Chat Bots
Chat Bots
Chat Bots
B. CLIENT-SIDE CODE INTERFACE- The quadrant given in the above figure other than the server-side interface
are the client-side interfaces. As for the instances there are three clients connected to the same server. and the
name of each client has also been chosen out by the user itself. the same client’s name is showing in the above
picture. The permission of choosing the nick name Is in the user hand. Hence three clients are connected to the
above server with having their unique port address.
C. CONVERSATION INTERFACE- The chatting or conversation between all the client will be done very smoothly.
The message sent by anyone of the client connected to the same database or server will be broadcasted to each
of the client connected. The massages is broadcasted using the TCP protocol .one may also send the message by
using their voice as we have used voice to text converter library that is the standard library in the python
programming language. this feature is very helpful for the client who have eye issues or are completely blind. In
the same way we will be importing the text to speech converter on the other side of the client for the user those
have ear issues or are the completely deaf by nature. Both the library is the standard library.
III. RESULTS
The overall result of the above application is very secure and smooth. as the clients are easily able to
communicate with their companion clients. and hence the message is broadcasted successfully.
The name of the clients are Sara, Lara and the liquid all are the online users and this is informed by the
application that all three clients has been connected successfully.
The figure 6 shows that the how conversation between the client will be going on. in the above interface sara
has sent the message and the message of sara has been broadcasted to every client connected to the same
server having different client.
The client information will be stored in the server for the further use and future purpose. if client want leave the
chat room for any specific region, then he may request to the server to remove his connectivity from the chat
room. and then all the client will be informed that the particular client with the particular user’s name has been
removed from the room. even if any new client Want to enter in the chat room, then also he must have to take
permission from the server for the same. And in the similar way to the removal of a client from the room, all the
client will be informed that the client with some nickname has joined the chat room.
IV. CONCLUSION
The above project explanation has solved the communication problems it may be among the staff members and
also reduce the communication and cost also. The chat messenger will support the many chat types.
The private chat with more than one online user can chat together even without internet connection. This
application allow file exchange as well will allow same local connection. The running client interface will be
done successfully. The common feature of for all the communication services that convergence then there will
be continuum between the both point to point and broadcast communication. The average prices from the long
time have been decreased in the line with the decrease in the cost. While the structure of the prices has
traditional included by crossing subsides. And it is also very difficult to talk about such subsides either they
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[6227]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:05/May-2023 Impact Factor- 7.868 www.irjmets.com
exist or ot. One ncould hope that at least the economics of postal system would have been well understood.
These types of the system are large, relatively slowly changing are usually open to the public scrutiny. It also
takes the place in various entities from such as speech, text, signal and the likes. It can also be called the
conceptual way exchanging the information between the entities. This paper is structured as follow in section 2
of this research discussion about the project interface. And the section 3 of this research paper describes how
the client connected to the server. and the section 4 of this research paper is about project protocols. The
section 5 of this research paper will be giving the output of the project’s implementation. Finally, the conclusion
of this research paper is “connected”. When the server received the “connect” that is mean that the new client it
may be public client or private client is connected. The server performs some operation: and we have to check if
the username is public or private in nature. If the type of username is found to be public add it to array list. And
then send the arraylist to all the user that are already connected in order to update the client in online list.
V. REFERENCE
[1] Alcantara, G. K. L., Evangelista, I. D. J., Malina, J. V. B., Ong, O. B., Rivera, R. S. D.,
[2] & Ambati, E. L. U. (2018). Head detection and tracking using OpenCV. In 2018 IEEE 10th International
Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control,
Environment and Management (HNICEM) (pp. 1-5). IEEE Opencv.org, „About OpenCV‟, 2017. [Online].
Available: http://www.opencv.org/about
[3] Hoque, M. A., Islam, T., Ahmed, T., & Amin, A. (2020, March). Autonomous face detection system from
real time video streaming for ensuring the intelligence security system. In 2020 6th International
Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 261-265). IEEE (2017,
January 17). Object Detection [Online]. Available: http://en.m.wikipedia.org/wiki/Object_detection
[4] Alcantara, G. K. L., Evangelista, I. D. J., Malina, J. V. B., Ong, O. B., Rivera, R. S. D.,
[5] & Ambati, E. L. U. (2018). Head detection and tracking using OpenCV. In 2018 IEEE 10th International
Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control,
Environment and Management (HNICEM) (pp. 1-5). IEEE
[6] Opencv.org, „About OpenCV‟, 2017. [Online]. Available: http://www.opencv.org/about
[7] Hoque, M. A., Islam, T., Ahmed, T., & Amin, A. (2020, March). Autonomous face detection system from
real time video streaming for ensuring the intelligence security system. In 2020 6th International
Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 261-265). IEEE (2017,
January 17). Object Detection [Online]. Available: http://en.m.wikipedia.org/wiki/Object_detection