Robotic Process Automation

ROBOTIC PROCESS AUTOMATION Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, c...

Descripción completa

Detalles Bibliográficos
Autor principal: Rawat, Romil (-)
Otros Autores: Chakrawarti, Rajesh Kumar, Sarangi, Sanjaya Kumar, Choudhary, Rahul, Gadwal, Anand Singh, Bhardwaj, Vivek
Formato: Libro electrónico
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated 2023.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009769038206719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Preface
  • Chapter 1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence
  • 1.1 Introduction
  • 1.2 Aim of the Study
  • 1.3 Architecture of Cloud Computing
  • 1.4 The Impact of Cloud Computing on Business
  • 1.5 The Benefits of Cloud Computing on Business
  • 1.6 Generic Security Protocol Features
  • 1.7 Cloud Computing Security Protocol Design
  • 1.7.1 Protocol for File Transfer (FTP)
  • 1.7.2 Local User Authentication Protocol (LUAP)
  • 1.7.3 Protocol for Consumption
  • 1.7.4 Remote User Authentication Protocol
  • 1.7.5 Secure Cloud Transmission Protocol
  • 1.7.6 Protocol for Cloud Trust
  • 1.7.7 Protocol for Secure Single-Sign-On
  • 1.7.8 Secure Session Protocol (SSP)
  • 1.7.9 Protocol for Authorization
  • 1.7.10 Protocol for Key Management
  • 1.8 AI Based Cloud Security
  • 1.8.1 Event Detection and Prevention
  • 1.8.2 Delegate to Automated Technology
  • 1.8.3 Machine Learning Algorithms in Cloud Computing
  • 1.9 Various Neuronal Network Architectures and Their Types
  • 1.10 Conclusion
  • Acknowledgement
  • References
  • Chapter 2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space
  • 2.1 Introduction
  • 2.2 Aim of the Study
  • 2.3 Motivation for the Study
  • 2.4 Detecting the Dark Web
  • 2.5 Preventing the Dark Web
  • 2.6 Recommendations
  • 2.7 Conclusion
  • Acknowledgement
  • References
  • Chapter 3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning
  • 3.1 Introduction
  • 3.2 Aim of the Study
  • 3.3 Motivation for the Study
  • 3.4 Nature of LASERS
  • 3.5 Ongoing Laser Weapon Projects
  • 3.6 Directed Energy Weapons (DEWs)
  • 3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements
  • 3.8 Methodology.
  • 3.9 Conclusion
  • Acknowledgement
  • References
  • Chapter 4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme - RPA and Machine Learning]
  • 4.1 Introduction
  • 4.2 Aim of the Study
  • 4.3 Motivation for the Study
  • 4.4 Supervised and Unsupervised Machine Learning for UAVs
  • 4.4.1 Supervised Learning Overview
  • 4.4.2 Overview of Unsupervised Learning
  • 4.4.3 Supervised and Unsupervised UAV-Based Solution Problems
  • 4.5 Unsupervised Solution
  • 4.5.1 Estimation of Channel
  • 4.5.2 Detection of UAVs
  • 4.5.3 Imaging for Unmanned Aerial Vehicles
  • 4.6 Conclusion
  • 4.7 Scope for the Future Work
  • Acknowledgement
  • References
  • Chapter 5 FLASH: Web-Form's Logical Analysis &amp
  • Session Handling Automatic Form Classification and Filling on Surface and Dark Web
  • 5.1 Introduction
  • 5.2 Literature Review
  • 5.2.1 Notable Approaches
  • 5.2.1.1 Crawling the Hidden Web
  • 5.2.1.2 Google's Deep Web Crawl
  • 5.2.1.3 Other Approaches
  • 5.3 How FLASH Offers Better Results
  • 5.4 Methodology
  • 5.4.1 Form Identification and Field Extraction
  • 5.4.1.1 Form Identification
  • 5.4.1.2 Extraction of Fields
  • 5.4.2 Form HTML Tag Interpretation
  • 5.4.2.1 Identification of Form Type
  • 5.4.2.2 Identification of Request Method
  • 5.4.3 Interpretation of Form Fields
  • 5.4.4 Form Classification
  • 5.4.5 Generation and Sending of Request with Appropriate Data
  • 5.4.5.1 Generation of the Request
  • 5.4.5.2 Sending the Request
  • 5.5 Results
  • 5.5.1 Classification of Forms
  • 5.5.2 Dataset
  • 5.5.2.1 Manual
  • 5.5.2.2 Automated
  • 5.5.3 Accuracy Measures
  • 5.5.4 Manual Dataset
  • 5.5.4.1 Form Classification
  • 5.5.4.2 Form Filling
  • 5.5.5 Automated Datasets
  • 5.5.5.1 Form Classification
  • 5.5.5.2 Form Input-Tag Inference
  • 5.6 Limitations and Future Work
  • 5.6.1 Limitations.
