Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
Author
Publication Type
| Journal Articles | 4 |
| Reports - Research | 2 |
| Guides - Classroom - Teacher | 1 |
| Reports - Descriptive | 1 |
Education Level
| Grade 6 | 1 |
| Grade 7 | 1 |
| Grade 8 | 1 |
| Middle Schools | 1 |
| Secondary Education | 1 |
Audience
| Practitioners | 1 |
| Teachers | 1 |
Location
| Italy | 1 |
| United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Battaglia, Onoforio Rosario; Di Paola, Benedetto; Fazio, Claudio – Physical Review Physics Education Research, 2019
A relevant aim of research in education is to find and study the reasoning lines that students deploy when dealing with problematic situations. This can be done through an analysis of the answers students give to a questionnaire. In this paper, we discuss some methodological aspects involved in the quantitative analysis of a questionnaire by means…
Descriptors: Correlation, Coding, Statistical Analysis, Questionnaires
McNeil, Nicole M.; Weinberg, Aaron; Hattikudur, Shanta; Stephens, Ana C.; Asquith, Pamela; Knuth, Eric J.; Alibali, Martha W. – Journal of Educational Psychology, 2010
This study examined how literal symbols affect students' understanding of algebraic expressions. Middle school students (N = 322) were randomly assigned to 1 of 3 conditions in which they were asked to interpret an expression (e.g., 4c + 3b) in a story problem. Each literal symbol represented the price of an item. In the c-and-b condition, the…
Descriptors: Middle School Students, Textbooks, Mnemonics, Algebra
Farag, Mark – Mathematics and Computer Education, 2007
Hill ciphers are linear codes that use as input a "plaintext" vector [p-right arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [c-right arrow above] = E [middle dot] [p-right arrow above]. Informally, a near-field is a triple [left angle bracket]N; +, *[right angle bracket] that…
Descriptors: Mathematics Instruction, Coding, Algebra, Geometric Concepts
Peer reviewedDonohoe, L. Joyce – AMATYC Review, 1992
Presents a public-key cryptosystem application to introduce students to several topics in discrete mathematics. A computer algorithms using recursive methods is presented to solve a problem in which one person wants to send a coded message to a second person while keeping the message secret from a third person. (MDH)
Descriptors: Algorithms, Coding, Computer Assisted Instruction, Mathematical Applications

Direct link
