SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31045 | Volume – 4 | Issue – 4 | May-June 2020 Page 522
Auto Response System for Legal Consultation
Nikita Bhanushali, Shruti Habibkar, Sagar Shah, Amol Dhumal, Radhika Fulzele
Department of Computer Engineering,
Shah and Anchor Kutchhi Engineering College, Mumbai, Maharashtra, India
ABSTRACT
The Auto response system for legal consultationwill providetheknowledgeof
cyber laws. The objective is to implement the legal consultant system service
by using chat-bot Technology. Itwasimplemented based ontheinformationof
the offence, previous records of cyber-crimes andundersectionsofINDIAN IT
ACT 2008 and their penalty all the records are gathered. User will input the
offence then the chat-bot will take the keyword from that offence and search
for the law for that particular offence or crime and it will show the penalties,
sections, and imprisonment for that offence or crime.
KEYWORDS: Cybercrime, cyber law, offenses, IT ACT 200, RNN, Chat-Bot, Tensor
Flow, Android, Firebase, Case studies
How to cite this paper: Nikita Bhanushali
| Shruti Habibkar | Sagar Shah | Amol
Dhumal | Radhika Fulzele "AutoResponse
System for Legal Consultation" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-4, June 2020,
pp.522-525, URL:
www.ijtsrd.com/papers/ijtsrd31045.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
Cyberlaw covers a fairly broad area, encompassing several
subtopics including freedom of expression, access to an
usage of the internet, and online privacy. Generically, cyber
law is referred to as the law of the internet. Created to help
and protect people and organizations on the internet from
malicious people and help to maintain order. An important
aspect of the Auto response system for legal consultantsisto
introduce it in people’s day to day life as we live in a worldof
internet. Cybercrime is one of the most deadly yet
underrated subject to work and even more challenging to
implement. Benefit to society. If someone breaksa cyberlaw
or rule, it will allow another person or organization to take
action against that person or have them sentenced to a
punishment. There are different forms of punishment
depending on the type of cyberlaw you broke, whom you
offended, where you broke the law, anywhere you live. If
you’ve committed a more serious offense such as hacking,
attacking another person or website, or causing another
person or company distress, additional action may be taken
against that person or havethemsentencedtoa punishment.
A Chat-Bot is a computer system, which can interact with
users by using natural language. Usually, it is designed to
serve in a particular domain such as online shopping, online
frequently asked questions, and also assistant system.Users
can easily use it without background knowledge or
experiences [2].
Moreover, Chat-Bot can serve many people at the same time
with the same topic and without getting bored. User will
input the offence then the Chat-Bot will take the keyword
from that offence and search for the law for that particular
offence or crime and it will show the penalties, sections and
imprisonment for that offence or crime. This test results
show the capability of the proposed system. The Auto-
response system for legal consultants is part of the legal
system that deals with the internet, Cyberspace, and their
own legal issues. Moreover, it is used as a guideline for
future improvement and also a guideline for future studies
[3].
The Chat-Bot can be easily implemented in Instant
Messaging (IM), application, oronlinechatsuchas Facebook,
Hangout, and Line by using the provided APIs[2].
2. LITERATURE SURVEY
A Chat-Bot is an Artificial Intelligence(AI)featurethatcanbe
embedded and used through any major messaging
applications that simulate human conversation through
voice commands or text chats or both.
A. Chat-Bot types:
1. Rule-Based ChatBot
2. AI-Based ChatBot
Rule-Based approach: A rule-based system uses rules as the
knowledge representation. These rules are coded into the
system in the form of if-then-else statements. The main idea
of a rule-based system is to capture the knowledge of a
human expert in a specialized domain and embody it within
a computer system.
IJTSRD31045
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31045 | Volume – 4 | Issue – 4 | May-June 2020 Page 523
AI-based approach: AI is a technology that bases on the
human ability to learn by themselves and gain effective
information. This approach allows us to move from tedious
traditional processes to automating intent, making it
possible to manage millions of devices in minutes.[2]
Chat-Bot Utilization forMedical consultantsystem:"MedBot"
is an application developed by Nudtaporn Rosruen and
Twaeesak Samanchuen, which uses Dialogflow. This
application is trained according to symptoms and their
treatments. The Chat-Bot gives proper response to the
particular symptoms with the proper guidance for handling
their disease. It increases service capability and decreases
the operation cost of medical consultant service[1].
Cyber Law and its Usefulness in IIT ACT: Cyberlaw is
important because it touches almost all aspects of
transactions and activities and on involving the internet,
World Wide Web, and cyberspace. Every actionandreaction
in cyberspace has some legal and cyber legal angles.
