Develop a visual design in java, JAVA Programming

Assignment Help:

Player Ship Appearance:

• Your ship must be either a nice-looking sphere (left image above), or a nice-looking sphere with a "mouth" (middle image above), depending on variant.

• For mouth ships, the mouth gap must be no more than 3/4 of the diameter of the ship. The middle image above shows a ship with such a mouth.

• The mouth can be any shape. I have used a cirle in the images because it was easy to draw.

• Mouth collision: Test if the point on the circumference is within the enemy ship's circle. The right image shows a small yellow star where the circumference point would be.

Player Ship Motion:

• Your ship moves by expelling tiny spheres opposite to the direction of motion. As Isaac Newton said: Every action has an equal and opposite reaction.

• The mass of the player's ship is equal to its area. Expelling small masses decreases the mass of player's ship, and thus its area.

• Clicking the mouse left button sets the direction in which the mass is expelled. When the mouse is pressed, construct a vector from the player's ship to the mouse location.

• The mass expelled is 1% of the mass of player's ship.

• The expelled masses join the collection of masses floating around in the play area. That is, they become enemy ships!

There are many instances of an enemy ship in the play area. Each enemy ship interacts with all of the rest of enemy ships and the player ship.

Enemy Ship Appearance:

• Each enemy ship is a circle.

• Each enemy ship starts with a random area.

• Enemy ships are red if bigger than the player's ship, and blue if smaller.

Enemy Ship Motion:

• Each enemy ship starts with a random velocity.

• Enemy ships drift passively.

The primary variations of this game are how the enemy ships in the scene move and respond.


Related Discussions:- Develop a visual design in java

Threads, what is meant by thread

what is meant by thread

Preventing applet based social engineering attacks, Preventing Applet Based...

Preventing Applet Based Social Engineering Attacks To help avoid this, Java applet windows are specifically labeled as such along with an ugly bar that says: "Warning: Applet W

Prepare simple spring maven task, Prepare Simple spring maven task Proje...

Prepare Simple spring maven task Project Description: We want a very simple delivery for one of our tasks using Spring STS Maven project. This chat does not have UI interf

Package inheritance hierarchy program, (Package Inheritance Hierarchy) Pack...

(Package Inheritance Hierarchy) Package-delivery services, such as FedEx®, DHL® and UPS®, offer a number of different shipping options, each with specific costs associated. Create

Why hub is used in networks, Why hub is used in networks? Hub is networ...

Why hub is used in networks? Hub is networking equipment and a device that connects various computers to form a network. In a network the NIC translates the message within elec

Why the number of temporary workers is on the rise, Why the number of tempo...

Why the number of temporary workers is on the rise? Discuss main reasons? Temporary workers: Temporary workers are those workers that a company can hire to perform a certain ta

How many ways are there to call a function in a program, How many ways are ...

How many ways are there to call a function in a program? Explain with example? Two Ways of Calling Functions: Functions do not run automatically. While the page loads, every

Explanation of the inputstream with suitable diagrams, Problem 1) Descr...

Problem 1) Describe the concept of interfaces in Java with a suitable example for the same Explanation of the concept of interfaces with example 2) Describe the Inp

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd