Computer Science ›› 2022, Vol. 49 ›› Issue (8): 225-229.doi: 10.11896/jsjkx.211100046

• Artificial Intelligence • Previous Articles     Next Articles

Design and Implementation of RPA System Based on UIA Interface

WANG Yan-song, QIN Yun-chuan, CAI Yu-hui, LI Ken-li   

  1. School of Computer Science and Engineering,Hunan University,Changsha 410082,China
  • Received:2021-11-03 Revised:2022-03-14 Published:2022-08-02
  • About author:WANG Yan-song,born in 1997,postgraduate.His main research interests include artificial intelligence and big data processing.
    QIN Yun-chuan,born in 1983,Ph.D,is a member of China Computer Federation.His main research interests include autonomous unmanned systems and high-performance embedded computing.
  • Supported by:
    National Key Research and Development Program of China(2020YFB2104002).

Abstract: Robotic process automation(RPA)is one of the current research hotspots.RPA mainly uses Win32 interface to automate the operation of windows.This method requires to encapsulate the API,which is expensive to develop and can only identify UI elements designed based on Win32 API.At the same time,automation based on Win32 interface needs to simulate keyboard and mouse operations.Because these operations are based on a broadcast message mechanism,the response time is long.This paper proposes a solution for building RPA process automation application based on Microsoft's UIA technology.The solution uses UIA methods to automate UI elements.It can adapt to a wide range of UI program frameworks,including Win32,WPF,QT,Silverlight,etc.,and the development cost is low.At the same time,this method binds the message to the UI element,avoids the inefficient broadcast message mechanism,and improves the execution efficiency of RPA.Experimental results show that the execution time can be shortened by 55.67% on average compared with the keyboard and mouse method.

Key words: Automation, RPA, UIA technology

CLC Number: 

