There are no theoretical or practical advantages when it comes to security, as the XOR with $R$ is easily reversed. Since the key is fully randomized and only dependent on the password, the security isn't degraded either. The XOR with a known value doesn't give any information to the attacker as both input and output are unknown - presuming your cipher / key usage is secure.
There is a practical advantage. It is possible to reuse an existing data encryption key while replacing the password. First you calculate a $K_{org}$ using a password hash and $P_{org}$, for which you require the initial password; $K_{org}$ or a derived key is used to encrypt the data. Then you calculate $K_{new}$ using $P_{new}$. What you store is with the ciphertext is $D=K_{new} \oplus K_{org}$. Now you've replaced your password, by calculating $K_{org}=K_{new} \oplus D$.
When you start you can also generate a random $K_{data}$ or $K_{master}$ which you can get to by always creating a $D$ for XOR key derivation. Basically you first create a randomized key, which you then force to another unpublished, randomized key using the XOR.
In other words, the advantage is in key management which helps with system level security rather than algorithm security.