to the
general public.
 Taking part in research can give you a more positive outlook on any health
issues.
 Some evidence has suggested that people who take part in research have better
health outcomes no matter what treatment they receive. This is known as the
‘trial effect’. Even if the research you take part in is unsuccessful, many people
feel they receive better care while the trial is running.(Cowley, 2021)

5.5.2. Benefits for the Industry/organization


Research and development fields are common to many large companies, especially
companies working with new products or technologies that are subject to significant
changes. When research and development is a tool for creating new products or adding
features to old products, the work that the department does is more complex than simple
inventions. R&D integrates with other areas of marketing, cost management and
business strategy.
Market research can be a significant investment, but one that many successful
companies choose to do over and over again.

B.M.N.D.B.Basnayake/KAN00034315 CRP 50
51

Analysis is necessary because without it, companies will fly blind and try to move into
a competitive landscape without any foresight. If you do not know the size and trend of
the markets in which you operate, it will be difficult to determine whether to expand,
contract, go public or buy a new company.
Most businesses today are truly global. In order for any company to be competitive,
they must have access to high-quality, reliable market research that will guide
everything from investments to product development. Understanding the competitive
environment of a given industry and its growth potential allows companies to develop
strong short-term and long-term growth strategies. Numerous industries and markets
are maturing, and market research will help identify areas of future growth, highlight
disruptive trends, and uncover important product innovations and research among key
competitors in an industry.
Our studies look at the industry as a whole and we expect future growth to be in an
unbiased manner. It is important to know that just because a company is growing or
shrinking does not mean that the entire industry is following the same path. By using
market research, companies can compare their own growth with the growth of the
industry, as well as better understand the ways in which they can improve or see what
improvements their competitors have made. (Cowley, 2021)

B.M.N.D.B.Basnayake/KAN00034315 CRP 51
52

Annexures A: Questionnaire

Dear sir/ madam,


I am the student of E-Soft metro campus Kandy, HND in computing. I am collecting the data
for my research. The purpose of this questionnaire is Impact of Artificial intelligence in
Internet of Things special reference in Smart Home Automation.
Your analysis/your opinion/your response will be kept highly confidential and will only be
used for the current research. None of research outcome or components shall be used for any
other purpose expect purely academic use.

Yours truly,
……………………

SECTION A
Please select the suitable answer by ticking (v) correctly in the provided brackets

1. Gender (Tick one only)


 Male ( )
 Female ( )
2. Level of education
 A/L ( )
 Certificates ( )
 Diploma ( )
 HND ( )
 Masters ( )
 PHD ( )

B.M.N.D.B.Basnayake/KAN00034315 CRP 52
53

Annexures B: Feedback Form / Question list

B.M.N.D.B.Basnayake/KAN00034315 CRP 53
54

B.M.N.D.B.Basnayake/KAN00034315 CRP 54
55

B.M.N.D.B.Basnayake/KAN00034315 CRP 55
56

B.M.N.D.B.Basnayake/KAN00034315 CRP 56
57

B.M.N.D.B.Basnayake/KAN00034315 CRP 57
58

Annexures C: Sample Feedback sheets

B.M.N.D.B.Basnayake/KAN00034315 CRP 58
59

B.M.N.D.B.Basnayake/KAN00034315 CRP 59
60

B.M.N.D.B.Basnayake/KAN00034315 CRP 60
61

B.M.N.D.B.Basnayake/KAN00034315 CRP 61
62

Figure 21 : Gantt chart

B.M.N.D.B.Basnayake/KAN00034315 CRP 62
63

Referencing

Apigy Inc. URL: https://lockitron.com/preorder. Retrieved: 2013-06-03


EH Staf, Electronic House, A Division of EH Publishing, Inc. d.b.a EH Media/
https://www.electronichouse.com/smart-home/10-most-important-features-of-a-home-
automation-system/August 27, 2014.
Bluetooth SIG, Inc. “Smat Devices” URL: http://www.Bluetooth.com/Pages/Bluetooth-
smart-devices.aspx. Retrieved: 2013-06-10
Yasser Ismail (November 27th 2019). Introductory Chapter: Internet of Things (IoT)
Importance and Its Applications, Internet of Things (IoT) for Automated and Smart
Applications, Yasser Ismail, IntechOpen, DOI: 10.5772/intechopen.90022. Available from:
https://www.intechopen.com/chapters/69788
Alexander S. Gillis, Networking and communications, What is internet of things (IoT)-URL:
https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT -
Retrieved: august 2021.
smartify/Knowledgebase/Home Automation/How Does a IoT based Home Automation
System Work/URL :https://smartify.in/knowledgebase/iot-based-home-automation-
system/2021.
BluespeedAV, home automation, smart homes URL: https://bluespeedav.com/blog/item/7-
greatest-advantages-of-smart-home-automation retrieved 14-06-2016.
Salman Zafar, The Impact of Smart Homes on Generations, URL:
https://www.bioenergyconsult.com/smart-homes/ January 9, 2021
Author: Greg Devenish, BLOG THE COMPLETE GUIDE TO HOME LIGHTING
CONTROL SYSTEMS, URL: https://www.hampshirelight.net/blog/complete-guide-to-
home-lighting-control-systems/04th June 2020
Celeste Tholen, Home Security, What Are the Smart Home or Home Automation Features of
Security Systems/ URL:https://www.safewise.com/home-security-faq/home-automation-
features/ Published on April 12, 2021.
Silva Consultants, intro-to-automatic-gates/https://www.silvaconsultants.com/intro-to-
automatic-gates/2021.

