SlideShare a Scribd company logo
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
1
University of Sargodha Lahore Campus Faculty of Computer Science &
Information Technology
BS-Information
Technology
Danial Ahmed BSIT-F15-LC-236
Final Documentationof Operation: War on Terror
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
2
BONAFIDE CERTIFICATE
This is to certify that the project document entitled “Operation: War on Terror” submitted
by Danial Ahmed, Roll No BSIT-F15-LC-236.In partial fulfillment of the requirements
for the award of the Degree Bachelor of in “Bachelor of Sciences in Information
Technology” is a confide record of the work carried out under my (our) guidance and
supervision at University of Sargodha Lahore Campus and I have proofread this
document and this is according to proper format.
Name of Co-Supervisor
Ms. Saleha Zahid
CS & IT
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
3
STATEMENT OF SUBMISSION
This is to certify that Danial Ahmed, Roll No BSIT-F15-LC-236, has successfully
completed the final project named as: “Operation: War on Terror”, at the Faculty of
IT, University of Sargodha, Lahore Campus, to fulfill the partial requirement of the
degree of Bachelors in Information Technology.
__________________________
Project Management Committee
Department of Computer Science and IT
University of Sargodha, Lahore Campus
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
4
APPROVAL CERTIFICATE
The undersigned have examined the Project entitled “Operation: War on Terror”
presented by Danial Ahmed candidate for the degree of Bachelors of Science (BS
(Hons) in Information Technology) and hereby certify that it is worthy of acceptance.
Dated Ms. Saleha Zahid
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
5
Proofreading Certificate
It is to certify that I have read the document meticulously and circumspectly. I am
convinced that the resultant project report does not contain any spelling, punctuation or
grammatical mistakes as such. All in all, I find this document well organized and I
make sure that its objectives have been successfully met.
University of Sargodha
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
6
Acknowledgement
Up and above, everything, all appreciation to Allah Almighty, the compassionate and
merciful, Who enabled us to elucidate a drop from the existing ocean of knowledge,
countless salutation be upon the Holy Prophet Muhammad (Sallallaho Alaihe wa Aalehi
Wassalam), the city of knowledge, Who has guided our “Ummah” to seek knowledge
from cradle to grave.
We truly acknowledge the cooperation and help make by Project Management Office, CS
department, UOSLC. He has been a constant source of guidance throughout the course of
this project. It is quite delectable and to becoming to avail of this most propitious
opportunity to articulate with utmost gratification, our profound and intense, sense if
indebtedness to our affectionate supervisor, Software Engineer, University of Sargodha,
Lahore Campus, Pakistan. Their proficient counseling, valuable suggestions, boundless
forbearance, indefatigable help with anything, anywhere, anytime, consummate advice
and thought-provoking instruction in piloting this project. Special thanks for him would
always be due.
We express our thankful feeling to our friends and families whose silent supported us to
complete our project.
Danial Ahmed
Dated:
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
7
ABSTRACT
This PC game can be played anyone above the age of game. It is a first-person shooting
game named “Operation: War on Terror”. It is developed for windows operating system.
This game is actually assumed as our security forces are fighting against the terrorism
acts that previously happened in Pakistan. Moreover, it is focused on some specific
missions. The main theme of the game is to fight against the forces that are constantly
attacking on Pakistan. The Game has many missions in which the user has to play
through to open the next mission of the game. The first-person shooting character in the
game is from Pakistan Armed Forces. High resolution texture, probs and materials are
used in the game to give the user better graphics experience. Moreover, the game
includes a map which guides the player through the level. There are also some
instructions to guide the player.
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
8
Table of Contents
Chapter No:1 ....................................................................................................................... 1
Project Overview................................................................................................................. 1
1 Project Title.................................................................................................................. 2
1.2 Introduction and Background ........................................................................... 2
1.3 Problem Statement ................................................................................................ 2
1.4 Previous Work....................................................................................................... 2
1.5 Objectives of the Project................................................................................... 3
1.6 Specific Project Goals....................................................................................... 3
1.7 Scope the Project (Abstract):............................................................................ 3
1.8 Glossary................................................................................................................. 4
1.9 Project Overview Statement ............................................................................. 4
2. Benefits of the Project................................................................................................. 5
2.1 Direct Customers / Beneficiaries of the Project.................................................... 5
2.2 Outputs Expected from the Project ....................................................................... 5
3. Project Description...................................................................................................... 5
3.1 Functional Specification........................................................................................ 5
3.2 Implementation Plan......................................................................................... 8
4. Qualifications ............................................................................................................ 10
4.1 Personal Background........................................................................................... 10
4.2 Courses Taken..................................................................................................... 10
4.3 Projects................................................................................................................ 10
5.1Software requirement specification...................................................................... 10
5.2Overall System Description ................................................................................. 10
5.3External Interface Requirements.......................................................................... 11
5.4 Functional Requirements..................................................................................... 11
5.5Non-functional Requirements .............................................................................. 11
Chapter no 2 ...................................................................................................................... 12
Story board ........................................................................................................................ 12
Chapter No 3 ..................................................................................................................... 14
Feasibility Report .............................................................................................................. 14
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
9
3 Feasibility Report ....................................................................................................... 15
3.1 Technical Feasibilities......................................................................................... 15
3.2 Economical Feasibilities ..................................................................................... 15
3.3 Operational Feasibilities...................................................................................... 15
3.4 Specification Feasibilities ................................................................................... 15
3.5 Schedule feasibilities........................................................................................... 15
3.6 Legal/Ethical Feasibilities................................................................................... 15
Chapter No 4 ..................................................................................................................... 16
System and Design Analysis............................................................................................. 16
4 UML diagrams ........................................................................................................... 17
4 .1 Use case Description.......................................................................................... 17
4.2 Class diagram...................................................................................................... 19
4.3 Sequence diagram ............................................................................................... 19
4.4 Game Environment Flow .................................................................................... 25
4.5 Activity Diagram................................................................................................. 26
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
1
Chapter No:1
Project Overview
