Cargando…

Robotic process automation /

ROBOTIC PROCESS AUTOMATION Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, c...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Rawat, Romil (Editor ), Chakrawarti, Rajesh Kumar, Sarangi, Sanjaya Kumar, Choudhary, Rahul, Gadwal, Anand Singh, Bhardwaj, Vivek
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ : Beverly, MA : John Wiley & Sons, Inc. ; Scrivener Publishing LLC, 2023.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Preface
  • Chapter 1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence
  • 1.1 Introduction
  • 1.2 Aim of the Study
  • 1.3 Architecture of Cloud Computing
  • 1.4 The Impact of Cloud Computing on Business
  • 1.5 The Benefits of Cloud Computing on Business
  • 1.6 Generic Security Protocol Features
  • 1.7 Cloud Computing Security Protocol Design
  • 1.7.1 Protocol for File Transfer (FTP)
  • 1.7.2 Local User Authentication Protocol (LUAP)
  • 1.7.3 Protocol for Consumption
  • 1.7.4 Remote User Authentication Protocol
  • 1.7.5 Secure Cloud Transmission Protocol
  • 1.7.6 Protocol for Cloud Trust
  • 1.7.7 Protocol for Secure Single-Sign-On
  • 1.7.8 Secure Session Protocol (SSP)
  • 1.7.9 Protocol for Authorization
  • 1.7.10 Protocol for Key Management
  • 1.8 AI Based Cloud Security
  • 1.8.1 Event Detection and Prevention
  • 1.8.2 Delegate to Automated Technology
  • 1.8.3 Machine Learning Algorithms in Cloud Computing
  • 1.9 Various Neuronal Network Architectures and Their Types
  • 1.10 Conclusion
  • Acknowledgement
  • References
  • Chapter 2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space
  • 2.1 Introduction
  • 2.2 Aim of the Study
  • 2.3 Motivation for the Study
  • 2.4 Detecting the Dark Web
  • 2.5 Preventing the Dark Web
  • 2.6 Recommendations
  • 2.7 Conclusion
  • Acknowledgement
  • References
  • Chapter 3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning
  • 3.1 Introduction
  • 3.2 Aim of the Study
  • 3.3 Motivation for the Study
  • 3.4 Nature of LASERS
  • 3.5 Ongoing Laser Weapon Projects
  • 3.6 Directed Energy Weapons (DEWs)
  • 3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements
  • 3.8 Methodology
  • 3.9 Conclusion
  • Acknowledgement
  • References
  • Chapter 4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme
  • RPA and Machine Learning]
  • 4.1 Introduction
  • 4.2 Aim of the Study
  • 4.3 Motivation for the Study
  • 4.4 Supervised and Unsupervised Machine Learning for UAVs
  • 4.4.1 Supervised Learning Overview
  • 4.4.2 Overview of Unsupervised Learning
  • 4.4.3 Supervised and Unsupervised UAV-Based Solution Problems
  • 4.5 Unsupervised Solution
  • 4.5.1 Estimation of Channel
  • 4.5.2 Detection of UAVs
  • 4.5.3 Imaging for Unmanned Aerial Vehicles
  • 4.6 Conclusion
  • 4.7 Scope for the Future Work
  • Acknowledgement
  • References
  • Chapter 5 FLASH: Web-Form's Logical Analysis & Session Handling Automatic Form Classification and Filling on Surface and Dark Web
  • 5.1 Introduction
  • 5.2 Literature Review
  • 5.2.1 Notable Approaches
  • 5.2.1.1 Crawling the Hidden Web
  • 5.2.1.2 Google's Deep Web Crawl
  • 5.2.1.3 Other Approaches