SlideShare uma empresa Scribd logo
1 de 16
Department of Electrical & Electronics Engineering
Topic:- MICROCONTROLLER BASED WEAPON
              AUTHENTICATION
         Guided by:- Smt. Rashmi Pawar
                 Presented by:-
                  Amruta Dixit
          University NO:- 2BL08EE004
1)   Abstract
2)   Introduction
3)   General working principle
4)   Existing authentication tech
5)    Drawbacks
6)   Conclusion
7)   Bibliography
 Today  our world is facing one of the big threats of
 terrorism. A very recent attack on our country which
 can never be forgettable is 26/11 attack on Mumbai.
 Terrorists armed with deadly weapons such as AK-
 47, grenades etc attacked the mob killing hundreds.
 These terrorists were using weapons from falling into
 wrong hands & strengthen our defense system, many
 engineers & technologists have come up with an idea
 to authenticate weapons by providing acess of the
 weapon to valid user.
 Terrorists  used weapons which are smuggled
  illegally. Hence stopping weapons from falling into
  the wrong hands is a major problem for law &
  enforcement agencies.
 To protect these weapons new technique is evolved
  i.e. weapon authentication.
 Weapon is a tool used to destroy the enemy or used
  for self defense.
 Authentication gives the meaning of authorization.
 Weapon Authentication is summarized as a technique
  used for authorization of weapon.
 Terrorists& underworld criminals use stolen
  weapons which are smuggled & used illegally.
 People who own guns for their personal use may face
  problems as Kids at home unknowingly may make
  childish use of guns.
 Many times during fight criminals may steal
  Policeman’s gun & use them illegally.
 These problems ask us to think about developing
  safety & security mechanism for fire arms so that
  only authorized users can use the weapon.
 Here  the authentication can be done using RFID tag
  & reader.
 Licensed user will be provided with a tag with
  specific user ID.
 When weapon is set to validation RFID reader reads
  RFID tag.
 RFID reader sends the read data to microcontroller
  chip where authorization of user is checked.
 If a person is authorized the microcontroller unlocks
  the gun by instructing magnetic locks.
 Here  authorization of user can be checked by using
  finger print scanner.
 Finger print of user is scanned by finger print
  scanner.
 Scanner sends the data to microcontroller chip where
  authorization of user is checked.
 If a person is authorized the microcontroller unlocks
  the gun by instructing magnetic locks.
a)   The O’dwyer’s VLE smart gun
    Electronically fired gun & launcher design.
    Multiple barrels with multiple rounds stacked in
     each barrel.
    It allows user to select b/w different types of round.
    No mechanical parts involved.
    Validates the exact finger print of the user.
 It is a new computer chip promises to keep police
  guns away from firing if they fall into wrong hands.
 It uses RFID technology.
 This tiny chip is implanted b/w the shoulder & elbow
  area of user’s hand.
 Chip needs no battery or power source.
 Reloading  mechanism is tedious for VLE guns.
 Scanning device could malfunction.
 Veri chip may get lost or may get smashed during
  fight.
 The system can be hacked & reprogrammed.
 Weapon usage cannot be traced.
 In today’s world technology has advanced to great
  extent.
 Many concept which were impractical to hear have
  now become reality.
 In this modern world developing smart weapons
  would be a hope for better future.
 In future illegal training of weapons may come to an
  end.
 Developing smart weapons will also help armies &
  federal bodies in fighting crimes in better ways.
 www.popularmechanics.com
 www.sciencecentral.com
 www.popsci.com
 www.wikipedia.org
 www.militaryphotos.net

Mais conteúdo relacionado

Destaque

Painel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy ExperiencePainel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy ExperienceUKinBrazilNetwork
 
Tsunami detection system
Tsunami detection systemTsunami detection system
Tsunami detection systemsrinithiv
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsAbhishek Mishra
 
ELectricity from Ocean Waves
ELectricity from Ocean WavesELectricity from Ocean Waves
ELectricity from Ocean WavesJeffrey Funk
 
Advanced softwares used in civil engineering
Advanced softwares used in civil  engineeringAdvanced softwares used in civil  engineering
Advanced softwares used in civil engineeringVinaykumar Koli
 
Managing Earthquakes
Managing EarthquakesManaging Earthquakes
Managing Earthquakespeishi huang
 
Civil engineering powerpoint
Civil engineering powerpointCivil engineering powerpoint
Civil engineering powerpointchrisminer01
 
Digital Strategy 101
Digital Strategy 101Digital Strategy 101
Digital Strategy 101Bud Caddell
 

Destaque (9)

Painel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy ExperiencePainel 3 – Hydrokinetic Energy Experience
Painel 3 – Hydrokinetic Energy Experience
 
Tsunami detection system
Tsunami detection systemTsunami detection system
Tsunami detection system
 
Identification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to BiometricsIdentification Simplified - An Introduction to Biometrics
Identification Simplified - An Introduction to Biometrics
 
