The Developmental Math Challenge and Statway at LaGuardia – Part I

This gallery contains 1 photo.

Statway: a Gateway to Graduation I have been an assistant Professor at LaGuardia Community College’s department of Mathematics, Engineering, and Computer Science since Fall 2012. My background is both theoretical Physics and Statistics, and I have an extensive teaching and … Continue reading

More Galleries | Leave a comment

Chancellor’s Award for Excellence in Undergraduate Mathematics Instruction

CUNY’s Office of Academic Affairs has released the 2015 Application for the Chancellor’s Award for Excellence in Undergraduate Mathematics Instruction.

Full-time and part-time faculty at CUNY community colleges, comprehensive colleges, and senior colleges are eligible to apply.  Awards in the amount of $5,000 are based on evidence demonstrating that the faculty member’s students improved their skills in math as a result of a particular successful technique or action. Materials submitted by candidates include evidence of excellent instructional methods, as measured by improvements in student learning, within at least the past year. Eligible courses for the award are developmental or credit-bearing mathematics courses up to and including the first year of calculus.

Applications, which are due February 12, 2015, contain detailed information and criteria.  CUNY math faculty are encouraged to apply!  Questions can be emailed to: mathinstructionaward@mail.cuny.edu

Posted in Uncategorized | Leave a comment

The Climate March Math

climate march by jonathan cornickThis past Sunday, did you see hundreds of photos from the People’s Climate March posted on your friends’ Facebook and kick yourself for having a lazy afternoon on your couch (as I kind of did)?

The New York Times reported that, on September 21, approximately 311,000 people participated in the March in New York City. The article said that the number was “… provided by 35 crowd spotters and analyzed by a mathematician from Carnegie Mellon University…”

There seem to be at least a few different ways of counting crowds, many of which use a basic “area times density” principle. They include the classic technique developed in the 1960s called the Jacobs Method, and updated, more accurate methods such as Yip and Watson’s.

While 311,000 was more than enough to make me wonder why I didn’t join this historic event, the event’s organizer claims that nearly 400,000 marched. There is no way to know whether this discrepancy comes from simple errors, or public relations motives. Or is there?

Professors: Do you think you can use this topic in any of your math classes? If so, in which course and how?

(Photo courtesy of Professor Jonathan Cornick at QCC, who was one of those Facebook friends)

Posted in Uncategorized | 8 Comments

Evidence-Based Reform of Remedial Mathematics

I am an Associate Professor in the Mathematics and Computer Science Department at Queensborough Community College, and I have spent the last six years working on improving remedial mathematics.

When I started at QCC in 2007, students either placed into a semester long elementary algebra course, or a semester long arithmetic course after which, if they passed, they were required to take the elementary algebra course. The majority of students coming to QCC placed into one of these courses. Success rates were very low – for example only 3% of students placing into arithmetic graduated with an Associates degree within six years, only 10% of them even exited remediation, and in general passing rates in elementary algebra were consistently 35-40%.

I have been involved in several evidence-based reforms to address the low success rates of students who place into remedial mathematics. Each step the changes have been directed by a growing body of peer reviewed research, and by careful analysis of local statistical data.

In 2009 the QCC math department created a compressed 4-week, 20-hour version of the arithmetic course. This course was successful in the sense that students passed at a much higher rate, despite having the same curriculum and exit requirements as the traditional course. However, later analysis revealed that these students weren’t passing elementary algebra at a greater rate than before. The arithmetic course(s) seemed mainly to serve as an obstacle to student success. In Spring 2013 the department voted to eliminate the arithmetic course completely for a variety of reasons.

Together with my colleagues G. Michael Guy and Karan Puri, we studied the effect of the course elimination and found that students who would previously have placed into arithmetic were not adversely affected in the rate at which they passed elementary algebra. This study has been published in MathAMATYC Educator.

Of course, we are under no illusion that we have magically solved the issue of weak arithmetic skills in some of our students, but we believe that an arithmetic course is not the solution to this issue. Students, who learn an arithmetic skill in one course, aren’t likely to remember it 4-6 months later when it’s required in algebra if they weren’t given a context in the first place.