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
2
1 ProjectTitle
Operation: War on Terror
1.2 Introduction and Background
The idea of making this first-person shooting game is originated from the recent terrorist
attacks in Pakistan. There are several incidents occur past years such as Army Public
School attack. There is a constant violation of at eastern border. With my game, I want to
try to remove the frustration of the players by destroying the terrorist plans. The character
in the game is a kind of 3D first-person shooter. In the first-person shooter, the player can
see the activity through the eyes of the player character.
In this game, the 3D first-person character will be a Pakistan Armed Forces Soldier who
will fight on the last battlegrounds. He will be fighting with both external and internal
threats and will fight for the survival of Pakistan and to rescue people. The main
character in the game will be from Pakistan Armed Forces and the player of the game
shall experience true first experience as the game’s sound and graphics make it perfect.
There will be a variety of weapons will be available for the player. The player will be
given with default weapons of the mission. As the game progress, he can swap through
different weapons from the enemies such as MP5, Sniper, and Ak47 etc. Each mission of
the game has its own objectives. The game will be a story-based game in which the
player will be briefed about the mission before starting the mission. The player will also
be able to skip the briefing. Aim and shooting feature will be added to the game as it is
compulsory for a shooting game. People will like to play this game as it will help them to
remove terrorism from Pakistan.
1.3Problem Statement
There are about 1226.1 Million Active Pc Gamers all over the world. Also, there are a
large number of Pc gamers in Pakistan. There is not any game currently on the market
that is made on the Pakistan Army. That is why they usually play games that are based on
the World War I and II. Some of them are in modern warfare. But there is not any single
game that is made on the Operation Zarbe-Azb. A fight our army has fought with against
the terrorism in FATA and other areas.
The number of pc gamers is much higher as compared to console in Pakistan. These
players have never played a game that represents their country. Each level of the game
has different stories and tasks.
1.4Previous Work
There are many related first shooting games and many studios that comes in mind for
example:
 Medal of Honor developed by Electronic Arts:
Medal of Honor is a story based first-person shooting game. The first installments of this
game based on the 2nd World War and the latest release of the game is more focused on
modern warfare.
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
3
 Call of Duty Series Developedby Infinity Ward
Call of duty is one of the very famous series of first-person shooting games. The early
releases of the game are all based on World War II. It also has new releases based on
modern warfare.
 Battlefield Developedby Electronic Arts
It is another great and famous first-person shooting video game. The first release was in
2002 in which it starts with Battlefield 1942. This series of the game focuses on
teamwork, vehicular warfare, and large maps.
1.5 Objectives of the Project
As a Pakistani, we want to eliminate the terrorism from our country. It is one of the big
challenges and we want to remove the terror from the minds of the people. In order to
reduce the frustration of our minds, we are making this game to give the player an
opportunity to put an end to all the enemy plans in the virtual world.
The objectives are as follows:
 The first objective of this game is to provide the player with a challenging gameplay
in which he will stand up against the terrorism happening in Pakistan. We also want
to give a message to the world that our Armed Forces has the ability to face any kind
of terrorism.
 The Environment and the gameplay are based upon the recent incidents happened in
the different areas and cities in Pakistan. The environment will be the same as the
streets and cities in Pakistan.
 I will be utilizing the blender and Unreal Engine for the best graphical capability that
can be achieved upon personal computer machines.
The main objective is that we should make that game in which we can find the terrorists
from all the means and sources as we can in our game and then to destroy them.
1.6 Specific ProjectGoals
Our goal states that “to provide the PC gamers of Pakistan with a great FPS game that
they can play and entertain their selves by fighting against the terrorism in a virtual
world.”
1.7 Scope the Project(Abstract):
I am developing this game to send a message that we are able to save our country. Our
aim is to fight against the terrorism in Pakistan. The idea is one of a kind as there are not
any game that is made by Pakistani Developers. That is why I decided to work on this to
reduce the frustration about terrorism in Pakistan.
This game will be played by the Pakistani gamers no matter what is their age. The scope
of the game is initially limited to Pakistani gamers only. It will provide them a platform
on which they can virtually unleash their anger against terrorism.
Operation: War on Terror is not just for the people of Pakistan but for all over the world.
Any PC gamer who has a compatible pc can play our game and it will help us to show the
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
4
world that we also want peace in the world and to realize them that how much lives we
have given to fight against terrorism.
1.8 Glossary
Operation: War on Terror (A war Against Terrorism)
1.9 ProjectOverview Statement
Table 2(Project Overview Statement)
Project Title: Operation: War on Terror
Group Leader: Danial Ahmed
Project Members:
Name Registration # Email Address Signature
Danial Ahmed 15F-US-L-
CSC-534
danial.riaz121@gmail.com
Project Goal: “Providing the PC gamers of Pakistan to experience a game based on Pakistan Army and
to remove their frustration against terrorism.”
Objectives:
Sr.#
1 Play Game
2 Save
3 Load
4 Graphics Settings
5 Game Settings
6 Exit
7 Retry Screen
8 Loading Screen
Project Success criteria: People love this game as this game is one of its kind and people will eager to
play a game like this.
A.
B. Risks of the Project:
(Please mark  where applicable) Low Medium High
 Technical risk
 Timing risk
 Budget risk
Organization Address (if any):
Type of project: Research Development
Target End users:Handheld android users
Development Technology: Object Oriented Structured
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
5
Platform: Web based Distributed
Desktop based Setup Configurations
Other_____________________
Suggested Project Supervisor: Ms. Saleha Zahid
Approved By:
Date:
2. Benefits of the Project
2.1 DirectCustomers / Beneficiaries ofthe Project
All the PC gamers of the world are the beneficiaries of the project.
2.2 Outputs Expectedfrom the Project
A “First Person Shooting Game” that provides the players with an opportunity to fight
against the terrorism in a virtual world.
3. ProjectDescription
3.1FunctionalSpecification
The player can make a profile by entering his name. After making the profile user can hit
the play button to play the game. From the next screen, user can select different difficulty
levels. Moreover, he can exit the game after saving. He can continue from the last saved
checkpoint. The game also has an option button where he can perform different
operations like changing graphics and control settings. After hitting the play button, the
loading will start with the short briefing of the mission. The user will also be able to see
the weapons he has and the amount of ammo on the left bottom side of the screen. He can
scroll through different weapons he has in its inventory. He can reload his gun by
pressing the reload weapon. He can pick ammo from the dead enemies and can pick their
weapons. The user will be able to play the game with keyboard mouse or with a
compatible Xbox controller.
3.1.1 Functions Performed
The player can perform different actions like aiming shooting, reloading, picking a
weapon. He can walk, run, and crouch while playing the game. Moreover, the player can
save the game and change settings such as graphic and game settings. He can save and
exit the game at any point.
1. Play the game
i. Aim
ii. Shoot
iii. Crouch
iv. Walk
v. Sprint
vi. Swap Weapons
vii. Select Difficulty
viii. See Objectives
2. Save the game
3. Load the game
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
6
4. Change settings
5. Exit game
3.1.2Limitations and Restrictions
A compatible PC system with windows is required to play the game. The game may not
run on low-performance systems but the number of fps will be low. As the game has
high-quality graphics, therefore, the game will require a dedicated graphics card for a
smooth gameplay experience.
3.1.3SystemArchitecture
Theme Development
Designing Main
Menu
FPS Controller
Missions
Graphics & Sound
Quality Check
Removing Glitches
Defining Controls
and Missions/Stage
s
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
7
Figure 1 (System Architecture)
3.1.4 Equipment Configuration
I am going to use a core i5 system with a dedicated NVidia graphics card for the
development.
The system requirements for playing the game are as follows:
OS: Microsoft Windows 7/8/8.1/10
Processor: Intel Core i3 3.0 GHz or AMD Phenom II X4
Memory: 4 GB RAM
Graphics: 1 GB NVIDIA GeForce AMD Graphics Card
DirectX®: Microsoft DirectX(R) 10
Hard Drive: 12GB of free hard drive space
Sound: 100% DirectX 9.0c compatible sound card
3.1.5 Implementation Tools and Technology
 Unreal Engine 4 will be used for development.
 Target platform will also be Windows.
 The programming language will be C++
 I am going to use the latest stable release version of Unreal Engine for the
development of the game.
 The size of the development effort will be great because high skills are required for
this project.
