Robotic Process Automation
ROBOTIC PROCESS AUTOMATION Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, c...
Autor principal: | |
---|---|
Otros Autores: | , , , , |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated
2023.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009769038206719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Preface
- Chapter 1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence
- 1.1 Introduction
- 1.2 Aim of the Study
- 1.3 Architecture of Cloud Computing
- 1.4 The Impact of Cloud Computing on Business
- 1.5 The Benefits of Cloud Computing on Business
- 1.6 Generic Security Protocol Features
- 1.7 Cloud Computing Security Protocol Design
- 1.7.1 Protocol for File Transfer (FTP)
- 1.7.2 Local User Authentication Protocol (LUAP)
- 1.7.3 Protocol for Consumption
- 1.7.4 Remote User Authentication Protocol
- 1.7.5 Secure Cloud Transmission Protocol
- 1.7.6 Protocol for Cloud Trust
- 1.7.7 Protocol for Secure Single-Sign-On
- 1.7.8 Secure Session Protocol (SSP)
- 1.7.9 Protocol for Authorization
- 1.7.10 Protocol for Key Management
- 1.8 AI Based Cloud Security
- 1.8.1 Event Detection and Prevention
- 1.8.2 Delegate to Automated Technology
- 1.8.3 Machine Learning Algorithms in Cloud Computing
- 1.9 Various Neuronal Network Architectures and Their Types
- 1.10 Conclusion
- Acknowledgement
- References
- Chapter 2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space
- 2.1 Introduction
- 2.2 Aim of the Study
- 2.3 Motivation for the Study
- 2.4 Detecting the Dark Web
- 2.5 Preventing the Dark Web
- 2.6 Recommendations
- 2.7 Conclusion
- Acknowledgement
- References
- Chapter 3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning
- 3.1 Introduction
- 3.2 Aim of the Study
- 3.3 Motivation for the Study
- 3.4 Nature of LASERS
- 3.5 Ongoing Laser Weapon Projects
- 3.6 Directed Energy Weapons (DEWs)
- 3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements
- 3.8 Methodology.
- 3.9 Conclusion
- Acknowledgement
- References
- Chapter 4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme - RPA and Machine Learning]
- 4.1 Introduction
- 4.2 Aim of the Study
- 4.3 Motivation for the Study
- 4.4 Supervised and Unsupervised Machine Learning for UAVs
- 4.4.1 Supervised Learning Overview
- 4.4.2 Overview of Unsupervised Learning
- 4.4.3 Supervised and Unsupervised UAV-Based Solution Problems
- 4.5 Unsupervised Solution
- 4.5.1 Estimation of Channel
- 4.5.2 Detection of UAVs
- 4.5.3 Imaging for Unmanned Aerial Vehicles
- 4.6 Conclusion
- 4.7 Scope for the Future Work
- Acknowledgement
- References
- Chapter 5 FLASH: Web-Form's Logical Analysis &
- Session Handling Automatic Form Classification and Filling on Surface and Dark Web
- 5.1 Introduction
- 5.2 Literature Review
- 5.2.1 Notable Approaches
- 5.2.1.1 Crawling the Hidden Web
- 5.2.1.2 Google's Deep Web Crawl
- 5.2.1.3 Other Approaches
- 5.3 How FLASH Offers Better Results
- 5.4 Methodology
- 5.4.1 Form Identification and Field Extraction
- 5.4.1.1 Form Identification
- 5.4.1.2 Extraction of Fields
- 5.4.2 Form HTML Tag Interpretation
- 5.4.2.1 Identification of Form Type
- 5.4.2.2 Identification of Request Method
- 5.4.3 Interpretation of Form Fields
- 5.4.4 Form Classification
- 5.4.5 Generation and Sending of Request with Appropriate Data
- 5.4.5.1 Generation of the Request
- 5.4.5.2 Sending the Request
- 5.5 Results
- 5.5.1 Classification of Forms
- 5.5.2 Dataset
- 5.5.2.1 Manual
- 5.5.2.2 Automated
- 5.5.3 Accuracy Measures
- 5.5.4 Manual Dataset
- 5.5.4.1 Form Classification
- 5.5.4.2 Form Filling
- 5.5.5 Automated Datasets
- 5.5.5.1 Form Classification
- 5.5.5.2 Form Input-Tag Inference
- 5.6 Limitations and Future Work
- 5.6.1 Limitations.
- 5.6.2 Future Work
- 5.7 Conclusion
- References
- Chapter 6 Performance Analysis of Terahertz Microstrip Antenna Designs: A Review
- 6.1 Introduction
- 6.2 Microstrip Antenna Design
- 6.2.1 Feeding Methods
- 6.3 Challenges of Terahertz Antenna Development
- 6.4 Antenna Performance Attributes
- 6.5 Comparative Analysis of Microstrip THZ Antennas
- 6.6 Conclusion
- References
- Chapter 7 Smart Antenna for Home Automation Systems
- 7.1 Introduction
- 7.2 Home Automation Antenna Geometry and Robotics Process Automation
- 7.3 Results for Home Automation Smart Antenna
- 7.4 Conclusion
- References
- Chapter 8 Special Military Application Antenna for Robotics Process Automation
- 8.1 Introduction
- 8.2 Special Military Application Antenna for Robotics Process Automation
- 8.3 Results for Special Military Application Antenna
- 8.4 Conclusion
- References
- Chapter 9 Blockchain Based Humans-Agents Interactions/Human-Robot Interactions: A Systematic Literature Review and Research Agenda
- 9.1 Introduction
- 9.2 Conceptual Foundation
- 9.2.1 Blockchains
- 9.2.2 Cryptocurrencies
- 9.2.3 Smart Contracts
- 9.2.4 Decentralized Identity
- 9.3 Motivation
- 9.4 Blockchain and Robotics Overview
- 9.5 Human-Robot Interaction
- 9.5.1 Games
- 9.5.2 Commitment Strategies and Conditioning
- 9.6 Applications of HRI
- 9.6.1 HRI Application in Industry
- 9.6.2 HRI in Rehabilitation and Medical
- 9.6.3 HRI in Agriculture
- 9.6.4 Robochains
- 9.7 Transactions between Robots and Human Beings
- 9.7.1 A Ledger that is Decentralized, Immutable, and Publicly Verifiable
- 9.7.2 Contracts
- 9.8 Escrow Services
- 9.9 Challenges for HRI
- 9.9.1 Task Dynamic Analysis
- 9.9.2 Teaching a Robot and Avoiding Unintended Consequences
- 9.9.3 Connecting Mutual "Mental" Models to Prevent Working in Conflict
- 9.9.4 Role of Robots in Education.
