Computer Science ›› 2022, Vol. 49 ›› Issue (8): 225-229.doi: 10.11896/jsjkx.211100046
• Artificial Intelligence • Previous Articles Next Articles
WANG Yan-song, QIN Yun-chuan, CAI Yu-hui, LI Ken-li
CLC Number:
[1]GRABOWSKI R,SIEGEL B,JOHNSON C,et al.Finance in a Digital World:Technology as a partner,not a threat[J].The Journal of Government Financial Management,2019,67(4):18-23. [2]MCCANN D.Special report:The new digital workforce[R].CFO.Com.Ireland,2018,51(2):24. [3]SUTIPITAKWONG S,JAMSRI P.The Effectiveness of RPA in Fine-tuning Tedious Tasks[C]//2020 6th International Confe-rence on Engineering,Applied Sciences and Technology(ICEAST).2020:1-4. [4]YOKOYAMA H,FUKUI M,MATSUMOTO T,et al.UseGameplay RPA as Programming Materials[C]//2020 Nicograph International(NicoInt).2020:92-92. [5]CHEN D,XIAO D,LI Y,et al.Automatic approval method for financial reimbursement of electric power enterprises based on RPA robot[C]//2021 International Conference on Computer Technology and Media Convergence Design(CTMCD).2021:231-234. [6]WEWERKA J,MICUS C,REICHERT M.Seven Guidelines for Designing the User Interface in Robotic Process Automation[C]//2021 IEEE 25th International Enterprise Distributed Object Computing Workshop(EDOCW).Gold Coast,Australia,2021:157-165. [7]WEWERKA J,DAX S,REICHERT M.A User AcceptanceModel for Robotic Process Automation[C]//2020 IEEE 24th International Enterprise Distributed ObjectComputing Confe-rence(EDOC).Eindhoven,Netherlands,2020:97-106. [8]BAIDYA A.Document Analysis and Classification:A RoboticProcess Automation(RPA)and Machine Learning Approach[C]//2021 4th International Conference on Information and Computer Technologies(ICICT).HI,USA,2021:33-37. [9]LE V C,PHAN D H,VU T D.Robotic Process Automation and Opportunities for Vietnamese Market[C]//Proceedings of the 2019 7th International Conference on Computer and Communications Management(ICCCM 2019).2019:86-90. [10]MAALLA A.Development Prospect and Application Feasibility Analysis of Robotic Process Automation[C]//2019 IEEE 4th Advanced Information Technology,Electronic and Automation Control Conference(IAEAC).2019:2714-2717. [11]KETKAR Y,GAWADE S.Effectiveness of Robotic ProcessAutomation for data mining using UiPath[C]//2021 International Conference on Artificial Intelligence and Smart Systems(ICAIS).2021:864-867. [12]ISSAC R,MUNI R,DESAI K.Delineated Analysis of Robotic Process Automation Tools[C]//2018 Second International Conference on Advances in Electronics,Computers and Communications(ICAECC).2018:1-5. [13]MARTINS P,SÁ F,MORGADO F,et al.Using machine lear-ning for cognitive Robotic Process Automation(RPA)[C]//2020 15th Iberian Conference on Information Systems and Technologies(CISTI).2020:1-6. [14]YATSKIV N,YATSKIV S,VASYLYK A.Method of Robotic Process Automation in Software Testing Using Artificial Intelligence[C]//2020 10th International Conference on Advanced Computer Information Technologies(ACIT).2020:501-504. [15]GUPTA S,RANI S,DIXIT A.Recent Trends in Automation-A study of RPA Development Tools[C]//2019 3rd International Conference on Recent Developments in Control,Automation &Power Engineering(RDCAPE).2019:159-163. [16]YATSKIV S,VOYTYUK I,YATSKIV N,et al.ImprovedMethod of Software Automation Testing Based on the Robotic Process Automation Technology[C]//2019 9th International