Conversational Artificial Intelligence |
Autore | Rawat Romil |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2024 |
Descrizione fisica | 1 online resource (799 pages) |
Altri autori (Persone) |
ChakrawartiRajesh Kumar
SarangiSanjaya Kumar VyasPiyush AlamandaMary Sowjanya SrividyaKotagiri SankaranK. Sakthidasan |
ISBN |
1-394-20079-X
1-394-20078-1 1-394-20080-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910830903703321 |
Rawat Romil | ||
Newark : , : John Wiley & Sons, Incorporated, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Robotic Process Automation |
Autore | Rawat Romil |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2023 |
Descrizione fisica | 1 online resource (452 pages) |
Disciplina | 670.42/7 |
Altri autori (Persone) |
ChakrawartiRajesh Kumar
SarangiSanjaya Kumar ChoudharyRahul GadwalAnand Singh BhardwajVivek |
Soggetto topico | Automation |
ISBN |
1-394-16695-8
1-394-16694-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence -- 1.1 Introduction -- 1.2 Aim of the Study -- 1.3 Architecture of Cloud Computing -- 1.4 The Impact of Cloud Computing on Business -- 1.5 The Benefits of Cloud Computing on Business -- 1.6 Generic Security Protocol Features -- 1.7 Cloud Computing Security Protocol Design -- 1.7.1 Protocol for File Transfer (FTP) -- 1.7.2 Local User Authentication Protocol (LUAP) -- 1.7.3 Protocol for Consumption -- 1.7.4 Remote User Authentication Protocol -- 1.7.5 Secure Cloud Transmission Protocol -- 1.7.6 Protocol for Cloud Trust -- 1.7.7 Protocol for Secure Single-Sign-On -- 1.7.8 Secure Session Protocol (SSP) -- 1.7.9 Protocol for Authorization -- 1.7.10 Protocol for Key Management -- 1.8 AI Based Cloud Security -- 1.8.1 Event Detection and Prevention -- 1.8.2 Delegate to Automated Technology -- 1.8.3 Machine Learning Algorithms in Cloud Computing -- 1.9 Various Neuronal Network Architectures and Their Types -- 1.10 Conclusion -- Acknowledgement -- References -- Chapter 2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space -- 2.1 Introduction -- 2.2 Aim of the Study -- 2.3 Motivation for the Study -- 2.4 Detecting the Dark Web -- 2.5 Preventing the Dark Web -- 2.6 Recommendations -- 2.7 Conclusion -- Acknowledgement -- References -- Chapter 3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning -- 3.1 Introduction -- 3.2 Aim of the Study -- 3.3 Motivation for the Study -- 3.4 Nature of LASERS -- 3.5 Ongoing Laser Weapon Projects -- 3.6 Directed Energy Weapons (DEWs) -- 3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements -- 3.8 Methodology.
3.9 Conclusion -- Acknowledgement -- References -- Chapter 4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme - RPA and Machine Learning] -- 4.1 Introduction -- 4.2 Aim of the Study -- 4.3 Motivation for the Study -- 4.4 Supervised and Unsupervised Machine Learning for UAVs -- 4.4.1 Supervised Learning Overview -- 4.4.2 Overview of Unsupervised Learning -- 4.4.3 Supervised and Unsupervised UAV-Based Solution Problems -- 4.5 Unsupervised Solution -- 4.5.1 Estimation of Channel -- 4.5.2 Detection of UAVs -- 4.5.3 Imaging for Unmanned Aerial Vehicles -- 4.6 Conclusion -- 4.7 Scope for the Future Work -- Acknowledgement -- References -- Chapter 5 FLASH: Web-Form's Logical Analysis & -- Session Handling Automatic Form Classification and Filling on Surface and Dark Web -- 5.1 Introduction -- 5.2 Literature Review -- 5.2.1 Notable Approaches -- 5.2.1.1 Crawling the Hidden Web -- 5.2.1.2 