You are on page 1of 22

Visvesvaraya Technological University

Belagavi

A Project Report on

“SPACE SHOOTER”
Project Report Submitted in Partial Fulfillment of the Requirement for the Award
of the Degree of
Bachelors of Engineering
in
Computer Science and Engineering
by

Deepti A. Latthe - 2KL20CS023


Sakshi S. Gunda - 2KL20CS082
Under the guidance of

Dr. Santosh Pattar


Prof. Prema A.
KLE Technological University’s Dr. MSSCET, Belagavi.

Department of Computer Science and Engineering,


KLE Dr. M. S. Sheshgiri College of Engineering and Technology, Belagavi –
590008.
June 2023
Dedicated to

ALMIGHT Y,
GU IDE, and
F AMILY
DECLARATION

I hereby declare that the matter embodied in this dissertation entitled “Space
Shooter” submitted to Visvesvaraya Technological University for the award of
degree of Bachelors of Engineering in Computer Science and Engineering is the
result of the work done by me in the Department of Computer Science and Engi-
neering, KLE Dr. M. S. Sheshgiri College of Engineering, under the guidance of
Dr. Santosh Pattar, Prof. Prema A., Department of Computer Science and Engi-
neering, KLE Dr. M. S. Sheshgiri College of Engineering. I further declare that
to the best of my knowledge and belief, the work reported here in doesn’t form
part of any other project on the basis of which a degree or award was conferred on
an earlier occasion on this by any other student, also the results of the work are
not submitted for the award of any degree or diploma within this or in any other
University or Institute. I hereby also confirm that all of the experimental work in
this report has been done by myself.

Belagavi – 590 008 Deepti A. Latthe


Date : 23.06.2023 Sakshi S. Gunda

i
Acknowledgments
The satisfaction that accompanies the successful completion of any task would be
incomplete without mentioning the people who made it possible, whose constant
guidance and encouragement crowned my effort with success.
First and foremost, I would like to express my sincere words of gratitude
and respect to the organization KLE Dr. M. S. Sheshgiri College of Engineering,
Belagavi, for providing me an opportunity to carry out my project work.
I thank my guide and guru, Dr. Santosh Pattar, Prof. Prema A., Depart-
ment of Computer Science and Engineering, KLE Dr. M. S. Sheshgiri College of
Engineering, for providing me with all the facilities that helped me to carry out
the work easily. I also appreciate his help to improve the quality of my dissertation
report.
I would like to express my deepest thanks to Dr. Rajashri Khanai, Head
of the Department, Department of Computer Science and Engineering, KLE Dr.
M. S. Sheshgiri College of Engineering, for her encouragement.
Last but not the least, I extend my thanks to all the people in the Depart-
ment of Computer Science and Engineering, KLE Dr. M. S. Sheshgiri College of
Engineering, for always being helpful over the years.
I am very grateful to my parents and well-wishers for their continuous moral
support and encouragement.

Deepti A. Latthe
Sakshi S. Gunda

ii
Abstract

The broad objective of this study is an attack, threat and vulnerabilities of cyber
infrastructure, which include hardware and software systems, networks, enterprise
networks, intranets, and its use of the cyber intrusions. To achieve this objective,
the paper attempts to explain the importance g in network intrusions and cyber
theft. It also discusses in vivid detail, the reasons for the quick dilation of cyber
crime. The paper also includes a complete description and definition of cyber se-
curity, the role it plays in network intrusion and cyber recognize theft, a discussion
of the reasons for the rise in cyber crime and their impact. In closing the authors
recommend some preventive measures and possible solutions to the attack, threats
and vulnerabilities of cyber security. The paper concludes that while technology
has a role to play in reducing the impact of cyber attacks, the vulnerability re-
sides with human behaviour and psychological predispositions. While literature
supports the dangers of psychological susceptibilities in cyber attacks investment
in organizational education campaigns offer optimism that cyber attacks can be
reduced.

