Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

SAKTI©: Secured Chatting Tool Through Forward Secrecy

View through CrossRef
The critical issue of academic misconduct is of utmost importance in the field of education and understanding whistleblowing behaviour can be a potential measure to effectively address this issue. This paper highlights the benefits of using the Tree-based Pipeline Optimization (TPOT) framework as a user-friendly tool for implementing machine learning techniques in studying whistleblowing behaviour among students in universities in Indonesia and Malaysia. The paper demonstrates the ease of implementing TPOT, making it accessible to inexpert computing scientists, and showcases highly promising results from the whistleblowing classification models trained with TPOT. Performance metrics such as Area Under Curve (AUC) are used to measure the reliability of the TPOT framework, with some models achieving AUC values above 90%, and the best AUC was 99% by TPOT with a Genetic Programming population size of 40. The paper’s main contribution lies in the empirical demonstration and findings that resulted in achieving the optimal outcomes from the whistleblowing case study. This paper sheds light on the potential of TPOT as an easy and rapid implementation tool for AI in the field of education, addressing the challenges of academic misconduct and showcasing promising results in the context of whistleblowing classification.
Title: SAKTI©: Secured Chatting Tool Through Forward Secrecy
Description:
The critical issue of academic misconduct is of utmost importance in the field of education and understanding whistleblowing behaviour can be a potential measure to effectively address this issue.
This paper highlights the benefits of using the Tree-based Pipeline Optimization (TPOT) framework as a user-friendly tool for implementing machine learning techniques in studying whistleblowing behaviour among students in universities in Indonesia and Malaysia.
The paper demonstrates the ease of implementing TPOT, making it accessible to inexpert computing scientists, and showcases highly promising results from the whistleblowing classification models trained with TPOT.
Performance metrics such as Area Under Curve (AUC) are used to measure the reliability of the TPOT framework, with some models achieving AUC values above 90%, and the best AUC was 99% by TPOT with a Genetic Programming population size of 40.
The paper’s main contribution lies in the empirical demonstration and findings that resulted in achieving the optimal outcomes from the whistleblowing case study.
This paper sheds light on the potential of TPOT as an easy and rapid implementation tool for AI in the field of education, addressing the challenges of academic misconduct and showcasing promising results in the context of whistleblowing classification.

Related Results

Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Optimising tool wear and workpiece condition monitoring via cyber-physical systems for smart manufacturing
Smart manufacturing has been developed since the introduction of Industry 4.0. It consists of resource sharing and networking, predictive engineering, and material and data analyti...
Determinan Partisipasi Ibu Membawa Balita ke Posyandu di Wilayah Kerja Puskesmas Sakti kecamatan Sakti Kabupaten Pidie
Determinan Partisipasi Ibu Membawa Balita ke Posyandu di Wilayah Kerja Puskesmas Sakti kecamatan Sakti Kabupaten Pidie
Posyandu is a basic health activity organized by, by and for the community assisted by health workers in a Puskesmas work area. The aim of this research was to determine the determ...
Secret Leviathan
Secret Leviathan
Leviathan, the all-powerful sea monster of the Old Testament, was Thomas Hobbes’s metaphor for the state: “that Mortall God to which wee owe . . . our peace and defence.” We make o...
PENGARUH EKUITAS MEREK DAN STRATEGI PENETAPAN HARGA TERHADAP KEPUTUSAN PEMBELIAN KONSUMEN PADA PRODUK PT HALIMJAYA SAKTI MEDAN
PENGARUH EKUITAS MEREK DAN STRATEGI PENETAPAN HARGA TERHADAP KEPUTUSAN PEMBELIAN KONSUMEN PADA PRODUK PT HALIMJAYA SAKTI MEDAN
Ekuitas Merek belum kuat sehingga banyak calon konsumen yang kurang mengetahui produk alas kaki yang diproduksi oleh PT Halimjaya Sakti Medan. Tujuan dari penelitian ini adalah unt...
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. Ho...
Achieving zero secrecy outage in amplify-and-forward relaying systems
Achieving zero secrecy outage in amplify-and-forward relaying systems
A proposed artificial noise (AN) injection strategy is considered in amplify-and-forward (AF) relaying systems. The limit of secrecy rate, hence the resulting zero-outage secrecy t...
Robot tool use: A survey
Robot tool use: A survey
Using human tools can significantly benefit robots in many application domains. Such ability would allow robots to solve problems that they were unable to without tools. However, r...
Optimal power allocation to improve secrecy performance of non‐regenerative cooperative systems using an untrusted relay
Optimal power allocation to improve secrecy performance of non‐regenerative cooperative systems using an untrusted relay
To protect data communication from eavesdropper nodes, different techniques have been developed to improve the physical‐layer security (PLS) of communications systems. Destination‐...

Back to Top