Essays about: "uppträdande"

Showing result 1 - 5 of 14 essays containing the word uppträdande.

  1. 1. RISK, RESPECT & UNSPEAKABLE ACTS : Untangling Intimate-Sexual Consent through 'Intuitive Inquiry' & 'Agential Realism'

    University essay from Karlstads universitet/Centrum för genusforskning (from 2013)

    Author : Frida Storm; [2021]
    Keywords : Doing; Consent; Communication; Intuition; Somatics; Intimacy; Sex; Sexual; Violence; Negotiation; Coercion; Rape; Legislation; Feminism; Neoliberal; Queer; Fanzine; BDSM; Dance; Performance; Sex Work; Responsibilization; Accountability; Diffraction; Entanglement; Autonomy; Agency; Power; Trauma.; Görande; samtycke; consent; kommunikation; intuition; somatik; intimitet; sex; sexuellt; våld; förhandling; tvång; våldtäkt; lagstiftning; feminism; nyliberalism; queer; fanzine; BDSM; dans; uppträdande; sexarbete; responsibilisering; ansvar; diffraction; entanglement; autonomi; agens; makt; trauma.;

    Abstract : In an attempt to address the issues in research and theory on consent, this thesis explores what consent can be seen as "doing" through an 'Intuitive Inquiry' (Anderson 2011a) and 'Agential Realism' (Barad 2007). Various manifestations of consent appears through: the experience of the researcher, consent research and theory, consent legislation, interviews with professionals in intimate-sexual consent, and, feminist fanzines. READ MORE

  2. 2. Collaborative Acting in Virtual Reality : Character embodiment for improving actor's immersion and minimizing scale mismatches for motion capture performances

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Robin Kammerlander; [2020]
    Keywords : ;

    Abstract : Motion capture systems are becoming more common within the entertainment industry, used for capturing actor’s movements and performances for animation purposes. However, the empty setting in which these performances take place differ a lot from traditional acting scenarios usually comprised of de- tailed sets, costumes and props. READ MORE

  3. 3. Security Test of iZettle's Reader 2 : A card terminal for safe payments?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daria Galal; Martin Tillberg; [2020]
    Keywords : izettle reader; ethical hacking; threat modelling; penetration testing; bluetooth; https.; izettle reader; etisk hackning; hotmodellering; penetrationstestning; bluetooth; https.;

    Abstract : Ethical hacking and penetration testing are two methods often used when organizations and companies want to measure their level of information security, and find out if there are additional steps that can be taken in order to increase the security. This report describes a security test of the card terminal iZettle Reader 2, with the intention to examine its level of security based on the device’s frequent appearance in the society. READ MORE

  4. 4. Weaknesses and risks of the Consumer Internet of Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fabienne Reitz; [2019]
    Keywords : ;

    Abstract :  The Consumer Internet of Things (CIoT) is a term to describe everyday items connected to the internet. The number of CIoT devices is growing rapidly and with it comes a number of security problems. One way to tackle these security issues is by learning from mistakes and to be aware of the risks at hand at both production and consumer level. READ MORE

  5. 5. Multivariate analysis of the parameters in a handwritten digit recognition LSTM system

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Georgios Zervakis; [2019]
    Keywords : Deep Learning; Interpretability; Handwritten Digit Recognition; MNIST; Recurrent Neural Networks; PCA; SVD; Variational Autoencoders;

    Abstract : Throughout this project, we perform a multivariate analysis of the parameters of a long short-term memory (LSTM) system for handwritten digit recognition in order to understand the model’s behaviour. In particular, we are interested in explaining how this behaviour precipitate from its parameters, and what in the network is responsible for the model arriving at a certain decision. READ MORE