Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Algebra | 3 |
Coding | 3 |
Computation | 2 |
Mathematical Concepts | 2 |
Abstract Reasoning | 1 |
Automation | 1 |
College Students | 1 |
Computer Assisted Testing | 1 |
Computer Software | 1 |
Constructivism (Learning) | 1 |
Foreign Countries | 1 |
More ▼ |
Source
International Journal of… | 3 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
United Kingdom (England) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hawthorne, Casey; Rasmussen, Chris – International Journal of Mathematical Education in Science and Technology, 2015
While a significant amount of research has been devoted to exploring why university students struggle applying logic, limited work can be found on how students actually make sense of the notational and structural components used in association with logic. We adapt the theoretical framework of unitizing and reification, which have been effectively…
Descriptors: College Students, Logical Thinking, Mathematical Logic, Abstract Reasoning
Sangwin, Christopher J. – International Journal of Mathematical Education in Science and Technology, 2015
The goal of this paper is to examine single variable real inequalities that arise as tutorial problems and to examine the extent to which current computer algebra systems (CAS) can (1) automatically solve such problems and (2) determine whether students' own answers to such problems are correct. We review how inequalities arise in contemporary…
Descriptors: Algebra, Mathematics Instruction, Mathematical Concepts, Computer Software
McAndrew, Alasdair – International Journal of Mathematical Education in Science and Technology, 2008
The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…
Descriptors: Orthographic Symbols, Computation, Coding, Technology