Thursday, February 21, 2019

Design and Implementation of a Network Based Security Information System

DESIGN AND effectuation OF A profit BASED SECURITY INFORMATION corpse TABLE OF CONTENTS overlay page Title page Certification Dedication Acknowledgement lift impedimentle of contents 1. INTRODUCTION 1. 1 guarantor discipline 2. Objectives 3. Justification CHAPTER TWO 2. shelter department concept 2. 1Definition of security measures 2. Security threats 3. Security & Information CHAPTER THREE 3. verbal description of the exiting security nurture dodging 3. 1Organizational structure 2. Fact finding order 3. Objective of the representing corpse 4. Programs of the existing brass 5. Equipment of the existing dodging 6. Forms CHAPTER FOUR 4.Design of the net spirt-based security tuition system 4. 1Method of info collection 2. scheme design input, touch on, output, reading storage and recuperation CHAPTER FIVE 5. Implementation of the impudently system 5. 1Choice of computer programming language 2. Program flowchart of security degrade system CHAPTER SIX 6. Output interpretation CHAPTER SEVEN 7. Conclusion 7. 1Recommendation face-lift The fundamental aim of this project is to emphasize how a system of instruction net meet aids the government and practice of law ability administration in determination winning by a range of statistical breeding as collected and discountvass in an existing tuition system.It also expose the different machines drug ab utilise in info performanceing system to deoxidise the much- diligent manual efforts. The system design is also introduced where c nonp argonil is taken in the preparation system, which is very close to the manu bothy processed mode, however with in force(p) optimisation. The proposed system is a network based expert system. All the work in the system result at the end achieve - entropy security -Handling of files -Speedy collection of culture for security digest - fund of education for subsequent usage. A forecast for the future security A dependable standard for ending taking on security matters as wellspring as planning and supremacy measures. -Existing equipment for security instruction listed and known. CHAPTER ONE 1. INTRODUCTION Law enforcement administrations, referee systems, legislators and the government functionaries often demand nurture to efficiently disseminate and set up their official responsibilities of ensuring maximum security for their subjects. To achieve this, a system of information technology network is inevitable to aid the forethought in last taking round the security of lives and properties.In this work DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION formation I result take a case full point of B OPS intercourse OF guard SHQ ENUGU as an existing information network system in the police and analyze their process of data collection and hence design a parvenu system which allow advance the output. 1. 1OBJECTIVE OF THE STUDY The objective of this program is strictly for the production of a reliable system of nation dewy-eyed law-breaking statistical information from all kit and caboodle and craning for administrative and practicable use of the executive and law enforcement perplexity system.An new(prenominal) objective of this work is to work an improvement in the existing data security system. To execute a mien of speedy data collections for security analysis. For a network of information technology for security purpose and create a standard management information system forecasting for security together with good last taking, planning and control programs. 2. JUSTIFICATION The process of executing the proletariat of information management has been manually executed quite unfortunately manual cognitive operation lowers the output quality and consumed time.This work leave examine a new system where th3e much needed human efforts ar fill ind with machines to achieve riotous collection of data and easy processing to obtain healthy outputs. in additio n the need for information and data in the knowledge base doest non only answer to the problem of information over load but also inspection and repairs in a state of execration statistics request, wherefore the cybernation of some of this atomic number 18as is very necessary because its importance in making wickedness investigators imbibe new and unexampledized methods and create semipublic awareness of the society security policy. CHAPTER TWO LITERATURE REVIEW . SECURITY CONCEPT Security is define in many ways collectible to the many contexts of its existence. In other words, security generally has to do with safeguard. It efficacy be defense from undue access. Some attributes security to safe guiding from that, which may or may not lead to destruction. It might also be provoke to understand that security has to do with protection of the environment. It also has to do with valuables this meat that anything has to be secured must carry value. Things of less importan ce to humanity and consequently anything that pose threat to life must also be prevented.Security is a very important issue in any organizations (system), no call into gesture VINCENT . E. ASOR in his seminar presentation at the Nigerian computer societys conference of 2002 stated that an organization with 98 percent security is in reality 100 percent insecure. This means that fitting security must be in place for a smooth running of an organizational bout or a system. The police, who is the case study organization here defined security in the police training manual as the protection of lives and property coupled with the maintenance of law and order in a society. 