However, whether students take arithmetic or not, exit rates from remedial mathematics at QCC remain disturbingly low in the 35-40% range. In an attempt to address thiswe wrote an elementary algebra book in which we contextualize arithmetic skills and introduce them “just in time”. For example, we start with linear equations, which only require positive integer operations to solve, then review signed numbers, and then move on to linear equations with negative number operations. Initial results have been promising, in a study involving six instructors using this textbook students were nearly twice as likely to pass the course as opposed to a control group taught be instructors using the standard departmental text.

Our emphasis is on rethinking pedagogy and using time more effectively for student centered problem solving rather than shifting the issue to a lower course.

My research, supported this year by a Chancellor’s Research Fellowship for Community Colleges, will focus on these questions:

  1. How do students who would have formerly been placed into arithmetic perform in their credit math course(s)?
  2. How do students who take remedial algebra in classes with our contextualized textbook and student centered problem solving pedagogy perform in subsequent credit math course(s)?
  3. How do various attributes and attitudes influence student success, and what can we do inside and outside the classroom to support those which have a positive effect, and change those which have a negative effect?
Posted in Uncategorized | 3 Comments

Chancellor’s Research Fellowship

In Spring 2014, Interim Chancellor Kelly awarded 19 “Chancellor’s Research Fellowships” to faculty at CUNY’s community colleges through a highly competitive process.  These fellowships fund research in many disciplines during the 2014-2015 academic year.  Three of the Fellows are mathematicians.  Luis Fernandez from Bronx Community College submitted a proposal regarding the curvature of harmonic surfaces in spheres. Uma Iyer, also from Bronx Community College, will examine representations of algebras of quantum differential operators.  Queensborough Community College’s Jonathan Cornick will engage in a longitudinal study of remedial mathematics reform.  Congratulations to these faculty.

Stay tuned!  Professor Cornick will keep CUNYMath blog readers apprised of his research.

Posted in Uncategorized | 1 Comment

Calculus Boot Camp

Calculus Boot Camp, an initiative of Interim Chancellor William Kelly, has launched at six CUNY campuses.  In July and August 2014, hundreds of students across Baruch College, Brooklyn College, City College, LaGuardia Community College, Lehman College and NYC College of Technology will participate in free workshops on campus.  Designed to enhance  the skills of students between their spring semester of Pre-Calculus and fall semester of Calculus, Boot Camp aims to give participants an advance look at the material they will cover for credit in a few short weeks. The program is sponsored by the CUNY Central Office of Academic Affairs, and will include an evaluation component to gauge its effects.

Math faculty teaching the workshops also serve as campus coordinators for the program.  Special thanks to Professors Peter Gregory, Jeff Suzuki, Matthew Auth, Mahdi Majidi-Zolbanin, Joseph Fera and Satyanand Singh.  Follow along at #CalculusBootcamp

Posted in Uncategorized | 2 Comments

Congratulations Janet Liou-Mark, recipient of the MAA Metro NY’s Distinguished Teaching Award

City Tech professor Janet Liou-Mark was presented with the Distinguished Teaching Award by the Mathematical Association of America’s New York Section at their annual meeting on May 3rd.   As her colleague, I can confirm that her creativity, positivity, enduring belief in her students, and indomitable energy are truly astonishing – Janet, we salute you!  Congratulations, and well deserved.

Professor Janet Liou-Mark (right) being presented her award by  New York Section Chair-Elect Elena Goloubeva (left).

Professor Janet Liou-Mark (right) being presented her award by New York Section Chair-Elect Elena Goloubeva (left).

For more details, check out the announcements on the MAA and City Tech sites.  For more on Janet, take a look at this great interview by Mari Watanabe-Rose here on the CUNY Math Blog.

Posted in Uncategorized | Tagged , , , , | 3 Comments

CUNY Math Conference

Almost 200 participants gathered last month as CUNY hosted it’s biennial Math Conference for faculty on May 9, 2014 at the Graduate Center.  With a theme centered around ‘Effective Instructional Strategies’, the day-long conference featured presentations on remedial math education, technology, pedagogy,  and communication.  “Globalizing Our Classrooms” was the keynote address from Deborah Hughes Hallett from the University of Arizona.  The program, abstracts and presentation slides are available to peruse online.  The day proved extra engaging through live tweets to #cunymath14.

BnNsu3uCMAAK7Nf

Beyond the presentations, faculty enthusiasm for the day was palpable.  Colleagues dispersed across a large University were able to come together around the shared passion of math instruction.  Special thanks to the planning committee: Warren Gordon (Baruch), John Verzani (CSI), G. Michael Guy (Queensborough), and John Velling (Brooklyn).

