Research Methodology Assignment-3

Verified

Added on  2023/06/12

|17
|3693
|404
AI Summary
This paper discusses the methodology of a study on a wireless home security system. It includes a literature review, research problem, methodology, and analysis of existing methodologies. The proposed methodology of using a combination of survey methodology will enable the researcher to gather a wide range of information regarding the topic and integrate both qualitative and quantitative elements in the analysis.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Research Methodology Assignment-3 1
Research Methodology Assignment 3
by
Rachid Hamadi
Student ID: 30099999
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Research Methodology Assignment-3 2
Table of Contents
Table of Contents...............................................................................................................................2
List of Tables.....................................................................................................................................3
List of Figures....................................................................................................................................4
Chapter 1 Methodology......................................................................................................................5
1.1 Introduction.......................................................................................................................................5
1.2 Research Problem and Reorganized Collected Literature..................................................................5
1.2.1 Research Problem Statement......................................................................................................5
1.2.2 Reorganized Collected Literature...............................................................................................6
1.3 Types of Methodology.......................................................................................................................7
1.3.1 Qualitative and Quantitative Methodologies...............................................................................7
1.3.2 Type of Chosen Methodology.....................................................................................................9
1.4 Review of the Existing Methodologies..............................................................................................9
1.4.1 Selected Sub-Problem.................................................................................................................9
1.4.2 Analysis of the Selected Methodologies...................................................................................11
1.4.3 Relevance of the Research Problem..........................................................................................11
1.4.4 Summary of the Reviewed Methodologies...............................................................................11
1.5 Proposed Methodology....................................................................................................................12
1.5.1 Identification and Justification..................................................................................................12
1.5.2 Benefits and Limitations...........................................................................................................12
1.5.3 Framework and Explanation.....................................................................................................13
References List...................................................................................................................................1
Document Page
Research Methodology Assignment-3 3
List of Tables
Table 1: Reorganized Collected Literature.........................................................................7
Table Summary of the Reviewed Methodologies.............................................................10
Document Page
Research Methodology Assignment-3 4
List of Figures
No Figures
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Research Methodology Assignment-3 5
Chapter 1
Methodology
1.1 Introduction
This section details the methodology of this paper. My study will focus on a wireless home
security system. Initially, a literature review was done. As a continuation of the first project, this
sections elucidates on research problem and methodology and addresses some notable gaps in
the existing literatures. This section is comprised by four parts which have some sub-sections.
The first part details the research problem and sub-problems that have been developed from
reviewing literature. The second section details the suitable methodology for the issues
identified. The third sections details review, analysis and summarizes relevant insights that have
been drawn from existing literature and problems. Finally, the last section details the objective of
the employed methodology, explanations, benefits and limitations of the adopted methodology
and the framework for the study. The goal of this task is to decide on a suitable research
methodology for developing the research thesis at hand.
1.2 Research Problem and Reorganized Collected Literature
1.2.1 Research Problem Statement
In the last 5-6 decades, the concept of home automation has gained significant attention. The
expectations of people concerning home security and automation have changed to a considerable
extent because of the technological advancements and services (Mihalache, 2017). Different
security systems at different times worked to offer safe, expedient and efficient ways for home
occupants to monitor their homes. Notwithstanding the revolution in the anticipations of the user,
technological advancements, or time changes, the duty of a home security automation systems
has continued being the unchanged (Zhao and Ye, 2008). The role of a modern home security
Document Page
Research Methodology Assignment-3 6
systems entails pinpointing an invader attempting to get entrance to the home, notifying the
owner about the invasion attempt or invasion, stopping the invader from accessing the house, and
collecting or gathering proof about the invasion for perpetrators to be arrested and tried in a court
of law for the committed crime (Valda and Leite, 2017). But is this transpiring in present state
where the crime rates are ever intensifying? Home intrusion criminalities are on rise because
continuous observing of home is challenging. Home automation and security systems face four
key tests, i.e., inflexibility, a high cost of ownership, poor manageability, and struggles attaining
security. The primary motivation behind this review is to make persons cognizant of different
types of home automation systems and study their need for security (Mihalache, 2017). Besides,
this paper addresses the use of user-interfaces in protection and conclude by deliberating where
the investigators should emphasize their work in the area of home automation security to design
and to implement a low-priced and open source home automation system that can control and
automate most of the house appliance through an easy controllable web interface to run.