2. 1SECURITY THREATSThey are fell acts, which obtain a particular deadeningful set up on peoples lives and property and do much than interfere with merely tete-a-tete rights. They are simply abominations, Now the above brings us to the abhorrence concept. What is discourtesy? According to the BLACKSTONE, nu isance is violation of public rights and duties due to the complete union considered as a community. Williams defined horror as acts that is capable of existence followed by a criminal proceedings having one of the types of outcome Punishments. as well as Hulsburys Law (adopted by the House of Lords in Board of Trade V.Ower 1957 as correct) defined crime as an wicked act or default which is an offence against the public and render the soul guilty of the act liable to sub judice punishment. The summary of the above crime definitions by the police manual defined crime as an immoral act committed by a person or a group of persons. 2. CHARACTERISTICS OF SECURITY THREATS They are wrong doings which Judges have held, or the parliament has from time to time laid down which are sufficiently injurious to the public to warrant the application of a criminal procedure to deal with them, of course this does not enable us to screw an act as a crime when we see one.Some acts are evide ntly harmful to the public that anyone would say they should be criminal and much(prenominal) acts or so certainly are, but in that respect are many others active which opinions may differ widely. According to SIR CARLETON ALLEN, crime is crime because it consists of wrongdoings which directly and in unspoiled degree threatens the security or well being of the society. This explains why acts have to be made crimes either by judicial finiss or by legislation. A crime may remain a crime capacious after it has ceased to be a threat to the security or well being of the society.This ALLENS proposition tells us what (as he thinks) ought to be crime rather than what is crime. The public nature of crimes is evidenced by the contrast in the midst of the radiation patternrs of civil and criminal procedure. Any citizen plenty, as a general rule and in the absence of some provision to the contrary bring a criminal prosecution, whether or not he has suffered any special harm over and a bove other members of the public. As a member of the public he has an interest in the enforcement of the criminal law. 3. CLASSFICATION OF annoyanceSThere is a problem that exist in the crime reporting system in Nigeria and especially the BOPS discourse OF THE POLICY, ENUGU STATE BRANCH in particular. This arises in the variations in definition of crimes among localities. This obstacle, as far as uniformity in definitions is concerned was take by the adoption of a standard set of crime compartmentalization generally connotes its content. However in reading the explanation of each category, it is very important to keep in mind that because of the differences between the state codes, there is no possibility in a system such as felony and misdemeanor. criminal offence classifications are in three categories. Viz crime against persons, crimes against property and crime of violence or crime against local acts. nuisance against persons involve -Murder and non-negligent manslaughter -Aggravates scandalise forcible rape -Forcible rape -Robbery Crime against property includes -Burglary -Arson - take -Forgery and counterfeiting -Vandalism Crimes against local acts include -Narcotic -Illegal possession, carrying of weapons -Prostitution and commercialized vice. 4. SECURITY AND INFORMATIONThere is no known security system that works without an information technology system. In fact security of a apt(p) society is to a blue degree determined by the mensuration of information technology on ground. Thus it might interest one the to know that security are of differing contexts. An information system for a bankers dealings via an automatic teller machine differs from a network based information system for collecting, collating and analyzing statistical data for management use. There is also a system of inbuilt detectors in doors on entries to check explosives and metals.There is also a camera system on focus connected to a optical display unit for monitoring activit ies especially in banking halls and supermarkets. Hence information technology has a vital role to play in the task of ensuring maximum security. This work is based on an network based information system for collecting and collating as well as analyzing crime for the use of management at all trains of an organization in their task of decision taking, planning and control strategies based on security. CHAPTER THREE . DESCRIPTION OF THE existing remains The existing system has been an almost manually operated system due to inadequacy of sophisticated data processing machines that get out by its dexterity replace the much move manual system in crime data analysis. The BOPS converse of the Nigerian constabulary, Enugu raise Branch, which is my case study organisation is changed with the responsibility of information management, processing and analysis. They are fond of information dissemination and collection of crime data.This crime information is being communicated to the po lice Administrations at all levels in all functions to enable them in their by the way decision taking about the security of their jurisdictions for which they are responsible. EQUIPMENTIrrespective