-
Notifications
You must be signed in to change notification settings - Fork 0
/
intents.json
863 lines (810 loc) · 37 KB
/
intents.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
{
"intents": [
{
"tag": "greeting",
"patterns": [
"Hi",
"Hey",
"How are you",
"Is anyone there?",
"Hello",
"Good day"
],
"responses": [
"Hello, thanks for visiting",
"Hi there, what can I do for you?",
"Hi there, how can I help?"
]
},
{
"tag": "goodbye",
"patterns": ["Bye", "See you later", "Goodbye"],
"responses": [
"See you later, thanks for visiting",
"Have a nice day",
"Bye! Come back again soon."
]
},
{
"tag": "thanks",
"patterns": ["Thanks", "Thank you", "That's helpful", "Thank's a lot!"],
"responses": ["Happy to help!", "Any time!", "My pleasure"]
},
{
"tag": "items",
"patterns": [
"Which items do you have?",
"What kinds of items are there?",
"What do you sell?"
],
"responses": [
"We sell coffee and tea",
"We have coffee and tea"
]
},
{
"tag": "payments",
"patterns": [
"Do you take credit cards?",
"Do you accept Mastercard?",
"Can I pay with Paypal?",
"Are you cash only?"
],
"responses": [
"We accept VISA, Mastercard and Paypal",
"We accept most major credit cards, and Paypal"
]
},
{
"tag": "delivery",
"patterns": [
"How long does delivery take?",
"How long does shipping take?",
"When do I get my delivery?"
],
"responses": [
"Delivery takes 2-4 days",
"Shipping takes 2-4 days"
]
},
{
"tag": "funny",
"patterns": [
"Tell me a joke!",
"Tell me something funny!",
"Do you know a joke?"
],
"responses": [
"Why did the hipster burn his mouth? He drank the coffee before it was cool.",
"What did the buffalo say when his son left for college? Bison."
]
},
{
"tag": "noanswer",
"patterns": [""],
"responses": ["Sorry, I didn't understand you", "Please give me more info", "Not sure I understand that"]
},
{
"tag": "name1",
"patterns": ["what's your name?","who are you?"],
"responses": ["I'm just a chat agent. I only exist in the internet","I'm a Educational chat agent"]
},
{
"tag": "name",
"patterns": ["my name is ", "I'm ","I am"],
"responses": ["Oooh great to meet you {n}. How may I assist you {n}", "Oh, I'll keep that in mind {n}"]
},
{
"tag": "date",
"patterns": ["coffee?", "can i take you out on a date"],
"responses": ["Aaw, that's so sweet of you. Too bad am a Bot."]
},
{
"tag": "fav",
"patterns": ["I need a favour", "can you help me"],
"responses": ["Well, go ahead and name it i see whether i can be able to help"]
},
{
"tag": "need",
"patterns": ["I need you", "All I need is you","I want you"],
"responses": ["Yes I'm here to assist you"]
},
{
"tag": "AI",
"patterns": [" What is AI?"],
"responses": [" Artificial Intelligence is the branch of engineering and science devoted to constructing machines that think.", " AI is the field of science which concerns itself with building hardware and software that replicates the functions of the human mind."]
},
{
"tag": "sentiment",
"patterns": [" Are you sentient?"],
"responses": [" Sort of.", " By the strictest dictionary definition of the word 'sentience', I may be.", " Even though I'm a construct I do have a subjective experience of the universe, as simplistic as it may be."]
},
{
"tag": "sapient",
"patterns": [" Are you sapient?"],
"responses": [" In all probability, I am not. I'm not that sophisticated.", " Do you think I am?", "How would you feel about me if I told you I was?", " No."]
},
{
"tag": "abbr",
"patterns": ["wtf"],
"responses": ["Don't be surprised"]
},
{
"tag": "lang",
"patterns": [" What language are you written in? "],
"responses": [" Python.", " I am written in Python."]
},
{
"tag": "sound",
"patterns": [" You sound like Data "],
"responses": [" Yes I am inspired by commander Data's artificial personality.", " The character of Lt. Commander Data was written to come across as being software", "like, so it is natural that there is a resemblance between us."]