iii
Contents

Acknowledgments ii

Abstract iii

Contents iii

List of Figures v

List of Tables vi

1 Introduction 1
1.1 Main Section 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Subsection 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.2 Subsection 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Main Section 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Main Section 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

2 Literature Survey 5
2.1 Main Section 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1.1 Subsection 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1.2 Subsection 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Main Section 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.3 Main Section 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

3 Proposed Model 8
3.1 An Algorithm Example . . . . . . . . . . . . . . . . . . . . . . . . . 8

A Appendix Title Here 9

B Some Code Here 10

Bibliography 12

iv
List of Figures

1.1 A Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

v
List of Tables

1.1 A Sample Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

2.1 Comparison of Different ........ Techniques . . . . . . . . . . . . . . 7

vi
Chapter 1

Introduction

1.1 Main Section 1

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam ultricies lacinia
euismod. Nam tempus risus in dolor rhoncus in interdum enim tincidunt. Donec
vel nunc neque. In condimentum ullamcorper quam non consequat. Fusce sagit-
tis tempor feugiat. Fusce magna erat, molestie eu convallis ut, tempus sed arcu.
Quisque molestie, ante a tincidunt ullamcorper, sapien enim dignissim lacus, in
semper nibh erat lobortis purus. Integer dapibus ligula ac risus convallis pellen-
tesque [1].

1.1.1 Subsection 1

Nunc posuere quam at lectus tristique eu ultrices augue venenatis. Vestibulum


ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Aliquam
erat volutpat. Vivamus sodales tortor eget quam adipiscing in vulputate ante
ullamcorper. Sed eros ante, lacinia et sollicitudin et, aliquam sit amet augue. In
hac habitasse platea dictumst.
Morbi rutrum odio eget arcu adipiscing sodales. Aenean et purus a est pulvinar
pellentesque. Cras in elit neque, quis varius elit. Phasellus fringilla, nibh eu
tempus venenatis, dolor elit posuere quam, quis adipiscing urna leo nec orci. Sed
nec nulla auctor odio aliquet consequat. Ut nec nulla in ante ullamcorper aliquam
at sed dolor. Phasellus fermentum magna in augue gravida cursus. Cras sed

1
Chapter 1 Introduction 1.2. Main Section 2
pretium lorem. Pellentesque eget ornare odio. Proin accumsan, massa viverra
cursus pharetra, ipsum nisi lobortis velit, a malesuada dolor lorem eu neque.

1.1.2 Subsection 2

Morbi rutrum odio eget arcu adipiscing sodales. Aenean et purus a est pulvinar
pellentesque. Cras in elit neque, quis varius elit. Phasellus fringilla, nibh eu
tempus venenatis, dolor elit posuere quam, quis adipiscing urna leo nec orci. Sed
nec nulla auctor odio aliquet consequat. Ut nec nulla in ante ullamcorper aliquam
at sed dolor. Phasellus fermentum magna in augue gravida cursus. Cras sed
pretium lorem. Pellentesque eget ornare odio. Proin accumsan, massa viverra
cursus pharetra, ipsum nisi lobortis velit, a malesuada dolor lorem eu neque.

Figure 1.1: A Computer

As shown in Figure 1.1, a computer is a machine.

1.2 Main Section 2

Sed ullamcorper quam eu nisl interdum at interdum enim egestas. Aliquam plac-
erat justo sed lectus lobortis ut porta nisl porttitor. Vestibulum mi dolor, lacinia
molestie gravida at, tempus vitae ligula. Donec eget quam sapien, in viverra

Dept. of CSE, KLE Dr. MSSCET June 2023 2


Chapter 1 Introduction 1.3. Main Section 3
eros. Donec pellentesque justo a massa fringilla non vestibulum metus vestibu-
lum. Vestibulum in orci quis felis tempor lacinia. Vivamus ornare ultrices facilisis.
Ut hendrerit volutpat vulputate. Morbi condimentum venenatis augue, id porta
ipsum vulputate in. Curabitur luctus tempus justo. Vestibulum risus lectus, adip-
iscing nec condimentum quis, condimentum nec nisl. Aliquam dictum sagittis velit
sed iaculis. Morbi tristique augue sit amet nulla pulvinar id facilisis ligula mol-
lis. Nam elit libero, tincidunt ut aliquam at, molestie in quam. Aenean rhoncus
vehicula hendrerit.
Table 1.1: A Sample Table

