
Robotic Process Automation
Beschreibung
Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, computer science, electrical engineering, information technology, mechatronics, electronics, bioengineering, and command and software engineering.
Robotics is the study of creating devices that can take the place of people and mimic their behaviors. Mechanical engineering, electrical engineering, information engineering, mechatronics, electronics, bioengineering, computer engineering, control engineering, software engineering, mathematics, and other subjects are all included in robotics. Robots can be employed in a variety of scenarios and for a variety of objectives, but many are now being used in hazardous areas (such as radioactive material inspection, bomb detection, and deactivation), manufacturing operations, or in conditions where humans are unable to live (e.g. in space, underwater, in high heat, and clean up and containment of hazardous materials and radiation). Walking, lifting, speaking, cognition, and any other human activity are all attempted by robots. Many of today's robots are influenced by nature, making bio-inspired robotics a growing area. Defusing explosives, seeking survivors in unstable ruins, and investigating mines and shipwrecks are just a few of the activities that robots are designed to undertake.
This groundbreaking new volume presents a Robotic Process Automation (RPA) software technique that makes it simple to create, deploy, and manage software robots that mimic human movements while dealing with digital systems and software. Software robots can interpret what's on a screen, type the correct keystrokes, traverse systems, locate and extract data, and do a wide variety of predetermined operations, much like people. Software robots can do it quicker and more reliably than humans, without having to stand up and stretch or take a coffee break.
Weitere Details
Weitere Ausgaben
Personen
Romil Rawat, PhD, is an assistant professor at Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore. With over 12 years of teaching experience, he has published numerous papers in scholarly journals and conferences. He has also published book chapters and is a board member on two scientific journals. He has received several research grants and has hosted research events, workshops, and training programs. He also has several patents to his credit.
Rajesh Kumar Chakrawarti, PhD, is a professor and the Dean of the Department of Computer Science & Engineering, Sushila Devi Bansal College, Bansal Group of Institutions, India. He has over 20 years of industry and academic experience and has published over 100 research papers and chapters in books.
Sanjaya Kumar Sarangi, PhD, is an adjunct professor and coordinator at Utkal University, Coordinator and Adjunct Professor, Utkal University, Bhubaneswar, India. He has over 23 years of academic experience and has authored textbooks, book chapters, and papers for journals and conferences. He has been a visiting doctoral fellow at the University of California, USA, and he has more than 30 patents to his credit.
Rahul Choudhary, PhD, is an assistant professor at the Shri Vaishnav Institute of Information Technology, Indore, India. He has over nine years of academic experience.
Anand Singh Gadwal, is an assistant professor at the Shri Vaishnav Institute of Information Technology, Indore, India, has a masters of engineering degree in computer engineering, and is pursuing a PhD in this area.
Vivek Bhardwaj, PhD, is an assistant professor at Manipal University Jaipur, Jaipur, India. He has over eight years of teaching and research experience, has filed five patents, and has published many articles in scientific journals and conferences.
Inhalt
Preface xix
1 A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence 1
Srinivasa Rao Gundu, Charanarur Panem and J. Vijaylaxmi
1.1 Introduction 2
1.2 Aim of the Study 2
1.3 Architecture of Cloud Computing 3
1.4 The Impact of Cloud Computing on Business 4
1.5 The Benefits of Cloud Computing on Business 5
1.6 Generic Security Protocol Features 5
1.7 Cloud Computing Security Protocol Design 6
1.8 AI Based Cloud Security 12
1.9 Various Neuronal Network Architectures and Their Types 14
1.10 Conclusion 15