 The budget will be needed for PC Equipment.
 Time: more time the better.
Testing Enemies Al
Check Performance
Resource Utilization Test
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
8
3.2 Implementation Plan
3.2.1Deliverable Items
Deliverable will be a game folder with a .exe file.
3.2.2MilestoneIdentification
Table 2(milestone)
C. Key Milestones and Deliverables:
(Please list and describe the principal milestones and associated deliverables of the
project. A key milestone is reached when a significant phase in the project is
concluded, e.g. selection and simulation of algorithms, completion of architectural
design and design documents, commissioning of equipment, completion of test, etc.)
The information given in this table will be the basis of monitoring by Project
Coordination Office.
No. Elapsed
time from
start (in
months) of
the project
Milestone Deliverables
1. 1 month Proposal .exe
2. 2 months Analysis .exe
3. 2 months Design .exe
4. 3 month Development .exe
5. 1 month Upgrading and
Maintenance
3.3.3 ProjectSchedule / Milestone Chart
Final Year Project Schedule
Activities
Semester 1 Semester 2
Duration Oct Nov Dec Jan Feb Mar April May Jun
e
Proposal
Ideas discussion 1 month
Supervisor
meeting
9 months
Project title
selection
1 month
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
9
Figure 2(Gantt chart)
Proposal
submission
1 month
Analysis
Requirement
gathering
1.5
months
Requirement
analysis
2 months
Key Issues 2 months
Set Objectives 1 month
Requirements
identification
Functional
requirements
1 month
Non-functional
requirements
1 month
Design
Theme 2 months
System
Architecture
2 months
Class diagram 2 months
Design use cases 2 months
Design test cases 2 months
Development
Demo
Development
3 months
Graphics
Development
3 months
Final Game
development
3 months
Testing 2 months
Upgrading &
Maintenance
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
10
4. Qualifications
4.1PersonalBackground
Danial Ahmed: Worked on some games as a freelancer.
4.2Courses Taken
Unreal Engine Game Development
4.3Projects
Web Project
Dos Game Project
Documentary Project.
5.1Software requirement specification
5.1.1Purpose ofDocument
SRS document is to provide a detailed overview of my game, its parameters and goals.
This document describes the project's target audience and its user interface, hardware and
software requirements.
5.1.2ProjectOverview
This game is for people over the age of 13. The purpose of making this game is to give
the gamers of Pakistan where they can play as an armed force member. The players will
fight against the terrorism in the game. The game allows them to show their aggression
against the terrorism in a virtual world.
5.1.3Scope
This game is developed for windows OS only. Every gamer who is over the age of 13 can
play this game because the game contains killing of the terrorism so it is advised to
recommend the people over the age of 13. Our armed forces are constantly fighting
against the terrorism. The main theme is to generate different operations against the
terrorist attacks previously happened in Pakistan. It is consisted on different missions and
user can select the difficulty level at the start of the game. People of Pakistan are very
frustrated with terrorism and our game provides them with a virtual world where they can
fight with the tourists in a virtual environment as the member of Pakistan Armed Forces.
5.2OverallSystemDescription
Overall system is based on a windows first person shooting game which allows the player
to fight against the terrorism as a Pakistan Armed Force soldier.
5.2.1Usercharacteristics
User Will make the profile on the game and then can play the game by clicking the play
game. There the user can select the difficulty level he wants to play with.
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
11
5.2.2Operating environment
System will operate on Windows platform.
5.2.3Systemconstraints
Identify any constraints or limitations on the system. Constraints may include the
following:
 OS: Microsoft Windows 7/8/8.1/10
 Processor: Intel Core i3 3.0 GHz or AMD Phenom II X4
 Memory: 4 GB RAM
 Graphics: 1 GB NVIDIA GeForce or AMD Graphics Card
 DirectX®: Microsoft DirectX(R) 9
 Hard Drive: 12GB of free hard drive space
 Sound: 100% DirectX 9.0c compatible sound card
5.3ExternalInterface Requirements
5.3.1HardwareInterfaces
Desktop computer or laptop is required to run the game.
5.3.2Software Interfaces
Windows Operating System is required.
5.4 Functional Requirements
User Profile
Select Mission
Options
5.5Non-functionalRequirements
5.5.1 Performance requirements
 The Average load tie must be less than 20 seconds.
 The time taken to make new profile should be less than 15 seconds
 Average time need for saving game should be less than 5 seconds.
 Game must not be crashed and no glitches should appear while playing.
 Safety Requirements
There are no any harmful things into the system.
5.5.2 SecurityRequirements
Not high security required for the system.
5.5.3 UserDocumentation
User manual is provided in the game menu which describes the information about the
functions and module provided in the game.
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
12
Chapter no 2
Story board
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
13
Description: The player will first make a profile on the game. Player will then start the
new game. After that, it will select the difficulty level and then the game will start and
player can play it. After completing the first mission the second mission will inlock and
after completing it the player will move on to next. Exit option is available in the game. It
can quit the game and after that it will come to the main menu.
Figure 3(story board)
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
14
Chapter No 3
Feasibility Report
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
15
3 Feasibility Report
3.1 TechnicalFeasibilities
The game is technically feasible. I am using Unreal Engine 4 for developing the game.
The game engine is designed to develop the high-performance AAA games. The project
is based on Object oriented approach.
3.2 EconomicalFeasibilities
Economically this project is feasible. Resources are available in the form of standards and
we can develop this by using unity. As everyone use smart phone in this era. This
application is easily use on every smart device.
This project is economically feasible as I am using Unreal Engine 4 which is very
responsible and the standard resources are available for developing this game. Most of
the people have a desktop computer or a laptop. The game can be played on any medium
level computer hardware having Windows OS.
3.3 OperationalFeasibilities
The game can be played using Keyboard and mouse combination. The user can also use a
XBOX 360 or One controller to play the game. The game main menu is very simple and
it can change the settings like graphics, sound and video etc.
3.4 SpecificationFeasibilities
The game can be run on a Desktop or laptop running windows OS. It is designed to run
on medium range computers which are mostly in use of the people.
3.5 Schedule feasibilities
The project will be complete on time. I have managed all the tasks to complete the project
on time. I have gathered all the information needed to complete my project on time.
3.6 Legal/EthicalFeasibilities
The project is ethically/legally feasible. The tool I used to develop my game are all
licensed.
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
16
Chapter No 4
System and Design
Analysis
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
17
4 UML diagrams
4 .1 Use case Description
Actors
 Player
Player have to do some functions like to install the setup of the game, then to run (load)
the game and then to initialize the game, and then play it. Player can use different
controls to play the game. When player enters the gameplay there are options for them for
different missions to play, some of them were locked and some of them were unlocked.
Player should start the game from the unlock missions and then proceeds toward by
getting experience points and also there are many weapons available for the player,
player have to choose it.
There are two possibilities for the player in the game:
Mission Successful:
If mission is successful, then player can proceed towards the next mission.
Mission Failed:
If the player is unable to complete the mission, player will have an option to replay that
mission.
 Developer
Developer has to develop the game, test on daily basis for the maintenance of the game
and deployment of the gameplay. Developer should make the game user-friendly.
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
18
Figure 4 Use Case Diagram
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
19
4.2 Class diagram
Figure 5 (class diagram)
4.3 Sequence diagram
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
20
User Freedom Force MainMenu Play Game
User Start PlayingGame
User
Start Game
Click on Play Game
Game Starts
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
21
User Missions Play Mission
Click on Missions To Select Mission
Play Selected Mission
User will play the selected Mission
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
22
User GameSettings SaveSettings LoadGame
UsercanLoadGameAfterSettingswereSavedandPlay
Options
ClickonOptions
ClickonGameSettings
SaveSettings afterchanging
LoadGame
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
23
User Weapons SelectWeapons
Click on Weapons
Selecting Weapons thatare avalable
Play Game After Selecting Weapon
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
24
User GameSettings Controls Save
ClickonGameSettings
ChangeControlsSettings forEaseOfUse
SaveSettings
ControlSettingsareSaved
Figure 6 (sequence diagram)
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
25
4.4 Game Environment Flow
Figure 7 (Game Environment Flow)
Operation: War on Terror
© Departmentof Computer Science & InformationTechnology.
26
4.5 Activity Diagram
Figure 8 (activity diagram)

