photo

David Hill


Last seen: Today Active since 2017

Followers: 3   Following: 0

Message

MS - Robotic Systems Development (MRSD) from CMU, BS - Electrical Engineering with minors in Computer Science and Mathematics from BYU.

Programming Languages:
Python, C++, C, Java, Javascript, R, MATLAB, CSS, Arduino
Spoken Languages:
English, Spanish
Professional Interests:
Robotics and Autonomous Systems, SLAM, Embedded Systems

Statistics

All
MATLAB Answers

0 Questions
2,210 Answers

File Exchange

21 Files

Cody

58 Problems
4963 Solutions

RANK
36
of 299,007

REPUTATION
5,342

CONTRIBUTIONS
0 Questions
2,210 Answers

ANSWER ACCEPTANCE
0.00%

VOTES RECEIVED
623

RANK
1,656 of 20,659

REPUTATION
1,119

AVERAGE RATING
4.80

CONTRIBUTIONS
21 Files

DOWNLOADS
72

ALL TIME DOWNLOADS
8949

RANK
3
of 163,093

CONTRIBUTIONS
58 Problems
4963 Solutions

SCORE
53,127

NUMBER OF BADGES
126

CONTRIBUTIONS
0 Posts

CONTRIBUTIONS
0 Public Channels

AVERAGE RATING

CONTRIBUTIONS
0 Highlights

AVERAGE NO. OF LIKES

  • MATLAB Mini Hack Participant
  • Treasure Hunt Participant
  • Ace
  • 36 Month Streak
  • Strings III Master
  • Strings II Master
  • Personal Best Downloads Level 4
  • 5-Star Galaxy Level 4
  • R2016b Feature Challenge Master
  • Cody Challenge Master
  • Matrix Patterns III Master
  • Indexing I Master

View badges

Feeds

Submitted


Convert Continued Fraction
Convert any continued fraction (non-repeating front portion and repeating portion) to (p + sqrt(d))/q representation.

2 years ago | 1 download |

0.0 / 5
Thumbnail

Submitted


Psychomotor Vigilance Task (PVT)
The psychomotor vigilance task (PVT) is a sustained-attention, reaction-timed task.

3 years ago | 4 downloads |

0.0 / 5
Thumbnail

Submitted


Galois Counter Mode (GCM) Block Cipher using AES
Encrypt/Decrypt a plaintext message using AES GCM.

3 years ago | 1 download |

0.0 / 5
Thumbnail

Submitted


Multiply Numbers using Number Theoretic Transform
Multiply very numbers (hexadecimal or decimal) together efficiently using Number Theoretic Transform (NTT)

4 years ago | 1 download |

0.0 / 5
Thumbnail

Submitted


T-Line Simulation
This simulates a transmission line and calculate the variables for placing different components in parallel to match the line to...

4 years ago | 1 download |

0.0 / 5
Thumbnail

Submitted


Secure Off-line Email Encryption GUI
Send and receive off-line encrypted emails using public-key cryptography and Advanced Encryption Standard (AES).

4 years ago | 1 download |

0.0 / 5
Thumbnail

Submitted


AES-256 GUI using CBC mode
Advance Encryption Standard-256 encryption and decryption in a GUI. The Cipher Block Chaining (CBC) mode is used with cipher-tex...

4 years ago | 6 downloads |

0.0 / 5
Thumbnail

Submitted


Advanced Encryption Standard (AES)-128,192, 256
Advance Encryption Standard-128, 192, or 256 encryption and decryption using 128/192/256-bit hexadecimal key and 128-bit hexadec...

4 years ago | 30 downloads |

4.5 / 5
Thumbnail

Submitted


BTC PrivateKey and Address Generator GUI
Generate Bitcoin/Ethereum Private Key and Addresses (including new Bech32) completely off-line

4 years ago | 5 downloads |

5.0 / 5
Thumbnail

Submitted


RIPEMD160 Hash
RIPEMD160 Hash of character array input of maximum length 8191

5 years ago | 1 download |

0.0 / 5
Thumbnail

Submitted


privateKey2bitAddress Generator GUI
Generates both uncompressed and compressed Bitcoin addresses from private key (either WIF or Hexadecimal)

5 years ago | 1 download |

4.0 / 5
Thumbnail

Submitted


Image Encryption using AES-256 CBC mode
Encrypt images of any size using AES-256 encryption in the CBC mode

5 years ago | 43 downloads |

0.0 / 5
Thumbnail

Submitted


Archimedean Solids
Display any of the Archimedean Solids

5 years ago | 2 downloads |

0.0 / 5
Thumbnail

Submitted


Shake256
Uses Advance Encryption Standard algorithm from FIBS-197

5 years ago | 2 downloads |

0.0 / 5
Thumbnail

Submitted


Bitcoin Address from WIF private key
Generate the uncompressed Bitcoin address (output) from any WIF formatted private key (input)

5 years ago | 2 downloads |

0.0 / 5
Thumbnail

Submitted


SHA-3 HASH
SHA-3 Hash implemented from standard

5 years ago | 4 downloads |

5.0 / 5
Thumbnail

Submitted


secp256k1 Elliptic Curve Shared-Key Generation GUI
Elliptic Curve Cryptography using secp256k1. Generates private-key times a given point (input) that is on the elliptic curve.

5 years ago | 5 downloads |

5.0 / 5
Thumbnail

Submitted


Curve448 Shared-Key Generation GUI
Elliptic Curve Cryptography using curve-448. Generates private-key times a given x-coordinate point (input) the is on the ellipt...

5 years ago | 1 download |

0.0 / 5
Thumbnail

Submitted


Curve25519 Shared-Key Generation GUI
Elliptic Curve Cryptography using curve-25519. Generates private-key times a given x-coordinate point (input) the is on the elli...

5 years ago | 3 downloads |

0.0 / 5
Thumbnail

Submitted


Cribbage GUI
Play two-handed cribbage

6 years ago | 1 download |

5.0 / 5
Thumbnail

Submitted


BlackJack GUI
Play BlackJack and check your card-counting skills. Learn how to take the best probable actions during the game.

6 years ago | 3 downloads |

5.0 / 5
Thumbnail