Any illegal behavior committed by meansof,orinrelationto,
a computer system or network, including such crimes as
illegal possession [and] offering or distributing information
by means of a computer system or network. There are
multiple types of cybercrime, such as Software Piracy,
Pornography, Phishing, E-mail spoofing, and many more[3].
What happens if you break a cyber law?
There are different forms of punishment depending on the
type of cyberlaw you broke, whom you offended, where you
broke the law, and where you live. In many situations,
breaking the rules on a website result in your account
becoming suspended or banned, and your IP addressed
blocked. If you've committed a more serious offense such as
hacking, attacking another person or website, or causing
another person or company distress, additional action may
be taken against you[3],[12].
Overview of the Speech recognition technology:
Speech recognition is the ability of a machine or program to
identify words and phrases in spoken language and convert
them to a machine-readable format.
The development of speech recognition systems is a
multistep process. First, relevantfeaturesare extractedfrom
the speech signal. Second, reference models are developed
using these features. Models are needed for each soundunit.
Third, feature vectors are derived from speech utterances
and are presented to all the reference models. The model,
which gives the highest confidence measure indicates the
identity of the sound unit. The sequence of the identified
sound units is validated using language models. In other
words, language models are used to convert sequence of
sound units into text.
Conceptually, approaches to developing speech recognition
systems fall into two types: template and model-based. In a
template-based approach, the system is initially trained
using known speech patterns. In the model-based systems,
suitable features for each sound unit are extracted from the
training data[5].
B. Related work
As there is no auto-response system for cyber law, so
everything is done manually, and it becomes very difficultto
search for a particular offence or section. Peoples are not
aware of the laws and penalties according to that offence.
There is no Auto response systemisdevelopedforcyberlaw,
but there is an auto response system for the medical
consultant system, and we are trying to make it forthecyber
laws[1].
At this moment, there are many ways to Develop a Chat-Bot
without coding, which makes the development of the Chat-
Bot is simple, convenient, and fast.
Currently, the Chat-Bot is utilized in various fields such as
Education, HealthCare, Airline services[2]. For Education
Chat-Bots are changing the face of education right from
personalizing education, helping people learn new
languages, spaced interval learning, student feedback,
professor assessment, essay scoring,acquainta student with
school culture, and for administrative formalities. For
Medical application, the Chat-Bot For hospitals and clinics,
Chat-Bots has been saving a lotofmoney. Whileonecategory
of Chat-Bots performs tasks for receptionists, nurses, and
interns, another category assists doctors with patient
progress reports, checking in on post-op recoveries,
assessing drug interactions, and so on. It learns common
symptoms and provides recommendations for relevant
resources. For Airline, services Travel bots used by the
airline industry are deployed to send announcements, for
ticketing, facilitate web check-ins, personalized search, and
purchases, provide flight options, and make other travel
arrangements.
The next section shows about design and implementation of
the Auto Response System for Legal Consultation.
3. SYSTEM IMPLEMENTATION
A. System Architecture
An Android Application which will solve the problem and to
provide a digital guide and that application will have a very
specific function that is giving the output of relative offence
and its case study[4].
Input: This output will be reflected when the input is given,
there are two way to give input,
1. Input by text
2. Input by voice
This will be handled and implemented on the android
application(by using the IDE Android Studio)
Database:
1. ONLINE(FIREBASE)
2. OFFLINE(local, cache)
The firebase database is created at the backend to store all
the sentences of previous cases and to retrieve it when
needed. It is also used to update the database for all the
users by updating it centrally. The offline storage is used for
fast loading by creating a small local database and cache
memory when app is running[11].
Speech Recognition: The unknown voice through the
microphone is transformed into an electrical signal on the
input of the identification system, the first after the
pretreatment. The system establishes a voice model
according to the human voice characteristics, analyzes the
input voice signal, and extracts the required features on this
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31045 | Volume – 4 | Issue – 4 | May-June 2020 Page 524
basis. It establishes the required template of the speech
recognition. A computer is used in the recognition process
according to the model of the speech recognitiontocompare
the voice template stored in the computer and the
characteristics of the input voicesignal.Searchandmatching
strategies to identify the optimal range of the input voice
matches the template. According to the definition of this
