ARMOURY USER IDENTIFICATION AND CRIME DETECTION SYSTEM IN THE 151 BASE SERVICES GROUP (151 BSG) NAF BASE MAKURDI
AbstractThis study utilized biometric fingerprint recognition and Global system for Mobile Communication (GSM) Short Message Service (SMS) to identify military armoury users and alert possible intrusion to take arms without authorization respectively. This is aimed at holding accountable those assigned arms from the armoury to avert the diversion of arms for criminal tendencies.Â The existing armoury security system was critically evaluated through physical examination of the armoury in the Nigeria Air Force (NAF) Base Markudi and oral interview to elicit facts from custodians of the armoury. It was observed that armoury control records were kept manually and this is prone to non-accountability and arms smuggling to commit crimes in the society. The new system was designed using object oriented programming and implemented using Personal Homepage Pre-processor (PHP) and java, with MySQL as the database system. A fingerprint sensor was integrated with the system for biometric image capturing of users and the entire system is linked to a mobile telecommunication system for SMS alerts of possible intrusions. The new system can authenticate pre-registered users via fingerprint recognition before granting them access to the armoury strong room, with an SMS to the administrator. An authentication failure triggers an SMS of intrusion notice to the armoury administrator and also triggers surveillance security guards to arrest the intruder. The database keeps logs of all assigned arms with the users and intrusion logs for cross-referencing. The system is thus found useful in identifying armoury users and in detecting arms smuggling.
. Owen L. Hewitt (2017). Armories. NAVFAC Engineering Criteria and Programs Office (CIENG).
https://www.wbdg.org/building-types/armories. Retrieved 29-05-2018.
. European Union (2004). Final Report on the Improved Weapons Record Keeping and Safe Storage
. Project in Military Region 4, EU-Assistance on Curbing Small Arms and Light Weapons in Cambodia
. Old, K. (2006). Armoury Building on Territory of the Russian Empire Nov 1917. Article 1256 of Book IV of the Civil Code of the Russian Federation No. 230-FZ. Ini-Mfon, U. (2016). Design and construction of Microcontroller Based Authentication system for Armoury Security. Masters of Technology (MTECH), Thesis, Obafemi Awolowo University, Ile-Ife.
. Hayes, F. (2004). â€œRFID Doesnâ€™t Work - So Live With it!â€ http://www.techworld.com/mobility/features/index.cfm?featureid=872. Retrieved on 29-05-2018.
. Sunday Punch (2008). â€œMore startling revelations on missing military armsâ€, Lagos, 20 January.
. Nigerian Tribune (2008). , 15 January 2008. â€œHow Nigerian army officers sold weapons to militantsâ€,
. Daily Champion (2011). â€œHow soldiers abducted Mikel Obiâ€™s dad â€“ policeâ€, 24 August.
. Vanguard (2015). â€œPolice arrest soldier for supplying arms to robbersâ€, 29 December.
. Unified Facilities Criteria (UFC) (2014). Armories and Arms Rooms. U.S. Army Corps of Engineers: UFC 4-215-01, 1 December. http://www.wbdg.org/FFC/DOD/UFC/ufc_4_215_01_2014.pdf
. Kamble, N.D. and Dharani, J. (2014). Implementation of Security System Using 3-Level Authentication. International Journal of Engineering Development and Research, 2 (2), 1528-1532. https://www.ijedr.org/papers/IJEDR1402039.pdf. Retrieved 30-05-2018.
. Meera, M. and Divya, R.S. (2017). Super Secure Door Lock System for Critical Zones. Proceedings of the Networks & Advances in Computational Technologies (NetACT) International Conference, Thiruvanthapuram, India, 20-22 July. DOI: 10.1109/NETACT.2017.8076773
. Azimpourkivi, M., Topkara, U. and Carbunar, B. (2017). A Secure Mobile Authentication Alternative to Biometrics . Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017), 7 December. https://arxiv.org/pdf/1712.02483.pdf. Retrieved 31-5-2017.
. Fons, M., Fons, F., Canto, E. And Lopez, M. (2012). FPGA-based Personal Authentication Using Fingerprints. Journal of Signal Processing Systems, 66(2),153-189. DOI: 10.1007/s11265-011-0629-3.
. Umar, F., Mahmood, H., Muhammad, A., Athar, H. and Muhammad, U. A. (2014). RFID Based Security and Access Control System. International Journal of Engineering and Technology, 6(4), 309-314. DOI: 10.7763/IJET.2014.V6.718.
. Silva, H., LourenÃ§o, A., Canento, F., Fred, A. and Raposo, N. (2013). ECG Biometrics: Principles and Applications. In Proceedings of the International Conference on Bio-inspired Systems and Signal Processing, pp. 215-220. DOI: 10.5220/0004243202150220.
. Tseng, K., Zeng, F., Ip, W.H. and Wu, C. (2016). ECG Sensor Verification System with Mean-Interval
. Algorithm for Handling Sport Issue. Journal of Sensors, (11), 1-12. DOI: 10.1155/2016/1814264.
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.