2 The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space 19
Charanarur Panem, Srinivasa Rao Gundu and J. Vijaylaxmi
2.1 Introduction 20
2.2 Aim of the Study 21
2.3 Motivation for the Study 21
2.4 Detecting the Dark Web 23
2.5 Preventing the Dark Web 24
2.6 Recommendations 28
2.7 Conclusion 30
3 Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning 33
Srinivasa Rao Gundu, Charanarur Panem, J. Vijaylaxmi and Aishvarya Dave
3.1 Introduction 34
3.2 Aim of the Study 35
3.3 Motivation for the Study 35
3.4 Nature of LASERS 37
3.5 Ongoing Laser Weapon Projects 38
3.6 Directed Energy Weapons (DEWs) 39
3.7 LIDAR Guided LASER Weapon System (LaWS)
3.8 Methodology 41
3.9 Conclusion 44
4 An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme - RPA and Machine Learning] 47
Srinivasa Rao Gundu, Charanarur Panem and J. Vijaylaxmi
4.1 Introduction 48
4.2 Aim of the Study 49
4.3 Motivation for the Study 50
4.4 Supervised and Unsupervised Machine Learning for UAVs 50
4.5 Unsupervised Solution 54
4.6 Conclusion 57
4.7 Scope for the Future Work 58
5 FLASH: Web-Form's Logical Analysis & Session Handling Automatic Form Classification and Filling on Surface and Dark Web 61
Ashwini Dalvi, Viraj Thakkar, Smit Moradiya, Aditya Vedpathak, Irfan Siddavatam, Fark Kazi and S.G. Bhirud
5.1 Introduction 62
5.2 Literature Review 63
5.3 How FLASH Offers Better Results 75
5.4 Methodology 75
5.5 Results 84
5.6 Limitations and Future Work 96
5.7 Conclusion 97
6 Performance Analysis of Terahertz Microstrip Antenna Designs: A Review 101
Ram Krishan
6.1 Introduction 101
6.2 Microstrip Antenna Design 103
6.3 Challenges of Terahertz Antenna Development 105
6.4 Antenna Performance Attributes 106
6.5 Comparative Analysis of Microstrip THZ Antennas 107
6.6 Conclusion 109
7 Smart Antenna for Home Automation Systems 113
Manish Varun Yadav and Swati Varun Yadav
7.1 Introduction 114
7.2 Home Automation Antenna Geometry and Robotics Process Automation 115
7.3 Results for Home Automation Smart Antenna 118
7.4 Conclusion 121
8 Special Military Application Antenna for Robotics Process Automation 125
Manish Varun Yadav and Swati Varun Yadav
8.1 Introduction 126
8.2 Special Military Application Antenna for Robotics Process Automation 127
8.3 Results for Special Military Application Antenna 130
8.4 Conclusion 136
9 Blockchain Based Humans-Agents Interactions/Human-Robot Interactions: A Systematic Literature Review and Research Agenda 139
Faizal Kureshi, Dhaval Makwana, Umesh Bodkhe, Sudeep Tanwar and Pooja Chaturvedi
9.1 Introduction 139
9.2 Conceptual Foundation 143
9.3 Motivation 147
9.4 Blockchain and Robotics Overview 148
9.5 Human-Robot Interaction 149
9.6 Applications of HRI 153
9.7 Transactions between Robots and Human Beings 156
9.8 Escrow Services 158
9.9 Challenges for HRI 159
9.10 Discussion and Future Work 161
9.11 Conclusion 163
10 Secured Automation in Business Processes 167
Ambika N.
10.1 Introduction 168
10.2 Literature Survey 169
10.3 Background 174
10.4 Proposed Model 175
10.5 Analysis of the Work 177
10.6 Conclusion 178
11 Future of Business Organizations Based on Robotic Process Automation: A Review 181
P. William, Sonal C. Bhangale, Harshal P. Varade and Santosh Kumar Sharma
11.1 Introduction 182
11.2 Literature Review 182
11.3 Technology: A Need of Robotic Process Automation 185
11.4 Business Enterprise 186
11.5 Conclusion and Future Scope 186
12 Comparative Overview of FER Methods for Human-Robot Interaction Using Review Analysis 189
Jitendra Sheetlani, Mohit Kadwal, Sumanshu Sharma, Sanat Jain and Shrikant Telang
12.1 Introduction 190
12.2 FER Method Review Based Analysis 191
12.4 Conclusion 194
13 Impact of Artificial Intelligence on Medical Science Post Covid 19 Pandemic 197
Yash Aryaman and Amit Kumar Tyagi
13.1 Introduction 198
13.2 Types of AI Relevant to Healthcare 198
13.3 Diagnosis and Treatment Application 201
13.4 Limitation of Artificial Intelligence in Medical Science 203
13.5 The Future of AI in Healthcare 205
13.6 Conclusion 206
14 Revolutionizing Modern Automated Technology with WEB 3.0 211
Shishir Shrivastava and Amit Kumar Tyagi
14.1 Introduction 211
14.2 What is WEB 3.0: Definitions 212
14.3 Features & Characteristics 213
14.4 Implementation 215
14.5 Inventions around Modern Technology 218
14.6 Conclusion 221