template through the look-up table can be given the
recognition results of the computer[5].
Technologies: Android Studio App: Android Studio is
Android's official IDE. It is purpose-built for Android to
accelerate your development and helpyoubuildthehighest-
quality apps for every Android device. Android is apowerful
operating system and supports great features such as
Improved incremental Java compilation when using
annotation processors, Single-variant project sync, Delete
unused Android Studio directories, and many more[4].
create android application
import PIP library
executes the final build the .apk file
android studio
Tensor Flow: It is an open-source artificial intelligence
library, using data flow graphs to build models. It allows
developers to create large-scale neural networks withmany
layers. Tensor Flow is mainly used for: Classification,
Perception, Understanding, Discovering, Prediction, and
Creation[6].
FireBase: Firebase is Google's mobile application
development platform that helps you build, improve, and
grow your app. It is a centralized database used to store
data[11].
PIP: pip (package manager) is a de facto standard package-
management system used to install and manage software
packages written in Python[10].
RNN: A recurrent neural network (RNN) is a typeofartificial
neural network commonly used in speech recognition and
natural language processing (NLP). RNNs are used in deep
learning and in the development of models that simulatethe
activity of neurons in the human brain[9].
CNN: A Convolutional neural network (CNN) is a neural
network that has one or more convolutional layers and is
used mainly for image processing, classification,
segmentation, and also for other autocorrelated data. CNN's
have been used for understanding in Natural Language
Processing (NLP) and speech recognition[7].
B. Implementation process
Fig1: Basic Diagram Of Chat-bot
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31045 | Volume – 4 | Issue – 4 | May-June 2020 Page 525
Fig 2: Flow graph
Flow of Auto Response System For Legal Consultation:
Step 1: Take input from the end-user(text/voice) with
respect to cyber-crime and cyber offences.
Step 2: Send the received input from the user as the query to
the server.
Step 3: At the server-side the dialog flow will check for the
existing keywords.
Step 4: If ( keyword is found)
Throw related intents
Send the most accurate sections with its relevant
stored data to the end device.
Else
DEFAULT_INTENT
Default messages
Step 5: Display the information to the end device that is
received from the server.
Step 6: Update the chat in the local database
Step 7: Update on the server.
Step 8: Display the result on the home screen of chat- bot.
4. CONCLUSION
In this work, the development of an auto-response system
for a legal consultation with multiple IT LAWS along with its
offenses and penalties which will be used to fetch from the
database along with the sentencing of previous cases. A
couple of sections, along with their offences are trained to
the Chat-Bot. The Chat-Bot can respond the proper answers
to the user with the proper guidance for handling the cases
threats based on the input inserted via keyboard or voice-
based, offenses automatically reducing all the manual work.
It can be applied to various government area to help solve
pending cases based on cybercrime. This system helps
maximize convenience to the users, increase service
capability, and decrease the operational cost of cyber
lawyers or individual.
5. REFERENCE
[1] Chatbot Utilization for Medical Consultant System -
Nudtaporn Rosruen and Taweesak Samanchuen The
2018 Technology Innovation Management and
Engineering Science International Conference(TIMES-
iCON2018).
[2] Chatbot Testing Using AI Planning - Josip Bozic, Oliver
A. Tazl and Franz Wotawa 2019 IEEE International
Conference on Artificial Intelligence Testing (AITest).
[3] Role of Cyber Law and its Usefulness in Indian IT
Industry 1 st Int’l Conf. on Recent Advances in
Information Technology | RAIT-2012 | .
[4] Developing mobile app of english pronunciation test
using android studio - Rizqi Mutqiyyah, Aliv Faizal
Muhammad 2016 international electronicssymposium
(ies).
[5] Overview of the Speech Recognition Technology -
Jianliang Meng, Junwei Zhang, Haoquan Zhao 2012
Fourth International ConferenceonComputational and
Information Sciences.
[6] Data Classification with Deep Learning using Tensor
flow -- Fatih Ertam Informatics Department Firat
University Elazig,Turkeyfatih.ertam@firat.edu.trGalip
AydÕn Computer Engineering Firat University Elazig,
Turkey gaydin@firat.edu.tr.
[7] Understanding of a Convolutional Neural Network --
Saad ALBAWI , Tareq Abed MOHAMMED and Saad AL-
ZAWI ICET2017, Antalya, Turkey.
[8] A View of Artificial Neural Network -- Manish Mishra
and Monika Srivastava IEEE International Conference
on Advances in Engineering & Technology Research
(ICAETR - 2014), August 01-02, 2014, Dr. Virendra
Swarup Group of Institutions, Unnao, India.
[9] The Prediction of Character based on RecurrentNeural
Network language model-- Zejian Shi, Minyong Shi and
Chunfang li, Beijing, P.R.china.
[10] https://packaging.python.org/tutorials/installing-
packages/
[11] https://firebase.google.com/docs/database
[12] https://sites.google.com/a/prashantmali.com/prashan
tmali/cyber-law-cases

