000 08673cam a22005657i 4500
999 _c92877
_d92877
005 20250918092754.0
006 m o d
007 cr cnu---unuuu
008 250918t20232023njum o u000 0 eng d
020 _a9781394166183
020 _a9781394166954
_qelectronic book
020 _a1394166958
_qelectronic book
020 _a9781394166947
_qelectronic book
020 _a139416694X
_qelectronic book
020 _z9781394166183
_qhardcover
020 _z1394166184
_qhardcover
024 7 _a10.1002/9781394166954
_2doi
035 _a(OCoLC)1392346965
_z(OCoLC)1392045521
037 _a9781394166183
_bO'Reilly Media
040 _aEBLCP
_beng
_erda
_cEBLCP
_dYDX
_dOCLCQ
_dYDX
_dDG1
_dOCLCO
_dORMDA
041 _aeng
050 4 _aT59.5
_b.R63 2023
082 0 4 _a670.42/7
_223/eng/20230918
245 0 0 _aRobotic process automation /
_cedited by Romil Rawat... [and 5 others]
264 1 _aHoboken, NJ :
_bJohn Wiley & Sons, Inc. ;
_aBeverly, MA :
_bScrivener Publishing LLC,
_c2023.
264 4 _c©2023.
300 _a1 online resource (452 p.)
336 _atext
_btxt
_2rdacontent.
337 _acomputer
_bc
_2rdamedia.
338 _aonline resource
_bcr
_2rdacarrier.
500 _a5.3 How FLASH Offers Better Results.
505 0 _aCover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence -- 1.1 Introduction -- 1.2 Aim of the Study -- 1.3 Architecture of Cloud Computing -- 1.4 The Impact of Cloud Computing on Business -- 1.5 The Benefits of Cloud Computing on Business -- 1.6 Generic Security Protocol Features -- 1.7 Cloud Computing Security Protocol Design -- 1.7.1 Protocol for File Transfer (FTP) -- 1.7.2 Local User Authentication Protocol (LUAP) -- 1.7.3 Protocol for Consumption.
505 8 _a1.7.4 Remote User Authentication Protocol -- 1.7.5 Secure Cloud Transmission Protocol -- 1.7.6 Protocol for Cloud Trust -- 1.7.7 Protocol for Secure Single-Sign-On -- 1.7.8 Secure Session Protocol (SSP) -- 1.7.9 Protocol for Authorization -- 1.7.10 Protocol for Key Management -- 1.8 AI Based Cloud Security -- 1.8.1 Event Detection and Prevention -- 1.8.2 Delegate to Automated Technology -- 1.8.3 Machine Learning Algorithms in Cloud Computing -- 1.9 Various Neuronal Network Architectures and Their Types -- 1.10 Conclusion -- Acknowledgement -- References.
505 8 _aChapter 2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space -- 2.1 Introduction -- 2.2 Aim of the Study -- 2.3 Motivation for the Study -- 2.4 Detecting the Dark Web -- 2.5 Preventing the Dark Web -- 2.6 Recommendations -- 2.7 Conclusion -- Acknowledgement -- References -- Chapter 3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning -- 3.1 Introduction -- 3.2 Aim of the Study -- 3.3 Motivation for the Study -- 3.4 Nature of LASERS -- 3.5 Ongoing Laser Weapon Projects.
505 8 _a3.6 Directed Energy Weapons (DEWs) -- 3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements -- 3.8 Methodology -- 3.9 Conclusion -- Acknowledgement -- References -- Chapter 4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme -- RPA and Machine Learning] -- 4.1 Introduction -- 4.2 Aim of the Study -- 4.3 Motivation for the Study -- 4.4 Supervised and Unsupervised Machine Learning for UAVs -- 4.4.1 Supervised Learning Overview -- 4.4.2 Overview of Unsupervised Learning.