Posted in Uncategorized | Tagged , | 1 Comment

Teaching a large Calculus I class – lessons learned

Last semester I taught a large section of Calculus I. There were 124 students in the class. Teaching a large class is not for everyone, but if you are so inclined, it can be a rewarding experience provided you pay attention to certain details.

Teaching a large class of over a hundred students requires a good deal of management skill. This sort of management isn’t a one-time thing like preparing lecture notes and reusing them. No, this sort of management is an integral component of teaching large classes. There’s management of the students and management of the graduate teaching assistants. If management is not your cup of tea, then it’s best to stick to the usual class maximum of 35 students.

At least one teaching assistant is indispensable, at the very least to help with monitoring exams and collecting and returning homework, quizzes, and exams. Otherwise too much class time will be spent on these sorts of administrative tasks. Liang Zhao served as teaching assistant for my Calculus I class last semester. He did a great job. The students appreciated our seamless efficiency.

There are many ways to assign responsibilities to a teaching assistant. I assigned grading of homework and quizzes (25% of the grade) to Liang. In my classes homework and quizzes are graded generously with relaxed deadlines; there is no reason why everyone cannot get a high score.

I also organized two informal recitation sessions per week. These sessions scheduled from 8:00 am – 9:00 am on Tuesdays and Thursdays quickly became popular especially since Liang is a good instructor. These sessions had the effect of not only helping students to finish their homework, but also of making sure they were on time. Students got into the habit of coming well before 9:00 am for the 9:00 am class. Punctuality is a big deal in a large class. Otherwise there will be students strolling in at all times. It must be enforced through a combination of incentives and consequences. It is an ongoing management issue.

Together, Liang and I worked hard to make this class a success, considerably over what was expected of us. Our reward was that things went well. It would be very easy to spend a lot of time and still have all sorts of problems leading to a frustrating experience. Fortunately our strategies were effective.

I graded the exams (2 tests and a final each 25% of the grade). If I didn’t do this, I wouldn’t have a good sense of what the students were learning. I got to know the students and was able to give them one-on-one attention – something that is hard to do in a large class. I am not advocating this particular strategy as it is extremely time-consuming, merely noting that I found it effective at communicating my leadership style.

Anonymity in numbers is an issue in a large class. Some interesting things occur when the students think the professor does not know Jill from Jane or Fred from Frank.

One such thing is changing test answers and asking for a re-grade under the assumption the professor made a mistake. My tests are not multiple-choice tests and I give partial credit. It is possible to overlook a correct step here and there when grading so many exams. My solution was to photocopy the exams before returning. Yes, all 124 of them. These are the organization and management issues I was talking about. It’s an ongoing thing throughout the semester. The plus side is that I have a wealth of data that I can analyze at my convenience.

When taking a test sitting so close to each other, it is hard not to accidently look at a neighbor’s test inches away. This made everyone uncomfortable. I handled this issue by using two large classrooms for exams, one monitored by me and the other by the TA. Students were able to sit comfortably at a respectable distance from each other. For the final exam all the students were in the auditorium that seats 260. I thought this was better than splitting up the class.

Room size can become an issue. I had 124 students in a 130 seat classroom. If I could make one suggestion, it would be to reduce the maximum size of the class to 110 so as to fit comfortably in the many large classrooms that seat 130 to 160. The seats are too tightly crammed together making it difficult to get in and out when filled to capacity. I noticed that students preferred sitting on the floor and the steps rather than sitting so very close to each other.

This is especially important in a math class because a larger auditorium may be problematic. I don’t think there is any effective substitute for writing on the board while explaining math. I also think a technology-enhanced lecture is good and I used the computer and projector often. But writing on the board is a basic strategy for teaching math. If the classroom is too large, like for example, the 260 seat auditorium, then students in the back cannot see the board – there is only so big we can write.

It would be a mistake to teach a large class thinking one can do the same amount of work or a little more and get double teaching credits. It is more work than teaching two regular size classes (for a maximum of 70 students). For the administration, it is three sections for the price of two. For faculty it frees up some in-house teaching hours for advising graduate and undergraduate students and mentoring teaching assistants. This is especially so for faculty with limited in-house teaching hours, whether the limitation is due to grant commitments, commuting difficulties or something else. It could be a win-win situation for both faculty and administrators.

