NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Journal Articles15
Reports - Descriptive15
Audience
Teachers1
Location
Singapore1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 15 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alves, Francisco Regis Vieira; Machado Vieira, Renata Passos – International Electronic Journal of Mathematics Education, 2020
The work deals with the study of the roots of the characteristic polynomial derived from the Leonardo sequence, using the Newton fractal to perform a root search. Thus, Google Colab is used as a computational tool to facilitate this process. Initially, we conducted a study of the Leonardo sequence, addressing it fundamental recurrence,…
Descriptors: Mathematical Concepts, Teaching Methods, Visualization, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Coggins, Porter E., III; Glatzer, Tim – PRIMUS, 2020
We present an algorithm for a matrix-based Enigma-type encoder based on a variation of the Hill Cipher as an application of 2 × 2 matrices. In particular, students will use vector addition and 2 × 2 matrix multiplication by column vectors to simulate a matrix version of the German Enigma Encoding Machine as a basic example of cryptography. The…
Descriptors: Mathematics Instruction, Matrices, Technology, Addition
Peer reviewed Peer reviewed
Direct linkDirect link
Linsenmeier, Katherine A.; Sherin, Miriam; Walkoe, Janet; Mulligan, Martha – Mathematics Teacher, 2014
The authors present three strategies for making sense of students' mathematical thinking. These lenses make the abstract idea of "making sense of student thinking" more manageable and concrete. We start by taking an initial look at a student's idea, going deeper, and finally looking across several ideas.
Descriptors: Mathematics Instruction, Mathematical Logic, Thinking Skills, Mathematical Concepts
Peer reviewed Peer reviewed
Direct linkDirect link
Sack, Jacqueline J. – Journal of Mathematical Behavior, 2013
This article explicates the development of top-view numeric coding of 3-D cube structures within a design research project focused on 3-D visualization skills for elementary grades children. It describes children's conceptual development of 3-D cube structures using concrete models, conventional 2-D pictures and abstract top-view numeric…
Descriptors: Educational Technology, Computer Uses in Education, Research Projects, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
Amador, Julie M.; Soule, Terence – Mathematics Teaching in the Middle School, 2015
By 2020, five of the top ten in-demand jobs in the United States will be in information technology (Moeller 2012). Companies across the nation are seeking a new type of employee: one who is computer savvy and who is familiar with computer coding, data, mathematics, and augmented reality (Leber 2013). Recent reports indicate that, although students…
Descriptors: Mathematics Instruction, Secondary School Mathematics, Middle School Students, Females
Peer reviewed Peer reviewed
Direct linkDirect link
Liu, Andy – College Mathematics Journal, 2009
In this paper, we give two unexpected applications of a Hamming code. The first one, also known as the "Hat Problem," is based on the fact that a small portion of the available code words are actually used in a Hamming code. The second one is a magic trick based on the fact that a Hamming code is perfect for single-error correction.
Descriptors: Mathematics Instruction, College Mathematics, Coding, Mathematical Concepts
Peer reviewed Peer reviewed
Direct linkDirect link
Karls, Michael A. – PRIMUS, 2010
At the suggestion of a colleague, I read "The Code Book", [32], by Simon Singh to get a basic introduction to the RSA encryption scheme. Inspired by Singh's book, I designed a Ball State University Honors Colloquium in Mathematics for both majors and non-majors, with material coming from "The Code Book" and many other sources. This course became…
Descriptors: College Mathematics, Mathematics Instruction, Mathematical Concepts, Homework
Peer reviewed Peer reviewed
Direct linkDirect link
Chua, Boon Liang – Mathematics Teaching in the Middle School, 2008
When students learn mathematics, they tend to understand and remember the mathematical processes that they find practical and relevant. It is not surprising then that "Principles and Standards for School Mathematics" (NCTM 2000) encourages teachers to help students discover the relevance of mathematics in their daily lives. To help young people…
Descriptors: Mathematical Concepts, Mathematics Instruction, Teaching Methods, Literature
Peer reviewed Peer reviewed
Direct linkDirect link
Kaur, Manmohan – PRIMUS, 2008
In order to get undergraduates interested in mathematics, it is necessary to motivate them, give them good reasons to spend time on a subject that requires hard work, and, if possible, involve them in undergraduate research. This article discusses how cryptography can be used for all these purposes. In particular, a special topics course on…
Descriptors: College Mathematics, Mathematics Instruction, Student Motivation, Learning Motivation
Peer reviewed Peer reviewed
Direct linkDirect link
Dence, Thomas P.; Heath, Steven – Mathematics and Computer Education, 2005
The number Pi has a rich and colorful history. The origin of Pi dates back to when Greek mathematicians realized that the ratio of the circumference to the diameter is the same for all circles. One is most familiar with many of its applications to geometry, analysis, probability, and number theory. This paper demonstrates several examples of how…
Descriptors: Technology, Probability, Number Concepts, Mathematical Concepts
Peer reviewed Peer reviewed
Direct linkDirect link
Clausen, Mary C. – Mathematics Teacher, 2005
The problem of solving mathematical equations can be quite tough for some students hence they face a great difficulty when applying ideas to the actual process. Students in algebra classes are taught coding in which they write down what they will need to do to solve the equation and this coding makes the students more adept at solving equations…
Descriptors: Children, Cognitive Development, Equations (Mathematics), Algebra
Peer reviewed Peer reviewed
Direct linkDirect link
Klima, Richard E.; Sigmon, Neil P. – Mathematics and Computer Education, 2005
The use of the computer, and specifically the mathematics software package Maple, has played a central role in the authors' abstract algebra course because it provides their students with a way to see realistic examples of the topics they discuss without having to struggle with extensive computations. However, Maple does not provide the computer…
Descriptors: Programming Languages, Computer Science, Algebra, Computer Assisted Design
Chua, Boon Liang – Australian Mathematics Teacher, 2006
This article describes Cryptography, defined as the science of encrypting and deciphering messages written in secret codes, it has played a vital role in securing information since ancient times. There are several cryptographic techniques and many make extensive use of mathematics to secure information. The author discusses an activity built…
Descriptors: Matrices, Mathematics Activities, Secondary School Teachers, Secondary School Students
Peer reviewed Peer reviewed
Sigmon, Neil P. – Mathematics and Computer Education, 1997
Demonstrates the use of technology to enhance the appreciation of applications involving abstract algebra. The symbolic manipulator Maple can perform computations required for a linear cryptosystem. One major benefit of this process is that students can encipher and decipher messages using a linear cryptosystem without becoming confused and…
Descriptors: Algebra, Coding, College Mathematics, Computer Assisted Instruction