More Related Content

What's hot

Phishing: A Field Experiment
Phishing: A Field ExperimentPhishing: A Field Experiment
Phishing: A Field Experiment
CSCJournals
 
i win presentation
 i win presentation i win presentation
i win presentation
Mr Nyak
 

What's hot (20)

Phishing: A Field Experiment
Phishing: A Field ExperimentPhishing: A Field Experiment
Phishing: A Field Experiment
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
 
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
 
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
 
Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement Computer Forensics: The Emerging Significance to Law Enforcement
Computer Forensics: The Emerging Significance to Law Enforcement
 
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICESVOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
 
Cyber Law and Cyber Crime
Cyber Law and Cyber Crime Cyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
F017513138
F017513138F017513138
F017513138
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber law nepal
Cyber law nepalCyber law nepal
Cyber law nepal
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
A Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System ArchitectureA Trustworthy SMS Based Voting System Architecture
A Trustworthy SMS Based Voting System Architecture
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Content blocking and filtering: A Technical approach to solve Socio/Political...
Content blocking and filtering: A Technical approach to solve Socio/Political...Content blocking and filtering: A Technical approach to solve Socio/Political...
Content blocking and filtering: A Technical approach to solve Socio/Political...
 
i win presentation
 i win presentation i win presentation
i win presentation
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber law by pravin ghosekar
Cyber law by pravin ghosekarCyber law by pravin ghosekar
Cyber law by pravin ghosekar
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
 

Similar to Auto Response System for Legal Consultation

Automated information retrieval and services of graduate school using chatbo...
Automated information retrieval and services of graduate  school using chatbo...Automated information retrieval and services of graduate  school using chatbo...
Automated information retrieval and services of graduate school using chatbo...
IJECEIAES
 
Delivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docxDelivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docx
cuddietheresa
 
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
ijistjournal
 
A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer Program
Aimee Brown
 

Similar to Auto Response System for Legal Consultation (20)

Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)Detecting HTTP Botnet using Artificial Immune System (AIS)
Detecting HTTP Botnet using Artificial Immune System (AIS)
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Automated information retrieval and services of graduate school using chatbo...
Automated information retrieval and services of graduate  school using chatbo...Automated information retrieval and services of graduate  school using chatbo...
Automated information retrieval and services of graduate school using chatbo...
 
AI-based Healthcare Chatbot
AI-based Healthcare ChatbotAI-based Healthcare Chatbot
AI-based Healthcare Chatbot
 
AI CHAT BOT USING SHAN ALGORITHM
AI CHAT BOT USING SHAN ALGORITHMAI CHAT BOT USING SHAN ALGORITHM
AI CHAT BOT USING SHAN ALGORITHM
 
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONA CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATION
 
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...IRJET-  	  An Effective Analysis of Anti Troll System using Artificial Intell...
IRJET- An Effective Analysis of Anti Troll System using Artificial Intell...
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Guarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social NetworkGuarding Against Large-Scale Scrabble In Social Network
Guarding Against Large-Scale Scrabble In Social Network
 
HealthCare ChatBot Using Machine Learning
HealthCare ChatBot Using Machine LearningHealthCare ChatBot Using Machine Learning
HealthCare ChatBot Using Machine Learning
 
Delivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docxDelivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docx
 
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
 
IRJET - Chat-Bot Utilization for Health Consultancy
IRJET - 	  Chat-Bot Utilization for Health ConsultancyIRJET - 	  Chat-Bot Utilization for Health Consultancy
IRJET - Chat-Bot Utilization for Health Consultancy
 
A Research Study On Using A Computer Program
A Research Study On Using A Computer ProgramA Research Study On Using A Computer Program
A Research Study On Using A Computer Program
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Auto Response System for Legal Consultation

