Search
Selected projects submitted in previous semesters, which were evaluated with grade A.
All projects are listed with the student's name, a screenshot, and a short description. This is the original work of students of the Matlab course. All m-files are compiled into p-files, projects are executable. Projects are published with the consent of the authors.
Petr Bílek
Description: Remake of the game Pacman. The player can choose the level of the game and the game map (You can import maps in the form of text files, so a new map creation is straightforward).
Download: ZIP archive At least MATLAB R2017b is needed.
Leonard Mentzl
Description: The program reads data in Touchstone format and displays it on a Smith chart. You can view all waveforms in the file at once or view only some. The data can be displayed either on a Smith diagram or on a classical polar diagram.
Jan Vrátník
Description: Remake of classic Czech MS-DOS game Vlak. Become an operator of your very own train, collect animals and other items around the map and reach the exit to reach the next level. Avoid expensive accidents as it would ruin your company and lose you the level.
Download: ZIP archive At least MATLAB R2014b is needed.
Jaroslav Klapálek
Description: Implementation of the famous computer game from the '80s. It contains 8 levels. A simple modification of the source files can change the graphical environment or add a new level.
Marek Timr
Description: Gorillas is a remake of a video game for MS-DOS originally published in 1991. The players control two gorillas throwing bananas at each other. The task is to choose the correct angle and velocity of the trow and hit the opponent. But be aware, the blowing wind can alter the trajectory of the banana.
Jiří Janovec
Description: The project implements a clone of a popular game from Nokia mobile phones. The graphics and mission content can be easily redefined in the source code.
Download: ZIP archive
Martin Adámek
Description: Stego E-D-A is used to encrypt text messages into black and white images (this technique is called steganography). It contains three parts: Encoder for encrypting the message into an image, Decoder for extracting the encrypted message from the picture, and Analyzer for experimental analysis of the image (determining whether it contains a message or not). The encoder also allows a preview of the histogram, which shows how many pixels of the original image remained unchanged after encoding the message (black pixels are original). The analyzer works based on the extraction of so-called SPAM features (see PDF); for a group of images, it first extracts the individual features, then encodes a random message into them and performs the same extraction again. Based on the comparison of these two groups, it creates the coefficient according to which it decides.
Miroslav Domankuš
Description: The program calculates a charge distribution iteratively on the specified area. Charges can be entered with the mouse or randomly. The positions of the points or the potential at any point are displayed.
Vojtěch Kumpošt
Description: A two-player chess game with a graphical interface, chess rule check, and control by mouse.
Chess is a classic board game for two players, in competitive form also considered as a sport. It represents the clash of two enemy armies. Whoever manages to neutralize the enemy king (give him a checkmate) wins. Wikipedia description