1.2.2 Reorganized Collected Literature
Table 1: 1.1.1 Reorganized Collected Literature
Research Problem Sub-problem Collected Literature
Security Alarms
issues
Security facet of the current home
automation system
Shortcomings of existing home
automation systems
Reasons for increased burglaries
Efficient methods to allow home
dwellers to access and monitor all
aspects of their home
The role of user interfaces in
security
(Cyril Jose
and Malekian,
2015)
(Aggarwal,
Gaur and
Verma, 2014)
Yao, Yang
and Xia,
2008)
(Alkar, Roach
and Baysal,
2010)
Awareness Awareness of advanced Home
automation systems
(Aggarwal, Gaur and
Verma, 2014)
Document Page
Research Methodology Assignment-3 7
The need for security
The convenience of using various
security apps
Issues, challenges and
countermeasures for existing
home automation systems
Yao, Yang and Xia, 2008)
(Prasanna and Ramadass,
2014)
1.3 Types of Methodology
1.3.1 Qualitative and Quantitative Methodologies
Qualitative methodology mainly focuses on trends in opinions and thoughts with the aim of
understanding various aspects of social life. This method involves analysis of unquantifiable
information principally in the form of words rather than numbers (Neuman, 2013, p.56).
Fundamentally, qualitative research serves multiple functions such as seeking answers to
questions, gathering evidence, answering the questions methodically using a predefined set of
measures, and producing results that have not been determined in advance. Some of the
qualitative methods include observation, case studies, content analysis, ethnographic research,
and focus groups among others. The main strength of this method is its ability to offer elaborate
textual descriptions of individuals’ experiences regarding a particular issue. In light of Taylor,
Bogdan, and DeVault (2015), qualitative methods are efficient and effective in ascertaining
intangible elements, including socioeconomic status, norms, gender roles, ethnicity, and
religion, which role in research might not be readily apparent (79).
On its part, quantitative methodology concentrates on the statistical, numerical, or mathematical
analysis of information gathered through surveys, polls, and questionnaires. More specifically,
quantitative methods focus on objective measurements through the manipulation of available
data using computational procedures. Examples of quantitative methods include surveys,
structured interviews, and questionnaires. Importantly, quantitative methods utilize four research
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Research Methodology Assignment-3 8
designs, namely descriptive, experimental, correlational, and quasi-experimental. These
techniques are primarily used when the researcher wants to assess the relationship between
variables. According to Wiek and Lang (2016), a researcher enjoys a considerable degree of
academic responsibility and freedom when using the quantitative methodology, and thus,
resulting in satisfactory and credible research (34). In addition, this methodology relies on
various levels of measurements in determining the types of statistics to use. The four major
scales used are ordinal, nominal, ratio, and interval. Quantitative methods also utilize statistical
tools such as SPSS, especially where regression remains indispensable in the data analysis.
The primary difference between qualitative and quantitative approaches is their flexibility.
Essentially, quantitative methodologies are fairly inflexible. For instance, with quantitative
techniques such as questionnaires and surveys, researchers often ask similar questions and in the
same order to all participants. In this way, the response sets from which respondents may choose
are fixed or close-ended. However, this inflexibility helps in making meaningful comparisons of
replies across respondents and study sites. To realize this objective, there is a dire need for
researchers to understand the most significant questions to ask, the approach of asking them, and
possible choice of feedback. Conversely, qualitative approaches are usually more flexible
because they allow bigger spontaneity and adaptation of the dealings between respondents and
the investigator (McCusker and Gunaydin, 2015, p. 539). Indeed, qualitative techniques mostly
ask open-ended questions, which are not necessarily phrased in the exactly similar manner
among the participants. Importantly, open-ended questions allow respondents to respond freely
using their words, and answers tend to be more multifaceted than just “NO” or “YES.”
