모뉴먼트 밸리의 컨셉을 차용한 Ball travel 게임의 최종 구현
저작권 고지사항:
Pictograms from
Computer: By Alex Valdivia
IPhone: By Mr Robot
https://thenounproject.com/term/computer/6034/
https://thenounproject.com/term/iphone/13061
리눅스 스터디 1회차 in KOSMOS
VM에 설치하므로 이미지 부분은 건너뛰세요.
on Onedrive:
https://onedrive.live.com/redir?resid=c4dd3c6db99e8d1a!11192&authkey=!ALtcH-dt9PGfl58&ithint=file%2cpptx
Monument Valley Utah is home to thousands of visitors each year who come to view the ancient sandstone rock formations. However, it is also home to the Navajo people, many of whom live in poverty without basic amenities. The document describes homes in Monument Valley that lack electricity, running water, bathrooms and proper floors. It then highlights a project by Monument Valley High School students to build new, traditional octagonal homes for elderly residents using donations. The homes include cement floors, insulation, wiring and windows to improve living conditions.
This document provides information about the mia material shader library for architectural visualization and design. It discusses the fundamentals of physically based rendering used by the mia material, describes the material's features like its shading model, BRDF, and parameters for controlling effects like diffuse, reflections, refractions, and more. It also provides tips for simulating common materials like wood, glass, metals, water and optimizing performance.
This document discusses implementing optical illusions and movement mechanics in Unity3D similar to the game Monument Valley. It covers using isometric projection to create tilted perspectives, a floor value system to allow movement on sloped surfaces, and object rotation. It also mentions using the A* pathfinding algorithm to navigate paths.
리눅스 스터디 1회차 in KOSMOS
VM에 설치하므로 이미지 부분은 건너뛰세요.
on Onedrive:
https://onedrive.live.com/redir?resid=c4dd3c6db99e8d1a!11192&authkey=!ALtcH-dt9PGfl58&ithint=file%2cpptx
Monument Valley Utah is home to thousands of visitors each year who come to view the ancient sandstone rock formations. However, it is also home to the Navajo people, many of whom live in poverty without basic amenities. The document describes homes in Monument Valley that lack electricity, running water, bathrooms and proper floors. It then highlights a project by Monument Valley High School students to build new, traditional octagonal homes for elderly residents using donations. The homes include cement floors, insulation, wiring and windows to improve living conditions.
This document provides information about the mia material shader library for architectural visualization and design. It discusses the fundamentals of physically based rendering used by the mia material, describes the material's features like its shading model, BRDF, and parameters for controlling effects like diffuse, reflections, refractions, and more. It also provides tips for simulating common materials like wood, glass, metals, water and optimizing performance.
This document discusses implementing optical illusions and movement mechanics in Unity3D similar to the game Monument Valley. It covers using isometric projection to create tilted perspectives, a floor value system to allow movement on sloped surfaces, and object rotation. It also mentions using the A* pathfinding algorithm to navigate paths.
The document discusses security threats to IoT devices that use embedded Linux operating systems. It provides background on IoT and common embedded Linux systems like home routers and NAS devices. It then analyzes specific malware strains like Aidra, Darlloz, Psybot, and Gafgyt that have targeted vulnerabilities in these systems to carry out DDoS attacks, mine cryptocurrencies, and compromise users' privacy. Key exploitation methods and impacted device models are mentioned.
The document discusses security threats to IoT devices that use embedded Linux operating systems. It provides background on IoT and common embedded Linux systems like home routers and NAS devices. It then analyzes specific malware strains like Aidra, Darlloz, Psybot, and Gafgyt that have targeted vulnerabilities in these systems to carry out DDoS attacks, mine cryptocurrencies, and compromise users' privacy. Key exploitation methods and impacted device models are mentioned.