  • 5.6.2 Future Work
  • 5.7 Conclusion
  • References
  • Chapter 6 Performance Analysis of Terahertz Microstrip Antenna Designs: A Review
  • 6.1 Introduction
  • 6.2 Microstrip Antenna Design
  • 6.2.1 Feeding Methods
  • 6.3 Challenges of Terahertz Antenna Development
  • 6.4 Antenna Performance Attributes
  • 6.5 Comparative Analysis of Microstrip THZ Antennas
  • 6.6 Conclusion
  • References
  • Chapter 7 Smart Antenna for Home Automation Systems
  • 7.1 Introduction
  • 7.2 Home Automation Antenna Geometry and Robotics Process Automation
  • 7.3 Results for Home Automation Smart Antenna
  • 7.4 Conclusion
  • References
  • Chapter 8 Special Military Application Antenna for Robotics Process Automation
  • 8.1 Introduction
  • 8.2 Special Military Application Antenna for Robotics Process Automation
  • 8.3 Results for Special Military Application Antenna
  • 8.4 Conclusion
  • References
  • Chapter 9 Blockchain Based Humans-Agents Interactions/Human-Robot Interactions: A Systematic Literature Review and Research Agenda
  • 9.1 Introduction
  • 9.2 Conceptual Foundation
  • 9.2.1 Blockchains
  • 9.2.2 Cryptocurrencies
  • 9.2.3 Smart Contracts
  • 9.2.4 Decentralized Identity
  • 9.3 Motivation
  • 9.4 Blockchain and Robotics Overview
  • 9.5 Human-Robot Interaction
  • 9.5.1 Games
  • 9.5.2 Commitment Strategies and Conditioning
  • 9.6 Applications of HRI
  • 9.6.1 HRI Application in Industry
  • 9.6.2 HRI in Rehabilitation and Medical
  • 9.6.3 HRI in Agriculture
  • 9.6.4 Robochains
  • 9.7 Transactions between Robots and Human Beings
  • 9.7.1 A Ledger that is Decentralized, Immutable, and Publicly Verifiable
  • 9.7.2 Contracts
  • 9.8 Escrow Services
  • 9.9 Challenges for HRI
  • 9.9.1 Task Dynamic Analysis
  • 9.9.2 Teaching a Robot and Avoiding Unintended Consequences
  • 9.9.3 Connecting Mutual "Mental" Models to Prevent Working in Conflict
  • 9.9.4 Role of Robots in Education.
