NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 61 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Jeffrey Ehme – PRIMUS, 2024
The Miller-Rabin test is a useful probabilistic method for finding large primes. In this paper, we explain the method in detail and give three variations on this test. These variations were originally developed as student projects to supplement a course in error correcting codes and cryptography.
Descriptors: Probability, Numbers, Coding, Algorithms
Peer reviewed Peer reviewed
Direct linkDirect link
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
Direct linkDirect link
David A. M. Peterson – Cogent Education, 2023
Measurement in the social sciences involves assigning values to particular empirical cases and plays a vital role in the research process, but it can be tricky to teach. Unless an undergraduate social sciences research methods course includes the collection of original data, many of the issues of measurement can seem abstract and arcane to…
Descriptors: Popular Culture, Lecture Method, Statistics, Social Sciences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alana Hoare; Shannon Wagner; Catharine Dishke Hondzel – Educational Planning, 2024
Post-secondary institutions are required to complete a variety of quality assurance activities including external program review, a process of inviting external reviewers from outside the institution to provide constructive feedback on all aspects of an academic program. While external program reviews have been completed for decades, there has…
Descriptors: Educational Planning, Program Evaluation, Educational Quality, Quality Assurance
Peer reviewed Peer reviewed
Direct linkDirect link
Urtasun, Ainhoa – Industry and Higher Education, 2023
This report describes a teaching experience with undergraduates to approach, in a simple and practical way, artificial intelligence (AI) and machine learning (ML) -- general-purpose technologies that are highly demanded in any industry today. The article shows how business undergraduates with no prior experience in coding can use AI and ML to…
Descriptors: Undergraduate Students, Student Empowerment, Artificial Intelligence, Business Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ro, Hyun Kyoung; Bergom, Inger – New Directions for Student Services, 2020
Following Mayhew and Simonoff's recent work (2015), we describe effect coding, an alternative to dummy coding, and present an example of its application for research and assessment in higher education and student affairs.
Descriptors: Coding, Higher Education, Student Personnel Services, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Xuefei; Wang, Zhuo – Journal of Chemical Education, 2022
Electrochemistry is a branch of chemistry concerned with the interrelation of electrical and chemical effects, in which mathematical equations are employed to describe the fundamental principles of electrode processes and measurement methods. In this work, we present a graphical simulation that provides visual observations of dynamical behavior…
Descriptors: Chemistry, Simulation, Equations (Mathematics), Observation
Peer reviewed Peer reviewed
Direct linkDirect link
Schembari, N. Paul – PRIMUS, 2020
Ciphers based on rotor machines were the state-of-the-art in the mid-1900s, with arguably the most famous being the German Enigma. We have found that students have great interest in the Enigma and its cryptanalysis, so we created our own rotor cipher that is simulated with shifting tables and can be cryptanalyzed. Ours and the historic rotor…
Descriptors: Mathematics Instruction, Equipment, Technology, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Lakshminarayanan, Srinivasan; Rao, N. J. – Higher Education for the Future, 2022
There are many grey areas in the interpretation of academic integrity in the course on Introduction to Programming, commonly known as CS1. Copying, for example, is a method of learning, a method of cheating and a reuse method in professional practice. Many institutions in India publish the code in the lab course manual. The students are expected…
Descriptors: Integrity, Cheating, Duplication, Introductory Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Luce, Thom – Information Systems Education Journal, 2021
This paper describes changes, precipitated by the COVID-19 pandemic, to a capstone MIS class using Microsoft ASP.NET MVC for team development with live-clients. The advent of the pandemic required that the entire development effort of the class immediately transition from a largely in-class development effort with local SQL Server and Web Server…
Descriptors: Computer Science Education, Educational Change, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Cline, K.; Fasteen, J.; Francis, A.; Sullivan, E.; Wendt, T. – PRIMUS, 2020
We consider the use of projects in math courses as a mechanism for promoting coding, communication, and interdisciplinary application of math skills. Final projects play an important role, but we also discuss several alternate types of projects. We describe a model that incorporates projects at all stages across the undergraduate mathematics…
Descriptors: Student Projects, Mathematics Curriculum, Mathematics Activities, Mathematics Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Gianmarc Grazioli; Adam Ingwerson; David Santiago Jr.; Patrick Regan; Heekun Cho – Journal of Chemical Education, 2023
Computational chemistry instructional activities are often based around students running chemical simulations via a graphical user interface (GUI). GUI-based activities offer many advantages, as they enable students to run chemical simulations with a few mouse clicks. Although these activities are excellent for introducing students to the…
Descriptors: Computation, Chemistry, Teaching Methods, Science Education
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5