Search

Browse Subject Areas

For Authors

Submit a Proposal

Robotic Process Automation

Edited by Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Rahul Choudhary, Anand Singh Gadwal, and Vivek Bhardwaj
Copyright: 2023   |   Status: Published
ISBN: 9781394166183  |  Hardcover  |  
447 pages
Price: $225 USD
Add To Cart

One Line Description
Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, computer science, electrical engineering, information technology, mechatronics, electronics, bioengineering, and command and software engineering.

Audience
Information technology (IT) specialists, software developers, government officials, policymakers, scientists, academics, researchers, and students

Description
Robotics is the study of creating devices that can take the place of people and mimic their behaviors. Mechanical engineering, electrical engineering, information engineering, mechatronics, electronics, bioengineering, computer engineering, control engineering, software engineering, mathematics, and other subjects are all included in robotics. Robots can be employed in a variety of scenarios and for a variety of objectives, but many are now being used in hazardous areas (such as radioactive material inspection, bomb detection and deactivation), manufacturing operations, or in conditions where humans are unable to live (e.g. in space, underwater, in high heat, and clean up and containment of hazardous materials and radiation). Walking, lifting, speaking, cognition, and any other human activity are all attempted by robots. Many of today's robots are influenced by nature, making bio-inspired robotics a growing area. Defusing explosives, seeking survivors in unstable ruins, and investigating mines and shipwrecks are just a few of the activities that robots are designed to undertake.

This groundbreaking new volume presents a Robotic Process Automation (RPA) software technique that makes it simple to create, deploy, and manage software robots that mimic human movements while dealing with digital systems and software. Software robots can interpret what's on a screen, type the correct keystrokes, traverse systems, locate and extract data, and do a wide variety of predetermined operations, much like people. Software robots can do it quicker and more reliably than humans, without having to stand up and stretch or take a coffee break.

Covering all of the latest processes, mechanical advances, and elements of robotic process automation, this book, written and edited by an elite team of experts in the field, is the state of the art of the science. Whether for the engineer, scientist, student, or other industry professional, it is a must have for any library.

Marketing
EEE (Institution of Electrical and Electronics Engineers), IET (Institution of Engineering and Technology), (SPIE) International Society for Optics and Photonics, ACM (Association for Computing Machinery), AES (Audio Engineering Society), EPRI (Electric Power Research Institute), American Society of Mechanical Engineers (ASME)

Back to Top
Author / Editor Details
Romil Rawat, PhD, is an assistant professor at Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore. With over 12 years of teaching experience, he has published numerous papers in scholarly journals and conferences. He has also published book chapters and is a board member on two scientific journals. He has received several research grants and has hosted research events, workshops, and training programs. He also has several patents to his credit.

Rajesh Kumar Chakrawarti, PhD, is a professor and the Dean of the Department of Computer Science & Engineering, Sushila Devi Bansal College, Bansal Group of Institutions, India. He has over 20 years of industry and academic experience and has published over 100 research papers and chapters in books.

Sanjaya Kumar Sarangi, PhD, is an adjunct professor and coordinator at Utkal University, Coordinator and Adjunct Professor , Utkal University, Bhubaneswar, India. He has over 23 years of academic experience and has authored textbooks, book chapters, and papers for journals and conferences. He has been a visiting doctoral fellow at the University of California, USA, and he has more than 30 patents to his credit.

Rahul Choudhary, PhD, is an assistant professor at the Shri Vaishnav Institute of Information Technology, Indore, India. He has over nine years of academic experience.

Anand Singh Gadwal, is an assistant professor at the Shri Vaishnav Institute of Information Technology, Indore, India, has a masters of engineering degree in computer engineering, and is pursuing a PhD in this area.

Back to Top

Table of Contents
Preface
1. A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence

