NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Sutherland, David C. – School Science and Mathematics, 1990
Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)
Descriptors: Algebra, Coding, College Mathematics, Higher Education
Peer reviewed Peer reviewed
Donohoe, L. Joyce – AMATYC Review, 1992
Presents a public-key cryptosystem application to introduce students to several topics in discrete mathematics. A computer algorithms using recursive methods is presented to solve a problem in which one person wants to send a coded message to a second person while keeping the message secret from a third person. (MDH)
Descriptors: Algorithms, Coding, Computer Assisted Instruction, Mathematical Applications
Peer reviewed Peer reviewed
Gallian, Joseph A. – Mathematics Magazine, 1991
Described are some ways in which individual states code driver's license numbers. The encoding of month, date of birth, year of birth, sex, and others involving elementary mathematics and the use of an elaborate system of hashing functions in describing the first, middle, and last names are discussed. (KR)
Descriptors: Coding, College Mathematics, Higher Education, Mathematical Applications
Peer reviewed Peer reviewed
Wheeler, Mary L. – Mathematics Teacher, 1994
Discusses the study of identification codes and check-digit schemes as a way to show students a practical application of mathematics and introduce them to coding theory. Examples include postal service money orders, parcel tracking numbers, ISBN codes, bank identification numbers, and UPC codes. (MKR)
Descriptors: Algebra, Coding, Mathematical Applications, Mathematics Curriculum
Peer reviewed Peer reviewed
Wright, Marie A. – Mathematics Teacher, 1993
Cryptography is the science that renders data unintelligible to prevent its unauthorized disclosure or modification. Presents an application of matrices used in linear transformations to illustrate a cryptographic system. An example is provided. (17 references) (MDH)
Descriptors: Coding, Cryptography, Data Processing, Enrichment Activities