  • TP312
[1]GRABOWSKI R,SIEGEL B,JOHNSON C,et al.Finance in a Digital World:Technology as a partner,not a threat[J].The Journal of Government Financial Management,2019,67(4):18-23.
[2]MCCANN D.Special report:The new digital workforce[R].CFO.Com.Ireland,2018,51(2):24.
[3]SUTIPITAKWONG S,JAMSRI P.The Effectiveness of RPA in Fine-tuning Tedious Tasks[C]//2020 6th International Confe-rence on Engineering,Applied Sciences and Technology(ICEAST).2020:1-4.
[4]YOKOYAMA H,FUKUI M,MATSUMOTO T,et al.UseGameplay RPA as Programming Materials[C]//2020 Nicograph International(NicoInt).2020:92-92.
[5]CHEN D,XIAO D,LI Y,et al.Automatic approval method for financial reimbursement of electric power enterprises based on RPA robot[C]//2021 International Conference on Computer Technology and Media Convergence Design(CTMCD).2021:231-234.
[6]WEWERKA J,MICUS C,REICHERT M.Seven Guidelines for Designing the User Interface in Robotic Process Automation[C]//2021 IEEE 25th International Enterprise Distributed Object Computing Workshop(EDOCW).Gold Coast,Australia,2021:157-165.
[7]WEWERKA J,DAX S,REICHERT M.A User AcceptanceModel for Robotic Process Automation[C]//2020 IEEE 24th International Enterprise Distributed ObjectComputing Confe-rence(EDOC).Eindhoven,Netherlands,2020:97-106.
[8]BAIDYA A.Document Analysis and Classification:A RoboticProcess Automation(RPA)and Machine Learning Approach[C]//2021 4th International Conference on Information and Computer Technologies(ICICT).HI,USA,2021:33-37.
[9]LE V C,PHAN D H,VU T D.Robotic Process Automation and Opportunities for Vietnamese Market[C]//Proceedings of the 2019 7th International Conference on Computer and Communications Management(ICCCM 2019).2019:86-90.
[10]MAALLA A.Development Prospect and Application Feasibility Analysis of Robotic Process Automation[C]//2019 IEEE 4th Advanced Information Technology,Electronic and Automation Control Conference(IAEAC).2019:2714-2717.
[11]KETKAR Y,GAWADE S.Effectiveness of Robotic ProcessAutomation for data mining using UiPath[C]//2021 International Conference on Artificial Intelligence and Smart Systems(ICAIS).2021:864-867.
[12]ISSAC R,MUNI R,DESAI K.Delineated Analysis of Robotic Process Automation Tools[C]//2018 Second International Conference on Advances in Electronics,Computers and Communications(ICAECC).2018:1-5.
[13]MARTINS P,SÁ F,MORGADO F,et al.Using machine lear-ning for cognitive Robotic Process Automation(RPA)[C]//2020 15th Iberian Conference on Information Systems and Technologies(CISTI).2020:1-6.
[14]YATSKIV N,YATSKIV S,VASYLYK A.Method of Robotic Process Automation in Software Testing Using Artificial Intelligence[C]//2020 10th International Conference on Advanced Computer Information Technologies(ACIT).2020:501-504.
[15]GUPTA S,RANI S,DIXIT A.Recent Trends in Automation-A study of RPA Development Tools[C]//2019 3rd International Conference on Recent Developments in Control,Automation &Power Engineering(RDCAPE).2019:159-163.
[16]YATSKIV S,VOYTYUK I,YATSKIV N,et al.ImprovedMethod of Software Automation Testing Based on the Robotic Process Automation Technology[C]//2019 9th International Conference on Advanced Computer Information Technologies(ACIT).2019:293-296.
[17]FENG K,GAO J H.GUI Event Interaction Graph Generation Method Based on Model[J].Computer Science,2013,40(Z6):184-187,203.
[18]JASON G,MASAHIKO K.Engineering Software for Accessibility[M]//Microsoft Press.2009:1-7.
[19]MORGADOI C,PAIVAAC R.The iMPAcT Tool:Testing UIPatterns on Mobile Applications[C]//2015 30th IEEE/ACM International Conference on Automated Software Engineering(ASE).2015:876-881.
[20]COSTA P,PAIVAAC R,NABUCO M.Pattern Based GUI Testing for Mobile Applications[C]//2014 9th International Conference on the Quality of Information and Communications Technology(QUATIC 2014).2014:66-74.
[21]HUANG S Q,LIU Y B,HUANG X S.Research on Automatic Testing Technology of Model Driven Development Tools[J].Computer Science,2021,48(6A):568-571.
[1] LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang. Overview of Side Channel Analysis Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(5): 296-302.
[2] ZHOU Tian-yang, ZENG Zi-yi, ZANG Yi-chao, WANG Qing-xian. Team Cooperative Attack Planning Based on Multi-agent Joint Decision [J]. Computer Science, 2021, 48(5): 301-307.
[3] DENG Li, WU Jin-da, LI Ke-xue, LU Ya-kang. SpaRC Algorithm Hyperparameter Optimization Methodology Based on TPE [J]. Computer Science, 2021, 48(2): 70-75.
[4] LIU Fang, HONG Mei, WANG Xiao, GUO Dan, YANG Zheng-hui, HUANG Xiao-dan. Performance Analysis of Randoop Automated Unit Test Generation Tool for Java [J]. Computer Science, 2020, 47(9): 24-30.
[5] TONG Wei-guo, LI Min-xia, ZHANG Yi-ke. Research on Optimization Algorithm of Deep Learning [J]. Computer Science, 2018, 45(11A): 155-159.
[6] MA Wen-zhuo and ZHANG Jie. Design Robot System Based on Stereo Perception Technology Computer Engineering and Applications [J]. Computer Science, 2016, 43(Z6): 563-567.
[7] WANG Bin, YUE Peng, LI Jie and ZHANG Li-hai. Research of GIS Second Development Based on OLE Technology [J]. Computer Science, 2016, 43(Z11): 578-580.
[8] YAN Cong, JI Mo-xuan and JI Qing-ge. Research on Video Copy Detection Algorithm Based on Spatial-Temporal Domain Informative Fusion [J]. Computer Science, 2016, 43(9): 274-279.
[9] WANG Huan-huan, WU Yi-jian and ZHAO Wen-yun. Automatic Detection Method of Cross-browser Web Application [J]. Computer Science, 2015, 42(Z11): 444-449.
[10] LAI Xin and HUANG Bang-ju. Research of Information Security Assessment for ATC Automation Systems [J]. Computer Science, 2014, 41(Z6): 474-476.
[11] WANG Mao-guang and CAO Huai-hu. Scenario Automation Machine Based Internetware Evolution [J]. Computer Science, 2014, 41(11): 94-98.
[12] CHEN Shu,YE Jun-min and ZHANG Fan. Automatic Program Testing with Dynamic Symbolic Execution and Model Learning [J]. Computer Science, 2013, 40(8): 161-164.
[13] MA Jun and ZHANG Yi-bin. Security Protocol Based on IEC60870-5-104for Communication in Distribution Automation [J]. Computer Science, 2013, 40(11): 81-84.
[14] ZHU Chuang-ying,CHANG Liang,XU Zhou-bo and LI Feng-ying. Model Checking of Temporal Description Logic ALC-LTL Based on Label Büchi Automata [J]. Computer Science, 2013, 40(10): 166-171.
[15] . Program Attack and Protection Based on Return-Oriented Programming [J]. Computer Science, 2012, 39(Z6): 1-5.
Full text



No Suggested Reading articles found!