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31045 | Volume – 4 | Issue – 4 | May-June 2020 Page 522 Auto Response System for Legal Consultation Nikita Bhanushali, Shruti Habibkar, Sagar Shah, Amol Dhumal, Radhika Fulzele Department of Computer Engineering, Shah and Anchor Kutchhi Engineering College, Mumbai, Maharashtra, India ABSTRACT The Auto response system for legal consultationwill providetheknowledgeof cyber laws. The objective is to implement the legal consultant system service by using chat-bot Technology. Itwasimplemented based ontheinformationof the offence, previous records of cyber-crimes andundersectionsofINDIAN IT ACT 2008 and their penalty all the records are gathered. User will input the offence then the chat-bot will take the keyword from that offence and search for the law for that particular offence or crime and it will show the penalties, sections, and imprisonment for that offence or crime. KEYWORDS: Cybercrime, cyber law, offenses, IT ACT 200, RNN, Chat-Bot, Tensor Flow, Android, Firebase, Case studies How to cite this paper: Nikita Bhanushali | Shruti Habibkar | Sagar Shah | Amol Dhumal | Radhika Fulzele "AutoResponse System for Legal Consultation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-4, June 2020, pp.522-525, URL: www.ijtsrd.com/papers/ijtsrd31045.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION Cyberlaw covers a fairly broad area, encompassing several subtopics including freedom of expression, access to an usage of the internet, and online privacy. Generically, cyber law is referred to as the law of the internet. Created to help and protect people and organizations on the internet from malicious people and help to maintain order. An important aspect of the Auto response system for legal consultantsisto introduce it in people’s day to day life as we live in a worldof internet. Cybercrime is one of the most deadly yet underrated subject to work and even more challenging to implement. Benefit to society. If someone breaksa cyberlaw or rule, it will allow another person or organization to take action against that person or have them sentenced to a punishment. There are different forms of punishment depending on the type of cyberlaw you broke, whom you offended, where you broke the law, anywhere you live. If you’ve committed a more serious offense such as hacking, attacking another person or website, or causing another person or company distress, additional action may be taken against that person or havethemsentencedtoa punishment. A Chat-Bot is a computer system, which can interact with users by using natural language. Usually, it is designed to serve in a particular domain such as online shopping, online frequently asked questions, and also assistant system.Users can easily use it without background knowledge or experiences [2]. Moreover, Chat-Bot can serve many people at the same time with the same topic and without getting bored. User will input the offence then the Chat-Bot will take the keyword from that offence and search for the law for that particular offence or crime and it will show the penalties, sections and imprisonment for that offence or crime. This test results show the capability of the proposed system. The Auto- response system for legal consultants is part of the legal system that deals with the internet, Cyberspace, and their own legal issues. Moreover, it is used as a guideline for future improvement and also a guideline for future studies [3]. The Chat-Bot can be easily implemented in Instant Messaging (IM), application, oronlinechatsuchas Facebook, Hangout, and Line by using the provided APIs[2]. 2. LITERATURE SURVEY A Chat-Bot is an Artificial Intelligence(AI)featurethatcanbe embedded and used through any major messaging applications that simulate human conversation through voice commands or text chats or both. A. Chat-Bot types: 1. Rule-Based ChatBot 2. AI-Based ChatBot Rule-Based approach: A rule-based system uses rules as the knowledge representation. These rules are coded into the system in the form of if-then-else statements. The main idea of a rule-based system is to capture the knowledge of a human expert in a specialized domain and embody it within a computer system. IJTSRD31045
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31045 | Volume – 4 | Issue – 4 | May-June 2020 Page 523 AI-based approach: AI is a technology that bases on the human ability to learn by themselves and gain effective information. This approach allows us to move from tedious traditional processes to automating intent, making it possible to manage millions of devices in minutes.