13063nam 22005773 450 991083005090332120230801080244.01-394-16695-81-394-16694-X10.1002/9781394166954(MiAaPQ)EBC7276515(Au-PeEL)EBL7276515(OCoLC)1392346965(OCoLC-P)1392346965(CaSebORM)9781394166183(EXLCZ)992787868770004120230801d2023 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierRobotic Process AutomationNewark :John Wiley & Sons, Incorporated,2023.©2023.1 online resource (452 pages)5.3 How FLASH Offers Better ResultsPrint version: Rawat, Romil Robotic Process Automation Newark : John Wiley & Sons, Incorporated,c2023 9781394166183 Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence -- 1.1 Introduction -- 1.2 Aim of the Study -- 1.3 Architecture of Cloud Computing -- 1.4 The Impact of Cloud Computing on Business -- 1.5 The Benefits of Cloud Computing on Business -- 1.6 Generic Security Protocol Features -- 1.7 Cloud Computing Security Protocol Design -- 1.7.1 Protocol for File Transfer (FTP) -- 1.7.2 Local User Authentication Protocol (LUAP) -- 1.7.3 Protocol for Consumption -- 1.7.4 Remote User Authentication Protocol -- 1.7.5 Secure Cloud Transmission Protocol -- 1.7.6 Protocol for Cloud Trust -- 1.7.7 Protocol for Secure Single-Sign-On -- 1.7.8 Secure Session Protocol (SSP) -- 1.7.9 Protocol for Authorization -- 1.7.10 Protocol for Key Management -- 1.8 AI Based Cloud Security -- 1.8.1 Event Detection and Prevention -- 1.8.2 Delegate to Automated Technology -- 1.8.3 Machine Learning Algorithms in Cloud Computing -- 1.9 Various Neuronal Network Architectures and Their Types -- 1.10 Conclusion -- Acknowledgement -- References -- Chapter 2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space -- 2.1 Introduction -- 2.2 Aim of the Study -- 2.3 Motivation for the Study -- 2.4 Detecting the Dark Web -- 2.5 Preventing the Dark Web -- 2.6 Recommendations -- 2.7 Conclusion -- Acknowledgement -- References -- Chapter 3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning -- 3.1 Introduction -- 3.2 Aim of the Study -- 3.3 Motivation for the Study -- 3.4 Nature of LASERS -- 3.5 Ongoing Laser Weapon Projects -- 3.6 Directed Energy Weapons (DEWs) -- 3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements -- 3.8 Methodology.3.9 Conclusion -- Acknowledgement -- References -- Chapter 4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme - RPA and Machine Learning] -- 4.1 Introduction -- 4.2 Aim of the Study -- 4.3 Motivation for the Study -- 4.4 Supervised and Unsupervised Machine Learning for UAVs -- 4.4.1 Supervised Learning Overview -- 4.4.2 Overview of Unsupervised Learning -- 4.4.3 Supervised and Unsupervised UAV-Based Solution Problems -- 4.5 Unsupervised Solution -- 4.5.1 Estimation of Channel -- 4.5.2 Detection of UAVs -- 4.5.3 Imaging for Unmanned Aerial Vehicles -- 4.6 Conclusion -- 4.7 Scope for the Future Work -- Acknowledgement -- References -- Chapter 5 FLASH: Web-Form's Logical Analysis &amp -- Session Handling Automatic Form Classification and Filling on Surface and Dark Web -- 5.1 Introduction -- 5.2 Literature Review -- 5.2.1 Notable Approaches -- 5.2.1.1 Crawling the Hidden Web -- 5.2.1.2 Google's Deep Web Crawl -- 5.2.1.3 Other Approaches -- 5.3 How FLASH Offers Better Results -- 5.4 Methodology -- 5.4.1 Form Identification and Field Extraction -- 5.4.1.1 Form Identification -- 5.4.1.2 Extraction of Fields -- 5.4.2 Form HTML Tag Interpretation -- 5.4.2.1 Identification of Form Type -- 5.4.2.2 Identification of Request Method -- 5.4.3 Interpretation of Form Fields -- 5.4.4 Form Classification -- 5.4.5 Generation and Sending of Request with Appropriate Data -- 5.4.5.1 Generation of the Request -- 5.4.5.2 Sending the Request -- 5.5 Results -- 5.5.1 Classification of Forms -- 5.5.2 Dataset -- 5.5.2.1 Manual -- 5.5.2.2 Automated -- 5.5.3 Accuracy Measures -- 5.5.4 Manual Dataset -- 5.5.4.1 Form Classification -- 5.5.4.2 Form Filling -- 5.5.5 Automated Datasets -- 5.5.5.1 Form Classification -- 5.5.5.2 