NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 16 results Save | Export
Peer reviewed Peer reviewed
Luciano, Dennis; Prichett, Gordon – College Mathematics Journal, 1987
Linear ciphers, substitution ciphers, public-key cryptosystems, and trapdoor knapsacks are each discussed. (MNS)
Descriptors: Algebra, Algorithms, College Mathematics, Cryptography
Peer reviewed Peer reviewed
Perso, Thelma – Australian Mathematics Teacher, 1996
Presents a method for solving linear equations involving the use of inverses instead of memorizing rules. (MKR)
Descriptors: Algebra, Algorithms, Equations (Mathematics), Mathematics Instruction
Peer reviewed Peer reviewed
Bidwell, James K. – College Mathematics Journal, 1986
A possible method of derivation of prescriptions for solving problems, found in Babylonian cuneiform texts, is presented. It is a kind of "geometric algebra" based mainly on one figure and the manipulation of or within various areas and segments. (MNS)
Descriptors: Algebra, Algorithms, College Mathematics, Geometric Concepts
Peer reviewed Peer reviewed
Olson, Alton T. – Journal of Computers in Mathematics and Science Teaching, 1986
Presents an example of mathematics from an algorithmic point of view, with emphasis on the design and verification of this algorithm. The program involves finding roots for algebraic equations using the half-interval search algorithm. The program listing is included. (JN)
Descriptors: Algebra, Algorithms, Computer Software, Equations (Mathematics)
Peer reviewed Peer reviewed
Maurer, Stephen B. – Mathematics Teacher, 1984
Two mathematical topics are interpreted from the viewpoints of traditional (performing algorithms) and contemporary (creating algorithms and thinking in terms of them for solving problems and developing theory) algorithmic mathematics. The two topics are Horner's method for evaluating polynomials and Gauss's method for solving systems of linear…
Descriptors: Algebra, Algorithms, Equations (Mathematics), High Schools
Peer reviewed Peer reviewed
Fay, Temple H.; Miller, H. Vincent – Mathematics and Computer Education, 1990
Discusses a numerical technique called the method of adjoints, turning a linear two-point boundary value problem into an initial value problem. Described are steps for using the method in linear or nonlinear systems. Applies the technique to solve a simple pendulum problem. Lists 15 references. (YP)
Descriptors: Algebra, Algorithms, College Mathematics, Higher Education
Peer reviewed Peer reviewed
Book, Ronald V. – American Mathematical Monthly, 1988
The "word problem" is stated for a given collection. Facts regarding Dehn's Algorithm, definition of Thue systems, a rewriting system, lemmas and corollaries are provided. The situation is examined where the monoid presented by a finite Thue system is a group. (DC)
Descriptors: Abstract Reasoning, Algebra, Algorithms, College Mathematics
Peer reviewed Peer reviewed
Gantner, T. E. – College Mathematics Journal, 1984
An efficient division algorithm is developed, using a computer program, to convert any positive fraction to its decimal representation. The computer program listing is included. (MNS)
Descriptors: Algebra, Algorithms, College Mathematics, Computer Software
Peer reviewed Peer reviewed
Reiter, Harold; Ritchie, David – College Mathematics Journal, 1989
This article develops an algorithm to find all solutions to the problem, making all sums of a hexagram's nine lines the same. It shows how to exploit the geometric structure of the hexagram and its group of automorphisms. (YP)
Descriptors: Algebra, Algorithms, College Mathematics, Computation
Morrow, Lorna J., Ed.; Kenney, Margaret J., Ed. – 1998
This 1998 yearbook aims to stimulate and answer questions that all educators of mathematics need to consider to adapt school mathematics for the 21st century. The papers included in this book cover a wide variety of topics, including student-invented algorithms, the assessment of such algorithms, algorithms from history and other cultures, ways…
Descriptors: Algebra, Algorithms, Educational Technology, Elementary Secondary Education
Peer reviewed Peer reviewed
Newton, Tyre A. – American Mathematical Monthly, 1990
Presented is a method where a quadratic equation is solved and from its roots the eigenvalues and corresponding eigenvectors are determined immediately. Included are the proposition, the procedure, and comments. (KR)
Descriptors: Algebra, Algorithms, College Mathematics, Equations (Mathematics)
Peer reviewed Peer reviewed
Arcavi, Abraham; Bruckheimer, Maxim – College Mathematics Journal, 1991
Presents the algorithm to approximate square roots as reproduced from the 1579 edition of an algebra book by Rafael Bombelli. The sequence of activities illustrates that the process of understanding an original source of mathematics, first at the algorithmic level and then with respect to its mathematical validity in modern terms, can be an…
Descriptors: Algebra, Algorithms, College Mathematics, Content Area Reading
Peer reviewed Peer reviewed
Olson, Alton T. – Journal of Computers in Mathematics and Science Teaching, 1991
Following a short introduction on the rationale and purpose for using algorithmic structures in the teaching of algebra, two topics from elementary algebra are presented in relation to control structures from computer programing, specifically: the multiplication of polynomials defined in terms of nested loops, and the distributive property…
Descriptors: Algebra, Algorithms, Computer Assisted Instruction, Instructional Materials
Peer reviewed Peer reviewed
Kalman, Dan – Mathematics Magazine, 1990
Presented is a scheduling algorithm that uses all the busses at each step for any rectangular array. Included are two lemmas, proofs, a theorem, the solution, and variations on this problem. (KR)
Descriptors: Algebra, Algorithms, College Mathematics, Computer Science
Peer reviewed Peer reviewed
Aslan, Farhad; Duck, Howard – School Science and Mathematics, 1992
P-adic or g-adic sets are sets of elements formed by linear combinations of powers of p, a prime number, or g, a counting number, where the coefficients are whole numbers less than p or g. Discusses exercises illustrating basic numerical operations for p-adic and g-adic sets. Provides BASIC computer programs to verify the solutions. (MDH)
Descriptors: Addition, Algebra, Algorithms, College Mathematics
Previous Page | Next Page ยป
Pages: 1  |  2