An Efficient Approach to Access Database in J2ME Applications
نویسندگان
چکیده
Application development for mobile devices has been very challenging. Distributed applications for mobile devices should have uninterrupted data access. Though most of the mobile phones have CLDC configuration, Java provides no standard JDBC driver and API for mobile devices with CLDC configuration. Relational database in J2ME can be used with some currently available DBMSs and frameworks. But still there are problems like storage limitation, database inconsistency, nonstandard SQL, platform dependency etc. This paper proposes an approach which ensures continuous database access with shared DBMS for distributed J2ME applications running on CLDC devices. This approach also supports writing standard SQL in J2ME applications.
منابع مشابه
An Overview on the Applications of Spatial Analyses in the Management and Allocation of Hemodialysis Services
Introduction: The prevalence of Chronic Kidney Disease (CKD) reached about 13.4% in 2016. Among available treatment methods, hemodialysis is the most common way used for the treatment of patients with End-Stage Renal Disease (ESRD), the last stage of CKD. On average, these patients refer to hemodialysis centers three times a week. The high patients referral rate indicates the importance of prop...
متن کاملAn Overview on the Applications of Spatial Analyses in the Management and Allocation of Hemodialysis Services
Introduction: The prevalence of Chronic Kidney Disease (CKD) reached about 13.4% in 2016. Among available treatment methods, hemodialysis is the most common way used for the treatment of patients with End-Stage Renal Disease (ESRD), the last stage of CKD. On average, these patients refer to hemodialysis centers three times a week. The high patients referral rate indicates the importance of prop...
متن کاملA Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing
Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...
متن کاملA hybrid approach for database intrusion detection at transaction and inter-transaction levels
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
متن کاملBuilding Mobile Tourist Guide Applications using Different Development Mobile Platforms
The rapid proliferation of mobile computing technology has massive potential for providing access to different services at any time and from anywhere. The mobile telephone is more than just making calls. It allows accessing several applications and services via the internet connection or by building stand-alone applications. The mobile telephone has a considerable effect in tourism by allowing ...
متن کامل