photo

David Hill


Last seen: Today Active since 2017

Followers: 3   Following: 0

Message

MS - Robotic Systems Development (MRSD) from CMU, BS - Electrical Engineering with minors in Computer Science and Mathematics from BYU.

Programming Languages:
Python, C++, C, Java, Javascript, R, MATLAB, CSS, Arduino
Spoken Languages:
English, Spanish
Professional Interests:
Robotics and Autonomous Systems, SLAM, Embedded Systems

Statistics

All
MATLAB Answers

0 Questions
2.210 Answers

File Exchange

21 Files

Cody

60 Problems
5076 Solutions

RANK
37
of 300.331

REPUTATION
5.344

CONTRIBUTIONS
0 Questions
2.210 Answers

ANSWER ACCEPTANCE
0.00%

VOTES RECEIVED
624

RANK
1.637 of 20.920

REPUTATION
1.143

AVERAGE RATING
4.60

CONTRIBUTIONS
21 Files

DOWNLOADS
83

ALL TIME DOWNLOADS
9183

RANK
4
of 168.124

CONTRIBUTIONS
60 Problems
5076 Solutions

SCORE
53.933

NUMBER OF BADGES
126

CONTRIBUTIONS
0 Posts

CONTRIBUTIONS
0 Public Channels

AVERAGE RATING

CONTRIBUTIONS
0 Highlights

AVERAGE NO. OF LIKES

  • MATLAB Mini Hack Participant
  • Treasure Hunt Participant
  • Ace
  • 36 Month Streak
  • Strings III Master
  • Strings II Master
  • Personal Best Downloads Level 4
  • 5-Star Galaxy Level 4
  • R2016b Feature Challenge Master
  • Cody Challenge Master
  • Matrix Patterns III Master
  • Indexing I Master

View badges

Feeds

Submitted


Convert Continued Fraction
Convert any continued fraction (non-repeating front portion and repeating portion) to (p + sqrt(d))/q representation.

meer dan 2 jaar ago | 1 download |

0.0 / 5
Thumbnail

Submitted


Psychomotor Vigilance Task (PVT)
The psychomotor vigilance task (PVT) is a sustained-attention, reaction-timed task.

meer dan 3 jaar ago | 2 downloads |

0.0 / 5
Thumbnail

Submitted


Galois Counter Mode (GCM) Block Cipher using AES
Encrypt/Decrypt a plaintext message using AES GCM.

bijna 4 jaar ago | 5 downloads |

0.0 / 5
Thumbnail

Submitted


Multiply Numbers using Number Theoretic Transform
Multiply very numbers (hexadecimal or decimal) together efficiently using Number Theoretic Transform (NTT)

meer dan 4 jaar ago | 2 downloads |

0.0 / 5
Thumbnail

Submitted


T-Line Simulation
This simulates a transmission line and calculate the variables for placing different components in parallel to match the line to...

meer dan 4 jaar ago | 3 downloads |

0.0 / 5
Thumbnail

Submitted


Secure Off-line Email Encryption GUI
Send and receive off-line encrypted emails using public-key cryptography and Advanced Encryption Standard (AES).

meer dan 4 jaar ago | 1 download |

0.0 / 5
Thumbnail

Submitted


AES-256 GUI using CBC mode
Advance Encryption Standard-256 encryption and decryption in a GUI. The Cipher Block Chaining (CBC) mode is used with cipher-tex...

meer dan 4 jaar ago | 3 downloads |

0.0 / 5
Thumbnail

Submitted


Advanced Encryption Standard (AES)-128,192, 256
Advance Encryption Standard-128, 192, or 256 encryption and decryption using 128/192/256-bit hexadecimal key and 128-bit hexadec...

meer dan 4 jaar ago | 36 downloads |

4.5 / 5
Thumbnail

Submitted


BTC PrivateKey and Address Generator GUI
Generate Bitcoin/Ethereum Private Key and Addresses (including new Bech32) completely off-line

bijna 5 jaar ago | 12 downloads |

5.0 / 5
Thumbnail

Submitted


RIPEMD160 Hash
RIPEMD160 Hash of character array input of maximum length 8191

meer dan 5 jaar ago | 1 download |

0.0 / 5
Thumbnail

Submitted


privateKey2bitAddress Generator GUI
Generates both uncompressed and compressed Bitcoin addresses from private key (either WIF or Hexadecimal)

meer dan 5 jaar ago | 2 downloads |

4.0 / 5
Thumbnail

Submitted


Image Encryption using AES-256 CBC mode
Encrypt images of any size using AES-256 encryption in the CBC mode

meer dan 5 jaar ago | 43 downloads |

0.0 / 5
Thumbnail

Submitted


Archimedean Solids
Display any of the Archimedean Solids

meer dan 5 jaar ago | 1 download |

0.0 / 5
Thumbnail

Submitted


Shake256
Uses Advance Encryption Standard algorithm from FIBS-197

meer dan 5 jaar ago | 1 download |

0.0 / 5
Thumbnail

Submitted


Bitcoin Address from WIF private key
Generate the uncompressed Bitcoin address (output) from any WIF formatted private key (input)

meer dan 5 jaar ago | 2 downloads |

0.0 / 5
Thumbnail

Submitted


SHA-3 HASH
SHA-3 Hash implemented from standard

bijna 6 jaar ago | 1 download |

5.0 / 5
Thumbnail

Submitted


secp256k1 Elliptic Curve Shared-Key Generation GUI
Elliptic Curve Cryptography using secp256k1. Generates private-key times a given point (input) that is on the elliptic curve.

bijna 6 jaar ago | 3 downloads |

5.0 / 5
Thumbnail

Submitted


Curve448 Shared-Key Generation GUI
Elliptic Curve Cryptography using curve-448. Generates private-key times a given x-coordinate point (input) the is on the ellipt...

bijna 6 jaar ago | 1 download |

0.0 / 5
Thumbnail

Submitted


Curve25519 Shared-Key Generation GUI
Elliptic Curve Cryptography using curve-25519. Generates private-key times a given x-coordinate point (input) the is on the elli...

bijna 6 jaar ago | 2 downloads |

0.0 / 5
Thumbnail

Submitted


Cribbage GUI
Play two-handed cribbage

meer dan 6 jaar ago | 1 download |

5.0 / 5
Thumbnail

Submitted


BlackJack GUI
Play BlackJack and check your card-counting skills. Learn how to take the best probable actions during the game.

meer dan 6 jaar ago | 5 downloads |

5.0 / 5
Thumbnail