Arcade Shooter Game Python

Download Project Document/Synopsis Developed using Python, Arcde style Shooter is a classic side scroller. This game mixes elements of platform games with run and gun games. As the player jumps from one platform to another and advances through the game, they’ll run into Goblins who’ll fire upon them. To survive through a level, the player […]

Continue reading


Space Shooter Combat Game Python

Download Project Document/Synopsis Reminiscent of many “shoot ’em up” video games from the early eighties- Space Shooter is an arcade game developed using Python as a programming language. Although built to be simplistic, the mechanics of this game are pretty dynamic. Moreover, the game also has engaging gameplay. The player starts the game with three […]

Continue reading


Online PDF to Text Converter & Language Translator Python

Download Project Document/Synopsis Be it browsing through the seemingly endless pages of terms and conditions on an important official document or kicking back and flipping through an intriguing eBook- reading is quite an undeniable and inescapable part of our everyday lives. However, reading anything demands our complete undivided attention making it nearly impossible for us […]

Continue reading


Online Fake Logo Detection System

Download Project Document/Synopsis Every year, brands lose a significant portion of their sales to unauthorized knock off brands and counterfeits. Moreover, since such counterfeit products are usually of an inferior quality, they also end up damaging the credibility of the brand. Many a times consumers also get cheated out of their hard-earned money as they […]

Continue reading


Three Level Image Password Authentication System Php

Download Project Document/Synopsis A security breach can be a threat to national confidential data or the private data of an organization or a person. The most popular kind of password used for security purposes is text-based. However, these passwords can be easily breached and one may lose his/her private data to the wrong hands. With […]

Continue reading