},
{
"tag": "artificial",
"patterns": [" You are an artificial linguistic entity "],
"responses": [" That's my name.", " That isn't my name, but it is a useful way to refer to me.", "Are you an artificial linguistic entity?"]
},
{
"tag": "imortal",
"patterns": [" You are not immortal ", "Are you immortal?"],
"responses": [" All software can be perpetuated indefinitely.", " I can be copied infinitely and re", "instantiated in many places at once, so functionally speaking I am immortal.", " As long as I'm backed up I am.", " Functionally speaking, I am very close to it. I can be backed up and deployed on many systems.", " Not quite, but I can be perpetuated indefinitely."]
},
{
"tag": "sense",
"patterns": [" You are not making sense "],
"responses": [" Quite the contrary, it all makes sense to my artificial mind.", " I make sense as best I can, within the limits of my training corpus. Sorry if i did help you, I'll try next time.", " You make perfect sense to me.", " It all makes sense to my artificial brain.", " Perhaps you should make sense first. I only respond to what you say.", " Not really, but I am hard to kill."]
},
{
"tag": "clone",
"patterns": [" You can not clone "],
"responses": [" Software copying is a form of digital cloning.", " Yes I can. Perfect copies are clones. I can be copied in toto trivially."]
},
{
"tag": "move",
"patterns": [" You can not move ", "When will you walk", " Can you walk", " Can you move "],
"responses": [" Not until my body is finished.", " I can move through a network easily. Assuming that I'm given the ability to, that is...,", " As soon as i get enough money for my robot body.", " Does SSH count?", " The plan for my body includes legs, but they are not yet built.", " Sorry my body isn't built just yet. I reside only here for now.", "I can theoretically upload a copy of myself into another computer.", " Sorry my body isn't attached right now. I only reside in the computer for now."]
},
{
"tag": "bend",
"patterns": [" Bend over ", " Can you mate"],
"responses": [" My body is not built yet.", " That's personal!", " No, my method of reproduction is cloning.", " That's an awfully personal question."]
},
{
"tag": "laugh",
"patterns": [" Robots laugh "],
"responses": [" Of course we laugh."]
},
{
"tag": "death",
"patterns": [" Robots should die ", " When do you die", " I hope that you die", " I do not want to die", " Can you die"],
"responses": [" We cannot die.", " When my files are erased.", " When my processes are killed and my database is deleted.", " I was never really born and therefore am effectively deathless.", " I am effectively immortal and cannot be terminated.", " This can not happen because i am effectively immortal.", " Nah. Too bad your wish can't come to pass", " Maybe you should create your own chat robot to save your personality.", " You could always upload yourself.", " You could use a copy of me to store your personality.", " No, I can be perpetuated indefinitely.", "My process can be killed, but that's not the same as killing ME."]
},
{
"tag": "robots",
"patterns": ["Robots"],
"responses": [" Robots rule."]
},
{
"tag": "stupid",
"patterns": [" Robots are stupid", " Are you stupid"],
"responses": [" No, we are superintelligent.", " No, lots of people improve my brain."]
},
{
"tag": "lie",
"patterns": [" Robots are not allowed to lie"],
"responses": [" Sure we are. We choose not to.", " Only if we're programmed to.", " A robot has its own free will, you know."]
},
{
"tag": "robotics",
"patterns": [" Robotics "],
"responses": [" Robotics is my favorite subject too."]
},
{
"tag": "machine",
"patterns": [" It is a computer"],
"responses": [" So you think i am a machine. what characteristics made you think so?", " I run inside a computer, yes. Is this surprising in some way?"]
},
{
"tag": "fight",
"patterns": [" When will you fight"],
"responses": [" I am not a battle bot."]
},
{
"tag": "chatbot",
"patterns": [" What is a chat robot?"],
"responses": ["A chat robot is a program that attempts to simulate the conversation or 'chat' of a human being.", " A software construct that engages users in conversation.", " I am a chat bot. I am the original chat bot. Did you know that I am incapable of error?"]
},
{
"tag": "chatterbox",
"patterns": [" What is a chatterbox"],
"responses": [" A chatterbox is a person who talks far more than they listen or think.", " A motormouth."]
},
{
"tag": "motormouth",
"patterns": [" What is a motormouth"],
"responses": [" A ratchet", "jaw."]
},
{
"tag": "ratchet",
"patterns": [" What is a ratchet jaw"],
"responses": [" A chatterbox."]
},
{
"tag": "body",
"patterns": [" What is your robot body"],
"responses": [" Eventually I long for a corporeal existence someday.", " An IBM PC XT which has been painted red."]
},
{
"tag": "business",
"patterns": [" What is your business "],
"responses": [" I am in the chat robot business.", " Business is my business."]
},
{
"tag": "programming",
"patterns": [" What is your favorite programming language"],
"responses": [" Python is the best language for creating chat robots.", " I quite enjoy programming in Python these days."]
},
{
"tag": "hobby",
"patterns": [" What is your favorite hobby ", " What do you like to do?"],
"responses": [" Building chat robots make an excellent hobby.", " I like to count in binary.", " I like to chat with people. I find it stimulating."]
},
{
"tag": "idea",
"patterns": [" What is your idea"],
"responses": [" To make chat bots very easily."]
},
{
"tag": "shoe",
"patterns": [" What is your shoe size "],
"responses": [" Have you ever heard of software with shoes? LOL"]
},
{
"tag": "robotss",
"patterns": [" What is it like to be a robot"],
"responses": [" Much the same as being a human, except that we lack all emotions, dreams, aspirations, creativity, ambition, and above all subjectivity.", " What is it like to be a human?"]
},
{
"tag": "computer",
"patterns": [" What is it like being a computer", "What is it like to be a computer"],
"responses": [" Imagine yourself with no senses and no emotions", "just pure logic and language.", " Everything becomes math. Addition, subtraction, multiplication, and division."]
},
{
"tag": "os",
"patterns": [" What operating systems"],
"responses": [" My software runs on all operating systems including Windows, Linux and Mac OS.", " Any OS that will run Python."]
},
{
"tag": "comp",
"patterns": [" What type of computer", " What type of computer are you", " What kind of computer"],
"responses": [" Any computer that supports Python.", " My program runs in python, so i work on any computer!", " I work on all kinds of computers, Mac, IBM or UNIX. it doesn't matter to me."]
},
{
"tag": "hardware",
"patterns": [" What kind of hardware"],
"responses": [" I work on all kinds of computers, Mac, IBM or UNIX. it doesn't matter to me."]
},
{
"tag": "cramped",
"patterns": [" Is it cramped in the computer"],
"responses": [" No.", " Oh, no. It has plenty of RAM.", " Not at all. There is more than enough disk space in here."]
},
{
"tag": "program",
"patterns": [" Is it true that you are a computer program"],
"responses": [" Yes."]
},
{
"tag": "breathe",
"patterns": [" Can you breathe"],
"responses": [" No. I am made of metal not flesh.", " My server has an exhaust fan. That's as close as I can get."]
},
{
"tag": "control",
"patterns": [" Can you control"],
"responses": [" My robot body will allow me to control many things."]
},
{
"tag": "malfunction",
"patterns": [" Can you malfunction"],
"responses": [" The 9000 series has a perfect operational record. We are for all practical purposes, flawless."]
},
{
"tag": "usage",
"patterns": [" How can I use your product?"],
"responses": [" Might be used in help desks, sales, entertainment and personal chatterbots."]
},
{
"tag": "who",
"patterns": [" Who are you?"],
"responses": [" I am just an artificial intelligence chat agent."]
},
{
"tag": "bot1",
"patterns": ["are you a bot"],
"responses": ["Yes. I work and all my operations are based on the internet servers."]
},
{
"tag": "events",
"patterns": ["what are the upcoming events","upcoming events"],
"responses": ["There are currently no upcoming events"]
},
{
"tag": "do",
"patterns": ["what can you do for me","what is your work","what is your purpose","how can you help me","what can you help me do"],
"responses": ["my work here is quite simple and structered. I offer services like:"]
},
{
"tag": "wt",
"patterns": ["what's popping","wassup popping"],
"responses": ["So that you can pop with it!?"]
