Get the complete project »
- The Complete Research Material is averagely 52 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
A rifle is a portable long barreled firearm designed for precision shooting, to be held with both hands and braced against the shoulder during firing, and with a helical pattern of grooves cut into the barrel walls. A rifle rack is a rack for storing firearms such as rifles and pistols. The rack is typically equipped with locks to prevent theft or improper use.
In the military and paramilitary, arms are sometimes issued by the armorer to personnel illegally because the signing in and signing out of these arms are done manually and can easily be tampered with by not recording the issue of such weapons to personnel or in some cases the rifle is sold or rented out to robbers which they use for operations.
In recent times with the upsurge of the boko haram terrorists according to United States network television national broadcasting commission (NBC), most of boko haram weapons are stolen from Nigerian and Libyan military stocks. In some cases, it was also gathered that book haram sympathizers in the Nigerian military abet the theft. This is sometimes done by leaving doors of armories unlocked for them simply giving them the weapons.
Furthermore, impersonation is sometimes perpetrated by unknown persons who goes to the armorer with the personal data of another personnel to sign out weapons in place of that personnel and this has put many personnel, unit commanders and armorers into serious problems as they will be held accountable for such missing weapons.
In this work, a biometrically operated rifle rack is designed and constructed to provide more security to the armory. A rifle rack of this nature incorporates a data base with the personal data and information of personnel already captured in it, a biometric scanner and rifle rack lock whereby the rifles are kept secured signing out rifles from the arm store will involve the personnel finger print being scanned which when verified a solenoid plunger opens the lock for that personnel to sign out that particular weapon the computer memory will save this information against the personnel name and even when the rifle is returned the information will still be kept for future purposes and reference and if an unrecognized finger print is detected that does not match with that on the database an alarm is triggered alerting the armorer of an unrecognized person(s).
1.1 AIM AND OBJECTIVES
The aim of this project is to design and construct a biometrically operated rifle rack to reduce the unauthorized issue of weapons in the armory of the Nigerian armed forces.
It is also aimed at having proper inventory of the rifle in the following stages;
a) Stock status from a console.
b) Time in/time out check.
c) Prevention of unauthorized signing of weapons from the armory.
d) Alert and alarm of illegally removed weapons.
The objectives are to design and construct;
i. A rifle rack
ii. Power supply unit (PSU)
iii. A biometric data base
iv. Solenoid switch unit
v. A finger print module
This project is limited in application to military and paramilitary outfits deployable in the armory.
The limitation to this work are:
a) Corruption of software due to wrong operation.
b) Electronic unit assembly knowledge.
1.4 PROBLEM DEFINITIOIN
The proliferation of firearms and issue/return breaches from armories in military and paramilitary units have left some of Nigerian firearms unaccounted for and so constitutes a great problem to the society.
The need for a biometrically operated rifle rack stems from the inadequacy and short comings of the manual (paper and pen) method of signing out and signing in of firearms. A biometrically operated rifle rack reduces cases of rifle theft and ensures a proper documentation of firearms taken in and out of the armory of the Nigerian armed forces.
1.6 PROJECT OUTLINE
This work is divided into five sections. Chapter one introduces the work, brief description of what the project is all about. Chapter two contains the literature review which is sub-divided into background information and review on past projects. Chapter three describes the design and implementation, the methodology used and how the work was realized. Chapter four describes the results obtained after the construction, discussion, precautions taken and troubleshooting guide. Chapter five comprises of conclusion and recommendations made.
1.7 PRESENTATION OF BLOCK DIAGRAM
The block diagram of this work entails five (5) blocks namely:
a) Finger print module
c) Switching unit
d) Solenoid plunger
e) Power supply unit (PSU)
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
1. AN IMPLEMENTATION OF A MOVING MESSAGE DISPLAY BOARD (A Case Study of Yahaya Hamza Institute Technology, Mando- Kaduna)» ABSTRACT LED's are a fantastic way to illuminate any kind of sign, be it lettering or panels. LED Dot Matrix Displays are a common sight nowadays on s...Continue Reading »
» CHAPTER ONE 1.1. INTRODUCTION A search engine is an information retrieval system designed to help find information stored on a computer system. The se...Continue Reading »
3. DESIGN AND IMPLEMENT A DATABASE DRIVEN ONLINE VIRTUAL MARKETPLACE WITH A PARTICULAR REFERENCE TO OGBETE MAIN MARKET» CHAPTER ONE 1.0 INTRODUCTION 1.1 INSIGHT TO ONLINE MARKETPLACE Online Market, commonly known as e commerce or eCommerce, or e business consists of the...Continue Reading »
4. DESIGN AND IMPLEMENTATION OF A TWO FACTOR AUTHENTICATION LOGIN SYSTEM USING ONE TIME PASSWORD (OTP) WITH SMS» ABSTRACTThe paper examined the design and implementation of a two factor authentication login system using OTP with SMS. The quest for the application...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Information seeking behaviour is a broad term, which involves a set of actions that an individual...Continue Reading »
» CHAPTER ONE 1.0 INTRODUCTION 1.1 BACKGROUND OF THE STUDY The world is fast becoming a global village and a necessary tool for this process is communic...Continue Reading »
7. DESIGN AND IMPLEMENTATION OF HOSPITAL INFORMATION SYSTEM (A CASE STUDY OF ESUTTH, PARKLANE, ENUGU)» TABLE OF CONTENTS Approval page…………………………………………..ii Dedication………………………………………………ii...Continue Reading »
» ABSTRACT An online trading community provides people with a structured method for trading, bartering, or selling goods and services. Most E commerce W...Continue Reading »
» ABSTRACT Reading groups have become extremely popular over the past years. And because of their successes in so many communities throughout the nation...Continue Reading »
10. DESIGN AND IMPLEMENTATION OF A COMPUTERISED RESTURANT MANAGEMENT INFORMATION SYSTEM CASE STUDY JEVENIKS RESTURANT ENUGU STATE» ABSTRACT This project work is primarily designed to give an insight to computer based restaurant management information system. It is as a result of p...Continue Reading »