Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Mathematics and Computer… | 11 |
Author
Ahmad, Faiz | 1 |
Combs, Randel | 1 |
Cupillari, Antonella | 1 |
DeThomas, Elizabeth | 1 |
Dence, Joseph B. | 1 |
Dence, Thomas P. | 1 |
Farag, Mark | 1 |
Fay, Temple H. | 1 |
Javadi, Mohammad | 1 |
Kennedy, Paul A. | 1 |
Mathews, John H. | 1 |
More ▼ |
Publication Type
Journal Articles | 11 |
Reports - Descriptive | 7 |
Guides - Classroom - Teacher | 4 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Teachers | 4 |
Practitioners | 3 |
Students | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ahmad, Faiz – Mathematics and Computer Education, 2011
It is a routine matter for undergraduates to find eigenvalues and eigenvectors of a given matrix. But the converse problem of finding a matrix with prescribed eigenvalues and eigenvectors is rarely discussed in elementary texts on linear algebra. This problem is related to the "spectral" decomposition of a matrix and has important technical…
Descriptors: Textbooks, Matrices, Mathematics Instruction, College Mathematics
Farag, Mark – Mathematics and Computer Education, 2007
Hill ciphers are linear codes that use as input a "plaintext" vector [p-right arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [c-right arrow above] = E [middle dot] [p-right arrow above]. Informally, a near-field is a triple [left angle bracket]N; +, *[right angle bracket] that…
Descriptors: Mathematics Instruction, Coding, Algebra, Geometric Concepts
Combs, Randel; Walls, Gary L. – Mathematics and Computer Education, 2004
In this note the authors investigate ways to shorten the amount of work involved in using the Rational Roots Theorem to find the rational roots of a polynomial with integral coefficients. The first result is a proof of a fact that we had long suspected, but were never able to find the statement of in any of the college algebra textbooks we had…
Descriptors: Algebra, Mathematical Formulas, College Mathematics
Cupillari, Antonella; DeThomas, Elizabeth – Mathematics and Computer Education, 2007
It is in the field of numerical analysis that this "easy-looking" function, also known as the Runge function, exhibits a behavior so idiosyncratic that it is mentioned even in most undergraduate textbooks. In spite of the fact that the function is infinitely differentiable, the common procedure of (uniformly) interpolating it with polynomials that…
Descriptors: Undergraduate Students, Textbooks, Intervals, Exhibits

Fay, Temple H.; Miller, H. Vincent – Mathematics and Computer Education, 1990
Discusses a numerical technique called the method of adjoints, turning a linear two-point boundary value problem into an initial value problem. Described are steps for using the method in linear or nonlinear systems. Applies the technique to solve a simple pendulum problem. Lists 15 references. (YP)
Descriptors: Algebra, Algorithms, College Mathematics, Higher Education
Skurnick, Ronald; Javadi, Mohammad – Mathematics and Computer Education, 2006
The Law of Sines and The Law of Cosines are of paramount importance in the field of trigonometry because these two theorems establish relationships satisfied by the three sides and the three angles of any triangle. In this article, the authors use these two laws to discover a host of other trigonometric relationships that exist within any…
Descriptors: Geometric Concepts, Textbooks, Algebra, Preservice Teacher Education

Osler, Thomas J. – Mathematics and Computer Education, 2002
Describes how the cubic formula can be presented easily at the precalculus level, shows how to verify that the formula is correct, and identifies when it is profitable to use. (KHR)
Descriptors: Algebra, Calculus, Curriculum Development, Higher Education
Zelator, Konstantine – Mathematics and Computer Education, 2005
This paper is written on a level accessible to college/university students of mathematics who are taking second-year, algebra based, mathematics courses beyond calculus I. This article combines material from geometry, trigonometry, and number theory. This integration of various techniques is an excellent experience for the serious student. The…
Descriptors: Geometric Concepts, Numbers, Number Concepts, Calculus

Dence, Joseph B.; Dence, Thomas P. – Mathematics and Computer Education, 1989
Presents an approach to Vieta's formula involving pi and infinite product expansions of the sine and cosine functions. Indicates how the formula could be used in computing approximations of pi. (MVL)
Descriptors: Algebra, College Mathematics, Instructional Materials, Mathematical Concepts

Kennedy, Paul A.; And Others – Mathematics and Computer Education, 1991
Presented is a method for factoring quadratic equations that helps the teacher demonstrate how to eliminate guessing through establishment of the connection between multiplication and factoring. Included are examples that allow the student to understand the link between the algebraic and the pictorial representations of quadratic equations. (JJK)
Descriptors: Algebra, Equations (Mathematics), Mathematical Formulas, Mathematical Models

Mathews, John H. – Mathematics and Computer Education, 1990
Illustrated is the use of computer algebra software to assist in both a computational and theoretical way to develop the underlying theory of polynomials and the partial fraction decomposition of a rational function. Background information and a discussion of theoretical considerations are provided. (KR)
Descriptors: Algebra, College Mathematics, Computer Assisted Instruction, Computer Uses in Education