27.03.2013 Views

BUKU ABSTRAK - Universiti Putra Malaysia

BUKU ABSTRAK - Universiti Putra Malaysia

BUKU ABSTRAK - Universiti Putra Malaysia

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

An Embedded Explicit Runge-Kutta-Nystrom Method for Solving Oscillatory<br />

Problems<br />

Dr. Norazak Senu<br />

Mohamed Suleiman and Fudziah Ismail<br />

Faculty of Science, University <strong>Putra</strong> <strong>Malaysia</strong>,<br />

43400 UPM Serdang, Selangor, <strong>Malaysia</strong>.<br />

+603-8946 6848; razak@math.upm.edu.my<br />

Keywords: Runge-Kutta-Nystrom method, phase-lag, oscillatory problem<br />

A XML based, User-centered Privacy Model in Pervasive Computing Systems<br />

Dr. Nur Izura Udzir<br />

Ali Dehghantanha and Ramlan Mahmod<br />

Faculty of Computer Science and Information Technology, University <strong>Putra</strong> <strong>Malaysia</strong>,<br />

43400 UPM Serdang, Selangor, <strong>Malaysia</strong>.<br />

+603-8946 6521; izura@fsktm.upm.edu.my<br />

Keywords: Privacy, pervasive computing, identity privacy, location privacy, time privacy<br />

271<br />

Science, Technology & Engineering<br />

A new pair of embedded explicit Runge-Kutta-Nyström (RKN) methods are developed to integrate secondorder<br />

differential equations of the form q” = f(t,q) where the solution is oscillatory. The embedded formula has<br />

dispersion order eight and dissipation order seven for the fifth-order formula. The cost for this pair is four function<br />

evaluations at each step of integration. Numerical comparisons with several codes in the scientific literature such<br />

as RKN5(4)D, RKN5(4)B, RKN4(3)G and DOPRI5 show the efficiency of the new method developed.<br />

Pervasive systems are typically embedded and invisible which make it difficult for users to know when,<br />

where, and how these devices are collecting data. With that, privacy is a major issue for pervasive computing<br />

applications and several privacy models have been proposed for pervasive environments. In this paper, we present<br />

a XML based User-centered Privacy Model (UPM) which provides content, identity, location, and time privacy<br />

with low unobtrusiveness.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!