Srinivasa Rao Gundu, Charanarur Panem and J. Vijaylaxmi
1.1 Introduction
1.2 Aim of the Study
1.3 Architecture of Cloud Computing
1.4 The Impact of Cloud Computing on Business
1.5 The Benefits of Cloud Computing on Business
1.6 Generic Security Protocol Features
1.7 Cloud Computing Security Protocol Design
1.7.1 Protocol for File Transfer (FTP)
1.7.2 Local User Authentication Protocol (LUAP)
1.7.3 Protocol for Consumption
1.7.4 Remote User Authentication Protocol
1.7.5 Secure Cloud Transmission Protocol
1.7.6 Protocol for Cloud Trust
1.7.7 Protocol for Secure Single-Sign-On
1.7.8 Secure Session Protocol (SSP)
1.7.9 Protocol for Authorization
1.7.10 Protocol for Key Management
1.8 AI Based Cloud Security
1.8.1 Event Detection and Prevention
1.8.2 Delegate to Automated Technology
1.8.3 Machine Learning Algorithms in Cloud Computing
1.9 Various Neuronal Network Architectures and Their Types
1.10 Conclusion
Acknowledgement
References
2. The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space
Charanarur Panem, Srinivasa Rao Gundu and J. Vijaylaxmi
2.1 Introduction
2.2 Aim of the Study
2.3 Motivation for the Study
2.4 Detecting the Dark Web
2.5 Preventing the Dark Web
2.6 Recommendations
2.7 Conclusion
Acknowledgement
References
3. Advanced Rival Combatant LIDAR-Guided Directed Energy Weapon Application System Using Hybrid Machine Learning
Srinivasa Rao Gundu, Charanarur Panem, J. Vijaylaxmi and Aishvarya Dave
3.1 Introduction
3.2 Aim of the Study
3.3 Motivation for the Study
3.4 Nature of LASERS
3.5 Ongoing Laser Weapon Projects
3.6 Directed Energy Weapons (DEWs)
3.7 LIDAR Guided LASER Weapon System (LaWS) Requirements
3.8 Methodology
3.9 Conclusion
Acknowledgement
References
4. An Impact on Strategical Advancement and Its Analysis of Training the Autonomous Unmanned Aerial Vehicles in Warfare [Theme - RPA and Machine Learning]
Srinivasa Rao Gundu, Charanarur Panem and J. Vijaylaxmi
4.1 Introduction
4.2 Aim of the Study
4.3 Motivation for the Study
4.4 Supervised and Unsupervised Machine Learning for UAVs
4.4.1 Supervised Learning Overview
4.4.2 Overview of Unsupervised Learning
4.4.3 Supervised and Unsupervised UAV-Based Solution Problems
4.5 Unsupervised Solution
4.5.1 Estimation of Channel
4.5.2 Detection of UAVs
4.5.3 Imaging for Unmanned Aerial Vehicles
4.6 Conclusion
4.7 Scope for the Future Work
Acknowledgement
References
5. FLASH: Web-Form’s Logical Analysis & Session Handling Automatic Form Classification and Filling on Surface and Dark Web
Ashwini Dalvi, Viraj Thakkar, Smit Moradiya, Aditya Vedpathak, Irfan Siddavatam, Fark Kazi and S.G. Bhirud
5.1 Introduction
5.2 Literature Review
5.2.1 Notable Approaches
5.2.1.1 Crawling the Hidden Web
5.2.1.2 Google’s Deep Web Crawl
5.2.1.3 Other Approaches
5.3 How FLASH Offers Better Results
5.4 Methodology
5.4.1 Form Identification and Field Extraction
5.4.1.1 Form Identification
5.4.1.2 Extraction of Fields
5.4.2 Form HTML Tag Interpretation
5.4.2.1 Identification of Form Type
5.4.2.2 Identification of Request Method
5.4.3 Interpretation of Form Fields
5.4.4 Form Classification
5.4.5 Generation and Sending of Request with Appropriate Data
5.4.5.1 Generation of the Request
5.4.5.2 Sending the Request
5.5 Results
5.5.1 Classification of Forms
5.5.2 Dataset
5.5.2.1 Manual
5.5.2.2 Automated
5.5.3 Accuracy Measures
5.5.4 Manual Dataset
5.5.4.1 Form Classification
5.5.4.2 Form Filling
5.5.5 Automated Datasets
5.5.5.1 Form Classification
5.5.5.2 Form Input-Tag Inference
5.6 Limitations and Future Work
5.6.1 Limitations
5.6.2 Future Work
5.7 Conclusion
References
6. Performance Analysis of Terahertz Microstrip Antenna Designs: A Review
Ram Krishan
6.1 Introduction
6.2 Microstrip Antenna Design
6.2.1 Feeding Methods
6.3 Challenges of Terahertz Antenna Development
6.4 Antenna Performance Attributes
6.5 Comparative Analysis of Microstrip THZ Antennas
6.6 Conclusion
References
7. Smart Antenna for Home Automation Systems
Manish Varun Yadav and Swati Varun Yadav
7.1 Introduction
7.2 Home Automation Antenna Geometry and Robotics Process Automation
7.3 Results for Home Automation Smart Antenna
7.4 Conclusion
References
8. Special Military Application Antenna for Robotics Process Automation
Manish Varun Yadav and Swati Varun Yadav
8.1 Introduction
8.2 Special Military Application Antenna for Robotics Process Automation
8.3 Results for Special Military Application Antenna
8.4 Conclusion
References
9. Blockchain Based Humans-Agents Interactions/Human-Robot Interactions: A Systematic Literature Review and Research Agenda
Faizal Kureshi, Dhaval Makwana, Umesh Bodkhe, Sudeep Tanwar and Pooja Chaturvedi
9.1 Introduction
9.2 Conceptual Foundation
9.2.1 Blockchains
9.2.2 Cryptocurrencies
9.2.3 Smart Contracts
9.2.4 Decentralized Identity
9.3 Motivation
9.4 Blockchain and Robotics Overview
9.5 Human-Robot Interaction
9.5.1 Games
9.5.2 Commitment Strategies and Conditioning
9.6 Applications of HRI
9.6.1 HRI Application in Industry
9.6.2 HRI in Rehabilitation and Medical
9.6.3 HRI in Agriculture
9.6.4 Robochains
9.7 Transactions between Robots and Human Beings
9.7.1 A Ledger that is Decentralized, Immutable, and Publicly Verifiable
9.7.2 Contracts
9.8 Escrow Services
9.9 Challenges for HRI
9.9.1 Task Dynamic Analysis
9.9.2 Teaching a Robot and Avoiding Unintended Consequences
9.9.3 Connecting Mutual “Mental” Models to Prevent Working in Conflict
9.9.4 Role of Robots in Education
9.9.5 Lifestyle, Fears, and Human Values
9.10 Discussion and Future Work
9.11 Conclusion
References
10. Secured Automation in Business Processes
Ambika N.
10.1 Introduction
10.2 Literature Survey
10.3 Background
10.4 Proposed Model
10.4.1 Disadvantages of Previous System
10.5 Analysis of the Work
10.6 Conclusion
References
11. Future of Business Organizations Based on Robotic Process Automation: A Review
P. William, Sonal C. Bhangale, Harshal P. Varade and Santosh Kumar Sharma
11.1 Introduction
11.2 Literature Review
11.3 Technology: A Need of Robotic Process Automation
11.3.1 Benefits of Robotic Process Automation
11.3.2 Drawbacks of Robotic Process Automation
11.4 Business Enterprise
11.5 Conclusion and Future Scope
References
12. Comparative Overview of FER Methods for Human-Robot Interaction Using Review Analysis
Jitendra Sheetlani, Mohit Kadwal, Sumanshu Sharma, Sanat Jain and Shrikant Telang
12.1 Introduction
12.2 FER Method Review Based Analysis
12.2.1 AdaBoost Method
12.3 Feature Extraction Techniques
12.3.1 Haar Classifier Method
12.3.2 Geometric-Based Method
12.3.3 Appearance-Based Method
12.4 Conclusion
References
13. Impact of Artificial Intelligence on Medical Science Post Covid 19 Pandemic
Yash Aryaman and Amit Kumar Tyagi
13.1 Introduction
13.2 Types of AI Relevant to Healthcare
13.2.1 Machine Learning - Neural Networks and Deep Learning
13.2.2 Natural Language Processing
13.2.3 Rule-Based Expert System
13.2.4 Physical Robots
13.2.5 Robotic Process Automation
13.3 Diagnosis and Treatment Application
13.4 Limitation of Artificial Intelligence in Medical Science
13.4.1 Data Availability
13.4.2 One-Sided Data
13.4.3 Data Preprocessing
13.4.4 Selection of Model
13.4.5 Presenting Biased Model
13.4.6 Fragmented Data
13.4.7 Black Boxes
13.5 The Future of AI in Healthcare
13.6 Conclusion
References
14. Revolutionizing Modern Automated Technology with WEB 3.0
Shishir Shrivastava and Amit Kumar Tyagi
14.1 Introduction
14.2 What is WEB 3.0: Definitions
14.3 Features & Characteristics
14.3.1 Rewarding Cryptocurreny
14.3.2 Interconnection-Exchange & Use of Info
14.3.3 Metaverse
14.3.4 Personalization
14.3.5 Semantic Web
14.4 Implementation
14.4.1 The Three Dimensional Web
14.4.2 Decentralized Technology
