Get the complete project »
- The Complete Research Material is averagely 52 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
A rifle is a portable long barreled firearm designed for precision shooting, to be held with both hands and braced against the shoulder during firing, and with a helical pattern of grooves cut into the barrel walls. A rifle rack is a rack for storing firearms such as rifles and pistols. The rack is typically equipped with locks to prevent theft or improper use.
In the military and paramilitary, arms are sometimes issued by the armorer to personnel illegally because the signing in and signing out of these arms are done manually and can easily be tampered with by not recording the issue of such weapons to personnel or in some cases the rifle is sold or rented out to robbers which they use for operations.
In recent times with the upsurge of the boko haram terrorists according to United States network television national broadcasting commission (NBC), most of boko haram weapons are stolen from Nigerian and Libyan military stocks. In some cases, it was also gathered that book haram sympathizers in the Nigerian military abet the theft. This is sometimes done by leaving doors of armories unlocked for them simply giving them the weapons.
Furthermore, impersonation is sometimes perpetrated by unknown persons who goes to the armorer with the personal data of another personnel to sign out weapons in place of that personnel and this has put many personnel, unit commanders and armorers into serious problems as they will be held accountable for such missing weapons.
In this work, a biometrically operated rifle rack is designed and constructed to provide more security to the armory. A rifle rack of this nature incorporates a data base with the personal data and information of personnel already captured in it, a biometric scanner and rifle rack lock whereby the rifles are kept secured signing out rifles from the arm store will involve the personnel finger print being scanned which when verified a solenoid plunger opens the lock for that personnel to sign out that particular weapon the computer memory will save this information against the personnel name and even when the rifle is returned the information will still be kept for future purposes and reference and if an unrecognized finger print is detected that does not match with that on the database an alarm is triggered alerting the armorer of an unrecognized person(s).
1.1 AIM AND OBJECTIVES
The aim of this project is to design and construct a biometrically operated rifle rack to reduce the unauthorized issue of weapons in the armory of the Nigerian armed forces.
It is also aimed at having proper inventory of the rifle in the following stages;
a) Stock status from a console.
b) Time in/time out check.
c) Prevention of unauthorized signing of weapons from the armory.
d) Alert and alarm of illegally removed weapons.
The objectives are to design and construct;
i. A rifle rack
ii. Power supply unit (PSU)
iii. A biometric data base
iv. Solenoid switch unit
v. A finger print module
This project is limited in application to military and paramilitary outfits deployable in the armory.
The limitation to this work are:
a) Corruption of software due to wrong operation.
b) Electronic unit assembly knowledge.
1.4 PROBLEM DEFINITIOIN
The proliferation of firearms and issue/return breaches from armories in military and paramilitary units have left some of Nigerian firearms unaccounted for and so constitutes a great problem to the society.
The need for a biometrically operated rifle rack stems from the inadequacy and short comings of the manual (paper and pen) method of signing out and signing in of firearms. A biometrically operated rifle rack reduces cases of rifle theft and ensures a proper documentation of firearms taken in and out of the armory of the Nigerian armed forces.
1.6 PROJECT OUTLINE
This work is divided into five sections. Chapter one introduces the work, brief description of what the project is all about. Chapter two contains the literature review which is sub-divided into background information and review on past projects. Chapter three describes the design and implementation, the methodology used and how the work was realized. Chapter four describes the results obtained after the construction, discussion, precautions taken and troubleshooting guide. Chapter five comprises of conclusion and recommendations made.
1.7 PRESENTATION OF BLOCK DIAGRAM
The block diagram of this work entails five (5) blocks namely:
a) Finger print module
c) Switching unit
d) Solenoid plunger
e) Power supply unit (PSU)
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» ABSTRACT This project describes the automated toll collection system for toll gate based on RFID technology. Most of the toll collection systems commo...Continue Reading »
2. AUTOMATED COOPERATIVE SOCIETY (A CASE STUDY OF AYEDIRE LOCAL GOVERNMENT COOPERATIVE INVESTMENT AND CREDIT UNION )» ABSTRACT The proposed project topic above is centered on the critical needed for registration of both the individuals and the e...Continue Reading »
» CHAPTER ONE BACKGROUND 1.1 INTRODUCTION Inventories are part of the strengths of any business and can be applied as the firm’s own strategy in build...Continue Reading »
4. DESIGN AND IMPLEMENTATION OF A FIXED ASSET MANAGEMENT INFORMATION SYSTEM (A CASE STUDY OF UNITED AFRICAN COMPANY OF NIGERIA (UACN) DEVELOPMENT COMPA...» CHAPTER ONE INTRODUCTION Fixed asset management information system is a sub operation in financial accounting that take care of the degeneration of as...Continue Reading »
5. DESIGN AND IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM (A CASE STUDY OF IBOM E-LIBRARY,OFF IBB WAY, UYO)» ABSTRACT As we adapt to the trend in information and communication technology which is affecting every sector of our economic life, our educational sy...Continue Reading »
6. DESIGN AND IMPLEMENTATION OF A COMPUTERISED COOPERATIVE SOCIETY (A CASE STUDY OF AYEDIRE LOCAL GOVERNMENT COOPERATIVE INVESTMENT AND CREDIT UNION )» ABSTRACT The proposed project topic above is centered on the critical needed for registration of both the individuals and the entire cooperate society...Continue Reading »
» ABSTRACTTABLE OF CONTENTCHAPTER ONEINTRODUCTION1.1 BACKGROUND OF THE STUDY 1.2 STATEMENT OF THE PROBLEMS1.3 OBJECTIVES OF THE STUDY1.4 JUSTIFICATION O...Continue Reading »
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY Children are heritage of the cord and the fruit of the womb is his reward. As arrows are in the h...Continue Reading »
» CHAPTER ONE 1.0 INTRODUCTION 1.1 General Overview In recent years, the technology of database has become more advanced where large amount of data is r...Continue Reading »
» CHAPTER ONE1.0 INTRODUCTIONCash receipt generating system is a viable source in any business organization and venture and so on, its main purpose is t...Continue Reading »