The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Enforcing User-Defined Constraints During the Run-Time in OODB

, Ali Mamat 2,
In this paper a run-time model is proposed. The run-time model enforces integrity constraints for attributes that are derived from composition and inheritance hierarchies. The run-time model is designed for enforcing the logical integrity constraints in object-oriented databases during the run-time. A new technique called detection method is designed to check the object meta data to detect and catch the object-oriented databases violation before it occurs. Furthermore, we have implemented the RTM and supported set of definitions that are for checking attribute values validity, object-oriented databases consistency, and also a method for verifying attribute values when inserting, deleting, and updating objects .


[1] Bagui S., Achievements and Weaknesses of Object-Oriented Databases, Journal of Object Technology , vol. 2, no. 4, pp. 29-41, 2003.

[2] Brown P., Object-Relational Database Development , Addison-Wesley, 2001.

[3] Choi I., Bae S., Do N., and Yun M., Backward Propagation of Engineering Constraints in Active Object-Oriented Databases, in Proceedings of the 22 nd International Conference on Computers and Industrial Engineering , Cairo, pp. 20-23, 1997.

[4] David W., Object Database Development Concepts and Principles , Addison-Wesley, 1998.

[5] Do N., Choi I., and Jang M., A Structure- Oriented Data Representation of Engineering Changes for Supporting Integrity Constraints, The International Journal of Advanced Manufacturing Technology , vol. 20, no. 8, pp. 564-570, 2002.

[6] Eick C. and Werstein P., Rule-Based Consistency Enforcement for Knowledge-Based Systems, The IEEE Transactions of Knowledge and Data Engineering , vol. 5, no. 1, pp. 52-64, 1993.

[7] Formica A., Finite Satisfiability of Integrity Constraints in Object-Oriented Database Schemas, The IEEE Transactions on Knowledge and Data Engineering , vol. 14, no. 1, pp. 123-139, 2002.

[8] Urban S. and Wang A., The Design of a Constraint/ Rule Language for an Object- Oriented Data Model, Elsevier Science System Software , vol. 28, no. 3, pp. 203-224, 1995.

[9] Zaqaibeh B., Ibrahim H., Mamat A., and Sulaiman M., An Assertion Model for Controlling Integrity Constraints in an OODB, in Proceedings of the International Conference on Informatics and RWICT , pp. 413-421, 2004.

[10] Zaqaibeh B., Ibrahim H., Mamat A., and Sulaiman M., Enforcing and Maintaining Constraints Base During the Compile-Time, Journal of WSEAS Transactions on Computers , 99-357, 2006. Belal Zaqaibeh received his BSc degree with the first honor degree in computer science from Irbid National University, Jordan, in 1998. In 1999, he was the manager of Makkah Center for Computer. In 2000, he continued to graduate school at Universiti Putra Malaysia (UPM) and received his MSc in distributed computing in 2001 and his PhD in object-oriented databases in 2006. In 2006, he joined Zarqa Private University, Jordan, where he is currently working as an assistant professor of computer science. His research interests include object-oriented databases, mobile databases, integrity constraints, and object-oriented software engineering. 92 The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 Hamidah Ibrahim is currently an associate professor at the Faculty of Computer Science and Information Technology, Universiti Putra Malaysia. She obtained her PhD in computer science from the University of Wales Cardiff, UK in 1998. Her current research interests include databases, transaction processing, and knowledge-based systems. Ali Mamat is an associate professor at Computer Science Department, Universiti Putra Malaysia. He obtained a PhD in computer science from University of Bradford, UK in 1992. His research interests include databases, XML, and semantic web. Nasir bin Sulaiman is a lecturer in Computer Science in Faculty of Computer Science and Information Technology, UPM. He has been appointed as an associate professor in 2002. He obtained PhD in neural networks simulation from Loughborough University, UK in 1994. His research interest includes neural networks theory and applications, intelligent software agents, and data mining. Enforcing User-Defined Constraints During the Run-Time in OODB 93