DSpace Collection:http://hdl.handle.net/123456789/632024-06-27T17:32:44Z2024-06-27T17:32:44ZNumerical Solution of Nonlinear Systems of Algebriac EquationsMahwash, Kamoh NathanielGyang, Gyemang Daudahttp://hdl.handle.net/123456789/30362020-03-25T11:31:28Z2018-03-23T00:00:00ZTitle: Numerical Solution of Nonlinear Systems of Algebriac Equations
Authors: Mahwash, Kamoh Nathaniel; Gyang, Gyemang Dauda
Abstract: Considered in this paper are two basic methods of approximating the solution of nonlinear systems of algebraic equations. The Steepest Descent method was presented as a way of obtaining good and sufficient initial guess (starting value)which is in turn used for the Broydend's method on the other hand replaces the Newton's method which requires the use of the inverse of the Jacobian matrix at every new step of iteration with a matrix whose inverse is directly determined at each step by updating the previous inverse. The result obtained by this method revealed that the setbacks encountered in computing the inverse of Jacobian matrix at every step number is eliminated hence saving human effort and computer time. The obtained result also showed that the number of steps that is reduced when compared to Newton's method used on the same problem.2018-03-23T00:00:00ZTrends in Transitive p-Groups and Their Defining RelationsApine, E.Jelten, B. N.http://hdl.handle.net/123456789/30262020-01-28T13:29:57Z2014-01-01T00:00:00ZTitle: Trends in Transitive p-Groups and Their Defining Relations
Authors: Apine, E.; Jelten, B. N.
Abstract: In this paper unless otherwise stated the letter p represents a fixed prime number. The concept of p- groups is
fundamental in the theory of groups. Sylow theorems will be assumed known in this paper. In classifying finite
groups we know in the Abelian case that the number of groups of order n is influenced largely by the character of
the prime factorization of n, and not by the size of n alone. Any finite group G contains the so called Sylow
p-subgroups which are p-groups and are closely linked to the structure of G. Recent developments in theory of
finite simple groups have brought insights on p-groups and have suggested investigations in diverse areas. In this
paper, however, we shall present some of the most basic results on transitive p-groups and their defining
relations.2014-01-01T00:00:00ZCommentaries on Hilbert’s Basis TheoremApine, E.Jelten, B. N.http://hdl.handle.net/123456789/30062019-11-22T14:03:13Z2008-01-01T00:00:00ZTitle: Commentaries on Hilbert’s Basis Theorem
Authors: Apine, E.; Jelten, B. N.
Abstract: The famous basis theorem of David Hilbert is an important theorem in commutative algebra. In particular the Hilbert’s basis
theorem is the most important source of Noetherian rings which are by far the most important class of rings in commutative
algebra. In this paper we have used Hilbert’s theorem to examine their unique properties which will help us to understand some
of the characteristics of the Noetherian rings.2008-01-01T00:00:00ZImplementation of a Data and Computer Security ApplicationBibu, G. D.Chukwuemeka, B. B.http://hdl.handle.net/123456789/30022019-11-22T12:39:06Z2009-01-01T00:00:00ZTitle: Implementation of a Data and Computer Security Application
Authors: Bibu, G. D.; Chukwuemeka, B. B.
Abstract: As information requirements become more complex, users have
adapted computer in almost all their daily endeavors. This has
made a lot of users to be online and perform most of their
businesses online. The basic data security utility applications that
are provided by most operating systems and other application
software is not strong enough to allow people to carry over the
confidence found in the physical world to the electronic world. It
does not allow people to do business electronically without worries
of deceit and not being able to have personal information kept
secret and secured from hackers and crackers. Data security has
therefore become a major problem that will jeopardize the various
electronic initiatives (e-initiatives) in business, administration,
education etc if not properly addressed through all possible means
(Syngress, 2008)
In this work, we design and implement security software which will
enable users to protect their data using several data security
techniques and approaches which are considered highly reliable.
These security techniques include; improved encryption and
decryption methods, improved folder protection techniques,
improved computer system monitoring using key logger and
camera video streaming (Thawte, 2008).2009-01-01T00:00:00Z