Form Input-Tag Inference -- 5.6 Limitations and Future Work -- 5.6.1 Limitations.5.6.2 Future Work -- 5.7 Conclusion -- References -- Chapter 6 Performance Analysis of Terahertz Microstrip Antenna Designs: A Review -- 6.1 Introduction -- 6.2 Microstrip Antenna Design -- 6.2.1 Feeding Methods -- 6.3 Challenges of Terahertz Antenna Development -- 6.4 Antenna Performance Attributes -- 6.5 Comparative Analysis of Microstrip THZ Antennas -- 6.6 Conclusion -- References -- Chapter 7 Smart Antenna for Home Automation Systems -- 7.1 Introduction -- 7.2 Home Automation Antenna Geometry and Robotics Process Automation -- 7.3 Results for Home Automation Smart Antenna -- 7.4 Conclusion -- References -- Chapter 8 Special Military Application Antenna for Robotics Process Automation -- 8.1 Introduction -- 8.2 Special Military Application Antenna for Robotics Process Automation -- 8.3 Results for Special Military Application Antenna -- 8.4 Conclusion -- References -- Chapter 9 Blockchain Based Humans-Agents Interactions/Human-Robot Interactions: A Systematic Literature Review and Research Agenda -- 9.1 Introduction -- 9.2 Conceptual Foundation -- 9.2.1 Blockchains -- 9.2.2 Cryptocurrencies -- 9.2.3 Smart Contracts -- 9.2.4 Decentralized Identity -- 9.3 Motivation -- 9.4 Blockchain and Robotics Overview -- 9.5 Human-Robot Interaction -- 9.5.1 Games -- 9.5.2 Commitment Strategies and Conditioning -- 9.6 Applications of HRI -- 9.6.1 HRI Application in Industry -- 9.6.2 HRI in Rehabilitation and Medical -- 9.6.3 HRI in Agriculture -- 9.6.4 Robochains -- 9.7 Transactions between Robots and Human Beings -- 9.7.1 A Ledger that is Decentralized, Immutable, and Publicly Verifiable -- 9.7.2 Contracts -- 9.8 Escrow Services -- 9.9 Challenges for HRI -- 9.9.1 Task Dynamic Analysis -- 9.9.2 Teaching a Robot and Avoiding Unintended Consequences -- 9.9.3 Connecting Mutual "Mental" Models to Prevent Working in Conflict -- 9.9.4 Role of Robots in Education.9.9.5 Lifestyle, Fears, and Human Values -- 9.10 Discussion and Future Work -- 9.11 Conclusion -- References -- Chapter 10 Secured Automation in Business Processes -- 10.1 Introduction -- 10.2 Literature Survey -- 10.3 Background -- 10.4 Proposed Model -- 10.4.1 Disadvantages of Previous System -- 10.5 Analysis of the Work -- 10.6 Conclusion -- References -- Chapter 11 Future of Business Organizations Based on Robotic Process Automation: A Review -- 11.1 Introduction -- 11.2 Literature Review -- 11.3 Technology: A Need of Robotic Process Automation -- 11.3.1 Benefits of Robotic Process Automation -- 11.3.2 Drawbacks of Robotic Process Automation -- 11.4 Business Enterprise -- 11.5 Conclusion and Future Scope -- References -- Chapter 12 Comparative Overview of FER Methods for Human-Robot Interaction Using Review Analysis -- 12.1 Introduction -- 12.2 FER Method Review Based Analysis -- 12.2.1 AdaBoost Method -- 12.3 Feature Extraction Techniques -- 12.3.1 Haar Classifier Method -- 12.3.2 Geometric-Based Method -- 12.3.3 Appearance-Based Method -- 12.4 Conclusion -- References -- Chapter 13 Impact of Artificial Intelligence on Medical Science Post Covid 19 Pandemic -- 13.1 Introduction -- 13.2 Types of AI Relevant to Healthcare -- 13.2.1 Machine Learning - Neural Networks and Deep Learning -- 13.2.2 Natural Language Processing -- 13.2.3 Rule-Based Expert System -- 13.2.4 Physical Robots -- 13.2.5 Robotic Process Automation -- 13.3 Diagnosis and Treatment Application -- 13.4 Limitation of Artificial Intelligence in Medical Science -- 13.4.1 Data Availability -- 13.4.2 One-Sided Data -- 13.4.3 Data Preprocessing -- 13.4.4 Selection of Model -- 13.4.5 Presenting Biased Model -- 13.4.6 Fragmented Data -- 13.4.7 Black Boxes -- 13.5 The Future of AI in Healthcare -- 13.6 Conclusion -- References.Chapter 14 Revolutionizing Modern Automated Technology with WEB 3.0 -- 14.1 Introduction -- 14.2 What is WEB 3.0: Definitions -- 14.3 Features &amp -- Characteristics -- 14.3.1 Rewarding Cryptocurreny -- 14.3.2 Interconnection-Exchange &amp -- Use of Info -- 14.3.3 Metaverse -- 14.3.4 Personalization -- 14.3.5 Semantic Web -- 14.4 Implementation -- 14.4.1 The Three Dimensional Web -- 14.4.2 Decentralized Technology -- 14.4.3 The Social Web -- 14.4.4 Prevalent and Omnipresent WEB -- 14.4.5 Multi-Media Web -- 14.5 Inventions around Modern Technology -- 14.5.1 A.I. Powered Search Engine -- 14.5.2 Touring and Travelling -- 14.5.3 Gaming Advancements -- 14.5.4 E-Learning with Virtual Documentary -- 14.6 Conclusion -- Acknowledgement -- References -- Chapter 15 The Role of Artificial Intelligence, Blockchain, and Internet of Things in Next Generation Machine Based Communication -- 15.1 Introduction -- 15.2 Blockchain -- 15.3 Internet of Things -- 15.4 Convergence of Blockchain, Internet of Things, and Artificial Intelligence -- 15.5 Block Chain for Vehicular IoT -- 15.6 Convergence of IoT with Cyber-Physical Systems -- 15.7 Conclusion -- References -- Chapter 16 Robots, Cyborgs, and Modern Society: Future of Society 5.0 -- 16.1 Introduction -- 16.2 Comparing Humans, Cyborgs, and Robots -- 16.3 Some Philosophical Aspects -- 16.4 Reproduction or Replication -- 16.5 Future of our Society -- 16.5.1 Eugenics or Genetic Engineered Humans -- 16.5.2 Why Do We Need Cyborgs? -- 16.6 Implications -- 16.6.1 Opportunity vs Exploitation -- 16.6.2 Utopia vs Dystopia -- 16.6.3 Emancipation vs Extermination -- 16.7 Conclusion -- References -- Chapter 17 Security and Privacy of Blockchain-Based Robotics System -- 17.1 Introduction -- 17.2 Security and Privacy Concerns -- 17.2.1 Double Spending -- 17.2.2 Vulnerable Wallets -- 17.2.3 Cyber-Attacks -- 17.2.4 Sybil Attack.17.2.5 Selfish Mining.ROBOTIC PROCESS AUTOMATION Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, computer science, electrical engineering, information technology, mechatronics, electronics, bioengineering, and command and software engineering. Robotics is the study of creating devices that can take the place of people and mimic their behaviors. Mechanical engineering, electrical engineering, information engineering, mechatronics, electronics, bioengineering, computer engineering, control engineering, software engineering, mathematics, and other subjects are all included in robotics. Robots can be employed in a variety of scenarios and for a variety of objectives, but many are now being used in hazardous areas (such as radioactive material inspection, bomb detection, and deactivation), manufacturing operations, or in conditions where humans are unable to live (e.g. in space, underwater, in high heat, and clean up and containment of hazardous materials and radiation). Walking, lifting, speaking, cognition, and any other human activity are all attempted by robots. Many of today's robots are influenced by nature, making bio-inspired robotics a growing area. Defusing explosives, seeking survivors in unstable ruins, and investigating mines and shipwrecks are just a few of the activities that robots are designed to undertake. This groundbreaking new volume presents a Robotic Process Automation (RPA) software technique that makes it simple to create, deploy, and manage software robots that mimic human movements while dealing with digital systems and software. Software robots can interpret what's on a screen, type the correct keystrokes, traverse systems, locate and extract data, and do a wide variety of predetermined operations, much like people. Software robots can do it quicker and more reliably than humans, without having to stand up and stretch or take a coffee break.AutomationAutomation.670.42/7Rawat Romil1636052Chakrawarti Rajesh Kumar1636053Sarangi Sanjaya Kumar1636054Choudhary Rahul1702783Gadwal Anand Singh1702784Bhardwaj Vivek1702785MiAaPQMiAaPQMiAaPQBOOK9910830050903321Robotic Process Automation4087576UNINA