3D 样条线(Splines)
发布时间:2015-05-12 来源:查字典编辑
摘要:2.2.3样条线(Splines)样条线是二维图形,它是一个没有深度的连续线(可以是开的,也可以是封闭的)。创建样条线对建立三维对象的模型至...
2.2.3 样条线(Splines)
样条线是二维图形,它是一个没有深度的连续线(可以是开的,也可以是封闭的)。创建样条线对建立三维对象的模型至关重要。例如,可以创建一个矩形,然后再定义一个厚度来生成一个盒子。也可以通过创建一组样条线来生成一个人物的头部模型。
相关阅读
推荐文章
猜你喜欢
附近的人在看
推荐阅读
拓展阅读
- ■trixbox (langChoice) Local File Inclusion Exploit (connect-back)
- ■Maian Search
- ■fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)
- ■BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit
- ■Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)
- ■minb 0.1.0 Remote Code Execution Exploit
- ■Mole Group Real Estate Script
- ■Poppler
- ■OllyDBG v1.10 and ImpREC v1.7f (export name) BOF PoC
- ■Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln
- ■Dreampics Builder (page) Remote SQL Injection Vulnerability
- ■Download Accelerator Plus - DAP 8.x (m3u) Local BOF Exploit 0day
- ■Safari Quicktime
- ■Maian Recipe
- ■AuraCMS
- ■Ultrastats
- ■Maian Uploader
- ■Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit
- ■Maian Guestbook
- ■jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities
- ■Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability
- ■fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)
- ■WebCMS Portal Edition (id) Remote SQL Injection Vulnerability
- ■Mole Group Last Minute Script
- ■HTC One M8升级Android 5.0后有哪些变化?
- ■Maian Weblog
- ■Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities
- ■fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit
- ■BoonEx Ray 3.5 (sIncPath) Remote File Inclusion Vulnerability
- ■Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit