Essays about: "tränings beteende"

Found 3 essays containing the words tränings beteende.

  1. 1. Experiences of viewing fitspiration, its body ideal perception and exercise behaviour in young adult exercisers: A qualitative study

    University essay from Högskolan i Halmstad/Akademin för hälsa och välfärd

    Author : Fatma Sahid; Sepideh Soheili; [2021]
    Keywords : Social media; fitspiration; fitspiration’s body ideal; social comparison; exercise behaviour; body image; social media; fitspiration; fitspiration body ideal; social comparison; exercise behaviour; body image; Sociala media. fitspiration; fitspirations kroppsideal; social jämförelse; tränings beteende; kroppsuppfattning;

    Abstract : The purpose of the present study was to gain knowledge and understanding on fitspiration, itsbody ideal perception and exercise behaviour in a sample of young adults who are exercisers, daily social media usersand also fitspiration followers. To that end, semi-structured interviews were carried out to gather information from eight young adult exercisers (M = 22. READ MORE

  2. 2. Adversarial learning in a multi-agent environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Max Truedsson; Erik Westergren; [2020]
    Keywords : ;

    Abstract : Reinforcement learning is one of the main paradigms of machine learning. In this paradigm learners (agents) are not explicitly told what to do, instead they must on their own explore their environment and determine which actions to take, in order to maximize some numerical signal. READ MORE

  3. 3. Near Real-time Detection of Masquerade attacks in Web applications : catching imposters using their browsing behavor

    University essay from KTH/Kommunikationsnät

    Author : Vasileios Panopoulos; [2016]
    Keywords : Naive Bayes; SVM; Support Vector Machines; Machine Learning; IDS; Intrusion Detection System; Web Application; scikit-learn;

    Abstract : This Thesis details the research on Machine Learning techniques that are central in performing Anomaly and Masquerade attack detection. The main focus is put on Web Applications because of their immense popularity and ubiquity. This popularity has led to an increase in attacks, making them the most targeted entry point to violate a system. READ MORE