Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 18 |
| Since 2007 (last 20 years) | 77 |
Descriptor
Source
Author
| Zandieh, Michelle | 4 |
| Allen, Frank B. | 3 |
| Trenkler, Gotz | 3 |
| Andrews-Larson, Christine | 2 |
| Berry, John S. | 2 |
| Debnath, L. | 2 |
| Dobbs, David E. | 2 |
| Farrell, Ann M. | 2 |
| Garcia, Stephan Ramon | 2 |
| Guyker, James | 2 |
| Ibrahim, Aziz | 2 |
| More ▼ | |
Publication Type
Education Level
| Higher Education | 49 |
| Postsecondary Education | 22 |
| Secondary Education | 5 |
| High Schools | 3 |
| Junior High Schools | 3 |
| Middle Schools | 3 |
| Elementary Education | 2 |
| Two Year Colleges | 2 |
| Grade 6 | 1 |
| Grade 8 | 1 |
| Intermediate Grades | 1 |
| More ▼ | |
Audience
| Teachers | 29 |
| Practitioners | 27 |
| Researchers | 2 |
| Students | 1 |
Location
| New Zealand | 2 |
| Canada | 1 |
| Connecticut | 1 |
| Finland | 1 |
| France | 1 |
| India | 1 |
| Lebanon | 1 |
| Massachusetts | 1 |
| Michigan | 1 |
| Nebraska | 1 |
| Oregon | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
McAndrew, Alasdair – International Journal of Mathematical Education in Science and Technology, 2008
The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…
Descriptors: Orthographic Symbols, Computation, Coding, Technology
Beslin, Scott J.; Heck, Brian K.; Becnel, Jeremy J. – PRIMUS, 2008
The authors explore the importance of "range" and its relationship to continuously differentiable functions that have inverses when their graphs are reflected about lines other than y = x. Some open questions are posed for the reader. (Contains 5 figures.)
Descriptors: Mathematics Instruction, Graphs, College Mathematics, Algebra
Wanstrom, Linda – Multivariate Behavioral Research, 2009
Second-order latent growth curve models (S. C. Duncan & Duncan, 1996; McArdle, 1988) can be used to study group differences in change in latent constructs. We give exact formulas for the covariance matrix of the parameter estimates and an algebraic expression for the estimation of slope differences. Formulas for calculations of the required sample…
Descriptors: Sample Size, Effect Size, Mathematical Formulas, Computation
Sani, B. – International Journal of Mathematical Education in Science and Technology, 2007
This paper presents the row-column multiplication of rhotrices that are of high dimension. This is an extension of the same multiplication carried out on rhotrices of dimension three, considered to be the base rhotrices.
Descriptors: Matrices, Multiplication, Algebra, Validity
Schmidt, Karsten – International Journal of Mathematical Education in Science and Technology, 2008
In this paper "Derive" functions are provided for the computation of the Moore-Penrose inverse of a matrix, as well as for solving systems of linear equations by means of the Moore-Penrose inverse. Making it possible to compute the Moore-Penrose inverse easily with one of the most commonly used Computer Algebra Systems--and to have the blueprint…
Descriptors: Programming Languages, Computer Uses in Education, Programming, Algebra
McCartin, Brian J. – PRIMUS, 2008
This note presents geometric and physical interpretations of the sufficient condition for a critical point to be a strict relative extremum: f[subscript xx]f[subscript yy] - f[superscript 2][subscript xy] greater than 0. The role of the double derivative f[subscript xy] in this inequality will be highlighted in these interpretations. (Contains 14…
Descriptors: Mathematics Instruction, Mathematical Formulas, Geometric Concepts, Mathematical Concepts
Lipovetsky, Stan – International Journal of Mathematical Education in Science and Technology, 2008
Benford's law of the "first digits" states that in spite of intuitively expected equal frequency of 1/9 of the decimal digits r = 1, ... , 9 appearance on the first place of any number, various empirical studies show another pattern of these frequencies distribution, which is log[subscript 10](1 + 1/r). The article considers this law and other…
Descriptors: Decision Making, Statistical Distributions, Mathematical Formulas, Matrices
Barabe, Samuel; Dubeau, Franc – International Journal of Mathematical Education in Science and Technology, 2007
Synthetic division is viewed as a change of basis for polynomials written under the Newton form. Then, the transition matrices obtained from a sequence of changes of basis are used to factorize the inverse of a bidiagonal matrix or a block bidiagonal matrix.
Descriptors: Equations (Mathematics), Validity, Mathematical Logic, Arithmetic
Marland, Eric; Palmer, Katrina M.; Salinas, Rene A. – PRIMUS, 2008
In this article we provide two detailed examples of how we incorporate biological examples into two mathematics courses: Linear Algebra and Ordinary Differential Equations. We use Leslie matrix models to demonstrate the biological properties of eigenvalues and eigenvectors. For Ordinary Differential Equations, we show how using a logistic growth…
Descriptors: Mathematics Instruction, Biology, Integrated Curriculum, Equations (Mathematics)
Laumakis, Paul J. – PRIMUS, 2008
This article details the application of an economic theory to the fiscal operation of a small engineering consulting firm. Nobel Prize-winning economist Wassily Leontief developed his general input-output economic theory in the mid-twentieth century to describe the flow of goods and services in the U.S. economy. We use one mathematical model that…
Descriptors: Mathematical Models, Algebra, Engineering, Economic Factors
Knight, D. G. – International Journal of Mathematical Education in Science and Technology, 2007
The use of digital elevation models, which represent the surface of the earth by a matrix of heights, has proved an ideal introductory topic for developing both the matrix-handling and computational skills of undergraduate mathematicians. This article looks at the solving of an easily understandable, but not necessarily simple problem: given a…
Descriptors: Algebra, Matrices, Mathematics Education, Maps
Peer reviewedHolt, Michael – Mathematics in School, 1976
The life and work of J. J. Sylvester, a mathematician who developed the theory of determinants, are briefly described. (SD)
Descriptors: Algebra, Biographies, History, Mathematicians
Gillies, A. W. – Mathematical Gazette, 1971
Descriptors: Algebra, Instruction, Mathematics, Matrices
Peer reviewedFarrell, Ann M. – Ohio Journal of School Mathematics, 1994
Descriptors: Algebra, Geometry, Mathematics Instruction, Matrices
Farag, Mark – Mathematics and Computer Education, 2007
Hill ciphers are linear codes that use as input a "plaintext" vector [p-right arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [c-right arrow above] = E [middle dot] [p-right arrow above]. Informally, a near-field is a triple [left angle bracket]N; +, *[right angle bracket] that…
Descriptors: Mathematics Instruction, Coding, Algebra, Geometric Concepts

Direct link