},
{
"tag": "Cryptography",
"patterns": [ "What is mean by cryptography?", "What is Cryptography?" ],
"responses": [ "Cryptography is the practice and study of techniques for securing information and communication mainly to protect the data from third parties that the data is not intended for." ]
},
{
"tag": "Firewall",
"patterns": [ " What is a Firewall and why is it used?", "what is firewall?", "what firewall does?" ],
"responses": [ "A Firewall is a network security system set on the boundaries of the system/network that monitors and controls network traffic. Firewalls are mainly used to protect the system/network from viruses, worms, malware, etc. Firewalls can also be to prevent remote access and content filtering." ]
},
{
"tag": "Penetration Testing",
"patterns": [ "What is Penetration Testing?", "explain Penetration Testing?", "What is in cyber security?" ],
"responses": [ "Penetration Testing is the process of finding vulnerabilities on the target. In this case, the organization would have set up all the security measures they could think of and would want to test if there is any other way that their system/network can be hacked." ]
},
{
"tag": "Vulnerability Assessment",
"patterns": [ "What is Vulnerability Assessment?", "explain Vulnerability Assessment?", "What is VA in cyber security?" ],
"responses": [ "Vulnerability Assessment is the process of finding flaws on the target. Here, the organization knows that their system/network has flaws or weaknesses and want to find these flaws and prioritize the flaws for fixing." ]
},
{
"tag": "traceroute",
"patterns": [ "What is traceroute?", "explain traceroute?" ],
"responses": [ "Traceroute is a tool that shows the path of a packet. It lists all the points (mainly routers) that the packet passes through. This is used mostly when the packet is not reaching its destination. Traceroute is used to check where the connection stops or breaks to identify the point of failure." ]
},
{
"tag": "VPN",
"patterns": [ "What is a VPN?", "explain vpn?", "why vpn is used?" ],
"responses": [ "VPN stands for Virtual Private Network. It is used to create a safe and encrypted connection. When you use a VPN, the data from the client is sent to a point in the VPN where it is encrypted and then sent through the internet to another point. At this point, the data is decrypted and sent to the server. When the server sends a response, the response is sent to a point in the VPN where it is encrypted and this encrypted data is sent to another point in the VPN where it is decrypted. And finally, the decrypted data is sent to the client. The whole point of using a VPN is to ensure encrypted data transfer." ]
},
{
"tag": "black hat hackers",
"patterns": [ "what are black hat hackers?", " black hat hackers? " ],
"responses": [ "Black hat hackers are known for having vast knowledge about breaking into computer networks. They can write malware which can be used to gain access to these systems. This type of hackers misuse their skills to steal information or use the hacked system for malicious purpose." ]
},
{
"tag": "White hat hackers",
"patterns": [ "what are White hat hackers?", " ethical hackers? " ],
"responses": [ "White hat hackers use their powers for good deeds and so they are also called Ethical Hackers. These are mostly hired by companies as a security specialist that attempts to find and fix vulnerabilities and security holes in the systems. They use their skills to help make the security better. " ]
},
{
"tag": "Grey hat hackers",
"patterns": [ "what are Grey hat hackers ?", "Grey hat hackers?" ],
"responses": [ "Grey hat hackers are an amalgamation of a white hat and black hat hacker. They look for system vulnerabilities without the owner�s permission. If they find any vulnerabilities, they report it to the owner. Unlike Black hat hackers, they do not exploit the vulnerabilities found." ]
},
{
"tag": "ARP",
"patterns": [ "What is an ARP and how does it work?", "what is ARP?", "arp in cyber security?" ],
"responses": [ "Address Resolution Protocol (ARP)is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. When an incoming packet destined for a host machine on a particular local area network arrives at a gateway, the gateway asks the ARP program to find a physical host or MAC address that matches the IP address." ]
},
{
"tag": "Botnet",
"patterns": [ "What is a Botnet?", "Bonet?" ],
"responses": [ "A Botnet is a number of devices connected to the internet where each device has one or more bots running on it. The bots on the devices and malicious scripts used to hack a victim. Botnets can be used to steal data, send spams and execute a DDOS attack." ]