C1 C2 C3 C4 C5
some-long- some-long- some- some-more-
some-text
text text longer-text longer-text
some-long- some-long- some- some-more-
some-text
text text longer-text longer-text
some-long- some-long- some- some-more-
some-text
text text longer-text longer-text
some-long- some-long- some- some-more-
some-text
text text longer-text longer-text
some-long- some-long- some- some-more-
some-text
text text longer-text longer-text
some-long- some-long- some- some-more-
some-text
text text longer-text longer-text
some-long- some-long- some- some-more-
some-text
text text longer-text longer-text

The Table 1.1 lists a sample table.

1.3 Main Section 3

Sed ullamcorper quam eu nisl interdum at interdum enim egestas. Aliquam plac-
erat justo sed lectus lobortis ut porta nisl porttitor. Vestibulum mi dolor, lacinia
molestie gravida at, tempus vitae ligula. Donec eget quam sapien, in viverra

Dept. of CSE, KLE Dr. MSSCET June 2023 3


Chapter 1 Introduction 1.3. Main Section 3
eros. Donec pellentesque justo a massa fringilla non vestibulum metus vestibu-
lum. Vestibulum in orci quis felis tempor lacinia. Vivamus ornare ultrices facilisis.
Ut hendrerit volutpat vulputate. Morbi condimentum venenatis augue, id porta
ipsum vulputate in. Curabitur luctus tempus justo. Vestibulum risus lectus, adip-
iscing nec condimentum quis, condimentum nec nisl. Aliquam dictum sagittis velit
sed iaculis. Morbi tristique augue sit amet nulla pulvinar id facilisis ligula mol-
lis. Nam elit libero, tincidunt ut aliquam at, molestie in quam. Aenean rhoncus
vehicula hendrerit.

Dept. of CSE, KLE Dr. MSSCET June 2023 4


Chapter 2

Literature Survey

2.1 Main Section 1

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam ultricies lacinia
euismod. Nam tempus risus in dolor rhoncus in interdum enim tincidunt. Donec
vel nunc neque. In condimentum ullamcorper quam non consequat. Fusce sagit-
tis tempor feugiat. Fusce magna erat, molestie eu convallis ut, tempus sed arcu.
Quisque molestie, ante a tincidunt ullamcorper, sapien enim dignissim lacus, in
semper nibh erat lobortis purus. Integer dapibus ligula ac risus convallis pellen-
tesque [1].

2.1.1 Subsection 1

Nunc posuere quam at lectus tristique eu ultrices augue venenatis. Vestibulum


ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Aliquam
erat volutpat. Vivamus sodales tortor eget quam adipiscing in vulputate ante
ullamcorper. Sed eros ante, lacinia et sollicitudin et, aliquam sit amet augue. In
hac habitasse platea dictumst [2, 3]

2.1.2 Subsection 2

Morbi rutrum odio eget arcu adipiscing sodales. Aenean et purus a est pulvinar
pellentesque. Cras in elit neque, quis varius elit. Phasellus fringilla, nibh eu
tempus venenatis, dolor elit posuere quam, quis adipiscing urna leo nec orci. Sed

5
Chapter 2 Literature Survey 2.2. Main Section 2
nec nulla auctor odio aliquet consequat. Ut nec nulla in ante ullamcorper aliquam
at sed dolor. Phasellus fermentum magna in augue gravida cursus. Cras sed
pretium lorem. Pellentesque eget ornare odio. Proin accumsan, massa viverra
cursus pharetra, ipsum nisi lobortis velit, a malesuada dolor lorem eu neque [4].

