Get the complete project »
- The Complete Research Material is averagely 52 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
A rifle is a portable long barreled firearm designed for precision shooting, to be held with both hands and braced against the shoulder during firing, and with a helical pattern of grooves cut into the barrel walls. A rifle rack is a rack for storing firearms such as rifles and pistols. The rack is typically equipped with locks to prevent theft or improper use.
In the military and paramilitary, arms are sometimes issued by the armorer to personnel illegally because the signing in and signing out of these arms are done manually and can easily be tampered with by not recording the issue of such weapons to personnel or in some cases the rifle is sold or rented out to robbers which they use for operations.
In recent times with the upsurge of the boko haram terrorists according to United States network television national broadcasting commission (NBC), most of boko haram weapons are stolen from Nigerian and Libyan military stocks. In some cases, it was also gathered that book haram sympathizers in the Nigerian military abet the theft. This is sometimes done by leaving doors of armories unlocked for them simply giving them the weapons.
Furthermore, impersonation is sometimes perpetrated by unknown persons who goes to the armorer with the personal data of another personnel to sign out weapons in place of that personnel and this has put many personnel, unit commanders and armorers into serious problems as they will be held accountable for such missing weapons.
In this work, a biometrically operated rifle rack is designed and constructed to provide more security to the armory. A rifle rack of this nature incorporates a data base with the personal data and information of personnel already captured in it, a biometric scanner and rifle rack lock whereby the rifles are kept secured signing out rifles from the arm store will involve the personnel finger print being scanned which when verified a solenoid plunger opens the lock for that personnel to sign out that particular weapon the computer memory will save this information against the personnel name and even when the rifle is returned the information will still be kept for future purposes and reference and if an unrecognized finger print is detected that does not match with that on the database an alarm is triggered alerting the armorer of an unrecognized person(s).
1.1 AIM AND OBJECTIVES
The aim of this project is to design and construct a biometrically operated rifle rack to reduce the unauthorized issue of weapons in the armory of the Nigerian armed forces.
It is also aimed at having proper inventory of the rifle in the following stages;
a) Stock status from a console.
b) Time in/time out check.
c) Prevention of unauthorized signing of weapons from the armory.
d) Alert and alarm of illegally removed weapons.
The objectives are to design and construct;
i. A rifle rack
ii. Power supply unit (PSU)
iii. A biometric data base
iv. Solenoid switch unit
v. A finger print module
This project is limited in application to military and paramilitary outfits deployable in the armory.
The limitation to this work are:
a) Corruption of software due to wrong operation.
b) Electronic unit assembly knowledge.
1.4 PROBLEM DEFINITIOIN
The proliferation of firearms and issue/return breaches from armories in military and paramilitary units have left some of Nigerian firearms unaccounted for and so constitutes a great problem to the society.
The need for a biometrically operated rifle rack stems from the inadequacy and short comings of the manual (paper and pen) method of signing out and signing in of firearms. A biometrically operated rifle rack reduces cases of rifle theft and ensures a proper documentation of firearms taken in and out of the armory of the Nigerian armed forces.
1.6 PROJECT OUTLINE
This work is divided into five sections. Chapter one introduces the work, brief description of what the project is all about. Chapter two contains the literature review which is sub-divided into background information and review on past projects. Chapter three describes the design and implementation, the methodology used and how the work was realized. Chapter four describes the results obtained after the construction, discussion, precautions taken and troubleshooting guide. Chapter five comprises of conclusion and recommendations made.
1.7 PRESENTATION OF BLOCK DIAGRAM
The block diagram of this work entails five (5) blocks namely:
a) Finger print module
c) Switching unit
d) Solenoid plunger
e) Power supply unit (PSU)
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
1. DESIGN AND IMPLEMENTATION OF A COMPUTERISED STADIUM MANAGEMENT INFORMATION SYSTEM (Case Study Of Nnamdi Azikiwe Stadium Enugu)» ABSTRACTThe accessibility, availability and reliability of data supporting management information system are important to the users in stadium managem...Continue Reading »
» ABSTRACT This project research was done to build a device that is capable of recording the heart rate of an individual and sending that heart rate to ...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.0 Introduction A student information system (SIS) is software application for education establishments to manage student da...Continue Reading »
» ABSTRACTThe principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the...Continue Reading »
5. AN IMPLEMENTATION OF A MOVING MESSAGE DISPLAY BOARD (A Case Study of Yahaya Hamza Institute Technology, Mando- Kaduna)» ABSTRACT LED's are a fantastic way to illuminate any kind of sign, be it lettering or panels. LED Dot Matrix Displays are a common sight nowadays on s...Continue Reading »
6. DESIGN AND IMPLEMENTATION OF COMPUTERISED TOURISM INFORMATION SYSTEM (CASE STUDY OF OWERRI IN IMO STATE)» CHAPTER ONE 1.0 INTRODUCTION Tourism is one of the fastest growing industries in the world today. It plays an important part in nation’s economy by ...Continue Reading »
7. DESIGN AND IMPLEMENTATION OF A COMPUTERISED INFORMATION SYSTEM FOR A SMALL BUSINESS ENTERPRISE (CASE STUDY OF TEXACO FILLING STATION)» CHAPTER ONE 1.0 INTRODUCTION The traditional management as well as organizational behaviour and operation research theories agrees that the organizati...Continue Reading »
8. AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION» ABSTRACT Image steganography is the science of hiding data for securing confidential communication and it is the most popular type of carrier to hold ...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 Background of the Study In the advanced world like China, Britain, Australia and the United State of America, ticketing s...Continue Reading »
» ABSTRACT This study investigated online hospital management system as a tool to revolutionize medical profession. With many writers decrying how patie...Continue Reading »