Google's Deep Web Crawl -- 5.2.1.3 Other Approaches -- 5.3 How FLASH Offers Better Results -- 5.4 Methodology -- 5.4.1 Form Identification and Field Extraction -- 5.4.1.1 Form Identification -- 5.4.1.2 Extraction of Fields -- 5.4.2 Form HTML Tag Interpretation -- 5.4.2.1 Identification of Form Type -- 5.4.2.2 Identification of Request Method -- 5.4.3 Interpretation of Form Fields -- 5.4.4 Form Classification -- 5.4.5 Generation and Sending of Request with Appropriate Data -- 5.4.5.1 Generation of the Request -- 5.4.5.2 Sending the Request -- 5.5 Results -- 5.5.1 Classification of Forms -- 5.5.2 Dataset -- 5.5.2.1 Manual -- 5.5.2.2 Automated -- 5.5.3 Accuracy Measures -- 5.5.4 Manual Dataset -- 5.5.4.1 Form Classification -- 5.5.4.2 Form Filling -- 5.5.5 Automated Datasets -- 5.5.5.1 Form Classification -- 5.5.5.2 Form Input-Tag Inference -- 5.6 Limitations and Future Work -- 5.6.1 Limitations. 5.6.2 Future Work -- 5.7 Conclusion -- References -- Chapter 6 Performance Analysis of Terahertz Microstrip Antenna Designs: A Review -- 6.1 Introduction -- 6.2 Microstrip Antenna Design -- 6.2.1 Feeding Methods -- 6.3 Challenges of Terahertz Antenna Development -- 6.4 Antenna Performance Attributes -- 6.5 Comparative Analysis of Microstrip THZ Antennas -- 6.6 Conclusion -- References -- Chapter 7 Smart Antenna for Home Automation Systems -- 7.1 Introduction -- 7.2 Home Automation Antenna Geometry and Robotics Process Automation -- 7.3 Results for Home Automation Smart Antenna -- 7.4 Conclusion -- References -- Chapter 8 Special Military Application Antenna for Robotics Process Automation -- 8.1 Introduction -- 8.2 Special Military Application Antenna for Robotics Process Automation -- 8.3 Results for Special Military Application Antenna -- 8.4 Conclusion -- References -- Chapter 9 Blockchain Based Humans-Agents Interactions/Human-Robot Interactions: A Systematic Literature Review and Research Agenda -- 9.1 Introduction -- 9.2 Conceptual Foundation -- 9.2.1 Blockchains -- 9.2.2 Cryptocurrencies -- 9.2.3 Smart Contracts -- 9.2.4 Decentralized Identity -- 9.3 Motivation -- 9.4 Blockchain and Robotics Overview -- 9.5 Human-Robot Interaction -- 9.5.1 Games -- 9.5.2 Commitment Strategies and Conditioning -- 9.6 Applications of HRI -- 9.6.1 HRI Application in Industry -- 9.6.2 HRI in Rehabilitation and Medical -- 9.6.3 HRI in Agriculture -- 9.6.4 Robochains -- 9.7 Transactions between Robots and Human Beings -- 9.7.1 A Ledger that is Decentralized, Immutable, and Publicly Verifiable -- 9.7.2 Contracts -- 9.8 Escrow Services -- 9.9 Challenges for HRI -- 9.9.1 Task Dynamic Analysis -- 9.9.2 Teaching a Robot and Avoiding Unintended Consequences -- 9.9.3 Connecting Mutual "Mental" Models to Prevent Working in Conflict -- 9.9.4 Role of Robots in Education. 9.9.5 Lifestyle, Fears, and Human Values -- 9.10 Discussion and Future Work -- 9.11 Conclusion -- References -- Chapter 10 Secured Automation in Business Processes -- 10.1 Introduction -- 10.2 Literature Survey -- 10.3 Background -- 10.4 Proposed Model -- 10.4.1 Disadvantages of Previous System -- 10.5 Analysis of the Work -- 10.6 Conclusion -- References -- Chapter 11 Future of Business Organizations Based on Robotic Process Automation: A Review -- 11.1 Introduction -- 11.2 Literature Review -- 11.3 Technology: A Need of Robotic Process Automation -- 11.3.1 Benefits of Robotic Process Automation -- 11.3.2 Drawbacks of Robotic Process Automation -- 11.4 Business Enterprise -- 11.5 Conclusion and Future Scope -- References -- Chapter 12 Comparative Overview of FER Methods for Human-Robot Interaction Using Review Analysis -- 12.1 Introduction -- 12.2 FER Method Review Based Analysis -- 12.2.1 AdaBoost Method -- 12.3 Feature Extraction Techniques -- 12.3.1 Haar Classifier Method -- 12.3.2 Geometric-Based Method -- 12.3.3 Appearance-Based Method -- 12.4 Conclusion -- References -- Chapter 13 Impact of Artificial Intelligence on Medical Science Post Covid 19 Pandemic -- 13.1 Introduction -- 13.2 Types of AI Relevant to Healthcare -- 13.2.1 Machine Learning - Neural Networks and Deep Learning -- 13.2.2 Natural Language Processing -- 13.2.3 Rule-Based Expert System -- 13.2.4 Physical Robots -- 13.2.5 Robotic Process Automation -- 13.3 Diagnosis and Treatment Application -- 13.4 Limitation of Artificial Intelligence in Medical Science -- 13.4.1 Data Availability -- 13.4.2 One-Sided Data -- 13.4.3 Data Preprocessing -- 13.4.4 Selection of Model -- 13.4.5 Presenting Biased Model -- 13.4.6 Fragmented Data -- 13.4.7 Black Boxes -- 13.5 The Future of AI in Healthcare -- 13.6 Conclusion -- References. Chapter 14 Revolutionizing Modern Automated Technology with WEB 3.0 -- 14.1 Introduction -- 14.2 What is WEB 3.0: Definitions -- 14.3 Features & -- Characteristics -- 14.3.1 Rewarding Cryptocurreny -- 14.3.2 Interconnection-Exchange & -- Use of Info -- 14.3.3 Metaverse -- 14.3.4 Personalization -- 14.3.5 Semantic Web -- 14.4 Implementation -- 14.4.1 The Three Dimensional Web -- 14.4.2 Decentralized Technology -- 14.4.3 The Social Web -- 14.4.4 Prevalent and Omnipresent WEB -- 14.4.5 Multi-Media Web -- 14.5 Inventions around Modern Technology -- 14.5.1 A.I. Powered Search Engine -- 14.5.2 Touring and Travelling -- 14.5.3 Gaming Advancements -- 14.5.4 E-Learning with Virtual Documentary -- 14.6 Conclusion -- Acknowledgement -- References -- Chapter 15 The Role of Artificial Intelligence, Blockchain, and Internet of Things in Next Generation Machine Based Communication -- 15.1 Introduction -- 15.2 Blockchain -- 15.3 Internet of Things -- 15.4 Convergence of Blockchain, Internet of Things, and Artificial Intelligence -- 15.5 Block Chain for Vehicular IoT -- 15.6 Convergence of IoT with Cyber-Physical Systems -- 15.7 Conclusion -- References -- Chapter 16 Robots, Cyborgs, and Modern Society: Future of Society 5.0 -- 16.1 Introduction -- 16.2 Comparing Humans, Cyborgs, and Robots -- 16.3 Some Philosophical Aspects -- 16.4 Reproduction or Replication -- 16.5 Future of our Society -- 16.5.1 Eugenics or Genetic Engineered Humans -- 16.5.2 Why Do We Need Cyborgs? -- 16.6 Implications -- 16.6.1 Opportunity vs Exploitation -- 16.6.2 Utopia vs Dystopia -- 16.6.3 Emancipation vs Extermination -- 16.7 Conclusion -- References -- Chapter 17 Security and Privacy of Blockchain-Based Robotics System -- 17.1 Introduction -- 17.2 Security and Privacy Concerns -- 17.2.1 Double Spending -- 17.2.2 Vulnerable Wallets -- 17.2.3 Cyber-Attacks -- 17.2.4 Sybil Attack. 17.2.5 Selfish Mining. |
Record Nr. | UNINA-9910830050903321 |
Rawat Romil | ||
Newark : , : John Wiley & Sons, Incorporated, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Robotic Process Automation |
Autore | Rawat Romil |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2023 |
Descrizione fisica | 1 online resource (452 pages) |
Disciplina | 670.42/7 |
Altri autori (Persone) |
ChakrawartiRajesh Kumar
