Ergonomic Evaluation of Workstations in an IT Industry
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 7
Abstract
In the Information Technology (IT) industry an individual spends most of time in front of their computers working for more than 7 to 8 hours per day. This continuous sitting in the same postures has been the reason for many musculoskeletal disorders (MSDs) and repetitive strain injuries (RSIs). The paper focuses on the finding the different body parts that suffer strain and discomfort. A questionnaire was designed to evaluate the different parts of the body suffering from pain and to evaluate the different aspects of the five workstation elements considered. The questionnaire was subjected to a Reliability test to measure the consistency of the questions and their responses. From the data collected it was found that the chair was the element that caused most discomfort. The major body parts that the employees had pain frequently were the neck, shoulder, upper back and lower back. The reliability test conducted showed that all the questions in the questionnaire were consistent and reliable. High correlation was found between the body parts affected and aspects of the chair.
Authors and Affiliations
M. Mahantesh M. Math| Assistant Professor, , R V College of Engineering, Department of Industrial Engineering and Management, Bangalore, Karnataka, India, mahenteshmath@rvce.edu.in, M. N Shruthi| Assistant Professor, , R V College of Engineering, Department of Industrial Engineering and Management, Bangalore, Karnataka, India, shruthimn@rvce.edu.in
Supervision of DC Link Pi Control In A D-Statcom Based on Fuzzy Logic
PI controller with control algorithms are used for load compensation and voltage regulation in D-STATCOM. Because of variation in dc capacitor voltage, load changes might affect the compensation. In this paper, a fuz...
A Novel Approach for O (1) Parallel Sorting Algorithm
Sorting is an algorithm of the most relevant operations performed on computers. In particular, it is a crucial tool when it comes to processing huge volumes of data into the memory. There are different types of sortin...
Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity
A range of privacy models as well as anonymization algorithms have been developed. In tabular micro data some of the no responsive attributes called quasi identifiers can be used to reidentify individuals and their s...
Adaptive Query Image Searching Methods Using Improved Hash Coding and Unified Color and Intensity level Matrices
In this thesis we had implemented Hash coding with bit wise hamming distance for similarity measurement between the feature vectors of query and database, which will be more secured and real time based application. B...
A review of Data Mining Techniques Using in Big Data
The term Big Data comprises largevolume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data are now rapidly...