Designing And Implementing Experiments – Methods And Results

Data Collection

The goal of task is to break down information and data with legitimate outline process. This task have assessed different journals, so as information is gathered with the assistance of optional technique information accumulation. Information and data identified with IOT in business organizations is gathered from different online journals, books and s from different sources. Every one of the journals are distributed after 2012.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Prior to starting test investigation and results, information accumulation is an essential advance to follow in the exploration. Along these lines, information is gathered from different secondary sources such as journals and government databases. Following areas will help in distinguishing different sources of information gathering identified with cloud security. We have utilized different association as contextual analyses to gather information and data with respect to cloud assaults and security challenges. All information and data are put into table for making records in an appropriate way.

  • Data Source

Before starting the analysis, data sources have been an important part of the study. Data sources for the research have been provided below:

  • Online Journals
  • Articles
  • Books
  • Private Companies
    • Collection of data

A data table has been prepared for stored and collecting data from different data sources.

Data Source Name

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Source Organization

Data Description

Data File Format

Charge fee

Target data source

Data 1

Public

How many employees are using IOT in the company?

Txt

Free

No

Data 2

Public

How many employees have been satisfied with the use of IOT?

Txt

Free

Yes

Data 3

Public

How many feel unsafe with IOT in their business?

Txt

Free

Yes

Data 4

Public

How many are satisfy with solutions provided by IOT?

Txt

Free

Yes

Data 5

Public

How many employees are using sensors at their work?

Txt

Free

No

Data Storage

After creation and completion of data table, the storage of data has been an important task to perform. The table contains all the recorded data collected from participates and other data sources.

Data Source name

Date of Collection

Saved File Location

Saved File name

Saved File Format

No. of Data Records

Survey from business organization

15/8/2017

//raw data/

Survey.txt

txt

2000

Survey from business organization

20/8/2017

//raw data/

Survey.txt

txt

1000

Survey from business organization

13/3/2018

//raw data/

Survey.txt

txt

738

Survey from business organization

23/5/2018

//raw data/

Survey.txt

txt

896

Survey from business organization

5/10/2018

//raw data/

Survey.txt

txt

478

 
Data pre-computing

Information pre-processing has been an imperative section in information accumulation strategy as all information sources are not qualified for utilized in examination. Different channels are connected for this situation for choosing proper information and data identified with cloud security.

Feature selection or dimension reduction

Date

Data Source Name

Purpose of Preprocessi ng

Preprocessi ng Method

No. Original Data Records

No. Result Data Records

No. Original Features

No. Result Features

New Data File Name

20/8/2017

Data 1

Clean missing data

Data filtering

1000

1000

8

8

Final_survey.txt

13/3/2018

Data 2

Avoid duplicity

Data reduction

738

738

4

4

Final_survey.txt

23/5/2018

Data 3

Feature selected

Data integration

896

896

7

7

Final_survey.txt

5/10/2018

Data 4

Filter the

data

Data reduction

400

400

2

2

Final_survey.txt

Experiment Designing

Analyses depended on an approach which has been purposed for research. I chose mixed technique which include Qualitative and Quantitative methodology. I include 5 Inquiries in survey, which are principle questions are my review.

Sex

Male

Female

Age range

18-25

26-35

36-45

Over 45

Education

High school

College Diploma

Graduation

Masters

Background

Manager

IT officer

Accountant

Employee

Question no.

Description

Question 1

How many employees are using IOT in the company?

Question 2

How many employees have been satisfied with the use of IOT?

Question 3

How many feel unsafe with IOT in their business?

Question 4

How many are satisfy with solutions provided by IOT?

Question 5

How many employees are using sensors at their work?

Table 5: Survey Questionnaires

So these are demographic and primary survey questions which I made for survey to ask.

Demographic data makes it easy to design new application including background, age etc. can add feature according to this information.

Software tool used

The next step is all about implementation. After designing survey, implementing survey has been main purpose of the researcher.

Features

Responses

Sex

Male

Female

75

55

Age

Ø 18-25

Ø 26-35

Ø 36-45

Ø 45-50

Over 50

35

45

30

15

5

Education

Ø High school

Ø Diploma

ØCommerce

Ø Graduation

Ø Masters

27

22

46

20

15

Background

Manager

IT officer

Accountant

Employee

40

15

35

40

Experiment results

Questions

Responses

How many employees are using IOT in the company?

107

How many employees have been satisfied with the use of IOT?

98

How many feel unsafe with IOT in their business?

70

How many are satisfy with solutions provided by IOT?

66

How many employees are using sensors at their work?