14.4.3 The Social Web
14.4.4 Prevalent and Omnipresent WEB
14.4.5 Multi-Media Web
14.5 Inventions around Modern Technology
14.5.1 A.I. Powered Search Engine
14.5.2 Touring and Travelling
14.5.3 Gaming Advancements
14.5.4 E-Learning with Virtual Documentary
14.6 Conclusion
Acknowledgement
References
15. The Role of Artificial Intelligence, Blockchain, and Internet of Things in Next Generation Machine Based Communication
R. Harish, Sanjana Chelat Menon and Amit Kumar Tyagi
15.1 Introduction
15.2 Blockchain
15.3 Internet of Things
15.4 Convergence of Blockchain, Internet of Things, and Artificial Intelligence
15.5 Block Chain for Vehicular IoT
15.6 Convergence of IoT with Cyber-Physical Systems
15.7 Conclusion
References
16. Robots, Cyborgs, and Modern Society: Future of Society 5.0
Shashank Sharma, Sanjana Chelat Menon and Amit Kumar Tyagi
16.1 Introduction
16.2 Comparing Humans, Cyborgs, and Robots
16.3 Some Philosophical Aspects
16.4 Reproduction or Replication
16.5 Future of our Society
16.5.1 Eugenics or Genetic Engineered Humans
16.5.2 Why Do We Need Cyborgs?
16.6 Implications
16.6.1 Opportunity vs Exploitation
16.6.2 Utopia vs Dystopia
16.6.3 Emancipation vs Extermination
16.7 Conclusion
References
17. Security and Privacy of Blockchain-Based Robotics System
Pratham Jaiswal and Amit Kumar Tyagi
17.1 Introduction
17.2 Security and Privacy Concerns
17.2.1 Double Spending
17.2.2 Vulnerable Wallets
17.2.3 Cyber-Attacks
17.2.4 Sybil Attack
17.2.5 Selfish Mining
17.2.6 51 Percent Attacks
17.3 Security and Privacy Requirements
17.3.1 Integrity of Data
17.3.2 Tamper-Resistant Data
17.3.3 Preventing Double-Spending
17.3.4 Anonymous User Identities
17.3.5 Transaction Unlinkability
17.3.6 Transaction Confidentiality
17.3.7 DDoS Attack Resistant
17.3.8 51% Attack Resistant
17.4 Consensus Algorithms
17.4.1 Proof of Work (PoW)
17.4.2 Practical Byzantine Fault Tolerance (pBFT)
17.4.3 Proof of Stake (PoS)
17.4.4 Proof of Burn (PoB)
17.4.5 Proof of Capacity (PoC)
17.5 Privacy and Security Techniques
17.5.1 Change Addresses
17.5.2 Coin Mixing
17.5.3 Ring Signatures
17.5.4 Homomorphic Encryption
17.5.5 Zero-Knowledge Proofs (zk-Proofs)
17.6 Conclusion
References
18. Digital Footprints: Opportunities and Challenges for Online Robotic Technologies
Sudhir Kumar Rathi, Pritam Prasad Lata, Nitin Soni, Sanat Jain and Shrikant Telang
18.1 Introduction
18.1.1 Types of Digital Footprint
18.1.1.1 Active Digital Footprints
18.1.1.2 Passive Digital Footprints
18.1.2 Evolution of Digital Footprint
18.1.3 Managing Digital Footprints
18.1.3.1 Google Alerts
18.1.3.2 Mention
18.1.3.3 Tweet Deck and Hootsuite
18.1.4 Impact of Digital Footprint on Personal Privacy
18.1.4.1 Pros
18.1.4.2 Cons
18.1.5 Robots Reduce Carbon Footprint
18.2 Proposed Methodology
18.3 Conclusion
Acknowledgement
References
19. SOCIAL MEDIA: The 21st Century’s Latest Addiction Detracted Using Robotic Technology
Sudhir Kumar Rathi, Pritam Prasad Lata and Nitin Soni
19.1 Introduction
19.2 Proposed Methodology
19.3 Importance and Value of Internet
19.4 Effects of Online Addiction on Society
19.4.1 Positive Effects of Social Media
19.4.2 Negative Effects of Social Media
19.5 Challenges to Reduce Social Media Addiction
19.6 Challenges Future Impact of Social Media Addiction on Youth
19.7 Conclusion
Acknowledgement
References
20. Future of Digital Work Force in Robotic Process Automation
P. William, Vishal M. Tidake, Sandip R. Thorat and Apurv Verma
20.1 Introduction
20.1.1 Robots
20.1.2 Process
20.1.3 Automation
20.2 Robotic Process Automation
20.3 Robotic Process Automation Operations
20.4 RPA-Operating Model Design
20.4.1 Technologists
20.4.2 Ongoing Support and Maintenance Staff
20.5 Who is Who in RPA Business?
20.6 Conclusion
References
21. Evolutionary Survey on Robotic Process Automation and Artificial Intelligence: Industry 4.0