B.M.N.D.B.Basnayake/KAN00034315 CRP 63
64

Neville Chamunorwa, HOME AUTOMATION, How IoT and Smart Home Technology is
Shaping Our Lives/https://getmysa.com/blogs/home-automation/how-iot-and-smart-home-
technology-is-shaping-our-lives/2019.
‘Stainton, Hayley. (2018) Lifeasabutterfly.’/https://tourismteacher.com/research-onion-
beginners/31/08/2021.
Bryman, A. (2012). Social research methods (5th ed.). Oxford: Oxford University Press.
May, T. (2011). Social research: Issues, methods and research. London: McGraw-Hill
International.
Goddard, W. & Melville, S. (2004). Research Methodology: An Introduction, (2nd ed.)
Oxford: Blackwell Publishing.
Saunders, M., Lewis, P., & Thornhill, A. (2007). Research Methods for Business Students,
(6th ed.) London: Pearson.
Wiles, R., Crow, G., & Pain, H. (2011). Innovation in qualitative research methods: a
narrative review. Qualitative Research, 11(5), pp.587-604.
Goddard, W. & Melville, S. (2004). Research Methodology: An Introduction, (2nd ed.)
Oxford: Blackwell Publishing.
ZIKMUND 2002. Business research methods, Dryden, Thomson Learning.
BROWN, G. H. 1947. A comparison of sampling methods. Journal of Marketing, 6, 331-337.
DAVIS, D. 2005. Business Research for Decision Making, Australia, Thomson South-
Western.
QuestionPro Products Audience 2021 QuestionPro Survey
https://www.questionpro.com/blog/non-probability-sampling/2021.
Stephanie Glen. "Correlation in Statistics: Correlation Analysis Explained" From
StatisticsHowTo.com: Elementary Statistics for the rest of us!
https://www.statisticshowto.com/probability-and-statistics/correlation-analysis/2021.
Prashanth Ashok, Great Learning Team, https://www.mygreatlearning.com/blog/what-is-
regression/Jul 26, 2021.
J Family Med Prim Care, Validity, reliability, and generalizability in qualitative research,
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4535087/2015 Jul-Sep;
Saran Shantikumar 1a - Epidemiology Validity, reliability and generalisability,
https://www.healthknowledge.org.uk/content/validity-reliability-and-
generalisability/2018/2021

B.M.N.D.B.Basnayake/KAN00034315 CRP 64
65

Assignment Help UK (2017) Research Onion – Made easy to understand and follow.
Retrieved from https://www.allassignmenthelp.co.uk/blog/research-onion-made-easy-to-
understand-and-follow/?share=twitter&nb=1
Feilzer, M. Y. (2010). Doing mixed methods research pragmatically: Implications for the
rediscovery of pragmatism as a research paradigm. Journal of Mixed Methods Research, 4(1),
pp.6-16.
Gulati, P. M. (2009). Research Management: Fundamental and Applied Research, New Delhi:
Global India Productions.
Newman, I. (1998). Qualitative-quantitative research methodology: Exploring the interactive
continuum. Carbondale: Southern Illinois University Press.
Podsakoff, P. M., MacKenzie, S. B., & Podsakoff, N. P. (2012). Sources of method bias in
social science research and recommendations on how to control it. Annual Review of
Psychology, 63, pp.539-569.
Bhaskaran, V. ( 2021). https://www.questionpro.com/. Retrieved from Home Consumer
Insights Market Research: https://www.questionpro.com/blog/data-collection/Cowley, A.
(2021). Research and Development. Retrieved from www.sabp.nhs.uk:
https://www.sabp.nhs.uk/research/about-research/benefits-research
Dudovskiy, J. (2012). research-philosophy. Retrieved from research-
methodology.ne:https://research-methodology.net/research-philosophy/
Gorani, Y. (2018, April 12). What are the advantages of doing research? Retrieved from
https://www.quora.com/: https://www.quora.com/What-are-the-advantages-of-doing-
researchManish Prakash Gupta, N. S. (2018). Literature Review on Home Automation.
International
Research Journal of Engineering and Technology (IRJET), 07.
Miller, G. (2019, August 23). https://jaxenter.com/. Retrieved from IoT solutions:
https://jaxenter.com/smart-home-ai-iot-160479.html
Mills, A. (2001, December ). Analysis of the value of home automation systems. Retrieved
from https://www.researchgate.net/:
https://www.researchgate.net/publication/240257404_Analysis_of_the_value_of_home_a
utomation_systems
Norouzzadeh, M. S. (2018, June 19). RESEARCH ARTICLE. Automatically identifying,
counting, and describing wild animals in camera-trap images with deep learning, p. 2.

B.M.N.D.B.Basnayake/KAN00034315 CRP 65
66

Physician, M. F. (2006 , Aug 31). Common Ethical Issues In Research And Publication.
Retrieved from https://www.ncbi.nlm.nih.gov/:
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4453117/
Raza, S. N. (2019, June 28). Artificial Intelligence based Camera. Artificial Intelligence based
Camera Calibration, pp. 2-3.Schmidt, S. (2019, April 22). Why Is Market Research Important
for Companies Today? Retrieved from https://blog.marketresearch.com/:
https://blog.marketresearch.com/why-is-market-research-important-for-companies-today

B.M.N.D.B.Basnayake/KAN00034315 CRP 66

You might also like