Additionally, with qualitative techniques, the relationship between study participants and
researcher is typically less formal compared to quantitative research.
Document Page
Research Methodology Assignment-3 9
1.3.2 Type of Chosen Methodology
I am going to use a combination of the Survey Methodology. The survey method is part of
quantitative methodology, which focuses on questioning people on various topics, and then,
unfolding their responses. In light of Neuman (2013), using survey method, a researcher can
collect data to reflect on individuals’ attitudes, test concepts, and determine level of consumer
satisfaction among other purposes (23). Therefore, this methodology remains indispensable in
my research on wireless home security system because, it will allow me to have wide range of
the information regarding the topic. Indeed, this methodology is appropriate for my study
because I can be able to integrate both qualitative and quantitative elements in the analysis.
According to Choy (2014), both quantitative and qualitative research may significantly rely on
surveys for the data collection and analysis although it depends on the factors under
consideration and intended results (101). In this regard, survey methodology will enable me to
explicitly gain more information on wireless home security systems ranging from perceptions of
the population to practicability of the systems. My methodology will not be restricted to closed
questions but will also include open-ended questions to allow respondents to give their insights
freely
1.4 Review of the Existing Methodologies
1.4.1 Selected Sub-Problem
Literature 1: The need for Home security: A Qualitative Review of How the Concept of
Security has changed in the Modern Home
The changing perception of security in modern homes affects the technological advancements.
Sophisticated home automation systems using cameras, proximity sensors, microphones, contact
sensors, alarms, etc. has been transformed from a simple lock and key-based security system
Document Page
Research Methodology Assignment-3 10
(Kim, Lee and Choi, 2010). Nowadays, users can control and access their homes distantly at any
time and from place globally by linking modern homes to the Internet that is very popular.
Reduction in cost, power consumption, and size of new electronics systems because of a rise in
processing power of newly-designed processors and the significant permits persons to control
and know every facet of their home. By using audio feeds and live video from several aspects of
their home individuals can keep an own eye home, also can be conscious of several
environmental elements outside and inside their home, like humidity, temperature, light
intensity, etc. In a Wireless Sensor-Actor Network, sensors collect data about the physical world
or the setting around them (Megat Mohamed Noor, 2013). Actors do the suitable activities on the
environment as required by the user or other parties. Designers, Engineers, researchers can
introduce efficient techniques to permit home dwellers to control and access all aspects of own
homes, including the environment owing to the acceptance of the Internet and Wireless Sensor
Actor Networks.
Literature 2: An Exploratory Survey for Home Security Automation systems: Problems
and Countermeasures
At the time of acquisition, individuals usually look for no-hassle, no-stress, and forthright home
security systems together with easy and quick installation, great value for money, smash and
crash protection, no broadband or landline options, if they are in countryside areas with
enhancing equipment warranty and full-proof technology (Prasanna and Ramadass, 2014). The
works of a contemporary home security systems include recognizing an interloper trying to
access a building, warning the owner, stopping the interloper and gathering evidence about the
intrusion (Ghosh et al., 2015). Bearing in mind the above discussion, this study would like to
recommend home security system as initially, the anticipated system will detect the biometric of
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Research Methodology Assignment-3 11
the user for generating the first-hand database. At the point of access, this input biometric
database will be further opened by the system for validation purpose. Afterward, the current
biometric input image and database image will be matched to permit the user. If the present input
image is the correct copy of the database, then the system will respond to the handler and offer
access (Ghosh et al., 2015). Or for easy or hassle-free access the user will respond by
implementing an application from her/his smartphone. Then the input from the application will
be taken by the system for comparison with the database. At this time, the system will give
verification to the user, if and only if the biometric image and input from the application are
matched. If not, the system will send a communication to the homeowner so that he can take
suitable action against the unapproved person, who is trying to gain access to his or her home.