505 8 _a4.4.3 Supervised and Unsupervised UAV-Based Solution Problems -- 4.5 Unsupervised Solution -- 4.5.1 Estimation of Channel -- 4.5.2 Detection of UAVs -- 4.5.3 Imaging for Unmanned Aerial Vehicles -- 4.6 Conclusion -- 4.7 Scope for the Future Work -- Acknowledgement -- References -- Chapter 5 FLASH: Web-Form's Logical Analysis & Session Handling Automatic Form Classification and Filling on Surface and Dark Web -- 5.1 Introduction -- 5.2 Literature Review -- 5.2.1 Notable Approaches -- 5.2.1.1 Crawling the Hidden Web -- 5.2.1.2 Google's Deep Web Crawl -- 5.2.1.3 Other Approaches.
506 _aAvailable to OhioLINK libraries.
520 _aROBOTIC PROCESS AUTOMATION Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, computer science, electrical engineering, information technology, mechatronics, electronics, bioengineering, and command and software engineering. Robotics is the study of creating devices that can take the place of people and mimic their behaviors. Mechanical engineering, electrical engineering, information engineering, mechatronics, electronics, bioengineering, computer engineering, control engineering, software engineering, mathematics, and other subjects are all included in robotics. Robots can be employed in a variety of scenarios and for a variety of objectives, but many are now being used in hazardous areas (such as radioactive material inspection, bomb detection, and deactivation), manufacturing operations, or in conditions where humans are unable to live (e.g. in space, underwater, in high heat, and clean up and containment of hazardous materials and radiation). Walking, lifting, speaking, cognition, and any other human activity are all attempted by robots. Many of today's robots are influenced by nature, making bio-inspired robotics a growing area. Defusing explosives, seeking survivors in unstable ruins, and investigating mines and shipwrecks are just a few of the activities that robots are designed to undertake. This groundbreaking new volume presents a Robotic Process Automation (RPA) software technique that makes it simple to create, deploy, and manage software robots that mimic human movements while dealing with digital systems and software. Software robots can interpret what's on a screen, type the correct keystrokes, traverse systems, locate and extract data, and do a wide variety of predetermined operations, much like people. Software robots can do it quicker and more reliably than humans, without having to stand up and stretch or take a coffee break.
545 0 _aAbout the Author Romil Rawat, PhD, is an assistant professor at Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore. With over 12 years of teaching experience, he has published numerous papers in scholarly journals and conferences. He has also published book chapters and is a board member on two scientific journals. He has received several research grants and has hosted research events, workshops, and training programs. He also has several patents to his credit. Rajesh Kumar Chakrawarti, PhD, is a professor and the Dean of the Department of Computer Science & Engineering, Sushila Devi Bansal College, Bansal Group of Institutions, India. He has over 20 years of industry and academic experience and has published over 100 research papers and chapters in books. Sanjaya Kumar Sarangi, PhD, is an adjunct professor and coordinator at Utkal University, Coordinator and Adjunct Professor, Utkal University, Bhubaneswar, India. He has over 23 years of academic experience and has authored textbooks, book chapters, and papers for journals and conferences. He has been a visiting doctoral fellow at the University of California, USA, and he has more than 30 patents to his credit. Rahul Choudhary, PhD, is an assistant professor at the Shri Vaishnav Institute of Information Technology, Indore, India. He has over nine years of academic experience. Anand Singh Gadwal, is an assistant professor at the Shri Vaishnav Institute of Information Technology, Indore, India, has a masters of engineering degree in computer engineering, and is pursuing a PhD in this area. Vivek Bhardwaj, PhD, is an assistant professor at Manipal University Jaipur, Jaipur, India. He has over eight years of teaching and research experience, has filed five patents, and has published many articles in scientific journals and conferences.
650 0 _aAutomation.
655 4 _aElectronic books.
700 1 _aRawat, Romil,
_eeditor.
700 1 _aChakrawarti, Rajesh Kumar.
700 1 _aSarangi, Sanjaya Kumar.
700 1 _aChoudhary, Rahul.
700 1 _aGadwal, Anand Singh.
700 1 _aBhardwaj, Vivek.
856 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781394166954
_yFull text is available at Wiley Online Library Click here to view
942 _2ddc
_cER