Mathematics and Computer Education
2007 Volume 41, Number 1
Table of Contents
Number of articles: 9

Brocard Point and Euler Function
K R. S. Sastry
This paper takes a known point from Brocard geometry, a known result from the geometry of the equilateral triangle, and bring in Euler's [empty set] function. It then demonstrates how to obtain new... More
pp. 611

Shapes of the Graphs of FourthDegree Polynomials in Terms of Their Coefficients
Tatyana Flesher & Eleanor Holder
One of the main problems in undergraduate research in pure mathematics is that of determining a problem that is, at once, interesting to and capable of solution by a student who has completed only ... More
pp. 1216

Some Cosine Relations and the Regular Heptagon
Thomas J. Osler & Phongthong Heng
The ancient Greek mathematicians sought to construct, by use of straight edge and compass only, all regular polygons. They had no difficulty with regular polygons having 3, 4, 5 and 6 sides, but... More
pp. 1721

Primitive Pythagorean Triples: The 3, 4, 5 Connection
Ronald Skurnick
The Pythagorean Theorem, arguably one of the bestknown results in mathematics, states that a triangle is a right triangle if and only if the sum of the squares of the lengths of two of its sides... More
pp. 2224

Developing Formulas by Skipping Rows in Pascal's Triangle
Robert J. Buonpastore & Thomas J. Osler
A table showing the first thirteen rows of Pascal's triangle, where the rows are, as usual numbered from 0 to 12 is presented. The entries in the table are called binomial coefficients. In this... More
pp. 2529

Generalizations of Ptolemy and Brahmagupta Theorems
Ayoub B. Ayoub
The Greek astronomer Ptolemy of Alexandria (second century) and the Indian mathematician Brahmagupta (sixth century) each have a significant theorem named after them. Both theorems have to do with ... More
pp. 3036

A Linear Algebraic Approach to Teaching Interpolation
Tamir Tassa
A novel approach for teaching interpolation in the introductory course in numerical analysis is presented. The interpolation problem is viewed as a problem in linear algebra, whence the various... More
pp. 3745

Hill Ciphers over NearFields
Mark Farag
Hill ciphers are linear codes that use as input a "plaintext" vector [pright arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [cright ... More
pp. 4654

A Capstone Course for PreService Mathematics Teachers Which Uses Technology as Its Unifying Theme
Aimee J. Ellington
In 2001, the Conference Board of the Mathematical Sciences (CBMS) published "The Mathematical Education of Teachers" (MET) outlining detailed recommendations for the instruction of future... More
pp. 5566