Note that, to add a new user at any time, the owner reserves all rights.
1.4.2 Analysis of the Selected Methodologies
1.4.3 Relevance of the Research Problem
Literature 1: will help to understand the changing perception of security in modern homes has an
effect on the technological advancements.
Literature 2: Gives information about a type of simple home security system that can adopted to
monitor and control
1.4.4 Summary of the Reviewed Methodologies
Table 2:1.1.1 Summary of the Reviewed Methodologies
Literature Research Problem Methodology Your Sub-
problem
Relevance
Literature1
The need for
Home security
Qualitative Increased
burglaries
Securing
homes , the
elderly, babies
and their
caretakers
Security Alarms Qualitative Shortcomings of
Document Page
Research Methodology Assignment-3 12
Literature2 issues existing home
automation
systems
Recommendation
of efficient
methods to allow
home inhabitants
to access and
control each and
every aspect of
their home
1.5 Proposed Methodology
I believe that survey method will be suitable for this study because it also allow use of
questionnaire method of data collection as well as capturing qualitative data. Importantly, since
my topic involves an investigative study, a survey methodology will enable me to get inputs
from individuals from diverse backgrounds. This section comprises three sub-topics, including
justification of chosen methodology, the limitations versus the benefits of selected methodology,
and procedures or framework of my methodology.
1.5.1 Identification and Justification
As indicated in the previous section, I will use survey methodology since it allows capturing of
both qualitative and quantitative aspects of my topic. The primary goal of my study is to create
awareness regarding the safety measures a person can take in day-to-day life. The secondary
objective is to accentuate the need for advanced home security system, which will make people’s
home more safe or crime resistant. I will do a survey, which includes the use of a substantial
number of questionnaires as well as face-to-face interviews. Indeed, I selected survey
methodology because it can incorporate these other methods. The intention behind administering
questionnaires will be to provide the residents an opportunity to express their views on their
homes’ safety freely. As the respondents complete this survey, they will assess it against their
personal lifestyles and in line with the security upgrading, they prefer.
Document Page
Research Methodology Assignment-3 13
1.5.2 Benefits and Limitations
Benefits
Cost-effective although cost relies on survey mode
Relatively easy to administer
It gives extensive flexibility in data analysis
Capable of gathering data from a considerable number of respondents
Standardized surveys are relatively accurate owing to lack of numerous types of errors
Limitations
Participants may feel uncomfortable providing answers to questions that are presented in
an unfavorable manner
Data errors owing to non-response may exist
Some survey questions may lead to unclear data
Surveys characterized by closed-ended questions lower the validity rate of responses
1.5.3 Framework and Explanation
The wireless home security system will be based on three primary databases, including
individual, regional, and global security databases. Principally, there will be an alarm, which will
produce a loud sound or noise when the sensors placed at the main entrance and along the
territorial wall sense any physical threat. The individual security system will coordinate with
regional as well as global security system to create an alert on the potential threat. However, the
home-based security systems will be connected to regional systems where the residents can get
prompt help in case of precarious threat.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Research Methodology Assignment-3 14
Document Page
Research Methodology Assignment1
References List
Aggarwal, L., Gaur, V. and Verma, P. (2014). Design and Implementation of GSM Based
Automated Home Security System. IAES International Journal of Robotics and
Automation (IJRA), [online] 3(3). Available at:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.434.5881&rep=rep1&type=pdf
[Accessed 31 May 2018].
Alkar, A., Roach, J. and Baysal, D. (2010). IP based home automation system. IEEE
Transactions on Consumer Electronics, 56(4), pp.2201-2207.
