Armoury user identification and crime detection system in the 151 base services group (151 BSG) NAF base Makurdi

Authors

  • Agana MA Department of Computer Science, University of Calabar
  • Beranard AI Nigeria Air Force (NAF) Base Makurdi

Keywords:

Armoury, biometric, authentication, arms, security

Abstract

This study utilized biometric fingerprint recognition and Global system for Mobile Communication (GSM) Short Message Service (SMS) to identify military armoury users and alert possible intrusion to take arms without authorization respectively. This is aimed at holding accountable those assigned arms from the armoury to avert the diversion of arms for criminal tendencies. The existing armoury security system was critically evaluated through physical examination of the armoury in the Nigeria Air Force (NAF) Base Markudi and oral interview to elicit facts from custodians of the armoury. It was observed that armoury control records were kept manually and this is prone to non-accountability and arms smuggling to commit crimes in the society. The new system was designed using object oriented programming and implemented using Personal Homepage Pre-processor (PHP) and java, with MySQL as the database system. A fingerprint sensor was integrated with the system for biometric image capturing of users and the entire system is linked to a mobile telecommunication system for SMS alerts of possible intrusions. The new system can authenticate pre-registered users via fingerprint recognition before granting them access to the armoury strong room, with an SMS to the administrator. An authentication failure triggers an SMS of intrusion notice to the armoury administrator and also triggers surveillance security guards to arrest the intruder. The database keeps logs of all assigned arms with the users and intrusion logs for cross-referencing. The system is thus found useful in identifying armoury users and in detecting arms smuggling.

References

. Owen L. Hewitt (2017). Armories. NAVFAC Engineering Criteria and Programs Office (CIENG). https://www.wbdg.org/buildingtypes/armories. Retrieved 29-05-2018.

. European Union (2004). Final Report on the Improved Weapons Record Keeping and Safe Storage

. Project in Military Region 4, EU-Assistance on Curbing Small Arms and Light Weapons in Cambodia

. Old, K. (2006). Armoury Building on Territory of the Russian Empire Nov 1917. Article 1256 of Book IV of the Civil Code of the Russian Federation No. 230-FZ. IniMfon, U. (2016). Design and construction of Microcontroller Based Authentication system for Armoury Security. Masters of Technology (MTECH), Thesis, Obafemi Awolowo University, Ile-Ife.

. Hayes, F. (2004). “RFID Doesn’t Work - So Live With it!” http://www.techworld.com/mobility/features/index.cfm?featureid=872. Retrieved on 29-05-2018.

. Sunday Punch (2008). “More startling revelations on missing military arms”, Lagos, 20 January.

. Nigerian Tribune (2008). , 15 January 2008. “How Nigerian army officers sold weapons to militants”,

. Daily Champion (2011). “How soldiers abducted Mikel Obi’s dad – police”, 24 August.

. Vanguard (2015). “Police arrest soldier for supplying arms to robbers”, 29 December. [10]. Unified Facilities Criteria (UFC) (2014). Armories and Arms Rooms. U.S. Army Corps of Engineers: UFC 4-215-01, 1 December. http://www.wbdg.org/FFC/DOD/UFC/ufc_4_215_01_2014.pdf

. Kamble, N.D. and Dharani, J. (2014). Implementation of Security System Using 3- Level Authentication. International Journal of Engineering Development and Research, 2 (2), 1528-1532. https://www.ijedr.org/papers/IJEDR1402039.pdf. Retrieved 30-05-2018.

. Meera, M. and Divya, R.S. (2017). Super Secure Door Lock System for Critical Zones. Proceedings of the Networks & Advances in Computational Technologies (NetACT) International Conference, Thiruvanthapuram, India, 20-22 July. DOI: 10.1109/NETACT.2017.8076773

. Azimpourkivi, M., Topkara, U. and Carbunar, B. (2017). A Secure Mobile Authentication Alternative to Biometrics . Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017), 7 December. https://arxiv.org/pdf/1712.02483.pdf. Retrieved 31-5-2017.

. Fons, M., Fons, F., Canto, E. And Lopez, M. (2012). FPGA-based Personal Authentication Using Fingerprints. Journal of Signal Processing Systems, 66(2),153- 189. DOI: 10.1007/s11265-011-0629-3.

. Umar, F., Mahmood, H., Muhammad, A., Athar, H. and Muhammad, U. A. (2014). RFID Based Security and Access Control System. International Journal of Engineering and Technology, 6(4), 309-314. DOI: 10.7763/IJET.2014.V6.718.

. Silva, H., Lourenço, A., Canento, F., Fred, A. and Raposo, N. (2013). ECG Biometrics: Principles and Applications. In Proceedings of the International Conference on Bioinspired Systems and Signal Processing, pp. 215-220. DOI: 10.5220/0004243202150220.

. Tseng, K., Zeng, F., Ip, W.H. and Wu, C. (2016). ECG Sensor Verification System with Mean-Interval

. Algorithm for Handling Sport Issue. Journal of Sensors, (11), 1-12. DOI: 10.1155/2016/1814264.

Downloads

Published

2024-02-26

How to Cite

Agana, M. A., & Beranard, A. I. (2024). Armoury user identification and crime detection system in the 151 base services group (151 BSG) NAF base Makurdi. COMPUSOFT: An International Journal of Advanced Computer Technology, 7(06), 2780–2787. Retrieved from https://ijact.in/index.php/j/article/view/437

Issue

Section

Original Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.