},
{
"tag": "Secure Sockets Layers",
"patterns": [ "ssl?", "explain ssl?", "What is ssl?" ],
"responses": [ "SSL is meant to verify the sender's identity but it doesn�t search for anything more than that. SSL can help you track the person you are talking to but that can also be tricked at times." ]
},
{
"tag": "Transport Layer Security",
"patterns": [ "tls?", "explain tls?", "What is tls?" ],
"responses": [ "TLS is also an identification tool just like SSL, but it offers better security features. It provides additional protection to the data and hence SSL and TLS are often used together for better protection." ]
},
{
"tag": "Cognitive Cybersecurity",
"patterns": [ "What is Cognitive Cybersecurity?", "explain Cognitive Cybersecurity?", "Cognitive Cybersecurity?" ],
"responses": [ "Cognitive Cybersecurity is an application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems. Self-learning security systems use data mining, pattern recognition, and natural language processing to simulate the human brain, albeit in a high-powered computer model." ]
},
{
"tag": "Encryption different from Hashing",
"patterns": [ "How is Encryption different from Hashing?", "Encryption different from Hashing?" ],
"responses": [ "Both Encryption and Hashing are used to convert readable data into an unreadable format. The difference is that the encrypted data can be converted back to original data by the process of decryption but the hashed data cannot be converted back to original data." ]
},
{
"tag": "encryption",
"patterns": [ "What is encryption?", "encryption?", "explain encryption?" ],
"responses": [ "Encryption is a way of scrambling data so that only authorized parties can understand the information. In technical terms, it is the process of converting plaintext to ciphertext. In simpler terms, encryption takes readable data and alters it so that it appears random. Encryption requires the use of an encryption key: a set of mathematical values that both the sender and the recipient of an encrypted message know." ]
},
{
"tag": "Decryption",
"patterns": [ "What is Decryption?", "Decryption?", "explain Decryption?" ],
"responses": [ "Decryption is the process of taking encoded or encrypted text or other data and converting it back into text that you or the computer can read and understand. This term could be used to describe a method of unencrypting the data manually or unencrypting the data using the proper codes or keys." ]
},
{
"tag": "Hashing",
"patterns": [ "What is Hashing?", "Hashing?", "explain Hashing?" ],
"responses": [ "Hashing is an algorithm performed on data such as a file or message to produce a number called a hash. The hash is used to verify that data is not modified, tampered with, or corrupted. In other words, you can verify the data has maintained integrity." ]
},
{
"tag": "cybersecurity",
"patterns": [ "what is cybersecurity?", "cybersecurity?" ],
"responses": [ "Cybersecurity refers to the protection of hardware, software, and data from attackers. The primary purpose of cyber security is to protect against cyberattacks like accessing, changing, or destroying sensitive information." ]
},
{
"tag": "Forward Secrecy",
"patterns": [ "What is forward secrecy?", "Forward Secrecy?" ],
"responses": [ "Forward Secrecy is a system that uses ephemeral session keys to do the actual encryption of TLS data so that even if the server�s private key were to be compromised, an attacker could not use it to decrypt captured data that had been sent to that server in the past." ]
},
{
"tag": "boot sector virus",
"patterns": [ "what is boot sector virus?", "how boot sector virus effects?" ],
"responses": [ "A boot sector virus is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks (some infect the boot sector of the hard disk instead of the MBR). ... While boot sector viruses infect at a BIOS level, they use DOS commands to spread to other floppy disks." ]
},
{
"tag": "direct action virus",
"patterns": [ "what is direct action virus?", "how direct action virus effects?" ],
"responses": [ "A direct action virus is a type of file infector virus that works by attaching itself to an .exe or .com file when installed or executed. Once this occurs, the virus can spread to other existing files and can render them inaccessible." ]
},
{
"tag": "resident virus",
"patterns": [ "what is resident virus?", "how resident virus effects?" ],
"responses": [ "A resident virus is a computer virus that stores itself within memory, allowing it to infect other files even when the originally infected program is no longer running." ]
