›› 2012, Vol. ›› Issue (06): 1548-1552.

Previous Articles     Next Articles

Novel instant message system based on extensible markup language

ZHENG Ming1, SHEN Wei1,2, BAI Tian1, LIU Gui-xia1, GONG Lei-guang1,3   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun 130012, China;
    2. College of Computer Science and Technology, Beihua University, Jilin 132021, China;
    3. IBM Watson Research Center, New York 10532, USA
  • Received:2012-02-14 Online:2012-11-01

Abstract: Traditional instant message systems have the shortcomings of low security and inefficiency in LANs or enterprises. To overcome the shortcomings, a novel instant message system with an improved transmission protocol was proposed. The management mode of network structure co-operation of three servers was employed in this system. In addition, a unique form of binary tree P2P lookup structure was proposed in the model of multi-client meeting. Furthermore, a novel protocol based on XML, which is different from any other protocols, was developed in the new system. The new protocol can improve the transmission security. Experimental results show that, compared with other two instant message systems, the proposed system is more steady and efficient in term of location lookup rate.

Key words: computer application, instant message, network security, binary tree, transmission protocol

CLC Number: 

  • TP393
[1] Chen G X, Han X P, Wang B H. Multi-level scaling properties of instant-message communications[C]//International Conference on Complexity and Interdisciplinary Sciences, 2010, 3(5): 1897-1905.
[2] 肖云鹏,刘宴兵,杨莎莎,等. 基于云计算的OMS即时通讯系统设计与实现[J]. 重庆邮电大学学报:自然科学版,2010,22(4):468-472. Xiao Yun-peng, Liu Yan-bing, Yang Sha-sha, et al.Design and implement of OMS IM system based on cloud computing[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition), 2010,22(4):468-472.
[3] Han J C, Park S O, Kang S G, et al. A study on SIP-based instant message and presence[C]//9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, 2007: 1298-1301.
[4] Andrews G, Bloggers vs. "AOL users": A digital divide of use and literacy[C]//43rd Hawaii International Conference on Systems Sciences, 2010: 1435-1444.
[5] Xu G T. Design and realization of the monitoring system for MSN[C]//International Conference of China Communication, 2010: 746-749.
[6] Jimenez A, Berzal F, Cubero J C. Mining frequent patterns from XML data: Efficient algorithms and design trade-offs[J]. Expert Systems with Applications, 2012, 39(1): 1134-1140.
[7] Hasan M H, Mustapha E E, Baharuddin H R. Mobile university notification system: a jabber-based notification system for educational institutions[C]//Proceedings of the 8th International Conference on Applications of Electrical Engineering/8th International Conference on Applied Electromagnetics, Wireless and Optical Communications, 2009: 64-69.
[8] Wang L W, Wei J L, Zhang L, et al. Optimal scheduling and simulation of snow removers for airfield pavement based on breadth-first search[J]. Advances in Key Engineering Materials, 2011, 214: 383-387.
[9] Dickson M. An examination into Yahoo Messenger 7.0 contact identification[J]. Digital Investigation, 2006, 3(3): 159-165.
[10] Lee I, Hyun W, Kang S G. A study on user data management for SIP-based IMPP services[C]//8th International Conference on Advanced Communication Technology, 2006: 1698-1701.
[11] Pan X, Zhang X, Yu H Y, et al. Study on routing protocol for WSNs based on the improved prim algorithm[C]//2009 International Conference on Wireless Communications and Signal Processing, 2009: 30-33.
[12] Dacosta I, Balasubramaniyan V, Ahamad M, et al. Improving authentication performance of distributed SIP Proxies[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(11): 1804-1812.
[13] Gomes D,Goncalves J M,Santos R O,et al.XMPP based context management architecture[C]//2010 IEEE Globecom Workshops, 2010: 1372-1377.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!