Conference on Advanced Computer Information Technologies(ACIT).2019:293-296. [17]FENG K,GAO J H.GUI Event Interaction Graph Generation Method Based on Model[J].Computer Science,2013,40(Z6):184-187,203. [18]JASON G,MASAHIKO K.Engineering Software for Accessibility[M]//Microsoft Press.2009:1-7. [19]MORGADOI C,PAIVAAC R.The iMPAcT Tool:Testing UIPatterns on Mobile Applications[C]//2015 30th IEEE/ACM International Conference on Automated Software Engineering(ASE).2015:876-881. [20]COSTA P,PAIVAAC R,NABUCO M.Pattern Based GUI Testing for Mobile Applications[C]//2014 9th International Conference on the Quality of Information and Communications Technology(QUATIC 2014).2014:66-74. [21]HUANG S Q,LIU Y B,HUANG X S.Research on Automatic Testing Technology of Model Driven Development Tools[J].Computer Science,2021,48(6A):568-571. |
[1] | LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang. Overview of Side Channel Analysis Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(5): 296-302. |
[2] | ZHOU Tian-yang, ZENG Zi-yi, ZANG Yi-chao, WANG Qing-xian. Team Cooperative Attack Planning Based on Multi-agent Joint Decision [J]. Computer Science, 2021, 48(5): 301-307. |
[3] | DENG Li, WU Jin-da, LI Ke-xue, LU Ya-kang. SpaRC Algorithm Hyperparameter Optimization Methodology Based on TPE [J]. Computer Science, 2021, 48(2): 70-75. |
[4] | LIU Fang, HONG Mei, WANG Xiao, GUO Dan, YANG Zheng-hui, HUANG Xiao-dan. Performance Analysis of Randoop Automated Unit Test Generation Tool for Java [J]. Computer Science, 2020, 47(9): 24-30. |
[5] | TONG Wei-guo, LI Min-xia, ZHANG Yi-ke. Research on Optimization Algorithm of Deep Learning [J]. Computer Science, 2018, 45(11A): 155-159. |
[6] | MA Wen-zhuo and ZHANG Jie. Design Robot System Based on Stereo Perception Technology Computer Engineering and Applications [J]. Computer Science, 2016, 43(Z6): 563-567. |
[7] | WANG Bin, YUE Peng, LI Jie and ZHANG Li-hai. Research of GIS Second Development Based on OLE Technology [J]. Computer Science, 2016, 43(Z11): 578-580. |
[8] | YAN Cong, JI Mo-xuan and JI Qing-ge. Research on Video Copy Detection Algorithm Based on Spatial-Temporal Domain Informative Fusion [J]. Computer Science, 2016, 43(9): 274-279. |
[9] | WANG Huan-huan, WU Yi-jian and ZHAO Wen-yun. Automatic Detection Method of Cross-browser Web Application [J]. Computer Science, 2015, 42(Z11): 444-449. |
[10] | LAI Xin and HUANG Bang-ju. Research of Information Security Assessment for ATC Automation Systems [J]. Computer Science, 2014, 41(Z6): 474-476. |
[11] | WANG Mao-guang and CAO Huai-hu. Scenario Automation Machine Based Internetware Evolution [J]. Computer Science, 2014, 41(11): 94-98. |
[12] | CHEN Shu,YE Jun-min and ZHANG Fan. Automatic Program Testing with Dynamic Symbolic Execution and Model Learning [J]. Computer Science, 2013, 40(8): 161-164. |
[13] | MA Jun and ZHANG Yi-bin. Security Protocol Based on IEC60870-5-104for Communication in Distribution Automation [J]. Computer Science, 2013, 40(11): 81-84. |
[14] | ZHU Chuang-ying,CHANG Liang,XU Zhou-bo and LI Feng-ying. Model Checking of Temporal Description Logic ALC-LTL Based on Label Büchi Automata [J]. Computer Science, 2013, 40(10): 166-171. |
[15] | . Program Attack and Protection Based on Return-Oriented Programming [J]. Computer Science, 2012, 39(Z6): 1-5. |
|