P. William, Siddhartha Choubey, Abha Choubey and Gurpreet Singh Chhabra
21.1 Introduction
21.2 Robotic Process Automation
21.3 Artificial Intelligence and Industry 4.0
21.4 RPA Tools with IA Support
21.4.1 UiPath
21.4.2 Kofax
21.4.3 WinAutomation
21.4.4 AssistEdge
21.4.5 Automagica
21.5 RPA Tools with IA Support
21.6 Conclusions
References
22. Advanced Method of Polygraphic Substitution Cipher Using an Automation System for Non-Invertible Matrices Key
Devendra Kuril, Manoj Dhawan and Gourav Shrivastava
22.1 Introduction
22.2 Significance of Advanced Methods of a Polygraphic Substitution Cipher
22.3 Related Work
22.4 Proposed Methodology
22.4.1 Proposed Encryption Technique Using Automation System
22.4.2 Proposed Decryption Technique
22.4.3 Planned Advance Codes Regarding Numbers and Some Symbols
22.5 Exploration
22.5.1 Zero Vulnerability Overcome by Automation System
22.5.2 While Used in Noninvertible Matrices
22.6 Conclusions
References
23. Intelligence System and Internet of Things (IoT) Based Smart Manufacturing Industries
Vinod Mahor, Sadhna Bijrothiya, Ankita Singh, Mandakini Ingle and Divyani Joshi
23.1 Introduction
23.2 Development of Artificial Intelligence
23.3 AI Evolution from Intelligent Manufacturing to Smart Manufacturing
23.4 IM and SM Comparison
23.5 Further Smart Manufacturing Development for Industry 4.0
23.6 Conclusion
References
24. E-Healthcare Systems Based on Blockchain Technology with Privacy
Vinod Mahor and Sadhna Bijrothiya
24.1 Introduction
24.2 Blockchains in Healthcare
24.3 Regulations and EHR Privacy
24.4 Issues with Migration
24.5 Blockchains: Unified or Multiple
24.6 Formation of a Unanimity
24.7 Access Control & Users
24.8 Conclusion
References
25. An Intelligent Machine Learning System Based on Blockchain for Smart Health Care
Vinod Mahor, Rahul Choudhary, Sadhna Bijrothiya, Jitendra Jatav and Harsh Dubey
25.1 Introduction
25.2 Review of Literature
25.3 Use of Blockchain in the Healthcare System
25.3.1 Locating and Obtaining Medical Supplies
25.3.2 Storing Medical Information
25.3.3 Disease and Outbreak Tracking
25.3.4 Machine Learning and Artificial Intelligence in the Healthcare System
25.3.5 Machine Learning in the Healthcare System
25.3.6 Oversee Learning
25.3.7 Unsupervised Learning
25.3.8 The Effort Movement
25.4 Machine Learning Algorithms in the Medical Industry
25.4.1 Support Vector Machine
25.4.2 Logistic Regression
25.5 Blockchain and Artificial Intelligence Solutions
25.6 Conclusions
References
26. Industry 4.0 Uses Robotic Methodology in Mechanization Based on Artificial Intelligence
Vinod Mahor and Sadhna Bijrothiya
26.1 Introduction
26.2 Mechanization of Robotic Processes
26.3 Industry 4.0 and Artificial Intelligence
26.4 RPM Outfits that Sustenance Artificial Intelligence
26.4.1 UiPath
26.4.2 Kofax
26.4.3 Wherever Mechanization
26.4.4 Win Mechanization
26.4.5 Assist Edge
26.4.6 Automatic
26.5 Discussion
26.6 Conclusions
References
27. RPA Using UiPATH in the Context of Next Generation Automation
Shadab Pasha Khan and Rehan Khan
27.1 Introduction
27.2 Traditional Approach vs RPA Approach
27.3 Related Work
27.4 Applications of RPA
27.4.1 Role of RPA in Education
27.4.2 RPA in Banking
27.4.3 Role of RPA in Healthcare
27.4.4 Role of RPA in Logistics and Transportation
27.5 Intelligent Process Automation
27.5.1 RPA Security
27.6 RPA and Blockchain
27.7 Implementation
27.7.1 Weather Report of Top 50 Cities Visited by International Visitors
27.7.2 Use Cases
27.7.2.1 Website Scraping
27.7.2.2 Data Migrations
27.7.2.3 Call Centre Operations
27.7.2.4 Compliance Reporting
27.7.2.5 Customer Order Processing
27.7.2.6 Employee Onboarding
27.7.2.7 Credit Card Applications
27.7.2.8 Scheduling Systems
27.8 Conclusion
References
About the Editors
Index


Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page