The use of participant-observation protocol in an industrial engineering research.
نویسندگان
چکیده
Based on literature, this article aims to present the "participant-observation' research protocol, and its practical application in the industrial engineering field, more specifically within the area of design development, and in the case shown by this article, of interiors' design. The main target is to identify the concept of the method, i.e., from its characteristics to structure a general sense about the subject, so that the protocol can be used in different areas of knowledge, especially those ones which are committed with the scientific research involving the expertise from researchers, and subjective feelings and opinions of the users of an engineering product, and how this knowledge can be benefic for product design, contributing since the earliest stage of design.
منابع مشابه
Updated protocol and guest participant results from the ACCeRT clinical study
Introduction: Cancer cachexia is a condition often seen at diagnosis, throughout chemotherapeutic treatments and in end stage Non-Small Cell Lung Cancer patients. These patients often experience a shorter life-expectancy and deterioration in performance status and reduced quality of life. New multi˗targeted regimens are required to be tested in this population to address these issues. Material...
متن کاملTexture assessment of automobile dashboard: An integrated approach on industrial design and ergonomics
In this paper, the main objective is ergonomics evaluation of automobile’s dashboard to devise suitable designs based on textures and patterns. Undoubtedly appropriated dashboards' design based on textures might be ended to more driving safety, in which the tactile-real and visualimplied texture of a surface should be considered. In this study, data was gathered by in-depth observa...
متن کاملTechnical Note: Performance measurement in industrial organizations, case study: Zarbal Complex
Industrial organizations are complex systems` where the interactions among the various functions such as Sales, Distribution, Manufacturing, Materials, Finance, Human Resources and Maintenance have to be man-aged towards a common purpose of delivering the customers satisfaction. However, since most of these or-ganizations have a `Functional Structure`, each function or department works towards ...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملImproving Performance of Opportunistic Routing Protocol using Fuzzy Logic for Vehicular Ad-hoc Networks in Highways
Vehicular ad hoc networks are an emerging technology with an extensive capability in various applications including vehicles safety, traffic management and intelligent transportation systems. Considering the high mobility of vehicles and their inhomogeneous distributions, designing an efficient routing protocol seems necessary. Given the fact that a road is crowded at some sections and is not c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Work
دوره 41 Suppl 1 شماره
صفحات -
تاریخ انتشار 2012