Choy, L.T., 2014. The strengths and weaknesses of research methodology: Comparison
and complimentary between qualitative and quantitative approaches. IOSR Journal of
Humanities and Social Science, 19(4), pp. 99-104.
Cyril Jose, A. and Malekian, R. (2015). Smart Home Automation Security: A Literature
Review. The Smart Computing Review. [online] Available at:
http://www.scirp.org/(S(351jmbntvnsjt1aadkposzje))/reference/ReferencesPapers.aspx?
ReferenceID=1739866 [Accessed 31 May 2018].
Ghosh, S., Konar, S., Ghosh, S., Ghosh, T. and Gope, S. (2015). Dual Tone Multiple
Frequency Based Home Automation System. International Journal of Engineering
Research, [online] 4(10), pp.542-544. Available at:
http://www.ijer.in/ijer/publication/v4s10/IJER_2015_1006.pdf [Accessed 31 May 2018].
Kim, D., Lee, S. and Choi, B. (2010). A real-time stereo depth extraction hardware for
intelligent home assistant robot. IEEE Transactions on Consumer Electronics, [online]
Document Page
Research Methodology Assignment2
56(3), pp.1782-1788. Available at: https://ieeexplore.ieee.org/document/5606326/
[Accessed 31 May 2018].
Kim, D., Lee, S. and Choi, B. (2010). A real-time stereo depth extraction hardware for
intelligent home assistant robot. IEEE Transactions on Consumer Electronics, [online]
56(3), pp.1782-1788. Available at: https://ieeexplore.ieee.org/document/5606326/
[Accessed 31 May 2018].
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or mixed
methods and choice based on the research. Perfusion, 30(7), pp. 537-542.
Megat Mohamed Noor, M. (2013). Community based home security system using
wireless mesh network. International Journal of Academic Research, [online] 5(5), pp.73-
79. Available at:
https://pdfs.semanticscholar.org/05e2/c3db5ac6129546c48296b5cc4197cfb43ce6.pdf
[Accessed 31 May 2018].
Mihalache, A. (2017). Wireless Home Automation System using IoT. Informatica
Economica, [online] 21(2/2017), pp.17-32. Available at:
https://ideas.repec.org/a/aes/infoec/v21y2017i2p17-32.html [Accessed 31 May 2018].
Neuman, W.L., 2013. Social research methods: Qualitative and quantitative approaches.
Pearson education.
Prasanna, G. and Ramadass, N. (2014). Low Cost Home Automation Using Offline
Speech Recognition. International Journal of Signal Processing Systems, [online] 2(2).
Available at: https://www.researchgate.net/profile/Ramadass_Narayanadass/publication/
264558453_Low_Cost_Home_Automation_Using_Offline_Speech_Recognition/links/
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Research Methodology Assignment3
53e84c140cf21cc29fdc375c/Low-Cost-Home-Automation-Using-Offline-Speech-
Recognition.pdf [Accessed 31 May 2018].
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research
methods: A guidebook and resource. John Wiley & Sons.
Valda, L. And Leite, J. (2017). Home Automation with Web Control Based On Java
Applets. Itegam- Journal of Engineering and Technology for Industrial Applications
(Itegam-Jetia), [online] 3(9). Available at: https://itegam-jetia.org/artigos/2017/3/18.pdf
[Accessed 31 Nov. 2018].
Wiek, A. and Lang, D.J., 2016. Transformational sustainability research methodology.
In Sustainability Science (pp. 31-41). Springer, Dordrecht.
Yao, F., Yang, S. and Xia, B. (2008). A Zigbee Based Home Automation: System Design
and Implementation. Measurement and Control, 41(10), pp.310-314.
Zhao, Y. and Ye, Z. (2008). A low cost GSM/GPRS based wireless home security
system. IEEE Transactions on Consumer Electronics, [online] 54(2), pp.567-572.
Available at: https://dl.acm.org/citation.cfm?id=2279645 [Accessed 31 May 2018].
chevron_up_icon
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]