More Related Content

What's hot

Design phase of game development of unity 2d game
Design phase of game development of unity 2d game Design phase of game development of unity 2d game
Design phase of game development of unity 2d game
Muhammad Maaz Irfan
 
Final Year Game Project Report - Riko: The Aventurer
 Final Year Game Project Report - Riko: The Aventurer  Final Year Game Project Report - Riko: The Aventurer
Final Year Game Project Report - Riko: The Aventurer
Nusrat Jahan Shanta
 
Car racing game for android
Car racing game for androidCar racing game for android
Car racing game for android
ravijot singh
 
Car Game - Final Year Project
Car Game - Final Year ProjectCar Game - Final Year Project
Car Game - Final Year Project
Vivek Naskar
 
Game Development Step by Step
Game Development Step by StepGame Development Step by Step
Game Development Step by Step
Bayu Sembada
 
game project presentation
game project presentationgame project presentation
game project presentation
Kavi Kumar
 
ER(ENTITY-RELATIONSHIP) diagram(Game)
ER(ENTITY-RELATIONSHIP) diagram(Game)ER(ENTITY-RELATIONSHIP) diagram(Game)
ER(ENTITY-RELATIONSHIP) diagram(Game)
Abhishek Panda
 
Snake project report
Snake project reportSnake project report
Snake project report
Manju Rajput
 
The complete srs documentation of our developed game.
The complete srs documentation of our developed game. The complete srs documentation of our developed game.
The complete srs documentation of our developed game.
Isfand yar Khan
 
Gaming Documentation final
Gaming Documentation finalGaming Documentation final
Gaming Documentation final
MemesTech
 
Game development life cycle
Game development life cycleGame development life cycle
Game development life cycle
Sarah Alazab
 
Introduction to Game Development
Introduction to Game DevelopmentIntroduction to Game Development
Introduction to Game Development
Sumit Jain
 
Zombi - Shoot for Survive
Zombi - Shoot for SurviveZombi - Shoot for Survive
Zombi - Shoot for Survive
Divy Singh Rathore
 
Android Mp3 Player
Android Mp3 PlayerAndroid Mp3 Player
Android Mp3 Player
Chirag Aggarwal
 
report on snake game
report on snake game report on snake game
report on snake game
azhar niaz
 
Snake game powerpoint presentation by rohit malav
Snake game powerpoint presentation by rohit malavSnake game powerpoint presentation by rohit malav
Snake game powerpoint presentation by rohit malav
Rohit malav
 
Introduction to Game Development
Introduction to Game DevelopmentIntroduction to Game Development
Introduction to Game Development
Reggie Niccolo Santos
 
Car Game Final Year Project
Car Game Final Year ProjectCar Game Final Year Project
Car Game Final Year Project
Bithika Barik
 
Report on car racing game for android
Report on car racing game for androidReport on car racing game for android
Report on car racing game for android
ravijot singh
 
Creating a Game Design Document
Creating a Game Design DocumentCreating a Game Design Document
Creating a Game Design Document
Karl Kapp
 

What's hot (20)

Design phase of game development of unity 2d game
Design phase of game development of unity 2d game Design phase of game development of unity 2d game
Design phase of game development of unity 2d game
 
Final Year Game Project Report - Riko: The Aventurer
 Final Year Game Project Report - Riko: The Aventurer  Final Year Game Project Report - Riko: The Aventurer
Final Year Game Project Report - Riko: The Aventurer
 
Car racing game for android
Car racing game for androidCar racing game for android
Car racing game for android
 
Car Game - Final Year Project
Car Game - Final Year ProjectCar Game - Final Year Project
Car Game - Final Year Project
 
Game Development Step by Step
Game Development Step by StepGame Development Step by Step
Game Development Step by Step
 
game project presentation
game project presentationgame project presentation
game project presentation
 
ER(ENTITY-RELATIONSHIP) diagram(Game)
ER(ENTITY-RELATIONSHIP) diagram(Game)ER(ENTITY-RELATIONSHIP) diagram(Game)
ER(ENTITY-RELATIONSHIP) diagram(Game)
 
Snake project report
Snake project reportSnake project report
Snake project report
 
The complete srs documentation of our developed game.
The complete srs documentation of our developed game. The complete srs documentation of our developed game.
The complete srs documentation of our developed game.
 
Gaming Documentation final
Gaming Documentation finalGaming Documentation final
Gaming Documentation final
 
Game development life cycle
Game development life cycleGame development life cycle
Game development life cycle
 
Introduction to Game Development
Introduction to Game DevelopmentIntroduction to Game Development
Introduction to Game Development
 
Zombi - Shoot for Survive
Zombi - Shoot for SurviveZombi - Shoot for Survive
Zombi - Shoot for Survive
 
Android Mp3 Player
Android Mp3 PlayerAndroid Mp3 Player
Android Mp3 Player
 
report on snake game
report on snake game report on snake game
report on snake game
 
Snake game powerpoint presentation by rohit malav
Snake game powerpoint presentation by rohit malavSnake game powerpoint presentation by rohit malav
Snake game powerpoint presentation by rohit malav
 
Introduction to Game Development
Introduction to Game DevelopmentIntroduction to Game Development
Introduction to Game Development
 
Car Game Final Year Project
Car Game Final Year ProjectCar Game Final Year Project
Car Game Final Year Project
 