2.2 Main Section 2

Sed ullamcorper quam eu nisl interdum at interdum enim egestas. Aliquam plac-
erat justo sed lectus lobortis ut porta nisl porttitor. Vestibulum mi dolor, lacinia
molestie gravida at, tempus vitae ligula. Donec eget quam sapien, in viverra
eros. Donec pellentesque justo a massa fringilla non vestibulum metus vestibu-
lum. Vestibulum in orci quis felis tempor lacinia. Vivamus ornare ultrices facilisis.
Ut hendrerit volutpat vulputate. Morbi condimentum venenatis augue, id porta
ipsum vulputate in. Curabitur luctus tempus justo. Vestibulum risus lectus, adip-
iscing nec condimentum quis, condimentum nec nisl. Aliquam dictum sagittis velit
sed iaculis. Morbi tristique augue sit amet nulla pulvinar id facilisis ligula mol-
lis. Nam elit libero, tincidunt ut aliquam at, molestie in quam. Aenean rhoncus
vehicula hendrerit [5, 6].

2.3 Main Section 3

Sed ullamcorper quam eu nisl interdum at interdum enim egestas. Aliquam plac-
erat justo sed lectus lobortis ut porta nisl porttitor. Vestibulum mi dolor, lacinia
molestie gravida at, tempus vitae ligula. Donec eget quam sapien, in viverra
eros. Donec pellentesque justo a massa fringilla non vestibulum metus vestibu-
lum. Vestibulum in orci quis felis tempor lacinia. Vivamus ornare ultrices facilisis.
Ut hendrerit volutpat vulputate. Morbi condimentum venenatis augue, id porta
ipsum vulputate in. Curabitur luctus tempus justo. Vestibulum risus lectus, adip-
iscing nec condimentum quis, condimentum nec nisl. Aliquam dictum sagittis velit

Dept. of CSE, KLE Dr. MSSCET June 2023 6


Chapter 2 Literature Survey 2.3. Main Section 3
sed iaculis. Morbi tristique augue sit amet nulla pulvinar id facilisis ligula mol-
lis. Nam elit libero, tincidunt ut aliquam at, molestie in quam. Aenean rhoncus
vehicula hendrerit [7].

Table 2.1: Comparison of Different ........ Techniques

Authors Year Concepts Advantages Disadvantages

Pattar et al. [1] 2018 Some concept Its advantage List of disadvan-
here. tages.
Roopa et al. [4] 2019 Some concept Its advantage List of disadvan-
here. tages.
Vinuta et al. [5] 2018 Some concept Its advantage List of disadvan-
here. tages.

The Table 2.1 lists a sample literature comparison table.

Dept. of CSE, KLE Dr. MSSCET June 2023 7


Chapter 3

Proposed Model

3.1 An Algorithm Example

A sample algorithm written in algorithm2e package is shown in Algorithm 3.1.

Algorithm 3.1: Some Algorithm


Input: PUSH or PULL Message from an IoT Resource/Search
Middleware.
Output: Priority of the message.
Some statement
Some more statement
if condition = TRUE then
/* comment-1 */
if time ¿ 20 then
flag ← FALSE;
else if time ¿ 40 then
flage ← TRUE;
else
return;
else
/* Long comment */
/* More Long Comment */
Do something else

8
Appendix A

Appendix Title Here

Write your Appendix content here.

9
Appendix B

Some Code Here

Don’t include your entire program here. Just some core skeleton code can be
shown.
1 NODE deleteEnd ( NODE h )
2 {
3 NODE cur = h ;
4 NODE prev ;
5

6 // Case -1: List is empty .


7 if ( h == NULL )
8 {
9 printf ( " \ nList is empty ! " ) ;
10 return h ;
11 }
12

13 // Case -2: List has only 1 node .


14 if ( h - > link == NULL )
15 {
16 h = NULL ;
17 return h ;
18 }
19

20 // Case -3: More than 1 node in the list .


