NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 12 results Save | Export
Peer reviewed Peer reviewed
DeMarr, Ralph E.; Gonzales, Nancy A. – School Science and Mathematics, 1991
A sample of novel verbal problems which can be solved by using systems of linear equations with free variables is presented. The procedure of Gaussian elimination is used to solve the system. (KR)
Descriptors: Algebra, Mathematical Applications, Mathematical Formulas, Mathematics Education
Peer reviewed Peer reviewed
Caulfield, Michael; And Others – College Mathematics Journal, 1986
The problem of controlling the grizzly bear population at Yellowstone is described. The results are presented in graphical form and discussed. A computer program is included. (MNS)
Descriptors: College Mathematics, Computer Software, Graphs, Higher Education
Peer reviewed Peer reviewed
Amir-Moez, Ali R. – School Science and Mathematics, 1992
Presents a short study of proper values of two-by-two matrices with real entries. Gives examples of symmetric matrices and applications to systems of linear equations of perpendicular lines intersecting at the origin and central conics rotated about the origin to eliminate the xy term from its equation. (MDH)
Descriptors: Analytic Geometry, Mathematical Applications, Mathematical Formulas, Mathematics Education
Peer reviewed Peer reviewed
Paton, Ray – Journal of Biological Education, 1990
Two properties of a wing, namely aspect ratio and wing loading, are described and the matrix approach is used to make certain deductions about particular wing plans. Some examples are provided which show how the matrix transformation of one wing plan into another brings about predictable changes in wing properties. (KR)
Descriptors: Algebra, Aviation Technology, Biology, Birds
Peer reviewed Peer reviewed
Lowther, Martha H. – Mathematics Teacher, 1996
Presents cost analyses of building a patio, incorporating manipulatives, pattern building, graphing calculators, matrix applications, and functions. Includes reproducible student worksheet. (MKR)
Descriptors: Consumer Economics, Cost Effectiveness, Functions (Mathematics), Graphing Calculators
Peer reviewed Peer reviewed
Brazier, Gerald; Watkins, Will – Journal of Computers in Mathematics and Science Teaching, 1986
Points out the benefits of students using LOGO with problems dealing with vectors and matrices. Provides examples of performing linear algebraic computations in LOGO. (ML)
Descriptors: Algebra, Computer Science Education, Computer Uses in Education, Mathematical Applications
Peer reviewed Peer reviewed
Rector, Robert E. – Mathematics Teacher, 1987
Game theory is appropriate as a topic for an honors seminar for high school students. Matrices provide a model for analyzing certain situations involving conflict, and probability theory can be used to determine the best strategies for the players. Variations on the ancient game of morra are discussed. (MNS)
Descriptors: Game Theory, Games, Mathematical Applications, Mathematical Enrichment
Peer reviewed Peer reviewed
Mathematics Teacher, 1989
Describes three teaching activities for secondary school mathematics classroom: designing a house; guessing the slope function in a calculus course; and solving the six problems of bisymmetric matrices. (YP)
Descriptors: Algebra, Calculus, Computer Assisted Instruction, Functions (Mathematics)
Peer reviewed Peer reviewed
Glaister, Paul – Mathematics Teacher, 1992
Abstract ideas in linear algebra are illustrated at different levels of difficulty through the investigation of the solution to a well-known puzzle. Matrices are used to model the puzzle and the concepts of rank, underdetermined systems, and consistency are employed in the solution to the problem. (MDH)
Descriptors: Discovery Learning, Enrichment Activities, Mathematical Applications, Mathematical Enrichment
Peer reviewed Peer reviewed
Wright, Marie A. – Mathematics Teacher, 1993
Cryptography is the science that renders data unintelligible to prevent its unauthorized disclosure or modification. Presents an application of matrices used in linear transformations to illustrate a cryptographic system. An example is provided. (17 references) (MDH)
Descriptors: Coding, Cryptography, Data Processing, Enrichment Activities
North Carolina School of Science and Mathematics. Dept. of Mathematics and Computer Science. – 1988
This material on matrices is part of "Introduction to College Mathematics" (ICM), designed to prepare high school students who have students who have completed algebra II for the variety of mathematics they will encounter in college and beyond. The concept goals of this unit are to use matrices to model real-world phenomena, to use matrices as…
Descriptors: Computer Assisted Instruction, Computer Software, Computer Uses in Education, High Schools
Peer reviewed Peer reviewed
Kalman, Dan – Mathematics Magazine, 1990
Presented is a scheduling algorithm that uses all the busses at each step for any rectangular array. Included are two lemmas, proofs, a theorem, the solution, and variations on this problem. (KR)
Descriptors: Algebra, Algorithms, College Mathematics, Computer Science