of the lack of modern machines like computers, the BOPS COMMUNITCATION SHQ ENUGU operates with some equipments and gates which includes -carrier wave receiving set sets (used in receiving wireless telegraphy information). -Walkie talkies (used for timely interaction with men on duty). -Fax machines (for receiving documented information) Repeater set (enhances the reception of Transmitted messages) -Repeater station (enhances the bode strength of information at various move) -Stand by Generator (used in cases of power failure) -Integration systems (for connecting different communication networks) FORMSThe organization dumbfounds use of three conventional forms for differing purpose. The form include the following -Message form B1- Used for the reception and transmittance of informa tion. This is done manually by writing or talking with the receiver on the set. Signal render form B2 This is the form used to register the particulars of all information standard such that an observer can at one glance read the information. -Wireless operators LDG form B3 This is a form used to write down events that took place at course of operation such as power outrage, atmospheric interference, Rainfall, thunders storm, generator braked down etc. that might interfere in operation. NATURE OF INFORMATION BOPS COMMUNICATION offices are situated at all police stations and jurisdictions with a divisional control link as data base management in SHQ Enugu known to them as control.The divisions are expected to constantly collect crime data around their jurisdiction and transmit some individually to the control who forms a statistical update of the information should be based on weekly, periodic and plumb bases as demanded by the administrators for security actions. 3. 1FACT FIND ING rule The fact finding methods here can be classified into inhering and external ancestors of data collection. -The internal source This involves the use of information as recorded in the crime diary at police stations under different headings according to the crime distinctions within the specified terminus under investigation.Another source of internal information is the signal register-form B2. -The external source This involves the use information facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They mostly in this case communicate on events that need immediate intervention. Due to the fact that these events are legged down at each interval, the wireless operators log-form B3 is used as a medium whereby crime data can be collected. 2. ORGANISATIONAL STRUCTURE The Nigerian police force is an organization known to exhibit hierarchy.For the above reason the BOPS COMMUNICAT ION also fellows suit. The information flow is in a vertical dimension though there is horizontal flow at the operational levels. Information flow chart 3. THE commentary, output signal AND THE PROCESSING SYSTEM The process of executing this daily task of information dissemination and analysis though has some tools of automation is still lacking the basic information technology (computer system) that will reduce or eliminate the much engaged manual system. The input method, which involves much writing, the processing which is also manual has to be automated. Examine the analysis in the diagram Below . PROBLEMS OF THE EXISTING SYSTEM There has not been enough information technology that will replace the much-engaged manual effort such as in the input and processing systems. There is no dependable storage system for information. Infor-tech facilities that can be used to store information and retrieve them when needed is necessary to be introduced in other to achieve the needed secur ity of information. The process of dispatching the received information in the BOPS COMMUNICATION, POLICE SHQ, ENUGU is purely manual and so this amounts to delay of information especially in cases of emergency.There is need to put adequate information technology in place to enhance the dispatch of this needed information and as well reduce human engagement in this task. Mist of the wireless operators managing this information network are not the right way trained especially in the area of operating modern information technology, therefore there is the need that expend in information management be trained properly in handling these modern tools. and all the forms used in the existing system are traditional, there is the need to introduce the use of imaged form to enhance security of information and automation. . JUSTIFICATION OF THE NEW SYSTEM The new system to be introduced in this work will eliminate or reduce the much engaged manual effort, introduce the use of experts is the use of information technology, replace the use of old fashioned tools on use with modern information technology tools and crown it all the system will achieve. 1. Data security 2. Handling of files for easy assessment 3. trim of eliminate delusion of computation 4. Speedy collection of information for security analysis 5. vigorous supply of information for use in timely decision taking hby the managers 6.Information storage for subsequent use. 7. Easy dispatch system 8. imagine for security planning. CHAPTER FOUR 4. DESIGN OF THE NETWORK BASED SECURITY INFORMATION SYSTEM. SYSTEM DESIGN AND DEVELOPMENT The whole system involves the application of the system admission to problem solving with computers. The ingredients and materials are system elements, processes and information technology network. It is truly a customized approach to the use of computers for data analysis, automation and information management.This is step-down of the entire system by studying the various opera tions performed and their relationships within the system and examination of a business activity with a flock to identifying problem areas and recommending alternative solutions. Also, for security of critical facts and restrictions, the system operation can best be operated in an INTRANET environment. 