ACCC5006 Research Methods Assignment

Assignment Help Computer Networking
Reference no: EM132600381

ACCC5006 Research Methods - University of Wales

Learning Outcome 1: 1. Produce a dissertation/project proposal that plans appropriately the research and development strategies to be applied for the achievement of the objectives of the study.

Project - "Heating and temperature control using wireless sensors.

Task A:

Produce a project proposal (2000 words) in which you introduce and justify your chosen research. The document should contain the following sections:

1. INTRODUCTION / BACKGROUND TO THE PROPOSED RESEARCH

• Give your research a working title.
• Describe clearly the background to the subject area of study. This should involve a mini critical review of the literature or literature survey pertaining to your research topic (diverse sources such as academic, governmental and industrial literature). Ensure that all literature sources identified are referenced correctly (use the numeric system of referencing, & append a bibliography).

• Provide the reader with an understanding of the field in which your study lies and an idea of where and how your study fits into this field. In other words, you must justify a rationale for the study, based on the literature review. Why is the research worth doing? Is it topical, interesting, controversial, applied in a new context, etc? Have there been similar studies? Is there a gap?

• If relevant, introduce the industry/organisation/context that is being investigated.
• Define one overarching aim of the study (the research purpose). Construct a series of objectives that specify what you will do to achieve the aim (typically 3 or 4 objectives). The objectives represent major components that direct your activity, i.e. to breakdown the study into identifiable sub-tasks. Ensure that they are Smartly phrased, incorporating higher order verbs (to analyse..., to evaluate..., to design and develop... etc.).
• Expected outcomes/deliverables? What will you submit at the end of the study? A set of recommendations based on synthesis of primary and secondary research? Models and algorithms developed to address specific problems? Web design guidelines? ...and so on

2. RESEARCH & DEVELOPMENT METHODS
• Research strategy (action research, experiment, case study, survey, etc.)
• If relevant, data collection methods for each objective (interview, questionnaire, observation, document review, etc.).
• Identify and justify any development methods and techniques that you will use as part of systems development (e.g. lifecycle models, RAD approach, DSDM, OO approach, prototyping, UML, storyboards, hybrid/customised model, etc.).
• Identify risks/limitations/ethical/legal issues and ways that you might deal with those risks.
• How will you analyse the data/evaluate your results? (e.g. SPSS, content analysis, compare with user requirements and aims and objectives, software tests, user tests, benchmarks, etc.)

Task B:

Prepare a poster and upload it online.

Consider the following things in your poster:

Well-defined aims and objectives

Clear statement of which research methods are to be used and why they are appropriate Clear statement of which development methods are to be used and why they are appropriate Clear statement of which tools are to be used and why they are appropriate
List of any deliverables

Attachment:- Research Methods.rar

Reference no: EM132600381

Questions Cloud

Find the direct materials price variance would be : For the month find the direct materials price variance would be, direct labor rate variance and material quantity variance for the month?
Find the depreciation expense on this machine : The oversight was discovered during the preparation of Janelle's 2013 financial statements. Find the depreciation expense on this machine for 2013
Auditors in understanding client business processes : Discuss how REA diagrams might be useful to auditors in understanding a client's business processes.
Which is a low value-added activity : Which one of the following is a low value-added activity? Plant maintenance./ Product delivery./ Order processing./ Customer service
ACCC5006 Research Methods Assignment : ACCC5006 Research Methods Assignment Help and Solution, University of Wales - Assessment Writing Service - Heating and temperature control using wireless
How much henrietta should record accrued interest payable : On September 1, 2012, Henrietta Co. issued note payable to National Bank in the amount of $3,600,000, how much Henrietta should record accrued interest payable
What are the five stages of the database design process : What are the five stages of the database design process? In which stages should accountants participate? Why?
Create the company cash budget for the upcoming fiscal year : Create the company's cash budget for the upcoming fiscal year. (Cash deficiency, repayments and interest should be indicated by a minus sign.)
Make a production budget by month and in total : Make a production budget by month and in total, for the second quarter. The company is now in the process of preparing a production budget for second quarter.

Reviews

len2600381

8/13/2020 11:40:51 PM

Project title "Heating and temperature control using wireless sensors", you can see details about in the second attachment On the very first page to be written only "REM" Thank you

Write a Review

Computer Networking Questions & Answers

  Describe real-world examples of attenuation and white noise

Compare the four items related to channel capacity: data rate, bandwidth, noise, and error rate.Describe real-world examples of attenuation and white noise.

  Determine the cardinality of the relationships

MN405 - Data and Information Management - Managing Data in Databases - a. Model organisational information requirements using conceptual data modelling

  Process of routers and switches

Do you think that one day, routers and switches will not be needed? Why?

  Examine the ip addresses specified in cidr notation

Working with CIDR Notation Time Required: 20 minutes Objective: Determine the subnet mask, number of host bits, and number of hosts for network numbers in CIDR.

  Role of hackers in attacks on networked infrastructure

COIT 20246 - Find and summarise a resource that describes the features and uses and discussing what the resource is about and why it is relevant to the task

  Building a payroll program for a large organization

Application Architecture. You have been tasked with building a payroll program for a large organization with offices spread across the United States.

  Calculate voip traffic load in access trunks to the internet

Calculate VoIP traffic load in access trunks to the Internet and Calculate the access bandwidth required and the number of SIP trunks needed for VoIP calls to the Internet

  Develop analytical understanding of distributed network

MN504 - Networked Application Management - Network Analysis using Wireshark - develop deeper analytical understanding of different distributed network

  Find at least one sample security audit plan

Using the resources given or other resources, find at least one sample security audit plan. Analyze that document.

  Network management in low power wireless networks

Prepare a thesis on given topic. Thesis topic is network management in low power wireless networks

  You are the lead forensics investigator for xyz inc -- an

you are the lead forensics investigator for xyz inc. -- an industry leading cyber forensic company. you have just been

  ICT703 Network Technology and Management Assignment

ICT703 Network Technology and Management Assignment Help and Solution, University of the Sunshine Coast - Assessment Writing Service

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd