NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Andrea Domínguez-Lara; Wulfrano Arturo Luna-Ramírez – International Association for Development of the Information Society, 2022
The automatic code generation is the process of generating source code snippets from a program, i.e., code for generating code. Its importance lies in facilitating software development, particularly important is helping in the implementation of software designs such as engineering diagrams, in such a case, automatic code generation copes with the…
Descriptors: Programming, Coding, Computer Software, Programming Languages
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alves, Francisco Regis Vieira; Machado Vieira, Renata Passos – International Electronic Journal of Mathematics Education, 2020
The work deals with the study of the roots of the characteristic polynomial derived from the Leonardo sequence, using the Newton fractal to perform a root search. Thus, Google Colab is used as a computational tool to facilitate this process. Initially, we conducted a study of the Leonardo sequence, addressing it fundamental recurrence,…
Descriptors: Mathematical Concepts, Teaching Methods, Visualization, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Csernoch, Mária; Biró, Piroska – Acta Didactica Napocensia, 2016
Sprego is programming with spreadsheet functions. The present paper provides introductory Sprego examples which have so far only been available in Hungarian. Spreadsheet environments offer both a programming tool which best serves beginner and end-user programmers' interest, and an approach which lightens the burden of coding and language details.…
Descriptors: Programming, Spreadsheets, Instruction, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Farag, Mark – Mathematics and Computer Education, 2007
Hill ciphers are linear codes that use as input a "plaintext" vector [p-right arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [c-right arrow above] = E [middle dot] [p-right arrow above]. Informally, a near-field is a triple [left angle bracket]N; +, *[right angle bracket] that…
Descriptors: Mathematics Instruction, Coding, Algebra, Geometric Concepts