Get the complete project »
- The Complete Research Material is averagely 52 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
A rifle is a portable long barreled firearm designed for precision shooting, to be held with both hands and braced against the shoulder during firing, and with a helical pattern of grooves cut into the barrel walls. A rifle rack is a rack for storing firearms such as rifles and pistols. The rack is typically equipped with locks to prevent theft or improper use.
In the military and paramilitary, arms are sometimes issued by the armorer to personnel illegally because the signing in and signing out of these arms are done manually and can easily be tampered with by not recording the issue of such weapons to personnel or in some cases the rifle is sold or rented out to robbers which they use for operations.
In recent times with the upsurge of the boko haram terrorists according to United States network television national broadcasting commission (NBC), most of boko haram weapons are stolen from Nigerian and Libyan military stocks. In some cases, it was also gathered that book haram sympathizers in the Nigerian military abet the theft. This is sometimes done by leaving doors of armories unlocked for them simply giving them the weapons.
Furthermore, impersonation is sometimes perpetrated by unknown persons who goes to the armorer with the personal data of another personnel to sign out weapons in place of that personnel and this has put many personnel, unit commanders and armorers into serious problems as they will be held accountable for such missing weapons.
In this work, a biometrically operated rifle rack is designed and constructed to provide more security to the armory. A rifle rack of this nature incorporates a data base with the personal data and information of personnel already captured in it, a biometric scanner and rifle rack lock whereby the rifles are kept secured signing out rifles from the arm store will involve the personnel finger print being scanned which when verified a solenoid plunger opens the lock for that personnel to sign out that particular weapon the computer memory will save this information against the personnel name and even when the rifle is returned the information will still be kept for future purposes and reference and if an unrecognized finger print is detected that does not match with that on the database an alarm is triggered alerting the armorer of an unrecognized person(s).
1.1 AIM AND OBJECTIVES
The aim of this project is to design and construct a biometrically operated rifle rack to reduce the unauthorized issue of weapons in the armory of the Nigerian armed forces.
It is also aimed at having proper inventory of the rifle in the following stages;
a) Stock status from a console.
b) Time in/time out check.
c) Prevention of unauthorized signing of weapons from the armory.
d) Alert and alarm of illegally removed weapons.
The objectives are to design and construct;
i. A rifle rack
ii. Power supply unit (PSU)
iii. A biometric data base
iv. Solenoid switch unit
v. A finger print module
This project is limited in application to military and paramilitary outfits deployable in the armory.
The limitation to this work are:
a) Corruption of software due to wrong operation.
b) Electronic unit assembly knowledge.
1.4 PROBLEM DEFINITIOIN
The proliferation of firearms and issue/return breaches from armories in military and paramilitary units have left some of Nigerian firearms unaccounted for and so constitutes a great problem to the society.
The need for a biometrically operated rifle rack stems from the inadequacy and short comings of the manual (paper and pen) method of signing out and signing in of firearms. A biometrically operated rifle rack reduces cases of rifle theft and ensures a proper documentation of firearms taken in and out of the armory of the Nigerian armed forces.
1.6 PROJECT OUTLINE
This work is divided into five sections. Chapter one introduces the work, brief description of what the project is all about. Chapter two contains the literature review which is sub-divided into background information and review on past projects. Chapter three describes the design and implementation, the methodology used and how the work was realized. Chapter four describes the results obtained after the construction, discussion, precautions taken and troubleshooting guide. Chapter five comprises of conclusion and recommendations made.
1.7 PRESENTATION OF BLOCK DIAGRAM
The block diagram of this work entails five (5) blocks namely:
a) Finger print module
c) Switching unit
d) Solenoid plunger
e) Power supply unit (PSU)
You either get what you want or your money back. T&C Apply
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» AbstractChapter One: IntroductionBackground of the StudyStatement of the Research problemResearch ObjectivesHypothesisSignificance/Scope of the StudyO...Continue Reading »
» ABSTRACTThis project work is all about design and implementation of a computer based scheduling system for a transport company.A computer based schedu...Continue Reading »
» CHAPTER ONE INTRODUCTION1.1 Background Of Study Customer relationship management (CRM) is a term that refers to practices, strategies and technologies...Continue Reading »
4. THE ROLE OF MODERN TECHNOLOGY IN ACHIEVING COMMUNICATION EFFICIENCY IN NIGERIA (A Case Study of Osun State Broadcasting Corporation, Osogbo)» CHAPTER ONE Introduction Background of the Study The development of technology most especially in this century has impact on every sphere of human lif...Continue Reading »
» Abstract The major objective of this project or research work is to find out those problems that affect allocation/distribution and marketing of petro...Continue Reading »
» CHAPTER ONE GENERAL INTRODUCTION 1.0 INTRODUCTION A system is a collection of inter related and inter connected components that work together to perfo...Continue Reading »
» CHAPTER ONE INTRODUCTION Online refers to electronic learning, it is the acquisition of knowledge and skill using electronic technologies such as comp...Continue Reading »
8. DESIGN AND IMPLEMENTATION OF A COMPUTER BASED LOAN SCHEME MANAGEMENT SYSTEM (A CASE STUDY OF HARVARD TRUST BANK ENUGU)» CHAPTER ONE INTRODUCTION Loan service for small organizations individuals was initiated after a number of considerations on the banking system. Major ...Continue Reading »
» ABSTRACT A vehicle is a mobile machine that transports passengers or cargo. Automated vehicle identification system, is software that will assist the ...Continue Reading »
10. DESIGN AND IMPLEMENTATION OF ONLINE STUDENT ADMISSION AND DOCUMENT VERIFICATION SYSTEM (A CASE STUDY OF UNIVERSITY OF UYO)» ABSTRACT Forgery has long crept into our educational system and, counterfeit and forged admission status / certificate and document have upper hand in...Continue Reading »