SarangiSanjaya Kumar ChoudharyRahul GadwalAnand Singh BhardwajVivek |
Soggetto topico | Automation |
ISBN |
9781394166954
1394166958 9781394166947 139416694X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence -- 1.1 Introduction -- 1.2 Aim of the Study -- 1.3 Architecture of Cloud Computing -- 1.4 The Impact of Cloud Computing on Business -- 1.5 The Benefits of Cloud Computing on Business -- 1.6 Generic Security Protocol Features -- 1.7 Cloud Computing Security Protocol Design -- 1.7.1 Protocol for File Transfer (FTP) -- 1.7.2 Local User Authentication Protocol (LUAP) -- 1.7.3 Protocol for Consumption -- 1.7.4 Remote User Authentication Protocol -- 1.7.5 Secure Cloud Transmission Protocol -- 1.7.6 Protocol for Cloud Trust -- 1.7.7 Protocol for Secure Single-Sign-On -- 1.7.8 Secure Session Protocol (SSP) -- 1.7.9 Protocol for Authorization -- 1.7.10 Protocol for Key Management -- 1.8 AI Based Cloud Security -- 1.8.1 Event Detection and Prevention -- 1.8.2 Delegate to Automated Technology -- 1.8.3 Machine Learning Algorithms in Cloud Computing -- 1.9 Various Neuronal Network Architectures and Their Types -- 1.10 Conclusion -- Acknowledgement -- References -- Chapter 2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space -- 2.1 Introduction -- 2.2 Aim of the Study -- 2.3 Motivation for the Study -- 2.4 Detecting the Dark Web -- 2.5 Preventing the Dark Web -- 2.6 Recommendations -- 2.7 Conclusion -- Acknowledgement -- References -- Chapter 3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning -- 3.1 Introduction -- 3.2 Aim of the Study -- 3.3 Motivation for the Study -- 3.4 Nature of LASERS -- 3.5 Ongoing Laser Weapon Projects -- 3.6 Directed Energy Weapons (DEWs) -- 3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements -- 3.8 Methodology.
3.9 Conclusion -- Acknowledgement -- References -- Chapter 4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme - RPA and Machine Learning] -- 4.1 Introduction -- 4.2 Aim of the Study -- 4.3 Motivation for the Study -- 4.4 Supervised and Unsupervised Machine Learning for UAVs -- 4.4.1 Supervised Learning Overview -- 4.4.2 Overview of Unsupervised Learning -- 4.4.3 Supervised and Unsupervised UAV-Based Solution Problems -- 4.5 Unsupervised Solution -- 4.5.1 Estimation of Channel -- 4.5.2 Detection of UAVs -- 4.5.3 Imaging for Unmanned Aerial Vehicles -- 4.6 Conclusion -- 4.7 Scope for the Future Work -- Acknowledgement -- References -- Chapter 5 FLASH: Web-Form's Logical Analysis & -- Session Handling Automatic Form Classification and Filling on Surface and Dark Web -- 5.1 Introduction -- 5.2 Literature Review -- 5.2.1 Notable Approaches -- 5.2.1.1 Crawling the Hidden Web -- 5.2.1.2 Google's Deep Web Crawl -- 5.2.1.3 Other Approaches -- 5.3 How FLASH Offers Better Results -- 5.4 Methodology -- 5.4.1 Form Identification and Field Extraction -- 5.4.1.1 Form Identification -- 5.4.1.2 Extraction of Fields -- 5.4.2 Form HTML Tag Interpretation -- 5.4.2.1 Identification of Form Type -- 5.4.2.2 Identification of Request Method -- 5.4.3 Interpretation of Form Fields -- 5.4.4 Form Classification -- 5.4.5 Generation and Sending of Request with Appropriate Data -- 5.4.5.1 Generation of the Request -- 5.4.5.2 Sending the Request -- 5.5 Results -- 5.5.1 Classification of Forms -- 5.5.2 Dataset -- 5.5.2.1 Manual -- 5.5.2.2 Automated -- 5.5.3 Accuracy Measures -- 5.5.4 Manual Dataset -- 5.5.4.1 Form Classification -- 5.5.4.2 Form Filling -- 5.5.5 Automated Datasets -- 5.5.5.1 Form Classification -- 5.5.5.2 Form Input-Tag Inference -- 5.6 Limitations and Future Work -- 5.6.1 Limitations. 