15 The Role of Artificial Intelligence, Blockchain, and Internet of Things in Next Generation Machine Based Communication 225
R. Harish, Sanjana Chelat Menon and Amit Kumar Tyagi
15.1 Introduction 226
15.2 Blockchain 227
15.3 Internet of Things 229
15.4 Convergence of Blockchain, Internet of Things, and Artificial Intelligence 231
15.5 Block Chain for Vehicular IoT 235
15.6 Convergence of IoT with Cyber-Physical Systems 236
15.7 Conclusion 238
16 Robots, Cyborgs, and Modern Society: Future of Society 5.0 243
Shashank Sharma, Sanjana Chelat Menon and Amit Kumar Tyagi
16.1 Introduction 244
16.2 Comparing Humans, Cyborgs, and Robots 244
16.3 Some Philosophical Aspects 246
16.4 Reproduction or Replication 246
16.5 Future of our Society 247
16.6 Implications 252
16.7 Conclusion 254
17 Security and Privacy of Blockchain-Based Robotics System 259
Pratham Jaiswal and Amit Kumar Tyagi
17.1 Introduction 260
17.2 Security and Privacy Concerns 262
17.3 Security and Privacy Requirements 263
17.4 Consensus Algorithms 265
17.5 Privacy and Security Techniques 270
17.6 Conclusion 272
18 Digital Footprints: Opportunities and Challenges for Online Robotic Technologies 275
Sudhir Kumar Rathi, Pritam Prasad Lata, Nitin Soni, Sanat Jain and Shrikant Telang
18.1 Introduction 276
18.2 Proposed Methodology 282
18.3 Conclusion 282
19 SOCIAL MEDIA: The 21st Century's Latest Addiction Detracted Using Robotic Technology 285
Sudhir Kumar Rathi, Pritam Prasad Lata and Nitin Soni
19.1 Introduction 286
19.2 Proposed Methodology 286
19.3 Importance and Value of Internet 287
19.4 Effects of Online Addiction on Society 288
19.4.1 Positive Effects of Social Media 289
19.4.2 Negative Effects of Social Media 291
19.5 Challenges to Reduce Social Media Addiction 292
19.6 Challenges Future Impact of Social Media Addiction on Youth 293
19.7 Conclusion 294
20 Future of Digital Work Force in Robotic Process Automation 297
P. William, Vishal M. Tidake, Sandip R. Thorat and Apurv Verma
20.1 Introduction 298
20.2 Robotic Process Automation 301
20.3 Robotic Process Automation Operations 303
20.4 RPA-Operating Model Design 305
20.5 Who is Who in RPA Business? 306
20.6 Conclusion 311
21 Evolutionary Survey on Robotic Process Automation and Artificial Intelligence: Industry 4.0 315
P. William, Siddhartha Choubey, Abha Choubey and Gurpreet Singh Chhabra
21.1 Introduction 316
21.2 Robotic Process Automation 316
21.3 Artificial Intelligence and Industry 4.0 317
21.4 RPA Tools with IA Support 318
21.5 RPA Tools with IA Support 321
21.6 Conclusions 323
22 Advanced Method of Polygraphic Substitution Cipher Using an Automation System for Non-Invertible Matrices Key 329
Devendra Kuril, Manoj Dhawan and Gourav Shrivastava
22.1 Introduction 330
22.2 Significance of Advanced Methods of a Polygraphic Substitution Cipher 331
22.3 Related Work 332
22.4 Proposed Methodology 334
22.5 Exploration 336
22.6 Conclusions 337
23 Intelligence System and Internet of Things (IoT) Based Smart Manufacturing Industries 339
Vinod Mahor, Sadhna Bijrothiya, Ankita Singh, Mandakini Ingle and Divyani Joshi
23.1 Introduction 340
23.2 Development of Artificial Intelligence 340
23.3 AI Evolution from Intelligent Manufacturing to Smart Manufacturing 343
23.4 IM and SM Comparison 346
23.5 Further Smart Manufacturing Development for Industry 4.0 349
23.6 Conclusion 351
24 E-Healthcare Systems Based on Blockchain Technology with Privacy 355
Vinod Mahor and Sadhna Bijrothiya
24.1 Introduction 355
24.2 Blockchains in Healthcare 357
24.3 Regulations and EHR Privacy 359
24.4 Issues with Migration 360
24.5 Blockchains: Unified or Multiple 362
24.6 Formation of a Unanimity 365
24.7 Access Control & Users 367
24.8 Conclusion 368
25 An Intelligent Machine Learning System Based on Blockchain for Smart Health Care 371
Vinod Mahor, Rahul Choudhary, Sadhna Bijrothiya, Jitendra Jatav and Harsh Dubey
25.1 Introduction 371
25.2 Review of Literature 372
25.3 Use of Blockchain in the Healthcare System 373
25.4 Machine Learning Algorithms in the Medical Industry 378
25.5 Blockchain and Artificial Intelligence Solutions 379
25.6 Conclusions 380
26 Industry 4.0 Uses Robotic Methodology in Mechanization Based on Artificial Intelligence 383
Vinod Mahor and Sadhna Bijrothiya
26.1 Introduction 384
