Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (6)
Horn antenna design in matlab
no vote
The following Matlab project contains the source code and Matlab examples used for horn antenna design . This GUI helps us to calculate the conical horn antenna characteristics based on frequency and aperture dimension of the horn. The source code and files included in this project are listed in the project files section, please make sure whether the listed source code meet your needs there.
rupal952432
2016-08-23
1
1
Horn antenna rad pattern in matlab
no vote
The following Matlab project contains the source code and Matlab examples used for horn antenna rad pattern . I have written a code for the radiation pattern of horn antenna. The source code and files included in this project are listed in the project files section, please make sure whether the listed source code meet your needs there.
rupal952432
2016-08-23
2
1
gui based weekday predictor in matlab
no vote
The following Matlab project contains the source code and Matlab examples used for gui based weekday predictor. Error warnings concerning bad input for months and date have been included so that user cant calculate while around with mistakes.Input for month should be in numbers. The source code and files included in this project are listed in the project files section, please make sure whether the listed source code meet your needs there.
rupal952432
2016-08-23
1
1
Virtual paiting in matlab
no vote
The following Matlab project contains the source code and Matlab examples used for virtual painting. This program detects user's finger's position by red color recognition and paint in a white space. The source code and files included in this project are listed in the project files section, please make sure whether the listed source code meet your needs there.
rupal952432
2016-08-23
1
1
Transposition encryption technique
no vote
Transposition cipher is the pure text message of cipher, which can reach agreement between sender and receiver through some method. In this paper, we study the transformation, affine and substitution of mono alphabetic transposition ciphers. The letter of the mono alphabetic password is changed by creating a new letter (password letter) and assigning a new letter. In transposition password, there is no creation of new alphabet of letters in plaintext, just rearrange some fashion. In simple columnar interchange, the information is written in fixed and horizontally agreed number of columns, and then the description of the letter column proceeds from left to right.
rupal952432
2016-08-23
1
1
Columnar Transposition Cipher
4.0
rupal952432
2016-08-23
0
1
No more~