Robotic process automation

Software robots can interpret what's on a screen, type the correct keystrokes, traverse systems, locate and extract data, and do a wide variety of predetermined operations, much like people. Software robots can do it quicker and more reliably than humans, without having to stand up and stretch...

Full description

Bibliographic Details
Other Authors: Rawat, Romil (Editor), Chakrawarti, Rajesh Kumar, Sarangi, Sanjaya Kumar, Choudhary, Rahul
Format: eBook
Language:English
Published: Hoboken, NJ John Wiley & Sons, Inc. 2023
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • 1.7.4 Remote User Authentication Protocol
  • 1.7.5 Secure Cloud Transmission Protocol
  • 1.7.6 Protocol for Cloud Trust
  • 1.7.7 Protocol for Secure Single-Sign-On
  • 1.7.8 Secure Session Protocol (SSP)
  • 1.7.9 Protocol for Authorization
  • 1.7.10 Protocol for Key Management
  • 1.8 AI Based Cloud Security
  • 1.8.1 Event Detection and Prevention
  • 1.8.2 Delegate to Automated Technology
  • 1.8.3 Machine Learning Algorithms in Cloud Computing
  • 1.9 Various Neuronal Network Architectures and Their Types
  • 1.10 Conclusion
  • Acknowledgement
  • References
  • 3.6 Directed Energy Weapons (DEWs)
  • 3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements
  • 3.8 Methodology
  • 3.9 Conclusion
  • Acknowledgement
  • References
  • Chapter 4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme
  • RPA and Machine Learning]
  • 4.1 Introduction
  • 4.2 Aim of the Study
  • 4.3 Motivation for the Study
  • 4.4 Supervised and Unsupervised Machine Learning for UAVs
  • 4.4.1 Supervised Learning Overview
  • 4.4.2 Overview of Unsupervised Learning
  • 4.4.3 Supervised and Unsupervised UAV-Based Solution Problems
  • 4.5 Unsupervised Solution
  • 4.5.1 Estimation of Channel
  • 4.5.2 Detection of UAVs
  • 4.5.3 Imaging for Unmanned Aerial Vehicles
  • 4.6 Conclusion
  • 4.7 Scope for the Future Work
  • Acknowledgement
  • References
  • Chapter 5 FLASH: Web-Form's Logical Analysis & Session Handling Automatic Form Classification and Filling on Surface and Dark Web
  • 5.1 Introduction
  • 5.2 Literature Review
  • 5.2.1 Notable Approaches
  • 5.2.1.1 Crawling the Hidden Web
  • 5.2.1.2 Google's Deep Web Crawl
  • 5.2.1.3 Other Approaches
  • Chapter 2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space
  • 2.1 Introduction
  • 2.2 Aim of the Study
  • 2.3 Motivation for the Study
  • 2.4 Detecting the Dark Web
  • 2.5 Preventing the Dark Web
  • 2.6 Recommendations
  • 2.7 Conclusion
  • Acknowledgement
  • References
  • Chapter 3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning
  • 3.1 Introduction
  • 3.2 Aim of the Study
  • 3.3 Motivation for the Study
  • 3.4 Nature of LASERS
  • 3.5 Ongoing Laser Weapon Projects
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Preface
  • Chapter 1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence
  • 1.1 Introduction
  • 1.2 Aim of the Study
  • 1.3 Architecture of Cloud Computing
  • 1.4 The Impact of Cloud Computing on Business
  • 1.5 The Benefits of Cloud Computing on Business
  • 1.6 Generic Security Protocol Features
  • 1.7 Cloud Computing Security Protocol Design
  • 1.7.1 Protocol for File Transfer (FTP)
  • 1.7.2 Local User Authentication Protocol (LUAP)
  • 1.7.3 Protocol for Consumption