An_AI_Based_Chat_Bot_For_Banking_Applications_using_Intelligent_Chat_Bots
An_AI_Based_Chat_Bot_For_Banking_Applications_using_Intelligent_Chat_Bots
Veda Vidhya
Department of Computer Science and
Assistant Professor
Engineering
Department of Computer Science and Engineering
MLR Institute of Technology
MLR Institute of Technology, Hyderabad
Hyderabad, India
[email protected]
[email protected]
D PAULRAJ
Professor,
Department of Computer Science and
Engineering,
R.M.K. Engineering College, Tamil
Nadu, India
[email protected]
B. SYSTEM ARCHITECTURE
II. LITERATURE SURVEY:
Authorized licensed use limited to: Zhejiang University. Downloaded on January 23,2025 at 17:01:42 UTC from IEEE Xplore. Restrictions apply.
both parties greatly. Because these bots can work in large or small
numbers, you can improve your consumers' experience. Customers
won't wait long for answers.
Finally, chatbots will save your firm money. Each new hire costs
thousands of dollars to recruit and train. Chatbots can handle more
customer conversations at reduced expense. This means you would
need fewer customer service staff. This also allows your live agents Figure: 7: Atm
to focus on higher-value prospects, benefiting your company.
A. SYSTEM ARCHITECTURE:
C. ACCURACY:
Figure: 4:Interface
Figure: 5:Statements
Authorized licensed use limited to: Zhejiang University. Downloaded on January 23,2025 at 17:01:42 UTC from IEEE Xplore. Restrictions apply.
System”, Applied Sciences , Appl. Sci. 2023, 13, 3970.
https://doi.org/10.3390/app13063970.
[8]. IBM Cloud Education, ―Chatbots‖. [Online]. Available:
https://www.ibm.com/cloud/learn/chatbots-explained#toc-building-
a-pWei9Ux1
[9]. GhatteSaquid Nisar Parvin and KaziFaizan Farook Farida,
―Chatting Bot Service Provider‖. [Online]. Available:
http://www.aiktcdspace.org:8080/jspui/bitstream/123456789/2051/
1/aiktcDspace2051
[10]. Ajmeera Kiran And N Shirisha, “K-Anonymization Approach For
Privacy Preservation Using Data Perturbation Techniques In Data
Mining”, Materials Todays ,
Https://Doi.Org/10.1016/J.Matpr.2022.05.117,2022.
Figure: 11 Customer Satisfaction Analysis
[11]. Ajmeera Kiran And D. Vasumathi, “Optimal Privacy Preserving
Technique Over Big Data Analytics Using Oppositional Fruitfly
IV. CONCLUSION: Algorithm”, Recent Patents On Computer Science, Volume 13 ,
A "chatbot" is software that mimics human dialogue or converses Issue 2 , 2020, DOI : 10.2174/2213275911666181119113913.
with people. They listen and give thoughtful, detailed responses. [12]. Ajmeera Kiran and D. Vasumathi, “A Comprehensive Survey on
Speech-activated digital assistants are available alongside Privacy Preservation Algorithms in Data Mining”, Proceedings of
chatbots. Chatbots are more conversational than digital or the 2017 IEEE International Conference on Computational
intelligent assistants, which perform user-helpful tasks. Because Intelligence and Computing Research (ICCIC-2017), 978-1-5090-
bank self-service offerings are often poor, most customers have 6621-6/17/$31.00 ©2017 IEEE.
low expectations. Customer must regularly call call centre to [13]. Sethukarasi T, Neelakandan S, Prakash M, Baburaj E (2023) An
complete self-service transaction. Banks may benefit from voice Efficient Hybrid Job Scheduling Optimization (EHJSO) approach to
enhance resource search using Cuckoo and Grey Wolf Job
bots. It enables phone independence. They can be watched
Optimization for cloud environment. PLoS ONE 18(3): e0282600.
anywhere without deployment or space.
https://doi.org/10.1371/journal.pone.0282600
[14]. S. Ancy “Online Learning Model For Handling Different Concept
REFERENCES: Drifts Using Diverse Ensemble Classifiers,” cybernetics and
Systems”, Vol.50 Issue 7, 2019
[1]. Conversation-to Automation in Banking Through Chatbot Using
[15]. K.Devi, "Multi-level Fault tolerance Aware Scheduling Technique
Artificial Machine Intelligence Language By Silvia García-
MéndezatlanTTic, Information Technology Group, School of in a cloud environment", Journal of Internet Technology, Vol.22,
Telecommunications Engineering Milagros Fernández- Issue 1, pp 109-119, Jan ,2021
GavilanesDefense University Center, Pontevedra, Spain on 14 [16]. L. Maria Michael Visuwasam "A Distributed Intelligent Mobile
march 2018 [Online]. Available: Application For Analyzing Travel Big Data Analytics". Journal Of
https://ieeexplore.ieee.org/document/9197825
Peer To Peer Networking And Applications, 2019
[2]. P. Dileep Kumar Reddy, R. Praveen Sam, C. Shoba Bindu
“Optimal Blowfish Algorithm based Technique for Data Security [17]. Devi, K, Muthusenthil, B, Deep Learning Based Security Model for
in Cloud”Int. J. Business Intelligence and Data Mining, ISSN Cloud based Task Scheduling,"KSII Transactions on Internet and
online 1743-8195, ISSN print 1743-8187, Vol. 11, No. 2, Information", Vol.14, Issue 9,pp 3663-3679, Sept.2020
2016.Pp.171–189.DOI: 10.1504/IJBIDM.2016.10001484. (Inder
Science)(UGC Approved). Journal No: 16481
[3]. P. Dileep Kumar Reddy, R. Praveen Sam, C. Shoba Bindu
“Tripartite partite key assignment scheme for security of cloud data
classes” Journal of Theoretical and Applied Information
Technology, 15th July 2017. Vol.95. No 13, ISSN: 1992-8645, E-
ISSN: 1817-3195, Pg.No:3116-3126.(Scopus& UGC), Journal No:
23566.
[4]. G. Ramu, P. Dileep Kumar Reddy, Appawala Jayanthi “A Survey
of Precision Medicine Strategy Using Cognitive Computing”
International Journal of Machine Learning and Computing, Vol. 8,
No. 6, December 2018 DOI: 10.18178/IJMLC2018.8.6.741
(Scopus) (UGC Approved) Journal No: 48748, pp 530 to 535.
[5]. T. Sakthivel , Allam Balaram ,"The impact of mobility models on
geographic routing in multi-hop wireless networks and extensions
- a survey ," International Journal of Computer Networks and
Applications, Vol. 8, Issue No. 5 , pp. 634–670, 2021. DOI:
10.22247/ijcna/2021/209993.
[6]. Allam Balaram, Shaik Abdul Nab" A hybrid approach of
segmentation in brain tumor data using fuzzy c-means and level set
," Journal of Advanced Research in Dynamical and Control
Systems, Vol. 12, Issue No. 6, pp. 47–56, 2020. DOI:
10.5373/JARDCS/V12I6/S20201006.
[7]. P. Chinnasamy, Ashwag Albakri , Mudassir Khan, A. Ambeth Raja
, Ajmeera Kiran , Jyothi Chinna Babu “Smart Contract-Enabled
Secure Sharing of Health Data for a Mobile Cloud-Based E-Health
Authorized licensed use limited to: Zhejiang University. Downloaded on January 23,2025 at 17:01:42 UTC from IEEE Xplore. Restrictions apply.