ELectricity from Ocean Waves
ELectricity from Ocean WavesELectricity from Ocean Waves
ELectricity from Ocean Waves
 
Advanced softwares used in civil engineering
Advanced softwares used in civil  engineeringAdvanced softwares used in civil  engineering
Advanced softwares used in civil engineering
 
Managing Earthquakes
Managing EarthquakesManaging Earthquakes
Managing Earthquakes
 
Civil Engineering
Civil EngineeringCivil Engineering
Civil Engineering
 
Civil engineering powerpoint
Civil engineering powerpointCivil engineering powerpoint
Civil engineering powerpoint
 
Digital Strategy 101
Digital Strategy 101Digital Strategy 101
Digital Strategy 101
 

Semelhante a weapon authentication

Biometric/fingerprint in guns
Biometric/fingerprint in gunsBiometric/fingerprint in guns
Biometric/fingerprint in gunsKartik Verma
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national securityMUTHU LAKSHMI
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyBlock Armour
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxVaibhavYadav297587
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxNarangYadav
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
3d pass words
3d pass words3d pass words
3d pass wordsmkanth
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 

Semelhante a weapon authentication (20)

Biometric/fingerprint in guns
Biometric/fingerprint in gunsBiometric/fingerprint in guns
Biometric/fingerprint in guns
 
journal
journaljournal
journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Technology for national security
Technology for national securityTechnology for national security
Technology for national security
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technologyZero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
 
D0351022026
D0351022026D0351022026
D0351022026
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
3d pass words
3d pass words3d pass words
3d pass words
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 

Último

8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 

Último (20)

8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 

weapon authentication

  • 1. Department of Electrical & Electronics Engineering Topic:- MICROCONTROLLER BASED WEAPON AUTHENTICATION Guided by:- Smt. Rashmi Pawar Presented by:- Amruta Dixit University NO:- 2BL08EE004
  • 2. 1) Abstract 2) Introduction 3) General working principle 4) Existing authentication tech 5) Drawbacks 6) Conclusion 7) Bibliography
  • 3.  Today our world is facing one of the big threats of terrorism. A very recent attack on our country which can never be forgettable is 26/11 attack on Mumbai. Terrorists armed with deadly weapons such as AK- 47, grenades etc attacked the mob killing hundreds. These terrorists were using weapons from falling into wrong hands & strengthen our defense system, many engineers & technologists have come up with an idea to authenticate weapons by providing acess of the weapon to valid user.
  • 4.  Terrorists used weapons which are smuggled illegally. Hence stopping weapons from falling into the wrong hands is a major problem for law & enforcement agencies.  To protect these weapons new technique is evolved i.e. weapon authentication.  Weapon is a tool used to destroy the enemy or used for self defense.  Authentication gives the meaning of authorization.  Weapon Authentication is summarized as a technique used for authorization of weapon.
  • 5.  Terrorists& underworld criminals use stolen weapons which are smuggled & used illegally.  People who own guns for their personal use may face problems as Kids at home unknowingly may make childish use of guns.  Many times during fight criminals may steal Policeman’s gun & use them illegally.  These problems ask us to think about developing safety & security mechanism for fire arms so that only authorized users can use the weapon.
  • 6.
  • 7.  Here the authentication can be done using RFID tag & reader.  Licensed user will be provided with a tag with specific user ID.  When weapon is set to validation RFID reader reads RFID tag.  RFID reader sends the read data to microcontroller chip where authorization of user is checked.  If a person is authorized the microcontroller unlocks the gun by instructing magnetic locks.
  • 8.
  • 9.  Here authorization of user can be checked by using finger print scanner.  Finger print of user is scanned by finger print scanner.  Scanner sends the data to microcontroller chip where authorization of user is checked.  If a person is authorized the microcontroller unlocks the gun by instructing magnetic locks.
  • 10. a) The O’dwyer’s VLE smart gun  Electronically fired gun & launcher design.  Multiple barrels with multiple rounds stacked in each barrel.  It allows user to select b/w different types of round.  No mechanical parts involved.  Validates the exact finger print of the user.
  • 11.
  • 12.  It is a new computer chip promises to keep police guns away from firing if they fall into wrong hands.  It uses RFID technology.  This tiny chip is implanted b/w the shoulder & elbow area of user’s hand.  Chip needs no battery or power source.
  • 13.
  • 14.  Reloading mechanism is tedious for VLE guns.  Scanning device could malfunction.  Veri chip may get lost or may get smashed during fight.  The system can be hacked & reprogrammed.  Weapon usage cannot be traced.
  • 15.  In today’s world technology has advanced to great extent.  Many concept which were impractical to hear have now become reality.  In this modern world developing smart weapons would be a hope for better future.  In future illegal training of weapons may come to an end.  Developing smart weapons will also help armies & federal bodies in fighting crimes in better ways.
  • 16.  www.popularmechanics.com  www.sciencecentral.com  www.popsci.com  www.wikipedia.org  www.militaryphotos.net