T S U B A S A 2 D E N G I N E
============================================================
Inherring all code from brown csci1950n, I reuse the code I wrote for emulating real-world problems and building new games.
As obeying the policy of the course, the core parts from the course are all encrypted using private-key cryptography.