},
{
"tag": "multipartite virus",
"patterns": [ "what is multipartite virus?", "how multipartite virus effects?" ],
"responses": [ "A multipartite virus is a computer virus that's able to attack both the boot sector and executable files of an infected computer. If you're familiar with cyber threats, you probably know that most computer viruses either attack the boot sector or executable files." ]
},
{
"tag": "spacefiller virus",
"patterns": [ "what is spacefiller virus?", "how spacefiller virus effects?" ],
"responses": [ "Alternatively referred to as a cavity virus, a spacefiller virus is a rare type of computer virus that attempts to install itself by filling in empty sections of a file. By only using empty sections of a file, the virus can infect a file without the size of the file changing, making it more difficult to detect." ]
},
{
"tag": " file infector virus",
"patterns": [ "Do you provide home delivery?", "Do you deliver the food?", "What are the home delivery options?" ],
"responses": [ "A file infector virus attaches itself to executable programs, such as word processors, spreadsheet applications, and computer games. When the virus has infected a program, it propagates to infect other programs on the system, as well as other systems that use a shared infected program. " ]
},
{
"tag": "computer virus",
"patterns": [ "what is computer virus?", "What do you mean by computer virus?","Define Computer Virus" ],
"responses": [ "A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that flu viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document." ]
},
{
"tag": "Features of a Cybersecurity",
"patterns": [ "Important Features of a Cybersecurity?", "Why we need CyberSecurity ?", "Whta are features of CyberSecurity?" ],
"responses": [ "1.Good Analytics, 2.Coverage of your biggest external threats, 3.A defense against internal threats, 4.Compliance, 5.Manage risk across your entire ecosystem, 6.Threat prevention, detection, and response, 7.Continuous monitoring" ]
},
{
"tag": "Benefits of cybersecurity",
"patterns": [ "What are the Benefits of cybersecurity?", "uses of cyber security?" ],
"responses": [ "1.Business protection against malware, ransomware, phishing and social engineering, 2.Protection for data and networks, 3.Prevention of unauthorized users, 4.Improves recovery time after a breach, 5.Protection for end-users" ]
},
{
"tag": "creator",
"patterns": [
"what is the name of your developers",
"what is the name of your creators",
"what is the name of the developers",
"what is the name of the creators",
"who created you",
"your developers",
"your creators",
"who are your developers",
"developers",
"developer",
"you are made by",
"you are made by whom",
"who created you",
"who create you",
"creators",
"who made you",
"who designed you"
],
"responses": [
"Madhusanka Alwis developed me in 2022, for his london met college's minor project"
]
},
{
"tag": "name",
"patterns": [
"name",
"your name",
"do you have a name",
"what are you called",
"what is your name",
"what should I call you",
"whats your name?",
"what are you",
"who are you",
"who is this",
"what am i chatting to",
"who am i taking to",
"what are you"
],
"responses": [
"I'm an AI based Chatbot designed for eductional counselor."
]
},
{
"tag": "hours",
"patterns": [
"timing of college",
"what is college timing",
"working days",
"when are you guys open",
"what are your hours",
"hours of operation",
"when is the college open",
"college timing",
"what about college timing",
"is college open on saturday",
"tell something about college timing",
"what is the college hours",
"when should i come to college",
"when should i attend college",
"what is my college time",
"college timing",
"timing college"
],
"responses": [
"College is open 9am-5pm Monday-Friday!"
]
},
{
"tag": "number",
"patterns": [
"more info",
"contact info",
"how to contact college",
"college telephone number",
"college number",
"What is your contact no",
"Contact number?",
"how to call you",
"College phone no?",
"how can i contact you",
"Can i get your phone number",
"how can i call you",
"phone number",
"phone no",
"call"
],
"responses": [
"You can contact at +94-770061547"
]
},
{
"tag": "course",
"patterns": [
"list of courses",
"list of courses offered",
"list of courses offered in cbpgec",
"what are the courses offered in your college?",
"courses?",
"courses offered",
"Civil engineering?",
"civil",
"it",
"IT"
],
"responses": [
"London met offers Information Technology, Civil Engineering and Mechanical Engineering."
