Robotic process automation /
ROBOTIC PROCESS AUTOMATION Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, c...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, NJ : Beverly, MA :
John Wiley & Sons, Inc. ; Scrivener Publishing LLC,
2023.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Preface
- Chapter 1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence
- 1.1 Introduction
- 1.2 Aim of the Study
- 1.3 Architecture of Cloud Computing
- 1.4 The Impact of Cloud Computing on Business
- 1.5 The Benefits of Cloud Computing on Business
- 1.6 Generic Security Protocol Features
- 1.7 Cloud Computing Security Protocol Design
- 1.7.1 Protocol for File Transfer (FTP)
- 1.7.2 Local User Authentication Protocol (LUAP)
- 1.7.3 Protocol for Consumption
- 1.7.4 Remote User Authentication Protocol
- 1.7.5 Secure Cloud Transmission Protocol
- 1.7.6 Protocol for Cloud Trust
- 1.7.7 Protocol for Secure Single-Sign-On
- 1.7.8 Secure Session Protocol (SSP)
- 1.7.9 Protocol for Authorization
- 1.7.10 Protocol for Key Management
- 1.8 AI Based Cloud Security
- 1.8.1 Event Detection and Prevention
- 1.8.2 Delegate to Automated Technology
- 1.8.3 Machine Learning Algorithms in Cloud Computing
- 1.9 Various Neuronal Network Architectures and Their Types
- 1.10 Conclusion
- Acknowledgement
- References
- Chapter 2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space
- 2.1 Introduction
- 2.2 Aim of the Study
- 2.3 Motivation for the Study
- 2.4 Detecting the Dark Web
- 2.5 Preventing the Dark Web
- 2.6 Recommendations
- 2.7 Conclusion
- Acknowledgement
- References
- Chapter 3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning
- 3.1 Introduction
- 3.2 Aim of the Study
- 3.3 Motivation for the Study
- 3.4 Nature of LASERS
- 3.5 Ongoing Laser Weapon Projects
- 3.6 Directed Energy Weapons (DEWs)
- 3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements
- 3.8 Methodology
- 3.9 Conclusion
- Acknowledgement
- References
- Chapter 4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme
- RPA and Machine Learning]
- 4.1 Introduction
- 4.2 Aim of the Study
- 4.3 Motivation for the Study
- 4.4 Supervised and Unsupervised Machine Learning for UAVs
- 4.4.1 Supervised Learning Overview
- 4.4.2 Overview of Unsupervised Learning
- 4.4.3 Supervised and Unsupervised UAV-Based Solution Problems
- 4.5 Unsupervised Solution
- 4.5.1 Estimation of Channel
- 4.5.2 Detection of UAVs
- 4.5.3 Imaging for Unmanned Aerial Vehicles
- 4.6 Conclusion
- 4.7 Scope for the Future Work
- Acknowledgement
- References
- Chapter 5 FLASH: Web-Form's Logical Analysis & Session Handling Automatic Form Classification and Filling on Surface and Dark Web
- 5.1 Introduction
- 5.2 Literature Review
- 5.2.1 Notable Approaches
- 5.2.1.1 Crawling the Hidden Web
- 5.2.1.2 Google's Deep Web Crawl
- 5.2.1.3 Other Approaches