- 9.9.5 Lifestyle, Fears, and Human Values
- 9.10 Discussion and Future Work
- 9.11 Conclusion
- References
- Chapter 10 Secured Automation in Business Processes
- 10.1 Introduction
- 10.2 Literature Survey
- 10.3 Background
- 10.4 Proposed Model
- 10.4.1 Disadvantages of Previous System
- 10.5 Analysis of the Work
- 10.6 Conclusion
- References
- Chapter 11 Future of Business Organizations Based on Robotic Process Automation: A Review
- 11.1 Introduction
- 11.2 Literature Review
- 11.3 Technology: A Need of Robotic Process Automation
- 11.3.1 Benefits of Robotic Process Automation
- 11.3.2 Drawbacks of Robotic Process Automation
- 11.4 Business Enterprise
- 11.5 Conclusion and Future Scope
- References
- Chapter 12 Comparative Overview of FER Methods for Human-Robot Interaction Using Review Analysis
- 12.1 Introduction
- 12.2 FER Method Review Based Analysis
- 12.2.1 AdaBoost Method
- 12.3 Feature Extraction Techniques
- 12.3.1 Haar Classifier Method
- 12.3.2 Geometric-Based Method
- 12.3.3 Appearance-Based Method
- 12.4 Conclusion
- References
- Chapter 13 Impact of Artificial Intelligence on Medical Science Post Covid 19 Pandemic
- 13.1 Introduction
- 13.2 Types of AI Relevant to Healthcare
- 13.2.1 Machine Learning - Neural Networks and Deep Learning
- 13.2.2 Natural Language Processing
- 13.2.3 Rule-Based Expert System
- 13.2.4 Physical Robots
- 13.2.5 Robotic Process Automation
- 13.3 Diagnosis and Treatment Application
- 13.4 Limitation of Artificial Intelligence in Medical Science
- 13.4.1 Data Availability
- 13.4.2 One-Sided Data
- 13.4.3 Data Preprocessing
- 13.4.4 Selection of Model
- 13.4.5 Presenting Biased Model
- 13.4.6 Fragmented Data
- 13.4.7 Black Boxes
- 13.5 The Future of AI in Healthcare
- 13.6 Conclusion
- References.
- Chapter 14 Revolutionizing Modern Automated Technology with WEB 3.0
- 14.1 Introduction
- 14.2 What is WEB 3.0: Definitions
- 14.3 Features &
- Characteristics
- 14.3.1 Rewarding Cryptocurreny
- 14.3.2 Interconnection-Exchange &
- Use of Info
- 14.3.3 Metaverse
- 14.3.4 Personalization
- 14.3.5 Semantic Web
- 14.4 Implementation
- 14.4.1 The Three Dimensional Web
- 14.4.2 Decentralized Technology
- 14.4.3 The Social Web
- 14.4.4 Prevalent and Omnipresent WEB
- 14.4.5 Multi-Media Web
- 14.5 Inventions around Modern Technology
- 14.5.1 A.I. Powered Search Engine
- 14.5.2 Touring and Travelling
- 14.5.3 Gaming Advancements
- 14.5.4 E-Learning with Virtual Documentary
- 14.6 Conclusion
- Acknowledgement
- References
- Chapter 15 The Role of Artificial Intelligence, Blockchain, and Internet of Things in Next Generation Machine Based Communication
- 15.1 Introduction
- 15.2 Blockchain
- 15.3 Internet of Things
- 15.4 Convergence of Blockchain, Internet of Things, and Artificial Intelligence
- 15.5 Block Chain for Vehicular IoT
- 15.6 Convergence of IoT with Cyber-Physical Systems
- 15.7 Conclusion
- References
- Chapter 16 Robots, Cyborgs, and Modern Society: Future of Society 5.0
- 16.1 Introduction
- 16.2 Comparing Humans, Cyborgs, and Robots
- 16.3 Some Philosophical Aspects
- 16.4 Reproduction or Replication
- 16.5 Future of our Society
- 16.5.1 Eugenics or Genetic Engineered Humans
- 16.5.2 Why Do We Need Cyborgs?
- 16.6 Implications
- 16.6.1 Opportunity vs Exploitation
- 16.6.2 Utopia vs Dystopia
- 16.6.3 Emancipation vs Extermination
- 16.7 Conclusion
- References
- Chapter 17 Security and Privacy of Blockchain-Based Robotics System
- 17.1 Introduction
- 17.2 Security and Privacy Concerns
- 17.2.1 Double Spending
- 17.2.2 Vulnerable Wallets
- 17.2.3 Cyber-Attacks
- 17.2.4 Sybil Attack.
- 17.2.5 Selfish Mining.