photo

David Hill


Carnegie Mellon University (CMU)

Last seen: Today Attivo dal 2017

Followers: 2   Following: 0

Messaggio

Master's Student in Robotic Systems Development (MRSD), BS Electrical Engineering with minors in Computer Science and Mathematics.

Programming Languages:
Python, C++, C, Java, Javascript, R, MATLAB, CSS, Arduino
Spoken Languages:
English, Spanish
Professional Interests:
Robotics and Autonomous Systems, Embedded Systems

Statistica

All
MATLAB Answers

0 Domande
2.210 Risposte

File Exchange

21 File

Cody

57 Problemi
4822 Soluzioni

RANK
36
of 297.648

REPUTAZIONE
5.340

CONTRIBUTI
0 Domande
2.210 Risposte

ACCETTAZIONE DELLE RISPOSTE
0.00%

VOTI RICEVUTI
623

RANK
1.684 of 20.460

REPUTAZIONE
1.095

VALUTAZIONE MEDIA
4.80

CONTRIBUTI
21 File

DOWNLOAD
131

ALL TIME DOWNLOAD
8702

RANK
6
of 159.263

CONTRIBUTI
57 Problemi
4822 Soluzioni

PUNTEGGIO
51.522

NUMERO DI BADGE
125

CONTRIBUTI
0 Post

CONTRIBUTI
0 Pubblico Canali

VALUTAZIONE MEDIA

CONTRIBUTI
0 Punti principali

NUMERO MEDIO DI LIKE

  • MATLAB Mini Hack Participant
  • Treasure Hunt Participant
  • Ace
  • 36 Month Streak
  • Strings II Master
  • R2016b Feature Challenge Master
  • Personal Best Downloads Level 4
  • 5-Star Galaxy Level 4
  • Cody Challenge Master
  • Matrix Patterns III Master
  • Indexing I Master
  • ASEE Challenge Master

Visualizza badge

Feeds

Inviato


Convert Continued Fraction
Convert any continued fraction (non-repeating front portion and repeating portion) to (p + sqrt(d))/q representation.

oltre un anno fa | 1 download |

0.0 / 5
Thumbnail

Inviato


Psychomotor Vigilance Task (PVT)
The psychomotor vigilance task (PVT) is a sustained-attention, reaction-timed task.

circa 3 anni fa | 7 download |

0.0 / 5
Thumbnail

Inviato


Galois Counter Mode (GCM) Block Cipher using AES
Encrypt/Decrypt a plaintext message using AES GCM.

oltre 3 anni fa | 4 download |

0.0 / 5
Thumbnail

Inviato


Multiply Numbers using Number Theoretic Transform
Multiply very numbers (hexadecimal or decimal) together efficiently using Number Theoretic Transform (NTT)

quasi 4 anni fa | 1 download |

0.0 / 5
Thumbnail

Inviato


T-Line Simulation
This simulates a transmission line and calculate the variables for placing different components in parallel to match the line to...

circa 4 anni fa | 10 download |

0.0 / 5
Thumbnail

Inviato


Secure Off-line Email Encryption GUI
Send and receive off-line encrypted emails using public-key cryptography and Advanced Encryption Standard (AES).

circa 4 anni fa | 1 download |

0.0 / 5
Thumbnail

Inviato


AES-256 GUI using CBC mode
Advance Encryption Standard-256 encryption and decryption in a GUI. The Cipher Block Chaining (CBC) mode is used with cipher-tex...

circa 4 anni fa | 10 download |

0.0 / 5
Thumbnail

Inviato


Advanced Encryption Standard (AES)-128,192, 256
Advance Encryption Standard-128, 192, or 256 encryption and decryption using 128/192/256-bit hexadecimal key and 128-bit hexadec...

circa 4 anni fa | 50 download |

4.5 / 5
Thumbnail

Inviato


BTC PrivateKey and Address Generator GUI
Generate Bitcoin/Ethereum Private Key and Addresses (including new Bech32) completely off-line

oltre 4 anni fa | 11 download |

5.0 / 5
Thumbnail

Inviato


RIPEMD160 Hash
RIPEMD160 Hash of character array input of maximum length 8191

quasi 5 anni fa | 2 download |

0.0 / 5
Thumbnail

Inviato


privateKey2bitAddress Generator GUI
Generates both uncompressed and compressed Bitcoin addresses from private key (either WIF or Hexadecimal)

quasi 5 anni fa | 6 download |

4.0 / 5
Thumbnail

Inviato


Image Encryption using AES-256 CBC mode
Encrypt images of any size using AES-256 encryption in the CBC mode

quasi 5 anni fa | 43 download |

0.0 / 5
Thumbnail

Inviato


Archimedean Solids
Display any of the Archimedean Solids

circa 5 anni fa | 2 download |

0.0 / 5
Thumbnail

Inviato


Shake256
Uses Advance Encryption Standard algorithm from FIBS-197

circa 5 anni fa | 2 download |

0.0 / 5
Thumbnail

Inviato


Bitcoin Address from WIF private key
Generate the uncompressed Bitcoin address (output) from any WIF formatted private key (input)

circa 5 anni fa | 2 download |

0.0 / 5
Thumbnail

Inviato


SHA-3 HASH
SHA-3 Hash implemented from standard

circa 5 anni fa | 4 download |

5.0 / 5
Thumbnail

Inviato


secp256k1 Elliptic Curve Shared-Key Generation GUI
Elliptic Curve Cryptography using secp256k1. Generates private-key times a given point (input) that is on the elliptic curve.

oltre 5 anni fa | 5 download |

5.0 / 5
Thumbnail

Inviato


Curve448 Shared-Key Generation GUI
Elliptic Curve Cryptography using curve-448. Generates private-key times a given x-coordinate point (input) the is on the ellipt...

oltre 5 anni fa | 1 download |

0.0 / 5
Thumbnail

Inviato


Curve25519 Shared-Key Generation GUI
Elliptic Curve Cryptography using curve-25519. Generates private-key times a given x-coordinate point (input) the is on the elli...

oltre 5 anni fa | 3 download |

0.0 / 5
Thumbnail

Inviato


Cribbage GUI
Play two-handed cribbage

quasi 6 anni fa | 1 download |

5.0 / 5
Thumbnail

Inviato


BlackJack GUI
Play BlackJack and check your card-counting skills. Learn how to take the best probable actions during the game.

quasi 6 anni fa | 7 download |

5.0 / 5
Thumbnail