Report on car racing game for android
Report on car racing game for androidReport on car racing game for android
Report on car racing game for android
 
Creating a Game Design Document
Creating a Game Design DocumentCreating a Game Design Document
Creating a Game Design Document
 

Similar to FPS GAME FYP Documentation

Ddos attacks on the data and prevention of attacks
Ddos attacks on the data and prevention of attacksDdos attacks on the data and prevention of attacks
Ddos attacks on the data and prevention of attacks
RanganathSri1
 
Nig game project file
Nig game project fileNig game project file
Nig game project file
NITINYTC
 
File tracking system
File tracking systemFile tracking system
File tracking system
Sabana Maharjan
 
A project report_online_course_portal_su (1)
A project report_online_course_portal_su (1)A project report_online_course_portal_su (1)
A project report_online_course_portal_su (1)
Assosa University
 
DRDO PROJECT REPORT1
DRDO PROJECT REPORT1DRDO PROJECT REPORT1
DRDO PROJECT REPORT1
Dikshya Rath
 
firozreport.pdf
firozreport.pdffirozreport.pdf
firozreport.pdf
Firozkumar2
 
NIC Project Final Report
NIC Project Final ReportNIC Project Final Report
NIC Project Final Report
Kay Karanjia
 
Project Final Report Ismail MIM IT13078010 SHUID 24048259_final
Project Final Report Ismail MIM IT13078010 SHUID 24048259_finalProject Final Report Ismail MIM IT13078010 SHUID 24048259_final
Project Final Report Ismail MIM IT13078010 SHUID 24048259_final
Ismail Iqbal
 
Report 2
Report 2Report 2
Report 2
Raman Sharma
 
Analyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testingAnalyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testing
Engr Md Yusuf Miah
 
Project Report
 Project Report Project Report
Project Report
KrishanKantGupta5
 
Project proposal Module
Project proposal ModuleProject proposal Module
Project proposal Module
Krishna Bashyal
 
Report final
Report finalReport final
Report final
Jim Kats
 
DATA AND BUSINESS PROCESS INTELLIGENCE
DATA AND BUSINESS PROCESS INTELLIGENCEDATA AND BUSINESS PROCESS INTELLIGENCE
DATA AND BUSINESS PROCESS INTELLIGENCE
Swati Singh
 
RAPA Project Documentaion
RAPA Project DocumentaionRAPA Project Documentaion
RAPA Project Documentaion
Khaled El Sawy
 
A Facial Expression Recognition System A Project Report
A Facial Expression Recognition System A Project ReportA Facial Expression Recognition System A Project Report
A Facial Expression Recognition System A Project Report
Allison Thompson
 
Vision360 Optical Shop Ecommerce Website Report
Vision360 Optical Shop Ecommerce Website ReportVision360 Optical Shop Ecommerce Website Report
Vision360 Optical Shop Ecommerce Website Report
NayanGupta60
 
DILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdf
DILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdfDILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdf
DILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdf
DiamondZ3
 
Hotel management report
Hotel management reportHotel management report
Hotel management report
Nishant Bhardwaj
 
Object and pose detection
Object and pose detectionObject and pose detection
Object and pose detection
AshwinBicholiya
 

Similar to FPS GAME FYP Documentation (20)

Ddos attacks on the data and prevention of attacks
Ddos attacks on the data and prevention of attacksDdos attacks on the data and prevention of attacks
Ddos attacks on the data and prevention of attacks
 
Nig game project file
Nig game project fileNig game project file
Nig game project file
 
File tracking system
File tracking systemFile tracking system
File tracking system
 
A project report_online_course_portal_su (1)
A project report_online_course_portal_su (1)A project report_online_course_portal_su (1)
A project report_online_course_portal_su (1)
 
DRDO PROJECT REPORT1
DRDO PROJECT REPORT1DRDO PROJECT REPORT1
DRDO PROJECT REPORT1
 
firozreport.pdf
firozreport.pdffirozreport.pdf
firozreport.pdf
 
NIC Project Final Report
NIC Project Final ReportNIC Project Final Report
NIC Project Final Report
 
Project Final Report Ismail MIM IT13078010 SHUID 24048259_final
Project Final Report Ismail MIM IT13078010 SHUID 24048259_finalProject Final Report Ismail MIM IT13078010 SHUID 24048259_final
Project Final Report Ismail MIM IT13078010 SHUID 24048259_final
 
Report 2
Report 2Report 2
Report 2
 
Analyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testingAnalyzing and implementing of network penetration testing
Analyzing and implementing of network penetration testing
 
Project Report
 Project Report Project Report
Project Report
 
Project proposal Module
Project proposal ModuleProject proposal Module
Project proposal Module
 
Report final
Report finalReport final
Report final
 
DATA AND BUSINESS PROCESS INTELLIGENCE
DATA AND BUSINESS PROCESS INTELLIGENCEDATA AND BUSINESS PROCESS INTELLIGENCE
DATA AND BUSINESS PROCESS INTELLIGENCE
 
RAPA Project Documentaion
RAPA Project DocumentaionRAPA Project Documentaion
RAPA Project Documentaion
 
A Facial Expression Recognition System A Project Report
A Facial Expression Recognition System A Project ReportA Facial Expression Recognition System A Project Report
A Facial Expression Recognition System A Project Report
 
Vision360 Optical Shop Ecommerce Website Report
Vision360 Optical Shop Ecommerce Website ReportVision360 Optical Shop Ecommerce Website Report
Vision360 Optical Shop Ecommerce Website Report
 
DILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdf
DILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdfDILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdf
DILE CSE SEO DIGITAL GGGTECHNICAL INTERm.pdf
 
Hotel management report
Hotel management reportHotel management report
Hotel management report
 
Object and pose detection
Object and pose detectionObject and pose detection
Object and pose detection
 

Recently uploaded

Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
Massimo Artizzu
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
NishanthaBulumulla1
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
YousufSait3
 

Recently uploaded (20)

Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
 

FPS GAME FYP Documentation

  • 1. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 1 University of Sargodha Lahore Campus Faculty of Computer Science & Information Technology BS-Information Technology Danial Ahmed BSIT-F15-LC-236 Final Documentationof Operation: War on Terror
  • 2. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 2 BONAFIDE CERTIFICATE This is to certify that the project document entitled “Operation: War on Terror” submitted by Danial Ahmed, Roll No BSIT-F15-LC-236.In partial fulfillment of the requirements for the award of the Degree Bachelor of in “Bachelor of Sciences in Information Technology” is a confide record of the work carried out under my (our) guidance and supervision at University of Sargodha Lahore Campus and I have proofread this document and this is according to proper format. Name of Co-Supervisor Ms. Saleha Zahid CS & IT
  • 3. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 3 STATEMENT OF SUBMISSION This is to certify that Danial Ahmed, Roll No BSIT-F15-LC-236, has successfully completed the final project named as: “Operation: War on Terror”, at the Faculty of IT, University of Sargodha, Lahore Campus, to fulfill the partial requirement of the degree of Bachelors in Information Technology. __________________________ Project Management Committee Department of Computer Science and IT University of Sargodha, Lahore Campus
  • 4. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 4 APPROVAL CERTIFICATE The undersigned have examined the Project entitled “Operation: War on Terror” presented by Danial Ahmed candidate for the degree of Bachelors of Science (BS (Hons) in Information Technology) and hereby certify that it is worthy of acceptance. Dated Ms. Saleha Zahid
  • 5. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 5 Proofreading Certificate It is to certify that I have read the document meticulously and circumspectly. I am convinced that the resultant project report does not contain any spelling, punctuation or grammatical mistakes as such. All in all, I find this document well organized and I make sure that its objectives have been successfully met. University of Sargodha
  • 6. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 6 Acknowledgement Up and above, everything, all appreciation to Allah Almighty, the compassionate and merciful, Who enabled us to elucidate a drop from the existing ocean of knowledge, countless salutation be upon the Holy Prophet Muhammad (Sallallaho Alaihe wa Aalehi Wassalam), the city of knowledge, Who has guided our “Ummah” to seek knowledge from cradle to grave. We truly acknowledge the cooperation and help make by Project Management Office, CS department, UOSLC. He has been a constant source of guidance throughout the course of this project. It is quite delectable and to becoming to avail of this most propitious opportunity to articulate with utmost gratification, our profound and intense, sense if indebtedness to our affectionate supervisor, Software Engineer, University of Sargodha, Lahore Campus, Pakistan. Their proficient counseling, valuable suggestions, boundless forbearance, indefatigable help with anything, anywhere, anytime, consummate advice and thought-provoking instruction in piloting this project. Special thanks for him would always be due. We express our thankful feeling to our friends and families whose silent supported us to complete our project. Danial Ahmed Dated:
  • 7. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 7 ABSTRACT This PC game can be played anyone above the age of game. It is a first-person shooting game named “Operation: War on Terror”. It is developed for windows operating system. This game is actually assumed as our security forces are fighting against the terrorism acts that previously happened in Pakistan. Moreover, it is focused on some specific missions. The main theme of the game is to fight against the forces that are constantly attacking on Pakistan. The Game has many missions in which the user has to play through to open the next mission of the game. The first-person shooting character in the game is from Pakistan Armed Forces. High resolution texture, probs and materials are used in the game to give the user better graphics experience. Moreover, the game includes a map which guides the player through the level. There are also some instructions to guide the player.
  • 8. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 8 Table of Contents Chapter No:1 ....................................................................................................................... 1 Project Overview................................................................................................................. 1 1 Project Title.................................................................................................................. 2 1.2 Introduction and Background ........................................................................... 2 1.3 Problem Statement ................................................................................................ 2 1.4 Previous Work....................................................................................................... 2 1.5 Objectives of the Project................................................................................... 3 1.6 Specific Project Goals....................................................................................... 3 1.7 Scope the Project (Abstract):............................................................................ 3 1.8 Glossary................................................................................................................. 4 1.9 Project Overview Statement ............................................................................. 4 2. Benefits of the Project................................................................................................. 5 2.1 Direct Customers / Beneficiaries of the Project.................................................... 5 2.2 Outputs Expected from the Project ....................................................................... 5 3. Project Description...................................................................................................... 5 3.1 Functional Specification........................................................................................ 5 3.2 Implementation Plan......................................................................................... 8 4. Qualifications ............................................................................................................ 10 4.1 Personal Background........................................................................................... 10 4.2 Courses Taken..................................................................................................... 10 4.3 Projects................................................................................................................ 10 5.1Software requirement specification...................................................................... 10 5.2Overall System Description ................................................................................. 10 5.3External Interface Requirements.......................................................................... 11 5.4 Functional Requirements..................................................................................... 11 5.5Non-functional Requirements .............................................................................. 11 Chapter no 2 ...................................................................................................................... 12 Story board ........................................................................................................................ 12 Chapter No 3 ..................................................................................................................... 14 Feasibility Report .............................................................................................................. 14
  • 9. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 9 3 Feasibility Report ....................................................................................................... 15 3.1 Technical Feasibilities......................................................................................... 15 3.2 Economical Feasibilities ..................................................................................... 15 3.3 Operational Feasibilities...................................................................................... 15 3.4 Specification Feasibilities ................................................................................... 15 3.5 Schedule feasibilities........................................................................................... 15 3.6 Legal/Ethical Feasibilities................................................................................... 15 Chapter No 4 ..................................................................................................................... 16 System and Design Analysis............................................................................................. 16 4 UML diagrams ........................................................................................................... 17 4 .1 Use case Description.......................................................................................... 17 4.2 Class diagram...................................................................................................... 19 4.3 Sequence diagram ............................................................................................... 19 4.4 Game Environment Flow .................................................................................... 25 4.5 Activity Diagram................................................................................................. 26
  • 10. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 1 Chapter No:1 Project Overview