5.6.2 Future Work -- 5.7 Conclusion -- References -- Chapter 6 Performance Analysis of Terahertz Microstrip Antenna Designs: A Review -- 6.1 Introduction -- 6.2 Microstrip Antenna Design -- 6.2.1 Feeding Methods -- 6.3 Challenges of Terahertz Antenna Development -- 6.4 Antenna Performance Attributes -- 6.5 Comparative Analysis of Microstrip THZ Antennas -- 6.6 Conclusion -- References -- Chapter 7 Smart Antenna for Home Automation Systems -- 7.1 Introduction -- 7.2 Home Automation Antenna Geometry and Robotics Process Automation -- 7.3 Results for Home Automation Smart Antenna -- 7.4 Conclusion -- References -- Chapter 8 Special Military Application Antenna for Robotics Process Automation -- 8.1 Introduction -- 8.2 Special Military Application Antenna for Robotics Process Automation -- 8.3 Results for Special Military Application Antenna -- 8.4 Conclusion -- References -- Chapter 9 Blockchain Based Humans-Agents Interactions/Human-Robot Interactions: A Systematic Literature Review and Research Agenda -- 9.1 Introduction -- 9.2 Conceptual Foundation -- 9.2.1 Blockchains -- 9.2.2 Cryptocurrencies -- 9.2.3 Smart Contracts -- 9.2.4 Decentralized Identity -- 9.3 Motivation -- 9.4 Blockchain and Robotics Overview -- 9.5 Human-Robot Interaction -- 9.5.1 Games -- 9.5.2 Commitment Strategies and Conditioning -- 9.6 Applications of HRI -- 9.6.1 HRI Application in Industry -- 9.6.2 HRI in Rehabilitation and Medical -- 9.6.3 HRI in Agriculture -- 9.6.4 Robochains -- 9.7 Transactions between Robots and Human Beings -- 9.7.1 A Ledger that is Decentralized, Immutable, and Publicly Verifiable -- 9.7.2 Contracts -- 9.8 Escrow Services -- 9.9 Challenges for HRI -- 9.9.1 Task Dynamic Analysis -- 9.9.2 Teaching a Robot and Avoiding Unintended Consequences -- 9.9.3 Connecting Mutual "Mental" Models to Prevent Working in Conflict -- 9.9.4 Role of Robots in Education. 9.9.5 Lifestyle, Fears, and Human Values -- 9.10 Discussion and Future Work -- 9.11 Conclusion -- References -- Chapter 10 Secured Automation in Business Processes -- 10.1 Introduction -- 10.2 Literature Survey -- 10.3 Background -- 10.4 Proposed Model -- 10.4.1 Disadvantages of Previous System -- 10.5 Analysis of the Work -- 10.6 Conclusion -- References -- Chapter 11 Future of Business Organizations Based on Robotic Process Automation: A Review -- 11.1 Introduction -- 11.2 Literature Review -- 11.3 Technology: A Need of Robotic Process Automation -- 11.3.1 Benefits of Robotic Process Automation -- 11.3.2 Drawbacks of Robotic Process Automation -- 11.4 Business Enterprise -- 11.5 Conclusion and Future Scope -- References -- Chapter 12 Comparative Overview of FER Methods for Human-Robot Interaction Using Review Analysis -- 12.1 Introduction -- 12.2 FER Method Review Based Analysis -- 12.2.1 AdaBoost Method -- 12.3 Feature Extraction Techniques -- 12.3.1 Haar Classifier Method -- 12.3.2 Geometric-Based Method -- 12.3.3 Appearance-Based Method -- 12.4 Conclusion -- References -- Chapter 13 Impact of Artificial Intelligence on Medical Science Post Covid 19 Pandemic -- 13.1 Introduction -- 13.2 Types of AI Relevant to Healthcare -- 13.2.1 Machine Learning - Neural Networks and Deep Learning -- 13.2.2 Natural Language Processing -- 13.2.3 Rule-Based Expert System -- 13.2.4 Physical Robots -- 13.2.5 Robotic Process Automation -- 13.3 Diagnosis and Treatment