[2] Chat-Bot Utilization forMedical consultantsystem:"MedBot" is an application developed by Nudtaporn Rosruen and Twaeesak Samanchuen, which uses Dialogflow. This application is trained according to symptoms and their treatments. The Chat-Bot gives proper response to the particular symptoms with the proper guidance for handling their disease. It increases service capability and decreases the operation cost of medical consultant service[1]. Cyber Law and its Usefulness in IIT ACT: Cyberlaw is important because it touches almost all aspects of transactions and activities and on involving the internet, World Wide Web, and cyberspace. Every actionandreaction in cyberspace has some legal and cyber legal angles. Any illegal behavior committed by meansof,orinrelationto, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer system or network. There are multiple types of cybercrime, such as Software Piracy, Pornography, Phishing, E-mail spoofing, and many more[3]. What happens if you break a cyber law? There are different forms of punishment depending on the type of cyberlaw you broke, whom you offended, where you broke the law, and where you live. In many situations, breaking the rules on a website result in your account becoming suspended or banned, and your IP addressed blocked. If you've committed a more serious offense such as hacking, attacking another person or website, or causing another person or company distress, additional action may be taken against you[3],[12]. Overview of the Speech recognition technology: Speech recognition is the ability of a machine or program to identify words and phrases in spoken language and convert them to a machine-readable format. The development of speech recognition systems is a multistep process. First, relevantfeaturesare extractedfrom the speech signal. Second, reference models are developed using these features. Models are needed for each soundunit. Third, feature vectors are derived from speech utterances and are presented to all the reference models. The model, which gives the highest confidence measure indicates the identity of the sound unit. The sequence of the identified sound units is validated using language models. In other words, language models are used to convert sequence of sound units into text. Conceptually, approaches to developing speech recognition systems fall into two types: template and model-based. In a template-based approach, the system is initially trained using known speech patterns. In the model-based systems, suitable features for each sound unit are extracted from the training data[5]. B. Related work As there is no auto-response system for cyber law, so everything is done manually, and it becomes very difficultto search for a particular offence or section. Peoples are not aware of the laws and penalties according to that offence. There is no Auto response systemisdevelopedforcyberlaw, but there is an auto response system for the medical consultant system, and we are trying to make it forthecyber laws[1]. At this moment, there are many ways to Develop a Chat-Bot without coding, which makes the development of the Chat- Bot is simple, convenient, and fast. Currently, the Chat-Bot is utilized in various fields such as Education, HealthCare, Airline services[2]. For Education Chat-Bots are changing the face of education right from personalizing education, helping people learn new languages, spaced interval learning, student feedback, professor assessment, essay scoring,acquainta student with school culture, and for administrative formalities. For Medical application, the Chat-Bot For hospitals and clinics, Chat-Bots has been saving a lotofmoney. Whileonecategory of Chat-Bots performs tasks for receptionists, nurses, and interns, another category assists doctors with patient progress reports, checking in on post-op recoveries, assessing drug interactions, and so on. It learns common symptoms and provides recommendations for relevant resources. For Airline, services Travel bots used by the airline industry are deployed to send announcements, for ticketing, facilitate web check-ins, personalized search, and purchases, provide flight options, and make other travel arrangements. The next section shows about design and implementation of the Auto Response System for Legal Consultation. 3. SYSTEM IMPLEMENTATION A. System Architecture An Android Application which will solve the problem and to provide a digital guide and that application will have a very specific function that is giving the output of relative offence and its case study[4]. Input: This output will be reflected when the input is given, there are two way to give input, 1. Input by text 2. Input by voice This will be handled and implemented on the android application(by using the IDE Android Studio) Database: 1. ONLINE(FIREBASE) 2. OFFLINE(local, cache) The firebase database is created at the backend to store all the sentences of previous cases and to retrieve it when needed. It is also used to update the database for all the users by updating it centrally. The offline storage is used for fast loading by creating a small local database and cache memory when app is running[11]. Speech Recognition: The unknown voice through the microphone is transformed into an electrical signal on the input of the identification system, the first after the pretreatment. The system establishes a voice model according to the human voice characteristics, analyzes the input voice signal, and extracts the required features on this
