Get the complete project »
- The Complete Research Material is averagely 52 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
A rifle is a portable long barreled firearm designed for precision shooting, to be held with both hands and braced against the shoulder during firing, and with a helical pattern of grooves cut into the barrel walls. A rifle rack is a rack for storing firearms such as rifles and pistols. The rack is typically equipped with locks to prevent theft or improper use.
In the military and paramilitary, arms are sometimes issued by the armorer to personnel illegally because the signing in and signing out of these arms are done manually and can easily be tampered with by not recording the issue of such weapons to personnel or in some cases the rifle is sold or rented out to robbers which they use for operations.
In recent times with the upsurge of the boko haram terrorists according to United States network television national broadcasting commission (NBC), most of boko haram weapons are stolen from Nigerian and Libyan military stocks. In some cases, it was also gathered that book haram sympathizers in the Nigerian military abet the theft. This is sometimes done by leaving doors of armories unlocked for them simply giving them the weapons.
Furthermore, impersonation is sometimes perpetrated by unknown persons who goes to the armorer with the personal data of another personnel to sign out weapons in place of that personnel and this has put many personnel, unit commanders and armorers into serious problems as they will be held accountable for such missing weapons.
In this work, a biometrically operated rifle rack is designed and constructed to provide more security to the armory. A rifle rack of this nature incorporates a data base with the personal data and information of personnel already captured in it, a biometric scanner and rifle rack lock whereby the rifles are kept secured signing out rifles from the arm store will involve the personnel finger print being scanned which when verified a solenoid plunger opens the lock for that personnel to sign out that particular weapon the computer memory will save this information against the personnel name and even when the rifle is returned the information will still be kept for future purposes and reference and if an unrecognized finger print is detected that does not match with that on the database an alarm is triggered alerting the armorer of an unrecognized person(s).
1.1 AIM AND OBJECTIVES
The aim of this project is to design and construct a biometrically operated rifle rack to reduce the unauthorized issue of weapons in the armory of the Nigerian armed forces.
It is also aimed at having proper inventory of the rifle in the following stages;
a) Stock status from a console.
b) Time in/time out check.
c) Prevention of unauthorized signing of weapons from the armory.
d) Alert and alarm of illegally removed weapons.
The objectives are to design and construct;
i. A rifle rack
ii. Power supply unit (PSU)
iii. A biometric data base
iv. Solenoid switch unit
v. A finger print module
This project is limited in application to military and paramilitary outfits deployable in the armory.
The limitation to this work are:
a) Corruption of software due to wrong operation.
b) Electronic unit assembly knowledge.
1.4 PROBLEM DEFINITIOIN
The proliferation of firearms and issue/return breaches from armories in military and paramilitary units have left some of Nigerian firearms unaccounted for and so constitutes a great problem to the society.
The need for a biometrically operated rifle rack stems from the inadequacy and short comings of the manual (paper and pen) method of signing out and signing in of firearms. A biometrically operated rifle rack reduces cases of rifle theft and ensures a proper documentation of firearms taken in and out of the armory of the Nigerian armed forces.
1.6 PROJECT OUTLINE
This work is divided into five sections. Chapter one introduces the work, brief description of what the project is all about. Chapter two contains the literature review which is sub-divided into background information and review on past projects. Chapter three describes the design and implementation, the methodology used and how the work was realized. Chapter four describes the results obtained after the construction, discussion, precautions taken and troubleshooting guide. Chapter five comprises of conclusion and recommendations made.
1.7 PRESENTATION OF BLOCK DIAGRAM
The block diagram of this work entails five (5) blocks namely:
a) Finger print module
c) Switching unit
d) Solenoid plunger
e) Power supply unit (PSU)
You either get what you want or your money back. T&C Apply
Share a Comment
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONE INTRODUCTION 1.1 Background to the Study A robot is seen as a machine of the modern day with improved technological advancements and robot...Continue Reading »
52 pages | 370 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY The world is fast becoming a global village and a necessary tool for this process is communicatio...Continue Reading »
77 pages | 245 hits | Source: COMPUTER SCIENCE
3. DESIGN AND IMPLEMENTATION OF HOSPITAL INFORMATION SYSTEM (A CASE STUDY OF ESUTTH, PARKLANE, ENUGU)» TABLE OF CONTENTS Approval page…………………………………………..ii Dedication………………………………………………ii...Continue Reading »
60 pages | 354 hits | Source: COMPUTER SCIENCE
4. PROBLEMS AND PROSPECTS OF MANAGING STUDENTS INFORMATION, A CASE STUDY OF COLLEGE OF SCIENCE AND TECHNOLOGY, KADUNA POLYTECHNIC» TABLE OF CONTENTS Title page Approval page i Declaration ii Dedication iii Acknowledgment iv Table of contents v Abstract vii CHAPTER ONE: INTRODUCTIO...Continue Reading »
52 pages | 190 hits | Source: COMPUTER SCIENCE
» TABLE OF CONTENT Cover page Title page Approval page Dedication Acknowledgment Table of content Abstract CHAPTER ONE 1.0 Introduction 1.1 Background o...Continue Reading »
94 pages | 328 hits | Source: COMPUTER SCIENCE
» ABSTRACT The Bank Verification Number (BVN) became imperative following the increasing incidence of compromise on conventional security systems such a...Continue Reading »
99 pages | 319 hits | Source: COMPUTER SCIENCE
» ABSTRACT The design and implementation of a web based registration portal for Cadets of NDA is a process of nation building and should not be undermin...Continue Reading »
102 pages | 45 hits | Source: COMPUTER SCIENCE
8. THE ROLE OF MODERN TECHNOLOGY IN ACHIEVING COMMUNICATION EFFICIENCY IN NIGERIA (A Case Study of Osun State Broadcasting Corporation, Osogbo)» CHAPTER ONE Introduction Background of the Study The development of technology most especially in this century has impact on every sphere of human lif...Continue Reading »
39 pages | 303 hits | Source: COMPUTER SCIENCE
» ABSTRACT My research Project is to develop fingerprint biometrics systems that assist in the elimination of examination impersonation. Up till now, th...Continue Reading »
92 pages | 392 hits | Source: COMPUTER SCIENCE
» THE NUTRITIONAL COMPOSITION OF PLANT MILK (SOYA BEAN)ABSTRACT Nutritional composition of Soya milk showed that it contained moisture content of 90.54%...Continue Reading »
77 pages | 392 hits | Source: COMPUTER SCIENCE