26.2 Mechanization of Robotic Processes 384
26.3 Industry 4.0 and Artificial Intelligence 385
26.4 RPM Outfits that Sustenance Artificial Intelligence 386
26.5 Discussion 390
26.6 Conclusions 392
27 RPA Using UiPATH in the Context of Next Generation Automation 395
Shadab Pasha Khan and Rehan Khan
27.1 Introduction 395
27.2 Traditional Approach vs RPA Approach 396
27.3 Related Work 397
27.4 Applications of RPA 398
27.5 Intelligent Process Automation 405
27.6 RPA and Blockchain 411
27.7 Implementation 413
27.8 Conclusion 419
References 419
About the Editors 423
Index 425
1
A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence
Srinivasa Rao Gundu1, Charanarur Panem2* and J. Vijaylaxmi3
1Department of Computer Science, Government Degree College-Sitaphalmandi, Hyderabad, Telangana, India
2School of Cyber Security and Digital Forensic, National Forensic Sciences University, Goa Campus, Goa, India
3PVKK Degree & PG College, Anantapur, Andhra Pradesh, India
Abstract
Since cloud computing is becoming an increasingly vital component of both big and small businesses, ensuring its integrity and confidentiality has emerged as a top priority in this space. There are a few different approaches that may be used to secure the cloud. Techniques are implemented through protocols. The protocols that are used in cloud computing may also be used in other types of security systems, such as authentication systems, mailing systems, and cryptonet systems. Cloud computing has challenges in the areas of security on-demand application resource management, and self-monitoring without delay. These challenges arise because of the massive amount of data that is made accessible via cloud computing. When it comes to improving the capabilities of security and privacy in cloud storage, Artificial Intelligence (AI) and machine learning have the potential to play a pivotal role. Therefore, incorporating methods for machine learning into the cloud that already exists with the potential to give enhanced efficiency.
Keywords: Simple Storage Service (S3), Elastic Compute Cloud (EC2), artificial neural network, cryptography, information and communication technology
1.1 Introduction
When it comes to cloud computing, several factors are working together to speed up its arrival and make it a reality sooner rather than later. Because of the development of more reasonably priced and powerful processors and the software as a service (SaaS) computing architecture, conventional data centres are being transformed into massive computing service pools (MCS). Because of the network's increased capacity and robust and flexible connections, users may now subscribe to high-quality services that employ data and software solely hosted in faraway data centres.
When data is moved to the cloud, users save time and money by not having to worry about maintaining local hardware. Moving data to the cloud is beneficial to users. There are two well-known organizations that provide cloud computing services: Amazon S3 and Amazon Elastic Compute Cloud (EC2) [1].
Additionally, this shift in computing platforms frees local computers from the burden of storing their own data, making it feasible for modern internet-based online services to supply enormous amounts of storage space and computer capabilities that may be customized.
Consequently, the cloud service providers of the users control both the availability and the integrity of the users' data as a direct consequence of this. There are several reasons why cloud computing presents substantial security issues. Data security is one of these issues, which has long been recognized as an important part of service quality. To begin, because users no longer have authority over their data, traditional cryptographic primitives cannot be directly employed in a cloud computing context [2].
It is because of this that cloud storage verification must be done without direct access to all of the data that is stored in the cloud. It becomes increasingly difficult to prove the authenticity of cloud-stored data when you consider the variety of data types that each user has access to, as well as their need for long-term confidence that their data is safe. Second, cloud computing is more than just a third-party data storage facility.