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31045 | Volume – 4 | Issue – 4 | May-June 2020 Page 524 basis. It establishes the required template of the speech recognition. A computer is used in the recognition process according to the model of the speech recognitiontocompare the voice template stored in the computer and the characteristics of the input voicesignal.Searchandmatching strategies to identify the optimal range of the input voice matches the template. According to the definition of this template through the look-up table can be given the recognition results of the computer[5]. Technologies: Android Studio App: Android Studio is Android's official IDE. It is purpose-built for Android to accelerate your development and helpyoubuildthehighest- quality apps for every Android device. Android is apowerful operating system and supports great features such as Improved incremental Java compilation when using annotation processors, Single-variant project sync, Delete unused Android Studio directories, and many more[4]. create android application import PIP library executes the final build the .apk file android studio Tensor Flow: It is an open-source artificial intelligence library, using data flow graphs to build models. It allows developers to create large-scale neural networks withmany layers. Tensor Flow is mainly used for: Classification, Perception, Understanding, Discovering, Prediction, and Creation[6]. FireBase: Firebase is Google's mobile application development platform that helps you build, improve, and grow your app. It is a centralized database used to store data[11]. PIP: pip (package manager) is a de facto standard package- management system used to install and manage software packages written in Python[10]. RNN: A recurrent neural network (RNN) is a typeofartificial neural network commonly used in speech recognition and natural language processing (NLP). RNNs are used in deep learning and in the development of models that simulatethe activity of neurons in the human brain[9]. CNN: A Convolutional neural network (CNN) is a neural network that has one or more convolutional layers and is used mainly for image processing, classification, segmentation, and also for other autocorrelated data. CNN's have been used for understanding in Natural Language Processing (NLP) and speech recognition[7]. B. Implementation process Fig1: Basic Diagram Of Chat-bot
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31045 | Volume – 4 | Issue – 4 | May-June 2020 Page 525 Fig 2: Flow graph Flow of Auto Response System For Legal Consultation: Step 1: Take input from the end-user(text/voice) with respect to cyber-crime and cyber offences. Step 2: Send the received input from the user as the query to the server. Step 3: At the server-side the dialog flow will check for the existing keywords. Step 4: If ( keyword is found) Throw related intents Send the most accurate sections with its relevant stored data to the end device. Else DEFAULT_INTENT Default messages Step 5: Display the information to the end device that is received from the server. Step 6: Update the chat in the local database Step 7: Update on the server. Step 8: Display the result on the home screen of chat- bot. 4. CONCLUSION In this work, the development of an auto-response system for a legal consultation with multiple IT LAWS along with its offenses and penalties which will be used to fetch from the database along with the sentencing of previous cases. A couple of sections, along with their offences are trained to the Chat-Bot. The Chat-Bot can respond the proper answers to the user with the proper guidance for handling the cases threats based on the input inserted via keyboard or voice- based, offenses automatically reducing all the manual work. It can be applied to various government area to help solve pending cases based on cybercrime. This system helps maximize convenience to the users, increase service capability, and decrease the operational cost of cyber lawyers or individual. 5. REFERENCE [1] Chatbot Utilization for Medical Consultant System - Nudtaporn Rosruen and Taweesak Samanchuen The 2018 Technology Innovation Management and Engineering Science International Conference(TIMES- iCON2018). [2] Chatbot Testing Using AI Planning - Josip Bozic, Oliver A. Tazl and Franz Wotawa 2019 IEEE International Conference on Artificial Intelligence Testing (AITest). [3] Role of Cyber Law and its Usefulness in Indian IT Industry 1 st Int’l Conf. on Recent Advances in Information Technology | RAIT-2012 | . [4] Developing mobile app of english pronunciation test using android studio - Rizqi Mutqiyyah, Aliv Faizal Muhammad 2016 international electronicssymposium (ies). [5] Overview of the Speech Recognition Technology - Jianliang Meng, Junwei Zhang, Haoquan Zhao 2012 Fourth International ConferenceonComputational and Information Sciences. [6] Data Classification with Deep Learning using Tensor flow -- Fatih Ertam Informatics Department Firat University Elazig,Turkeyfatih.ertam@firat.edu.trGalip AydÕn Computer Engineering Firat University Elazig, Turkey gaydin@firat.edu.tr. [7] Understanding of a Convolutional Neural Network -- Saad ALBAWI , Tareq Abed MOHAMMED and Saad AL- ZAWI ICET2017, Antalya, Turkey. [8] A View of Artificial Neural Network -- Manish Mishra and Monika Srivastava IEEE International Conference on Advances in Engineering & Technology Research (ICAETR - 2014), August 01-02, 2014, Dr. Virendra Swarup Group of Institutions, Unnao, India. [9] The Prediction of Character based on RecurrentNeural Network language model-- Zejian Shi, Minyong Shi and Chunfang li, Beijing, P.R.china. [10] https://packaging.python.org/tutorials/installing- packages/ [11] https://firebase.google.com/docs/database [12] https://sites.google.com/a/prashantmali.com/prashan tmali/cyber-law-cases