• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 1
  • Tagged with
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

#yogaeverydamnday : En analys av religiösa och andliga uttryck och beskrivningar på Instagram

Franck, Julia January 2015 (has links)
In recent years, the Internet has exploded with different kinds of social media, where a significant function is to share your life in text and images. This changes how we form our identity, our religious identity included. The aim of this paper was to study how Instagram forms a space for the creation and development of religious and spiritual beliefs. For this purpose, Instagram updates from five women with yoga oriented Instagram accounts have been analyzed in relation to two theories: Paul Heelas’ och Linda Woodhead’s theory of a spiritual revolution and Heidi Campbell’s theory of networked religion. The aim of the study was to explore how these women presented themselves in their Instagram flow and what part religion and spirituality had in their presentations. The method used was thematic content analyses. Four themes were identified: (1) immanent and transcendent religion, (2) the unique self, (3) the holistic idea and (4) thoughts about the universe and the earth. The conclusion when analyzing the data in relation to the selected theories was that religion and spirituality have a central part in the texts that was published with the pictures and that the women expressed and described religion and spirituality in a way that can be understood in accordance with both the theory of a spiritual revolution and the theory of networked religion, especially with references to storied identity, shifting authority and convergent practice.  Nevertheless, some parts of the result couldn’t fully be explained through these theories and there were some parts of the result that showed that the theories might need some development or adjustment, for example regarding gender roles and female religiosity in the contemporary society.
2

Mötet mellan skäggiga män : Hur ett socialt möte skapar en plats

Werbowsky, Charlotte January 2016 (has links)
ABSTRACT Today our physical appearance is more important than before. The way we physically present ourselves is how many of us would like to be seen. By acting a certain way, dressing a certain way or spend time with a certain social group we identify ourselves. A certain style that an individual presents can say something about what that individual are interested in and how the person spends his or her time. Today many complement their physical appearance with a physical attribute like a beard. Beard is seen as something that is trendy and masculine. Many men identify themselves with their beard, even thou it is only a part of the male physical appearance. In Sweden there is a beard contest called “En Karl Med Skägg” this is an event with an audience that nominates Sweden’s best beard of ten final contestants. Men all over the country apply for the contest. A jury then selects ten men that will be the final contestants for the best beard of Sweden.   This thesis is going to analyze the social meeting that the participants create while participating in the contest and the importance of that meeting to them. While participating in the event, participants give the place of the event a meaning and the place of the event also got a meaning to the participants both socially and geographically. These men create a social place that is time-stretched with an importance to them. This thesis is also going to examine how this type of event symbolizes modern culture and how the male gaze is of higher importance than before historically. The thesis is going to analyze the connection between the male self-identification and participating in a social meeting between others, by appearance similar individuals.
3

Utgör Utsatthet och Identifiering med Alternativa Sociala Grupperingar Riskfaktorer för Självskadebeteenden? / Are Peer Harassment and Self-Identification with Alternative Peer Crowds Risk Factors for Self-Harm?

Narancic, Sandra, Ågren, Samira January 2016 (has links)
Självskadebeteenden bland ungdomar är ett allvarligtsamhällsproblem som tycks öka. Ett flertal faktorer såsom utsatthet iskolan och vilken eller vilka sociala grupperingar en ungdom uppleversig tillhöra har i tidigare studier identifierats som riskfaktorer för attutveckla självskadebeteenden. Syftet med studien var att undersökaom utsatthet och alternativa sociala grupperingar utgör riskfaktorer försjälvskadebeteenden, samt om det finns en interaktionseffekt mellandessa faktorer i att predicera självskadebeteenden. Studien baseradespå longitudinell data insamlad bland högstadieungdomar på sju skolori centrala Sverige. En multipel regressionsanalys utfördes för att testainteraktionstermen mellan variablerna över tid. Resultatet bekräftadebåde utsatthet i skolan och identifiering med alternativa socialagrupperingar som riskfaktorer, samt att det fanns en interaktionseffektmellan de båda som ytterligare ökar risken för utvecklandet avsjälvskadebeteenden hos ungdomar. / Self-harm is a major public health concern amongst adolescents thatappears to be increasing. Several risk factors have in previous researchbeen associated with self-harm, such as peer harassment and the peercrowd or crowds an adolescent identifies with. The aim of this studywas to examine whether peer harassment and identification withalternative peer crowds constitutes risk factors and whether there wasan interaction effect between these factors in predicting self-harm. In alongitudinal study, students from seven secondary schools in centralSweden responded to a questionnaire. A multiple regression analysiswas conducted to test the interaction between these variables overtime. The results confirmed that both peer harassment andidentification with alternative peer crowds were risk factors for selfharmingbehaviors, as well as there was an interaction effect, namelythat the adolescents who were exposed to peer harassment andidentified with particular social crowds were particularly at risk fordeveloping self-harm behaviors.
4

Topology-based Device Self-identification in Wireless Mesh Networks

Quan, Yongyun January 2019 (has links)
In the context of the Internet of Things (IoT), commissioning is the process of securely adding a new device to a network. It covers many different tasks, including the physical deployment of devices and configuration of parameters. It is network installers who need to manually commission each device one by one with the help of commissioning tools. In practice, the first task for a network installer is to identify each device correctly before configuring it with proper parameters. Individually identifying each device, especially in a large network, is a very time-consuming process. This is also known as the identification problem. This project is going to address the problem.A novel device identification approach is presented in the thesis, and there is no human intervention involved in the identification process. Devices are trying to identify themselves based on predefined rules and given information. The approach is therefore called device self-identification, and it is implemented in two different algorithms. One is the centralized device selfidentification, and the other is the distributed device self-identification. In short, only one device participates in the device identification process in the centralized approach, and in the distributed counterpart, every device is part of the identification process.The results of the implementations show the potential of the new way to identify devices in IoT. Devices in both the centralized approach and the distributed approach are able to identify themselves given necessary information about the network. A detailed discussion regarding the two proposed algorithms and the network information is presented in the thesis. / I samband med Internet of Things (IoT) är igångkörning processen att säkert lägga till en ny enhet i ett nätverk. Den täcker många olika uppgifter, inklusive fysisk distribution av enheter och konfigurering av parametrar. Det är nätverksinstallatörer som måste manuellt beställa varje enhet en efter en med hjälp av installationsverktyg. I praktiken är den första uppgiften för en nätverksinstallatör att korrekt identifiera varje enhet innan den konfigureras med lämpliga parametrar. Att identifiera varje enhet speciellt i ett stort nätverk är en mycket tidskrävande process. Detta är också känt som identifieringsproblemet. Detta projekt kommer att ta itu med problemet.En nyhetsidentifieringsmetod presenteras i avhandlingen och det finns ingen mänsklig intervention involverad i identifieringsprocessen. Enheter försöker identifiera sig baserat på fördefinierade regler och information. Tillvägagångssättet kallas därför enhetens självidentifiering och det implementeras i två olika algoritmer, en är centraliserad enhetens självidentifiering och den andra är distribuerad enhetens självidentifiering. Kort sagt, endast en enhet deltar i enhetsidentifieringsprocessen i centraliserat tillvägagångssätt, och i distribuerad motsvarighet är varje enhet en del av identifieringsprocessen.Resultaten av implementationerna visar potentialen för det nya sättet att identifiera enheter i IoT. Enheter i både centraliserat tillvägagångssätt och distribuerat tillvägagångssätt kan identifiera sig med den information som krävs för nätverket. En detaljerad diskussion om de två föreslagna algoritmerna och nätverksinformationen presenteras i avhandlingen.

Page generated in 0.1358 seconds