NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Farag, Mark – Mathematics and Computer Education, 2007
Hill ciphers are linear codes that use as input a "plaintext" vector [p-right arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [c-right arrow above] = E [middle dot] [p-right arrow above]. Informally, a near-field is a triple [left angle bracket]N; +, *[right angle bracket] that…
Descriptors: Mathematics Instruction, Coding, Algebra, Geometric Concepts
Peer reviewed Peer reviewed
Direct linkDirect link
Dence, Thomas P.; Heath, Steven – Mathematics and Computer Education, 2005
The number Pi has a rich and colorful history. The origin of Pi dates back to when Greek mathematicians realized that the ratio of the circumference to the diameter is the same for all circles. One is most familiar with many of its applications to geometry, analysis, probability, and number theory. This paper demonstrates several examples of how…
Descriptors: Technology, Probability, Number Concepts, Mathematical Concepts
Peer reviewed Peer reviewed
Direct linkDirect link
Klima, Richard E.; Sigmon, Neil P. – Mathematics and Computer Education, 2005
The use of the computer, and specifically the mathematics software package Maple, has played a central role in the authors' abstract algebra course because it provides their students with a way to see realistic examples of the topics they discuss without having to struggle with extensive computations. However, Maple does not provide the computer…
Descriptors: Programming Languages, Computer Science, Algebra, Computer Assisted Design
Peer reviewed Peer reviewed
Direct linkDirect link
Courtney, Mary F.; Stix, Allen – Mathematics and Computer Education, 2006
Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…
Descriptors: Textbooks, Textbook Content, Internet, Programming Languages
Peer reviewed Peer reviewed
Sigmon, Neil P. – Mathematics and Computer Education, 1997
Demonstrates the use of technology to enhance the appreciation of applications involving abstract algebra. The symbolic manipulator Maple can perform computations required for a linear cryptosystem. One major benefit of this process is that students can encipher and decipher messages using a linear cryptosystem without becoming confused and…
Descriptors: Algebra, Coding, College Mathematics, Computer Assisted Instruction