  • 11. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 2 1 ProjectTitle Operation: War on Terror 1.2 Introduction and Background The idea of making this first-person shooting game is originated from the recent terrorist attacks in Pakistan. There are several incidents occur past years such as Army Public School attack. There is a constant violation of at eastern border. With my game, I want to try to remove the frustration of the players by destroying the terrorist plans. The character in the game is a kind of 3D first-person shooter. In the first-person shooter, the player can see the activity through the eyes of the player character. In this game, the 3D first-person character will be a Pakistan Armed Forces Soldier who will fight on the last battlegrounds. He will be fighting with both external and internal threats and will fight for the survival of Pakistan and to rescue people. The main character in the game will be from Pakistan Armed Forces and the player of the game shall experience true first experience as the game’s sound and graphics make it perfect. There will be a variety of weapons will be available for the player. The player will be given with default weapons of the mission. As the game progress, he can swap through different weapons from the enemies such as MP5, Sniper, and Ak47 etc. Each mission of the game has its own objectives. The game will be a story-based game in which the player will be briefed about the mission before starting the mission. The player will also be able to skip the briefing. Aim and shooting feature will be added to the game as it is compulsory for a shooting game. People will like to play this game as it will help them to remove terrorism from Pakistan. 1.3Problem Statement There are about 1226.1 Million Active Pc Gamers all over the world. Also, there are a large number of Pc gamers in Pakistan. There is not any game currently on the market that is made on the Pakistan Army. That is why they usually play games that are based on the World War I and II. Some of them are in modern warfare. But there is not any single game that is made on the Operation Zarbe-Azb. A fight our army has fought with against the terrorism in FATA and other areas. The number of pc gamers is much higher as compared to console in Pakistan. These players have never played a game that represents their country. Each level of the game has different stories and tasks. 1.4Previous Work There are many related first shooting games and many studios that comes in mind for example:  Medal of Honor developed by Electronic Arts: Medal of Honor is a story based first-person shooting game. The first installments of this game based on the 2nd World War and the latest release of the game is more focused on modern warfare.
  • 12. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 3  Call of Duty Series Developedby Infinity Ward Call of duty is one of the very famous series of first-person shooting games. The early releases of the game are all based on World War II. It also has new releases based on modern warfare.  Battlefield Developedby Electronic Arts It is another great and famous first-person shooting video game. The first release was in 2002 in which it starts with Battlefield 1942. This series of the game focuses on teamwork, vehicular warfare, and large maps. 1.5 Objectives of the Project As a Pakistani, we want to eliminate the terrorism from our country. It is one of the big challenges and we want to remove the terror from the minds of the people. In order to reduce the frustration of our minds, we are making this game to give the player an opportunity to put an end to all the enemy plans in the virtual world. The objectives are as follows:  The first objective of this game is to provide the player with a challenging gameplay in which he will stand up against the terrorism happening in Pakistan. We also want to give a message to the world that our Armed Forces has the ability to face any kind of terrorism.  The Environment and the gameplay are based upon the recent incidents happened in the different areas and cities in Pakistan. The environment will be the same as the streets and cities in Pakistan.  I will be utilizing the blender and Unreal Engine for the best graphical capability that can be achieved upon personal computer machines. The main objective is that we should make that game in which we can find the terrorists from all the means and sources as we can in our game and then to destroy them. 1.6 Specific ProjectGoals Our goal states that “to provide the PC gamers of Pakistan with a great FPS game that they can play and entertain their selves by fighting against the terrorism in a virtual world.” 1.7 Scope the Project(Abstract): I am developing this game to send a message that we are able to save our country. Our aim is to fight against the terrorism in Pakistan. The idea is one of a kind as there are not any game that is made by Pakistani Developers. That is why I decided to work on this to reduce the frustration about terrorism in Pakistan. This game will be played by the Pakistani gamers no matter what is their age. The scope of the game is initially limited to Pakistani gamers only. It will provide them a platform on which they can virtually unleash their anger against terrorism. Operation: War on Terror is not just for the people of Pakistan but for all over the world. Any PC gamer who has a compatible pc can play our game and it will help us to show the
  • 13. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 4 world that we also want peace in the world and to realize them that how much lives we have given to fight against terrorism. 1.8 Glossary Operation: War on Terror (A war Against Terrorism) 1.9 ProjectOverview Statement Table 2(Project Overview Statement) Project Title: Operation: War on Terror Group Leader: Danial Ahmed Project Members: Name Registration # Email Address Signature Danial Ahmed 15F-US-L- CSC-534 danial.riaz121@gmail.com Project Goal: “Providing the PC gamers of Pakistan to experience a game based on Pakistan Army and to remove their frustration against terrorism.” Objectives: Sr.# 1 Play Game 2 Save 3 Load 4 Graphics Settings 5 Game Settings 6 Exit 7 Retry Screen 8 Loading Screen Project Success criteria: People love this game as this game is one of its kind and people will eager to play a game like this. A. B. Risks of the Project: (Please mark  where applicable) Low Medium High  Technical risk  Timing risk  Budget risk Organization Address (if any): Type of project: Research Development Target End users:Handheld android users Development Technology: Object Oriented Structured
  • 14. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 5 Platform: Web based Distributed Desktop based Setup Configurations Other_____________________ Suggested Project Supervisor: Ms. Saleha Zahid Approved By: Date: 2. Benefits of the Project 2.1 DirectCustomers / Beneficiaries ofthe Project All the PC gamers of the world are the beneficiaries of the project. 2.2 Outputs Expectedfrom the Project A “First Person Shooting Game” that provides the players with an opportunity to fight against the terrorism in a virtual world. 3. ProjectDescription 3.1FunctionalSpecification The player can make a profile by entering his name. After making the profile user can hit the play button to play the game. From the next screen, user can select different difficulty levels. Moreover, he can exit the game after saving. He can continue from the last saved checkpoint. The game also has an option button where he can perform different operations like changing graphics and control settings. After hitting the play button, the loading will start with the short briefing of the mission. The user will also be able to see the weapons he has and the amount of ammo on the left bottom side of the screen. He can scroll through different weapons he has in its inventory. He can reload his gun by pressing the reload weapon. He can pick ammo from the dead enemies and can pick their weapons. The user will be able to play the game with keyboard mouse or with a compatible Xbox controller. 3.1.1 Functions Performed The player can perform different actions like aiming shooting, reloading, picking a weapon. He can walk, run, and crouch while playing the game. Moreover, the player can save the game and change settings such as graphic and game settings. He can save and exit the game at any point. 1. Play the game i. Aim ii. Shoot iii. Crouch iv. Walk v. Sprint vi. Swap Weapons vii. Select Difficulty viii. See Objectives 2. Save the game 3. Load the game
  • 15. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 6 4. Change settings 5. Exit game 3.1.2Limitations and Restrictions A compatible PC system with windows is required to play the game. The game may not run on low-performance systems but the number of fps will be low. As the game has high-quality graphics, therefore, the game will require a dedicated graphics card for a smooth gameplay experience. 3.1.3SystemArchitecture Theme Development Designing Main Menu FPS Controller Missions Graphics & Sound Quality Check Removing Glitches Defining Controls and Missions/Stage s
  • 16. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 7 Figure 1 (System Architecture) 3.1.4 Equipment Configuration I am going to use a core i5 system with a dedicated NVidia graphics card for the development. The system requirements for playing the game are as follows: OS: Microsoft Windows 7/8/8.1/10 Processor: Intel Core i3 3.0 GHz or AMD Phenom II X4 Memory: 4 GB RAM Graphics: 1 GB NVIDIA GeForce AMD Graphics Card DirectX®: Microsoft DirectX(R) 10 Hard Drive: 12GB of free hard drive space Sound: 100% DirectX 9.0c compatible sound card 3.1.5 Implementation Tools and Technology  Unreal Engine 4 will be used for development.  Target platform will also be Windows.  The programming language will be C++  I am going to use the latest stable release version of Unreal Engine for the development of the game.  The size of the development effort will be great because high skills are required for this project.  The budget will be needed for PC Equipment.  Time: more time the better. Testing Enemies Al Check Performance Resource Utilization Test