In my next post I will talk about the data I collected and the results of my analysis.

Posted in Uncategorized | 1 Comment

Is RSA Safe?

There has been some talk in the news recently that the security provided by the RSA encryption algorithm isn’t as secure as it used to be.

RSA is an acronym standing for Rivest, Shamir, and Adleman, the individuals who designed the algorithm at MIT in 1977.

Rivest, Shamir, Adleman

Rivest, Shamir and Adleman

An equivalent system was developed by British mathematician Clifford Cocks in 1973, though at the time he was working for a clandestine branch of the government, and his work went unattributed for many years.

Clifford Cocks

Clifford Cocks

The RSA algorithm is one of the cryptographic workhorses of the internet, helping to put the “s” in “https” on the websites we use every day.  Through ingenious means, which we won’t discuss here, it is also used to produce digital signatures, which guarantee that messages originate from their specified sources.

The article linked above, concerning looming insecurities in RSA, discusses a recent talk delivered by Alex Stamos at the annual Black Hat conference in Las Vegas.  From the article it is difficult to fathom how dire the crisis might be.  It’s said that Stamos is disconcerted by recent progress made by French mathematician Antoine Joux on the discrete logarithm problem.  There is no comment from Joux, whose word I would find more definitive.  How certain can we be that the alarm isn’t an illusion?

Those things will become more clear in coming weeks no doubt.  But what is the discrete logarithm problem, and how does it relate to RSA?

We should start with a review of the ordinary logarithm function, invented by the Scottish wizard Napier in the 17th century. We then give a short description of modular arithmetic, define the discrete logarithm problem, and review RSA.  Finally, we’ll see how all these fit together, and why the ability to compute discrete logarithms quickly challenges current security protocols.

A logarithm is a function which takes two positive real numbers, a base b together with an input a and returns the number c such that b^c = a. In notation we express this by \log_b(a) = c.

The fact that there is such a number c is interesting in itself.  The existence of c can quickly be confirmed by examining a graph of the exponential function.  The following figure is for b = 2, though for other values of b the figure is essentially the same.  Note that for any output (on the y axis) there is an input (on the x axis) such that the function strikes the output with the input.  This justifies the definition of the logarithm.

exp2

The graph of the curve described by y = 2^x

To understand the discrete logarithm, it is necessary to understand the discrete context.  Here we are not concerned with real numbers, but rather with integers (whole numbers).  In fact, we are only concerned with the numbers \{0,1,2,\ldots,n-1\} for a fixed integer n.  We can do arithmetic in this finite realm provided we are willing to “wrap around” when our sums an products go out of scope.  The exact nature of what happens is discussed in this introductory article from the Khan Academy.  If you would like something more serious, the article by Gauss himself is not difficult, and uses (in fact introduces) all the modern notation.  Amazingly I cannot find an English edition of Disquisitiones Arithmeticae online, and so I refer the reader to the excerpts found in the collection God Created the Integers.

To give a few fast examples, we write
5^2 \equiv 1 \mod{4}

to mean that if we were to consider 25 = 5^2 stones and count them out in groups of 4, in the last pile we would have a single stone.  We call 1 the residue of 25 modulo 4. Note that if we were to take 5 stones and count them out in groups of 4, then in the last pile we would have only 1 stone.  That is, the residue of 5 mod 4 is already 1.  Note also that in this case the product of the residues is the residue of the product.  In other words, using C++ notation,

5^2 \% 4 == (5\%4)(5\%4) because 1 = 1\cdot 1.

In fact this is true in general, and explains many of the properties of numbers we learn in grade school.  For instance we learn that a number is divisible by 3 if and only if its digits sum to three.  I will use modular arithmetic to show why this is true for the arbitrary example of 2349. First expand using the definition of a decimal number.

2349 = 2\cdot 10^3 + 3\cdot 10^2 + 4 \cdot 10 + 9

 

Now note that 10 \equiv 1 \mod{3} and so the same is true for any power of 10.  Thus 2349 \equiv 2+3+4+9 \mod{3}.

Now 2349 is divisible by three if and only if 2349 \equiv 2+3+4+9 \equiv 0 \mod{3}.  That is, it is equivalent to the condition that the sum of the digits is also 0 mod 3, or in other words that the sum of the digits is divisible by 3.  This gives something of the flavor of discrete arithmetic.

