This action might not be possible to undo. Are you sure you want to continue?
Relation to research areas/topics/ideas/problems/questions: 1. These should reflect the sources from which your interest is derived e.g.: a. an area or topic in which you have an interest b. ideas or issues which you wish to explore in detail c. problems detected and needing a solution in practical or theoretical terms d. questions arising from experience, reading the literature, etc. e. you should clearly state the nature of the problem etc. and its known or estimated extent f. if possible you should locate your questions within the context within which it is to be studied Having selected your research topic and questions, the next stage is to begin designing and planning your research project, the focus of which is usually expressed in terms of aims and objectives. Aims: 1. Are broad statements of desired outcomes, or the general intentions of the research, which describes your research proposal 2. Emphasize what is to be accomplished, NOT HOW it is to be accomplished 3. Address the long-term project outcomes, i.e. they should reflect the aspirations and expectations of the research topic Once aims have been established, the next task is to formulate the objectives. Generally, a project should have no more than two or three aims statements, while it may include a number of objectives consistent with them i.e. there should be a relationship between the objectives and the aims. Objectives: 1. Are specific lists of features needed to accomplish the aims of the project which includes brief descriptions about the features. 2. Emphasize how aims are to be accomplished 3. Must be highly focused and feasible 4. Address the more immediate project outcomes 5. Make accurate use of concepts and be sensible and precisely described 6. Are usually numbered so that each objective reads as an 'individual' statement to convey your intentions For each specific objective you must have a method to attempt to achieve it. The development of a realistic time schedule may help to prioritize your objectives and help to minimize wasted time and effort.
5. respondents. Provide you and your assessors with indicators of how you: 1. ambitious or broad in scope though aims are more general in nature than objectives it is the viability and feasibility of your study that you have to demonstrate and aims often present an over-optimistic picture of what the project can achieve 2. spend time discussing details of your job or research site i. units.: it is your research study your supervisor and advisor are interested in and you should keep this in mind at all times. you will deal with ethical and practical problems in your research Aims and Objectives should not: 1. they should not imply methodological goals or standards of measurement. will develop a strategy and design for data collection and analysis 4. just be a list of things related to your research topic 4. proof or generalizability of findings that the methods cannot sustain . goods or services and develop a sampling frame and strategy or a rationale for their selection 3. Be presented concisely and briefly 2. that is. The aim is what you want to achieve.e. intend to approach the literature and theoretical issues related to you project 2. be too vague. just repeat each other in different terms 3.: the scope of your project must be consistent with the time frame and level of effort available to you 4. intend to access your chosen subjects. Be interrelated.Aims and Objectives should: 1. Be realistic about what you can accomplish in the duration of the project (4 ½ months – 2nd semester) and the other assignments you will be having i. and the objective describes how you are going to achieve that aim: make sure that each aim is matched with specific objectives 3. Contradict methods.e.
Remember: 1. Objectives In order to achieve the aim of implementing full device encryption. Example 2 (Better) Aims The research proposal has multiple aims. To calculate the estimated arrival time based on the taxi current location and the passenger location. where the randomised pattern would help prevent successful smudge attacks. one of the objectives is to include SD card encryption. 2. since your research may reveal that your questions were inappropriate. your conclusion will still have to reflect on how well the research design that was guided by your objectives has contributed to addressing your aims. that there are intervening variables you could not account for or that the circumstances of the study have changed etc. The second stage would consist of another lock which consists of a . which is one of the major flaws in the existing encryption method. Your supervisor and advisor will also evaluate whether the objectives of the project has been met at the end of the project. To broadcast the mobile device location to all nearby taxis. Another objective would be to integrate compact encryption algorithms that allow for quick encryption and minimal resource consumption. To send the dispatched taxi information including its GPS location to the passenger. You may not however always meet your aims in full. Objectives: To detect the user location based on his or her mobile device that has GPS functionality. At the conclusion of your project you will need to assess whether or not you have met your objectives and if not. to research a solution that allows Android tablet users to implement full and comprehensive device encryption. why not. Whatever the case. Example 1 (Acceptable) Aim: To develop an application that can book a taxi based on the user location using a GPS enabled mobile device. The second aim of providing a dual-stage device access control is achieved through the deployment of a randomised grid layout lock. to provide dual-stage device access control for enhanced security. and to implement a platform for secure backup and restoration.
References: Adopted from http://www. The application would also serve an additional role as a secure device authorisation platform.user-defined image pattern. allowing desktop root access only through this authorised desktop.oup. where the correct image sequence must be chosen to affirm the user’s authenticity. This would allow the user to safely backup and restore their personal data and settings at any time. The third aim of safeguarding encryption data is done through the integration of an additional application that resides on a separate device that would allow for the secure backup of key and files.htm .com/uk/orc/bin/9780199284986/01student/project_guide/project_guide/page_11 .