  • 17. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 8 3.2 Implementation Plan 3.2.1Deliverable Items Deliverable will be a game folder with a .exe file. 3.2.2MilestoneIdentification Table 2(milestone) C. Key Milestones and Deliverables: (Please list and describe the principal milestones and associated deliverables of the project. A key milestone is reached when a significant phase in the project is concluded, e.g. selection and simulation of algorithms, completion of architectural design and design documents, commissioning of equipment, completion of test, etc.) The information given in this table will be the basis of monitoring by Project Coordination Office. No. Elapsed time from start (in months) of the project Milestone Deliverables 1. 1 month Proposal .exe 2. 2 months Analysis .exe 3. 2 months Design .exe 4. 3 month Development .exe 5. 1 month Upgrading and Maintenance 3.3.3 ProjectSchedule / Milestone Chart Final Year Project Schedule Activities Semester 1 Semester 2 Duration Oct Nov Dec Jan Feb Mar April May Jun e Proposal Ideas discussion 1 month Supervisor meeting 9 months Project title selection 1 month
  • 18. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 9 Figure 2(Gantt chart) Proposal submission 1 month Analysis Requirement gathering 1.5 months Requirement analysis 2 months Key Issues 2 months Set Objectives 1 month Requirements identification Functional requirements 1 month Non-functional requirements 1 month Design Theme 2 months System Architecture 2 months Class diagram 2 months Design use cases 2 months Design test cases 2 months Development Demo Development 3 months Graphics Development 3 months Final Game development 3 months Testing 2 months Upgrading & Maintenance
  • 19. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 10 4. Qualifications 4.1PersonalBackground Danial Ahmed: Worked on some games as a freelancer. 4.2Courses Taken Unreal Engine Game Development 4.3Projects Web Project Dos Game Project Documentary Project. 5.1Software requirement specification 5.1.1Purpose ofDocument SRS document is to provide a detailed overview of my game, its parameters and goals. This document describes the project's target audience and its user interface, hardware and software requirements. 5.1.2ProjectOverview This game is for people over the age of 13. The purpose of making this game is to give the gamers of Pakistan where they can play as an armed force member. The players will fight against the terrorism in the game. The game allows them to show their aggression against the terrorism in a virtual world. 5.1.3Scope This game is developed for windows OS only. Every gamer who is over the age of 13 can play this game because the game contains killing of the terrorism so it is advised to recommend the people over the age of 13. Our armed forces are constantly fighting against the terrorism. The main theme is to generate different operations against the terrorist attacks previously happened in Pakistan. It is consisted on different missions and user can select the difficulty level at the start of the game. People of Pakistan are very frustrated with terrorism and our game provides them with a virtual world where they can fight with the tourists in a virtual environment as the member of Pakistan Armed Forces. 5.2OverallSystemDescription Overall system is based on a windows first person shooting game which allows the player to fight against the terrorism as a Pakistan Armed Force soldier. 5.2.1Usercharacteristics User Will make the profile on the game and then can play the game by clicking the play game. There the user can select the difficulty level he wants to play with.
  • 20. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 11 5.2.2Operating environment System will operate on Windows platform. 5.2.3Systemconstraints Identify any constraints or limitations on the system. Constraints may include the following:  OS: Microsoft Windows 7/8/8.1/10  Processor: Intel Core i3 3.0 GHz or AMD Phenom II X4  Memory: 4 GB RAM  Graphics: 1 GB NVIDIA GeForce or AMD Graphics Card  DirectX®: Microsoft DirectX(R) 9  Hard Drive: 12GB of free hard drive space  Sound: 100% DirectX 9.0c compatible sound card 5.3ExternalInterface Requirements 5.3.1HardwareInterfaces Desktop computer or laptop is required to run the game. 5.3.2Software Interfaces Windows Operating System is required. 5.4 Functional Requirements User Profile Select Mission Options 5.5Non-functionalRequirements 5.5.1 Performance requirements  The Average load tie must be less than 20 seconds.  The time taken to make new profile should be less than 15 seconds  Average time need for saving game should be less than 5 seconds.  Game must not be crashed and no glitches should appear while playing.  Safety Requirements There are no any harmful things into the system. 5.5.2 SecurityRequirements Not high security required for the system. 5.5.3 UserDocumentation User manual is provided in the game menu which describes the information about the functions and module provided in the game.
  • 21. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 12 Chapter no 2 Story board
  • 22. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 13 Description: The player will first make a profile on the game. Player will then start the new game. After that, it will select the difficulty level and then the game will start and player can play it. After completing the first mission the second mission will inlock and after completing it the player will move on to next. Exit option is available in the game. It can quit the game and after that it will come to the main menu. Figure 3(story board)
  • 23. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 14 Chapter No 3 Feasibility Report
  • 24. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 15 3 Feasibility Report 3.1 TechnicalFeasibilities The game is technically feasible. I am using Unreal Engine 4 for developing the game. The game engine is designed to develop the high-performance AAA games. The project is based on Object oriented approach. 3.2 EconomicalFeasibilities Economically this project is feasible. Resources are available in the form of standards and we can develop this by using unity. As everyone use smart phone in this era. This application is easily use on every smart device. This project is economically feasible as I am using Unreal Engine 4 which is very responsible and the standard resources are available for developing this game. Most of the people have a desktop computer or a laptop. The game can be played on any medium level computer hardware having Windows OS. 3.3 OperationalFeasibilities The game can be played using Keyboard and mouse combination. The user can also use a XBOX 360 or One controller to play the game. The game main menu is very simple and it can change the settings like graphics, sound and video etc. 3.4 SpecificationFeasibilities The game can be run on a Desktop or laptop running windows OS. It is designed to run on medium range computers which are mostly in use of the people. 3.5 Schedule feasibilities The project will be complete on time. I have managed all the tasks to complete the project on time. I have gathered all the information needed to complete my project on time. 3.6 Legal/EthicalFeasibilities The project is ethically/legally feasible. The tool I used to develop my game are all licensed.
  • 25. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 16 Chapter No 4 System and Design Analysis
  • 26. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 17 4 UML diagrams 4 .1 Use case Description Actors  Player Player have to do some functions like to install the setup of the game, then to run (load) the game and then to initialize the game, and then play it. Player can use different controls to play the game. When player enters the gameplay there are options for them for different missions to play, some of them were locked and some of them were unlocked. Player should start the game from the unlock missions and then proceeds toward by getting experience points and also there are many weapons available for the player, player have to choose it. There are two possibilities for the player in the game: Mission Successful: If mission is successful, then player can proceed towards the next mission. Mission Failed: If the player is unable to complete the mission, player will have an option to replay that mission.  Developer Developer has to develop the game, test on daily basis for the maintenance of the game and deployment of the gameplay. Developer should make the game user-friendly.
  • 27. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 18 Figure 4 Use Case Diagram
  • 28. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 19 4.2 Class diagram Figure 5 (class diagram) 4.3 Sequence diagram
  • 29. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 20 User Freedom Force MainMenu Play Game User Start PlayingGame User Start Game Click on Play Game Game Starts
  • 30. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 21 User Missions Play Mission Click on Missions To Select Mission Play Selected Mission User will play the selected Mission
  • 31. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 22 User GameSettings SaveSettings LoadGame UsercanLoadGameAfterSettingswereSavedandPlay Options ClickonOptions ClickonGameSettings SaveSettings afterchanging LoadGame
  • 32. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 23 User Weapons SelectWeapons Click on Weapons Selecting Weapons thatare avalable Play Game After Selecting Weapon
  • 33. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 24 User GameSettings Controls Save ClickonGameSettings ChangeControlsSettings forEaseOfUse SaveSettings ControlSettingsareSaved Figure 6 (sequence diagram)
  • 34. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 25 4.4 Game Environment Flow Figure 7 (Game Environment Flow)
  • 35. Operation: War on Terror © Departmentof Computer Science & InformationTechnology. 26 4.5 Activity Diagram Figure 8 (activity diagram)