  • 9.9.5 Lifestyle, Fears, and Human Values
  • 9.10 Discussion and Future Work
  • 9.11 Conclusion
  • References
  • Chapter 10 Secured Automation in Business Processes
  • 10.1 Introduction
  • 10.2 Literature Survey
  • 10.3 Background
  • 10.4 Proposed Model
  • 10.4.1 Disadvantages of Previous System
  • 10.5 Analysis of the Work
  • 10.6 Conclusion
  • References
  • Chapter 11 Future of Business Organizations Based on Robotic Process Automation: A Review
  • 11.1 Introduction
  • 11.2 Literature Review
  • 11.3 Technology: A Need of Robotic Process Automation
  • 11.3.1 Benefits of Robotic Process Automation
  • 11.3.2 Drawbacks of Robotic Process Automation
  • 11.4 Business Enterprise
  • 11.5 Conclusion and Future Scope
  • References
  • Chapter 12 Comparative Overview of FER Methods for Human-Robot Interaction Using Review Analysis
  • 12.1 Introduction
  • 12.2 FER Method Review Based Analysis
  • 12.2.1 AdaBoost Method
  • 12.3 Feature Extraction Techniques
  • 12.3.1 Haar Classifier Method
  • 12.3.2 Geometric-Based Method
  • 12.3.3 Appearance-Based Method
  • 12.4 Conclusion
  • References
  • Chapter 13 Impact of Artificial Intelligence on Medical Science Post Covid 19 Pandemic
  • 13.1 Introduction
  • 13.2 Types of AI Relevant to Healthcare
  • 13.2.1 Machine Learning - Neural Networks and Deep Learning
  • 13.2.2 Natural Language Processing
  • 13.2.3 Rule-Based Expert System
  • 13.2.4 Physical Robots
  • 13.2.5 Robotic Process Automation
  • 13.3 Diagnosis and Treatment Application
  • 13.4 Limitation of Artificial Intelligence in Medical Science
  • 13.4.1 Data Availability
  • 13.4.2 One-Sided Data
  • 13.4.3 Data Preprocessing
  • 13.4.4 Selection of Model
  • 13.4.5 Presenting Biased Model
  • 13.4.6 Fragmented Data
  • 13.4.7 Black Boxes
  • 13.5 The Future of AI in Healthcare
  • 13.6 Conclusion
  • References.
  • Chapter 14 Revolutionizing Modern Automated Technology with WEB 3.0
  • 14.1 Introduction
  • 14.2 What is WEB 3.0: Definitions
  • 14.3 Features &amp
  • Characteristics
  • 14.3.1 Rewarding Cryptocurreny
  • 14.3.2 Interconnection-Exchange &amp
  • Use of Info
  • 14.3.3 Metaverse
  • 14.3.4 Personalization
  • 14.3.5 Semantic Web
  • 14.4 Implementation
  • 14.4.1 The Three Dimensional Web
  • 14.4.2 Decentralized Technology
  • 14.4.3 The Social Web
  • 14.4.4 Prevalent and Omnipresent WEB
  • 14.4.5 Multi-Media Web
  • 14.5 Inventions around Modern Technology
  • 14.5.1 A.I. Powered Search Engine
  • 14.5.2 Touring and Travelling
  • 14.5.3 Gaming Advancements
  • 14.5.4 E-Learning with Virtual Documentary
  • 14.6 Conclusion
  • Acknowledgement
  • References
  • Chapter 15 The Role of Artificial Intelligence, Blockchain, and Internet of Things in Next Generation Machine Based Communication
  • 15.1 Introduction
  • 15.2 Blockchain
  • 15.3 Internet of Things
  • 15.4 Convergence of Blockchain, Internet of Things, and Artificial Intelligence
  • 15.5 Block Chain for Vehicular IoT
  • 15.6 Convergence of IoT with Cyber-Physical Systems
  • 15.7 Conclusion
  • References
  • Chapter 16 Robots, Cyborgs, and Modern Society: Future of Society 5.0
  • 16.1 Introduction
  • 16.2 Comparing Humans, Cyborgs, and Robots
  • 16.3 Some Philosophical Aspects
  • 16.4 Reproduction or Replication
  • 16.5 Future of our Society
  • 16.5.1 Eugenics or Genetic Engineered Humans
  • 16.5.2 Why Do We Need Cyborgs?
  • 16.6 Implications
  • 16.6.1 Opportunity vs Exploitation
  • 16.6.2 Utopia vs Dystopia
  • 16.6.3 Emancipation vs Extermination
  • 16.7 Conclusion
  • References
  • Chapter 17 Security and Privacy of Blockchain-Based Robotics System
  • 17.1 Introduction
  • 17.2 Security and Privacy Concerns
  • 17.2.1 Double Spending
  • 17.2.2 Vulnerable Wallets
  • 17.2.3 Cyber-Attacks
  • 17.2.4 Sybil Attack.
  • 17.2.5 Selfish Mining.