NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
Fay, Temple H.; Miller, H. Vincent – Mathematics and Computer Education, 1990
Discusses a numerical technique called the method of adjoints, turning a linear two-point boundary value problem into an initial value problem. Described are steps for using the method in linear or nonlinear systems. Applies the technique to solve a simple pendulum problem. Lists 15 references. (YP)
Descriptors: Algebra, Algorithms, College Mathematics, Higher Education
Peer reviewed Peer reviewed
Pollak, Henry – Australian Mathematics Teacher, 1989
Possible ways of mechanization for counting using a binary system are discussed. Shows a binary representation of the numbers and geometric models having eight triples of lamps. Provides three problem sets. (YP)
Descriptors: Algorithms, Computation, Geometric Constructions, Geometry
Johnson, Marvin L. – 1989
Discrete mathematics and finite mathematics differ in a number of ways. First, finite mathematics has a longer history and is therefore more stable in terms of course content. Finite mathematics courses emphasize certain particular mathematical tools which are useful in solving the problems of business and the social sciences. Discrete mathematics…
Descriptors: Algorithms, Community Colleges, Course Content, Mathematical Applications
Peer reviewed Peer reviewed
Evered, Lisa – Arithmetic Teacher, 1989
Outlines various subtraction methods, such as the decomposition method, equal-addends method, and low-stress algorithm. Describes a subtraction method by addition of complements. Discusses the advantages and disadvantages of the method. (YP)
Descriptors: Algorithms, Arithmetic, Computers, Elementary School Mathematics
Peer reviewed Peer reviewed
Schoaff, Eileen; Rising, Gerald – Mathematics and Computer Education, 1990
Describes examples of rational representation as a guide for translating terminology and information encountered in manuals for computers. Discusses four limitations of the representation. (YP)
Descriptors: Algorithms, Computation, Decimal Fractions, Mathematical Applications
Peer reviewed Peer reviewed
Donohoe, L. Joyce – AMATYC Review, 1992
Presents a public-key cryptosystem application to introduce students to several topics in discrete mathematics. A computer algorithms using recursive methods is presented to solve a problem in which one person wants to send a coded message to a second person while keeping the message secret from a third person. (MDH)
Descriptors: Algorithms, Coding, Computer Assisted Instruction, Mathematical Applications
Peer reviewed Peer reviewed
Reiter, Harold; Ritchie, David – College Mathematics Journal, 1989
This article develops an algorithm to find all solutions to the problem, making all sums of a hexagram's nine lines the same. It shows how to exploit the geometric structure of the hexagram and its group of automorphisms. (YP)
Descriptors: Algebra, Algorithms, College Mathematics, Computation
Peer reviewed Peer reviewed
Joyner, Virginia G.; Haggard, Paul W. – Mathematics and Computer Education, 1990
Discusses how to express an n factorial as a product of powers of primes. Provides two examples and answers. Presents four related suggestions. (YP)
Descriptors: Algorithms, College Mathematics, Computation, Division
Peer reviewed Peer reviewed
Austin, Joe Dan – Mathematics and Computer Education, 1990
Shows a series of Euclidean equations using the Euclidean algorithm to get the greatest common divisor of two integers. Describes the use of the equations to generate a series of circles. Discusses computer generation of Euclidean circles and provides a BASIC program. (YP)
Descriptors: Algorithms, College Mathematics, Computer Graphics, Computer Software
Peer reviewed Peer reviewed
Waits, Bert K.; Demana, Franklin – College Mathematics Journal, 1990
The rule of 78 is used by banks and loan companies to compute the amounts due when installment loans are paid early. Describes an unexpected case of negative amortization when the rule is applied. Presents an actual problem and discusses the case. (YP)
Descriptors: Algorithms, College Mathematics, Computation, Computer Oriented Programs
Peer reviewed Peer reviewed
Wood, Eric F. – Arithmetic Teacher, 1989
Presents an easy method for constructing magic squares from three-by-three to general squares. Provides a computer program generating odd-order magic squares. Six references are listed. (YP)
Descriptors: Algorithms, Computation, Computer Uses in Education, Elementary Education
Peer reviewed Peer reviewed
Kalman, Dan – Mathematics Magazine, 1990
Presented is a scheduling algorithm that uses all the busses at each step for any rectangular array. Included are two lemmas, proofs, a theorem, the solution, and variations on this problem. (KR)
Descriptors: Algebra, Algorithms, College Mathematics, Computer Science
Peer reviewed Peer reviewed
Niaz, Mansoor – Journal of Chemical Education, 1989
Defines M-demand as the maximum number of schemes that the subject must activate simultaneously in the course of executing a task. Discusses the effect of M-demand on problem solving. Uses algorithms to reduce M-demand. Describes the role of algorithms in problem solving. (MVL)
Descriptors: Algorithms, Chemistry, Cognitive Development, Cognitive Processes
New York City Board of Education, Brooklyn, NY. Div. of Curriculum and Instruction. – 1986
This document serves as Volume II of a two-part course designed to improve mathematical proficiency and understanding as the student is given practice in relevant problem-solving situations. It includes the mathematics skills needed to make sound consumer decisions. The purpose of this course is to review, reinforce and extend concepts learned in…
Descriptors: Algorithms, Computer Assisted Instruction, Computer Oriented Programs, Computer Uses in Education