1. Cover
2. Table of Contents
3. Series Page
4. Title Page
5. Copyright Page
6. Preface
7. 1 A Glance View on Cloud Infrastructures Security and Solutions
1. 1.1 Introduction
2. 1.2 Methodology
3. 1.3 Literature Review
4. 1.4 Open Challenges
5. 1.5 Recommendations
6. 1.6 Conclusion
7. Acknowledgments
8. References
8. 2 Artificial Intelligence Effectiveness for Conversational Agents in Healthcare Security
1. 2.1 Introduction
2. 2.2 Types of AI Relevance to Healthcare
3. 2.3 The Future of AI in Healthcare
4. 2.4 Ways of Artificial Intelligence that Will Impact Hearlthcare
5. 2.5 AI Models
6. 2.6 Compare E-Cohort Findings on Wearables and AI in Healthcare
7. 2.7 Ethical Concerns of AI in Healthcare
8. 2.8 Future in Healthcare
9. 2.9 Conclusion
10. References
9. 3 Conversational AI: Security Features, Applications, and Future Scope at Cloud Platform
1. 3.1 Introduction
2. 3.2 How Does Conversational Artificial Intelligence (AI) Work?
3. 3.3 The Conversational AI Components
4. 3.4 Uses of Conversational AI
5. 3.5 Advantages of Conversational AI
6. 3.6 Challenges with Conversational Artificial Intelligence
7. 3.7 Risks Associated with Conversational AI
8. 3.8 Proposed Model for Conversational AI in Cloud Platform
9. 3.9 Conclusion
10. 3.10 Future Work
11. References
10. 4 Unsupervised BERT-Based Granular Sentiment Analysis of Literary Work
1. 4.1 Introduction
2. 4.2 Related Works
3. 4.3 Text Extraction
4. 4.4 Data Preprocessing
, 5. 4.5 Sentiment Analysis on Literary Works
6. 4.6 TF-IDF Vectorizer
7. 4.7 Fine-Grained Sentiment Analysis on Literary Data
8. 4.8 BERT Classifier for Unsupervised Learning
9. 4.9 Conclusion
10. References
11. 5 Extracting and Analyzing Factors to Identify the Malicious Conversational AI Bots on
1. 5.1 Introduction
2. 5.2 Literature Review
3. 5.3 Methods
4. 5.4 Results and Discussion
5. 5.5 Conclusion and Future Direction
6. References
12. 6 Evolution and Adoption of Conversational Artificial Intelligence in the Banking Industry
1. 6.1 Introduction
2. 6.2 Significance of Artificial Intelligence
3. 6.3 Conversational AI in the Indian Banking Industry
4. 6.4 Conversational AI in Use in Various Companies
5. 6.5 Conclusion
6. References
13. 7 Chatbots: Meaning, History, Vulnerabilities, and Possible Defense
1. 7.1 Understanding Chatbots
2. 7.2 History of Chatbots
3. 7.3 Vulnerabilities and Security Concerns of Chatbots
4. 7.4 Possible Defense Strategies
5. 7.5 Conclusion
6. References
14. 8 Conversational Chatbot-Based Security Threats for Business and Educational Platforms
and Their Counter Measures
1. 8.1 Introduction
2. 8.2 Chatbot Applications in Education, Business Management, and Health Sector
3. 8.3 Security and Privacy in Chatbot
4. 8.4 Related Work
5. 8.5 Methodology
6. 8.6 Results and Discussion
7. 8.7 Conclusion
8. References
15. 9 Identification of User Preference Using Human–Computer Interaction Technologies and
Design of Customized Reporting for Business Analytics Using Ranking Consistency Index
1. 9.1 Introduction
2. 9.2 Literature Review
3. 9.3 Design of Metric for Ranking Consistency Index
4. 9.4 Experimentation
5. 9.5 Results and Discussion
6. 9.6 Conclusion
, 7. References
16. 10 Machine Learning for Automatic Speech Recognition
1. 10.1 Introduction
2. 10.2 Related Work
3. 10.3 Methodology
4. 10.4 Results
5. 10.5 Conclusion
6. References
17. 11 Conversational Artificial Intelligence at Industrial Internet of Things
1. 11.1 Introduction
2. 11.2 Technology Components Used in Conversational AI
3. 11.3 Benefits of Conversational AI
4. 11.4 How to Create Conversational AI?
5. 11.5 Conversational Platforms and Internet of Things: Relevance and Benefits
6. 11.6 Internet of Things Status for Industry
7. 11.7 Scope of IIoT in Future
8. 11.8 Work of IIoT with Additional New Innovations
9. 11.9 Conclusion
10. References
18. 12 Performance Analysis of Cloud Hypervisor Using Network Package Workloads in
Virtualization
1. 12.1 Introduction
2. 12.2 A Related Study on Energy Efficiency
3. 12.3 Motivation
4. 12.4 Experiment Methodology and Setup
5. 12.5 Results and Discussion
6. 12.6 Conclusion
7. References
19. 13 Evaluation of Chabot Text Classification Using Machine Learning
1. 13.1 Introduction
2. 13.2 Literature Survey
3. 13.3 Methodology
4. 13.4 Results
5. 13.5 Conclusion
6. References
20. 14 Enhanced Security in Chatbot
1. 14.1 Introduction
2. 14.2 Architecture of Chatbots
3. 14.3 Working of Chatbots
4. 14.4 Background
5. 14.5 Literature Survey
6. 14.6 Proposed System
7. 14.7 Analysis of the Work
8. 14.8 Future Work
9. 14.9 Conclusion
10. References