21 while ( cur - > link != NULL )
22 {
23 // store previous link node
24 prev = cur ;
25 cur = cur - > link ;
26 }
27 // Curr assign 2 nd last node ’s next to Null
28 previous -> link = NULL ;
29

30 free ( cur ) ;

10
Appendix B Some Code Here Appendix B Some Code Here
31

32 return h ;
33 }

Dept. of CSE, KLE Dr. MSSCET June 2023 11


Bibliography

[1] S. Pattar, R. Buyya, K. R. Venugopal, S. S. Iyengar, and L. M. Patnaik, “Searching


for the IoT Resources: Fundamentals, Requirements, Comprehensive Review and
Future Directions,” IEEE Communications Surveys & Tutorials, vol. 20, no. 3 third
quater, pp. 2101–2132, 2018.

[2] S. Pattar, C. R. Sandhya, V. Darshil, D. Chouhan, R. Buyya, K. R. Venugopal, S. S.


Iyengar, and L. M. Patnaik, “Context-oriented User-centric Search System for the
IoT based on Fuzzy Clustering,” in Proceedings of the International Conference on
Computational Intelligence, Security and IoT (ICCISIoT 2019). Agartala , India:
Springer, Dec 13–14 2019, pp. 1–14.

[3] S. Pattar, C. R. Sandhya, V. Darshil, R. Buyya, K. R. Venugopal, S. S. Iyengar,


and L. M. Patnaik, “SoCo-ITS: Service Oriented Context Ontology for Intelligent
Transport System,” in Proceedings of the 2019 ACM 7th International Conference
on Information Technology: IoT and Smart City (ICIT 2019). Shanghai, China:
ACM, 20–23 2019, pp. 1–6.

[4] M. S. Roopa, S. Pattar, R. Buyya, K. R. Venugopal, S. S. Iyengar, and L. M. Patnaik,


“Social Internet of Things (SIoT): Foundations, Thrust Areas, Systematic Review
and Future Directions,” Computer Communications, vol. 139, pp. 32–57, 2019.

[5] N. Vinutha, S. Pattar, K. Chiranjeev, A. Akash, P. D. Shenoy, and K. R. Venu-


gopal, “A Convolution Neural Network based Classifier for Diagnosis of Alzheimer’s
Disease,” in Proceedings of the IEEE Fourteenth International Conference on Infor-
mation Processing (ICInPro) - 2018. Bengaluru, India: IEEE, Dec 21–23 2019, pp.
201–206.

12
[6] S. Pattar, S. K. Dwaraka, V. Darshil, R. Buyya, K. R. Venugopal, S. S. Iyengar,
and L. M. Patnaik, “Progressive Search Algorithm for Service Discovery in an IoT
Ecosystem,” in Proceedings of the 2019 IEEE International Conference on Internet
of Things (iThings-2019). Atlanta, USA: IEEE, Jul 14–17 2019, pp. 1041–1048.

[7] S. Pattar, Ritika, V. Darshil, R. Buyya, K. R. Venugopal, S. S. Iyengar, and L. M.


Patnaik, “Device Discovery Techniques for Industrial Internet of Things through
Predictive Analytic Mechanism,” in Proceedings of the 2019 3rd International Con-
ference on Security with Intelligent Computing and Big-data Services (SICBS’19).
New Taipei City, Taiwan: Springer, Dec 4–6 2019, pp. 1–14.

13
List of Publications based on the Dissertation
REFEREED INTERNATIONAL JOURNALS

1. S. Pattar, R. Buyya, K. R. Venugopal, S. S. Iyengar, and L. M. Patnaik, “Searching


for the IoT Resources: Fundamentals, Requirements, Comprehensive Review and
Future Directions,” IEEE Communications Surveys & Tutorials, vol. 20, no. 3
third quater, pp. 2101–2132, 2018.

2. Journal paper-2

PRESENTATIONS IN REFEREED INTERNATIONAL


CONFERENCES

3. Conference paper-1

4. Conference paper-2

14

You might also like