Author(s): Belal Mohammad Zaqaibeh | Firas Ali Albalas | Awajan W A
Journal: International Journal of Interactive Mobile Technologies (iJIM)
ISSN 1865-7923
Volume: 6;
Issue: 2;
Start page: 39;
Date: 2012;
Original page
Keywords: Constraints violation | Mobile database | Mobile database model | Object data model
ABSTRACT
In this paper a new assertion constraint model is proposed and implemented. The model is designed to enforce and maintain the integrity constraints in mobile database and object data model environments. It has an object assertion model for integrity constraints which it is used to create classes and collect attributes and their constraints that are derived from multiple composition or inheritance hierarchies. Also it has a compile-time model which keeps the derivation path along with the attributes' relationships. Furthermore, the run-time model enforces integrity constraints, enforcing the logical integrity constraints during the run-time. And a new technique is designed to check the object metadata to detect the object violation before it occurs. However, the model is implemented and tested over set of definitions that check attribute values validity and objects for object-oriented and mobile databases.
Journal: International Journal of Interactive Mobile Technologies (iJIM)
ISSN 1865-7923
Volume: 6;
Issue: 2;
Start page: 39;
Date: 2012;
Original page
Keywords: Constraints violation | Mobile database | Mobile database model | Object data model
ABSTRACT
In this paper a new assertion constraint model is proposed and implemented. The model is designed to enforce and maintain the integrity constraints in mobile database and object data model environments. It has an object assertion model for integrity constraints which it is used to create classes and collect attributes and their constraints that are derived from multiple composition or inheritance hierarchies. Also it has a compile-time model which keeps the derivation path along with the attributes' relationships. Furthermore, the run-time model enforces integrity constraints, enforcing the logical integrity constraints during the run-time. And a new technique is designed to check the object metadata to detect the object violation before it occurs. However, the model is implemented and tested over set of definitions that check attribute values validity and objects for object-oriented and mobile databases.