35

This is an idea wherein different gadgets associated shrewdly to make simple correspondence of section of data. This can be utilized with the assistance of any gadget like savvy TVs, PDAs, keen watches, workstations, work areas and even brilliant homes. According to the pie charts, there have been 34.7% male and 65.3% female involved in the survey. These data shows that female employees have been using IoT devices in the business organization. 33% employees are satisfied with the use of the IoT in the business organization. IoT have been helping in maintaining several duties in the organization. This framework helps in giving a remarkable personality to the earth where the correspondence is required. This condition helps in empowering interface of human, items and gadgets with the goal that information and data can be moved or exchanged. In contrast to the customary network, the Internet of Things (IoT) encourages in interfacing with a more extensive scope of gadgets alongside empowering the help of observing of the correspondence being finished. The present discourse is to distinguish and assess impact of IoT in business in any association. The work is organized to an exploration work that will have an examination issue or issue pursued by recognizing the approaches to address the equivalent. The work is fundamentally founded on writing references alongside investigation of different s and researchers related it the theme. The IT field are benefitted by use of the distributed computing.

Data Storage

The difficulties and troubles in the distributed computing are examined about in these reports. The past looks into in cloud security are talked about in region. A drew in philosophy are used in order to examinations composing. The aggregate of what online are really related to distribute computing security. Unmistakable particular parts of the distributed computing are talked about in on the web. These online have had the ability to recognize security issues in the distributed computing. Distributed computing is a continuous thought in the IT field. The usage of cloud benefits in the business affiliation are a remarkable favorable for headway of association in the market. These examination online contains diverse logical examinations of the unmistakable affiliations that are benefitted as a result of the distributed computing. Nearby these, the guideline point of convergence of these online are difficulties and challenges in distributed computing related to security approach.

Result Summary

Thinking about the present business, associations are getting into hierarchical and correspondence structure that calls for steady help and enhanced efficiency. Web helps in interfacing individuals together by lessening separation and aiding having steady virtual touch with one another. Only 13% employees have been feeling unsafe from use of IoT devices in the business organization. There have been various attacks in the IoT devices related to the cyber-attacks.  These have been causing unfamiliar behavior in the organization. Internet of Things (IoT) has added support to reason and helped in preparing things significantly more straightforward and very successful. According to the pie charts, 21% employees have been using IoT devices in their work environment. It helps in linking social correspondence, business and individuals with business exchanges, and other hierarchical frameworks. Sensors utilized in the IoT help in interfacing machines and the frameworks together to help in decreasing human intercessions. Lesser the human mediations, bring down is the event of any sort of dangers that may influence the profitability. Not just that, Internet of Things (IoT) has upheld in growing the scope of network to a more extensive territory alongside offering help for a wide range of business.

Objective

Data Collection

1.3 Data Storage

2.Design and Implementation

2.1 Data pre-computing

2.2 Feature selection or dimension reduction

2.3 Experiment Designing

2.4 Implementation

2.4.1 Software tool used

2.4.2 Experiment results

3.1 Result Estimation

3.2 Result Summary

4.Outline of the research

Antikainen, M., & Valkokari, K. (2016). A framework for sustainable circular business model innovation. Technology Innovation Management Review, 6(7).

Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.

Caputo, A., Marzi, G., & Pellegrini, M. M. (2016). The internet of things in manufacturing innovation processes: development and application of a conceptual framework. Business Process Management Journal, 22(2), 383-402.

Kiel, D. A. N. I. E. L., Arnold, C. H. R. I. S. T. I. A. N., Collisi, M. A. T. T. H. I. A. S., & Voigt, K. I. (2016). The impact of the industrial internet of things on established business models. In Proceedings of the 25th international association for management of technology (IAMOT) conference.

Mineraud, J., Mazhelis, O., Su, X., & Tarkoma, S. (2016). A gap analysis of Internet-of-Things platforms. Computer Communications, 89, 5-16.

Mishra, D., Gunasekaran, A., Childe, S. J., Papadopoulos, T., Dubey, R., & Wamba, S. (2016). Vision, applications and future challenges of Internet of Things: A bibliometric study of the recent literature. Industrial Management & Data Systems, 116(7), 1331-1355.

Yu, X., Nguyen, B., & Chen, Y. (2016). Internet of things capability and alliance: entrepreneurial orientation, market orientation and product and process innovation. Internet Research, 26(2), 402-434.

Zdravkovi?, M., Trajanovi?, M., Sarraipa, J., Jardim-Gonçalves, R., Lezoche, M., Aubry, A., & Panetto, H. (2016, February). Survey of Internet-of-Things platforms. In 6th International Conference on Information Society and Techology, ICIST 2016 (Vol. 1, p

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.