Application -- 13.4 Limitation of Artificial Intelligence in Medical Science -- 13.4.1 Data Availability -- 13.4.2 One-Sided Data -- 13.4.3 Data Preprocessing -- 13.4.4 Selection of Model -- 13.4.5 Presenting Biased Model -- 13.4.6 Fragmented Data -- 13.4.7 Black Boxes -- 13.5 The Future of AI in Healthcare -- 13.6 Conclusion -- References. Chapter 14 Revolutionizing Modern Automated Technology with WEB 3.0 -- 14.1 Introduction -- 14.2 What is WEB 3.0: Definitions -- 14.3 Features & -- Characteristics -- 14.3.1 Rewarding Cryptocurreny -- 14.3.2 Interconnection-Exchange & -- Use of Info -- 14.3.3 Metaverse -- 14.3.4 Personalization -- 14.3.5 Semantic Web -- 14.4 Implementation -- 14.4.1 The Three Dimensional Web -- 14.4.2 Decentralized Technology -- 14.4.3 The Social Web -- 14.4.4 Prevalent and Omnipresent WEB -- 14.4.5 Multi-Media Web -- 14.5 Inventions around Modern Technology -- 14.5.1 A.I. Powered Search Engine -- 14.5.2 Touring and Travelling -- 14.5.3 Gaming Advancements -- 14.5.4 E-Learning with Virtual Documentary -- 14.6 Conclusion -- Acknowledgement -- References -- Chapter 15 The Role of Artificial Intelligence, Blockchain, and Internet of Things in Next Generation Machine Based Communication -- 15.1 Introduction -- 15.2 Blockchain -- 15.3 Internet of Things -- 15.4 Convergence of Blockchain, Internet of Things, and Artificial Intelligence -- 15.5 Block Chain for Vehicular IoT -- 15.6 Convergence of IoT with Cyber-Physical Systems -- 15.7 Conclusion -- References -- Chapter 16 Robots, Cyborgs, and Modern Society: Future of Society 5.0 -- 16.1 Introduction -- 16.2 Comparing Humans, Cyborgs, and Robots -- 16.3 Some Philosophical Aspects -- 16.4 Reproduction or Replication -- 16.5 Future of our Society -- 16.5.1 Eugenics or Genetic Engineered Humans -- 16.5.2 Why Do We Need Cyborgs? -- 16.6 Implications -- 16.6.1 Opportunity vs Exploitation -- 16.6.2 Utopia vs Dystopia -- 16.6.3 Emancipation vs Extermination -- 16.7 Conclusion -- References -- Chapter 17 Security and Privacy of Blockchain-Based Robotics System -- 17.1 Introduction -- 17.2 Security and Privacy Concerns -- 17.2.1 Double Spending -- 17.2.2 Vulnerable Wallets -- 17.2.3 Cyber-Attacks -- 17.2.4 Sybil Attack. 17.2.5 Selfish Mining. |
Record Nr. | UNINA-9910876640603321 |
Rawat Romil | ||
Newark : , : John Wiley & Sons, Incorporated, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Using Machine Intelligence : Autonomous Vehicles Volume 1 |
Autore | Rawat Romil |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2023 |
Descrizione fisica | 1 online resource (315 pages) |
Altri autori (Persone) |
SowjanyaA. Mary
PatelSyed Imran JaiswalVarshali KhanImran BalaramAllam |
Soggetto genere / forma | Electronic books. |
ISBN |
9781119871972
9781119871958 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910632497703321 |
Rawat Romil | ||
Newark : , : John Wiley & Sons, Incorporated, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Using Machine Intelligence : Autonomous Vehicles Volume 1 |
Autore | Rawat Romil |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2023 |
Descrizione fisica | 1 online resource (315 pages) |
Altri autori (Persone) |
SowjanyaA. Mary
PatelSyed Imran JaiswalVarshali KhanImran BalaramAllam |
ISBN |
1-119-87198-0
1-119-87197-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910643666503321 |
Rawat Romil | ||
Newark : , : John Wiley & Sons, Incorporated, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|