What should a logarithm be in the discrete context?  We can use the old definition, with an additional twist.  For numbers b and a in \{0,1,\ldots,n-1\} define the discrete logarithm (base b ) of a to be the number k in \{0,1,\ldots,n-1\} such that b^k \equiv a \mod{n}.  For instance, because we know that 11^5 \equiv 10 \mod{17}, it follows that the discrete logarithm of 10 base 11 mod 17 is 5.

Again, we have the question of whether the logarithm is well defined.  Is it the case that for any choice of a,b and n, the integer k exists such that b^k \equiv a \mod{n}?  The answer is no — you should find it easy to produce a counter example.  Also, unlike the continuous cases, the discrete exponential function is not one-to-one.  This means that the uniqueness of k is also an issue.

In group theoretic terms, the base now has to be a generator of the multiplicative group of integers mod n in order for the definition of logarithm to make sense.  These details don’t matter for a rough discussion of discrete logs as they apply to cryptography.

Questions of efficient means of computing discrete logarithms arise in many cryptographic systems, but we will focus our attention of RSA.  At this point we need some account of what RSA is, for which I have written the this using the iPython notebook to produce an annotated example.

After following the link and diligently reading, you must now know that the crux of the RSA algorithm is the decryption step M = C^{d} \mod{n}.   Can we cast this as a question about a logarithm?  Recall from the RSA example that the secret parts of the above equation are d and M.  The ciphertext C is public knowledge, as is the modulus n.  But anyone is free to encrypt a message using any public key.  This means that we can pick M, and so we can know that value too.  Thus the real mystery is d, the private exponent.

To find d, what we need to know is:  To what power must C be raised in order to be congruent to M modulo n?

In other words, to crack RSA we want to know the discrete logarithm of M base C modulo n.

For this reason, if Joux or his colleagues ever do find a fast method for computing discrete logarithms, the current implementations of many common cryptographic systems, including systems for producing digital signatures, will become obsolete.

This is not the only way to break RSA.  It seems like it should be easier in fact to crack RSA for a particular message M rather than find d and unravel the whole system.  To do this, imagine that the message M is produced not by us but by someone communicating with the victim.  To recover M we must solve for it in the equation

C = M^e \mod{n},

in which it is the only unknown.  This is not a logarithm problem, but is instead the problem of discrete root extraction.  In fact this problem has its own name — it is called the RSA problem.  Obviously no practical means is yet known for solving this problem either.

RSA could fall because of advances in the science of number factoring.  While this has not yet led to the gelding of RSA as far as anyone is saying, still the speed with which numbers can be factored has improved in dramatic and unexpected ways.

Shortly after RSA was announced, the popular mathematics writer Martin Gardner asked Rivest, Shamir, and Adleman for an encrypted message with which he could tease his readers.  They agreed, and produced an encoded message using a 129-digit public key.  The value of n in the key was: 1143816257578888676692357799761466120102182 967212423625625618429357069352457338 97830597123563958705058989075147599290026879543541

The prize for producing a solution was $100.  Rivest calculated, based on mathematical technology existing at the time, that factoring this number would require 40 quadrillion years.  This figure assumed a machine capable of performing 1 billion modular multiplications per second, which seems to have been achieved at the PC level only in 2009.

As this article explains, Rivest’s figures were off by many orders of magnitude, but not because he underestimated the growth in computing power.  Rather, he was overly optimistic about innovations in factoring large numbers, in particular sophisticated variants of the quadratic sieve. This article by Pomerance outlines some of the history.

For those who are curious about the solution to Gardener’s puzzle, it may interest you to know that (as a team of hackers found in 1994)

1143816257578888676692357799761466120102182 967212423625625618429357069352457338 97830597123563958705058989075147599290026879543541 = 34905295108476509491478496199038 98133417764638493387843990820577 \times 32769132993266709549961988190834 461413177642967992942539798288533

The message which was encoded read: THE MAGIC WORDS ARE SQUEAMISH OSSIFRAGE

I am indebted to Julian Brown’s book The Quest for the Quantum Computer for this anecdote.  Incidentally Brown’s book is a good starting place for reading about that other perennial threat to our online security: quantum computing.

 

 

Posted in Uncategorized | 6 Comments