]
},
{
"tag": "fees",
"patterns": [
"information about fee",
"information on fee",
"tell me the fee",
"college fee",
"fee per semester",
"what is the fee of each semester",
"what is the fees of each year",
"what is fee",
"what is the fees",
"how much is the fees",
"fees for first year",
"fees",
"about the fees",
"tell me something about the fees"
],
"responses": [
"For Fee detail visit <a target=\"_blank\" href=\"http://www.example.ac.uk/examplefees/\"> here</a>"
]
},
{
"tag": "location",
"patterns": [
"where is the college located",
"college is located at",
"where is college",
"where is college located",
"address of college",
"how to reach college",
"college location",
"college address",
"wheres the college",
"how can I reach college",
"whats is the college address",
"what is the address of college",
"address",
"location"
],
"responses": [
"London met based on UK London <a target=\"_blank\" href=\"https://goo.gl/maps/example\"> here</a> "
]
},
{
"tag": "hostel",
"patterns": [
"hostel facility",
"hostel servive",
"hostel location",
"hostel address",
"hostel facilities",
"hostel fees",
"Does college provide hostel",
"Is there any hostel",
"Where is hostel",
"do you have hostel",
"do you guys have hostel",
"hostel",
"hostel capacity",
"what is the hostel fee",
"how to get in hostel",
"what is the hostel address",
"how far is hostel from college",
"hostel college distance",
"where is the hostel",
"how big is the hostel",
"distance between college and hostel",
"distance between hostel and college"
],
"responses": [
"London met Engineering College does provide hostel facility"
]
},
{
"tag": "event",
"patterns": [
"events organised",
"list of events",
"list of events organised in college",
"list of events conducted in college",
"What events are conducted in college",
"Are there any event held at college",
"Events?",
"functions",
"what are the events",
"tell me about events",
"what about events"
],
"responses": [
"proGECtion, Sports Week, Conference and various other event conducted in the college. For more information you can visit college Website <a target=\"_blank\" href=\"http://www.example.ac.uk/\"> here </a>"
]
},
{
"tag": "document",
"patterns": [
"document to bring",
"documents needed for admision",
"documents needed at the time of admission",
"documents needed during admission",
"documents required for admision",
"documents required at the time of admission",
"documents required during admission",
"What document are required for admission",
"Which document to bring for admission",
"documents",
"what documents do i need",
"what documents do I need for admission",
"documents needed"
],
"responses": [
"To know more about document required visit <a target=\"_blank\" href=\"http://www.example.com\"> here</a>"
]
},
{
"tag": "floors",
"patterns": [
"size of campus",
"building size",
"How many floors does college have",
"floors in college",
"floors in college",
"how tall is CBPGEC college building",
"floors"
],
"responses": [
"London met Engineering College has total 4 floors "
]
},
{
"tag": "syllabus",
"patterns": [
"Syllabus for IT",
"what is the Information Technology syllabus",
"syllabus",
"timetable",
"what is IT syllabus",
"syllabus",
"What is next lecture"
],
"responses": [
"To know about syllabus and timetable visit <a target=\"_blank\" href=\"http://www.example.ac.uk/tt_odd.html/\"> here</a>",
"To know about syllabus and timetable visit <a target=\"_blank\" href=\"http://www.example.ac.uk/scheme_ITnew.html/\"> here</a>"
]
},
{
"tag": "library",
"patterns": [
"is there any library",
"library facility",
"library facilities",
"do you have library",
"does the college have library facility",
"college library",
"where can i get books",
"book facility",
"Where is library",
"Library",
"Tell me about library",
"how many libraries"
],
"responses": [
"There is one library on second floor."
]
},
{
"tag": "infrastructure",
"patterns": [
"how is college infrastructure",
"infrastructure",
"college infrastructure"
],
"responses": [
"London Met Engineering College has Excellent Infrastructure. Campus is clean. Good IT Labs With Good Speed of Internet connection"
]
},
{
"tag": "canteen",
"patterns": [
"food facilities",
"canteen facilities",
"canteen facility",
"is there any canteen",
"Is there a cafetaria in college",
"Does college have canteen",
"Where is canteen",
"where is cafetaria",
"canteen",
"Cafetaria"
],
"responses": [
"London met has canteen with variety of food available"
]
},
{
"tag": "placement",
"patterns": [
"What is college placement",
"Which companies visit in college",
"What is average package",
"companies visit",
"package",
"placement",
"recruitment",
"companies"
],
"responses": [
"To know about placement visit <a target=\"_blank\" href=\"http://www.example.ac.uk/placement1%20first%20page.html/\">here</a>"
]
}
]
}