Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Coding | 5 |
Algebra | 3 |
Mathematical Concepts | 3 |
Computer Science | 2 |
Computer Software | 2 |
Geometric Concepts | 2 |
Mathematics Instruction | 2 |
Programming Languages | 2 |
College Mathematics | 1 |
Color | 1 |
Computer Assisted Design | 1 |
More ▼ |
Source
Mathematics and Computer… | 5 |
Author
Sigmon, Neil P. | 2 |
Courtney, Mary F. | 1 |
Dence, Thomas P. | 1 |
Farag, Mark | 1 |
Heath, Steven | 1 |
Klima, Richard E. | 1 |
Stix, Allen | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Farag, Mark – Mathematics and Computer Education, 2007
Hill ciphers are linear codes that use as input a "plaintext" vector [p-right arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [c-right arrow above] = E [middle dot] [p-right arrow above]. Informally, a near-field is a triple [left angle bracket]N; +, *[right angle bracket] that…
Descriptors: Mathematics Instruction, Coding, Algebra, Geometric Concepts
Dence, Thomas P.; Heath, Steven – Mathematics and Computer Education, 2005
The number Pi has a rich and colorful history. The origin of Pi dates back to when Greek mathematicians realized that the ratio of the circumference to the diameter is the same for all circles. One is most familiar with many of its applications to geometry, analysis, probability, and number theory. This paper demonstrates several examples of how…
Descriptors: Technology, Probability, Number Concepts, Mathematical Concepts
Klima, Richard E.; Sigmon, Neil P. – Mathematics and Computer Education, 2005
The use of the computer, and specifically the mathematics software package Maple, has played a central role in the authors' abstract algebra course because it provides their students with a way to see realistic examples of the topics they discuss without having to struggle with extensive computations. However, Maple does not provide the computer…
Descriptors: Programming Languages, Computer Science, Algebra, Computer Assisted Design
Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java
Courtney, Mary F.; Stix, Allen – Mathematics and Computer Education, 2006
Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…
Descriptors: Textbooks, Textbook Content, Internet, Programming Languages

Sigmon, Neil P. – Mathematics and Computer Education, 1997
Demonstrates the use of technology to enhance the appreciation of applications involving abstract algebra. The symbolic manipulator Maple can perform computations required for a linear cryptosystem. One major benefit of this process is that students can encipher and decipher messages using a linear cryptosystem without becoming confused and…
Descriptors: Algebra, Coding, College Mathematics, Computer Assisted Instruction