15,774 research outputs found

    Penentuan Tes Kepribadian Calon Mahasiswa Berdasarkan Sidik Jari Menggunakan Minutie dan Support Vector Machine

    Get PDF
    Every human being is given its own uniqueness by an almighty god, one of which is a part of the body organs such as the fingerprint pattern of the hand, the fingerprint pattern of each human being determines personality, this can be known from many previous studies, which use fingerprints or someone's detection by the police to capture the perpetrators with the biometry approach in the form of footprint fingerprint records attached to other objects. Determination of a person's personality can be known through fingerprints, and also can adjust prospective students in choosing the study program correctly. Fingerprint student personality identification application provides convenience in determining the choice of prospective students of the study program. The minutie method and the Support Vector Machine algorithm are used in clustering personalities according to training data in the application. The minutie test on the fingerprint pattern shows 100% compatibility, with a precision input image source. SVM algorithm in testing reached 80,9% in grouping personality types accordingly.Every human being is given its own uniqueness by an almighty god, one of which is a part of the body organs such as the fingerprint pattern of the hand, the fingerprint pattern of each human being determines personality, this can be known from many previous studies, which use fingerprints or someone's detection by the police to capture the perpetrators with the biometry approach in the form of footprint fingerprint records attached to other objects. Determination of a person's personality can be known through fingerprints, and also can adjust prospective students in choosing the study program correctly. Fingerprint student personality identification application provides convenience in determining the choice of prospective students of the study program. The minutie method and the Support Vector Machine algorithm are used in clustering personalities according to training data in the application. The minutie test on the fingerprint pattern shows 100% compatibility, with a precision input image source. SVM algorithm in testing reached 80,9% in grouping personality types accordingly

    Support Vector Machine Classification and Regression Prioritize Different Structural Features for Binary Compound Activity and Potency Value Prediction

    Get PDF
    In computational chemistry and chemoinformatics, the support vector machine (SVM) algorithm is among the most widely used machine learning methods for the identification of new active compounds. In addition, support vector regression (SVR) has become a preferred approach for modeling nonlinear structure−activity relationships and predicting compound potency values. For the closely related SVM and SVR methods, fingerprints (i.e., bit string or feature set representations of chemical structure and properties) are generally preferred descriptors. Herein, we have compared SVM and SVR calculations for the same compound data sets to evaluate which features are responsible for predictions. On the basis of systematic feature weight analysis, rather surprising results were obtained. Fingerprint features were frequently identified that contributed differently to the corresponding SVM and SVR models. The overlap between feature sets determining the predictive performance of SVM and SVR was only very small. Furthermore, features were identified that had opposite effects on SVM and SVR predictions. Feature weight analysis in combination with feature mapping made it also possible to interpret individual predictions, thus balancing the black box character of SVM/SVR modeling

    IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

    Full text link
    With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a brownfield approach: applying necessary protection measures within the network so that potentially vulnerable devices can coexist without endangering the security of other devices in the same network. In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. We show that IOT SENTINEL is effective in identifying device types and has minimal performance overhead

    XSS-FP: Browser Fingerprinting using HTML Parser Quirks

    Get PDF
    There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting. This paper presents and evaluates a novel fingerprinting technique to determine the exact nature (browser type and version, eg Firefox 15) of a web-browser, exploiting HTML parser quirks exercised through XSS. Our experiments show that the exact version of a web browser can be determined with 71% of accuracy, and that only 6 tests are sufficient to quickly determine the exact family a web browser belongs to
    • …
    corecore