1.2 Aim of the Study
The objective of this project is to examine whether or not Artificial Intelligence (AI) and machine learning can play a major role in enhancing cloud storage facilities in terms of both security and privacy.
1.3 Architecture of Cloud Computing
A cloud computing architecture is a collection of cloud components that are only loosely linked to one another. The two components that may be separated to construct the cloud architecture are the front-end and the back-end.
A network, typically the Internet, serves as the linking mechanism between the system's two ends. Figure 1.1 depicts a graphical representation of cloud computing architecture.
The "front end" of a cloud computing system is the element that interacts with users, or clients. It is made up of the interfaces and programmes needed to access cloud computing platforms, such as a web browser, and its primary component is known as the software stack.
In the background, cloud computing is often referred to as a system's "back end." It has all of the resources necessary to deliver cloud computing services. It includes, among other things, massive amounts of data storage, virtual machines, security measures, services, deployment methods, and servers [3].
Figure 1.1 Cloud computing.
1.4 The Impact of Cloud Computing on Business
In the world of information technology and cloud computing has become indispensable. Despite its popularity, many firms are reluctant to implement and utilize cloud computing for commercial and operational reasons due to uncertainty about its cost and security consequences. The fundamental appeal of cloud computing for organizations is its cost-effective-ness, whereas the most serious concern is security risks. Cloud computing security is a major concern in the workplace. In addition, various critical implications that enterprises should consider while using cloud computing are explored, as well as security methods for avoiding the highlighted cost and security difficulties [4].
Cloud computing has become a widely accepted and ubiquitous paradigm for service-oriented computing in which computer infrastructure and solutions are provided as a service. Through its characteristics (e.g., self-service on-demand, wide network access, resource pooling, and so on), the cloud has revolutionized the abstraction and use of computer infrastructure, making cloud computing popular. Security, on the other hand, is the most pressing issue and worries about cloud computing are growing as we see more and more innovative cloud computing platforms [5].
Cloud services, software, and infrastructure are clearly becoming more popular in the post-COVID-19 environment, since they can be accessed at any time and from any location. Several research projects and advancements have been suggested to address security threats. Nonetheless, new approaches to make the cloud safer have yet to be discovered. The majority of current cloud security approaches do not address the new sorts of security concerns that cloud computing infrastructure may encounter. As a result, they are unable to identify attacks or vulnerabilities that may originate from either the cloud service provider or the customer [6].
Cloud computing is based on the notion of providing all feasible services, such as software, IT infrastructure, and services to clients over the internet. Cloud computing systems are heterogeneous, large-scale groupings of autonomous computers with a flexible computational architecture. This technology is on the rise since it is becoming the preferred option for firms who do not want to deal with system maintenance or a development team in-house. Many companies, including Amazon Web Services (AWS), Google, IBM, Sun Microsystems, Microsoft, and others, are creating effective cloud products and technologies. Customers and the enterprise exchange data through virtual data centres with cloud technologies [7].
Furthermore, just a few previous studies have looked at the many tiers of cloud architecture. This study did an exhaustive assessment on the challenges that the cloud computing infrastructure encounters at various levels due to the relevance of examining such concerns (application, host, network, and data level). It also discusses the current solutions that have been employed to address these concerns. In addition, this report identifies certain outstanding difficulties that need to be addressed as well as future research prospects [8].
The term "cloud computing" may apply to both a platform, as well as a specific kind of application. The data of both users and corporations is kept safe on servers located in the cloud. The term may also apply to applications that may be downloaded from many websites on the internet. Cloud applications are stored on robust servers that are located in large data centres. These servers also host websites and online services. Several businesses in the information technology sector, including Google, Amazon, Microsoft, and others, are developing and marketing products and services that are hosted on the cloud [9].
1.5 The Benefits of Cloud Computing on Business
Cloud computing has various benefits for enterprises, but a few stick out:
Some of the cost advantages include decreased investment on technology infrastructure, lower capital costs, related savings, and convenience savings.
Some of the technological benefits include reducing maintenance, innovating in technology, devising diversity, and so on. Implementation is straightforward, modification is straightforward, and storage is expanded. Advantages for businesses, customization, adaptability,...
Systemvoraussetzungen
Dateiformat: ePUB
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet – also für „fließenden” Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.