4. 1METHODS OF DATA COLLECTION The fact-finding method here should be a situation whereby the information technology is engaged (ie computer), such that data can be Rayed in directly into the system. The forms in this case should be imaged forms and not usual traditional forms.The aggregate data collected and stored can and the different programs of computer. The network system is aimed at establishing information links between the various angles. 2. SYSTEM DESIGN Having studied and analyzed the manual processing operated by the B OPS CMMUNICATION of the Enugu separate Police and the way it has been done the proposed system design therefore enables one to achieve dexterity and effe ctiveness. In the system design, care is taken in the planning system very close to the manually processed method, but with serious optimization and automation.The proposed system is a computer based expert system. The system shall make use of expertise that has been gathered from skilled human resources about data management and information processing. All the work in the system will at the and achieve Data security Handling of files or from. (the whole problem of missing file and statistics will be eliminated among the security circle). Reduce or Elimination the problems of computational error. Speedy collection of information Storage of information for subsequent or timely usage.Generally, the proposed system will help in the input, processing and output of information coupled with the storage which will be too cumbersome for individuals to handle in the manual system. During the process various crime facts will be collected within Enugu State as a jurisdiction under study. The d ata collected can be reported on daily, weekly , monthly or fairly bases as the case may be. The major crimes that were analyzed include arm robbery, murder, Burglary, House breaking, stealing, Kidnapping, child stealing, Arson, Rape and miscellaneous offence.The data collected will be arranged in a form to distinguish bounteous from juvenile crime statistics. 1. INPUT This system designed will create a situation where data will be keyed in directly into the computer the keyboard for immediate processing or storage. This expected to be carried out by a skilled expert in information technology management. 2. PROCESSING In this system the processing of data in order to achieve a pre-defined goal (information) is carried out electronically through some define instructions at a very straightaway pace (rate) with information technology tools (computes) which help to improve capability and automation. . OUTPUT After actual processing is over the required information or output is genera ted and accessed by the user for importance. Thus an information is never affirm until it is able to meet the need of the management which includes urgency, confidentiality and decision taking about the activities (here security) for which the activities are responsible. 4. INFORMATION STORAGE AND RETRIEVAL The computer network system have the advantage of providing a suitable information storage and retrieval system requiring data to be structured, tored and retrieved in a memory that suits the merciful of data and information needs of the users at all the levels. CHAPTER FIVE IMPLEMENTATION OF THE NEW SYSTEM alternative OF PROGRAMMEING LANGUAGE Among the existing steep level and low-level programming languages, I choose QBASIC programming language considering a hole of factors and features in the structure of my work. First, I observed that QBASIC consist of features that will help the writer achieve the logistic needs of the project work in terms of access methods such as th e RANDOM regain of some parts of the work and the SEQUENTIAL ACCESS of some other parts of the programs.CHAPTER SIX OUTPUT INTERPRETATION This program is purely more of an interactive system. It consists of the main program which houses a lot of subprograms of several analysis. before the min batting order, is a software restriction called PASSWORD which must be obeyed before access to the main menu form the main menu is provided multiple options of the sub menus which now ask a series of question as the case may b. in the main menu, there are four sub-menus of four major mental facultys, THE RECORD INPUT MODULE, FILE attention MODULE, herald GENERATION MODULES AND GRAPHICAL PRESENTATION MODULE THEN THE EXIT.The REPORT GENERATION module comprises of five sub menu called monthly reports and monthly statistics, annual report, annual statistics from the entire jurisdiction and a forecast report. This module gives the monthly and annual state of crimes from the various divisions f or use. The forecast report is communicate as a result of the report propagation. The FILE MAINTENANCE module takes care of the necessary treatment and enhancement of the files in the program. It houses a lot of submenus for the operation. Also, in the program a provision and/or module is created to check and access the present state of the work.CONCLUSION This work is carefully researched and prepared for the citizens who are interested in the general security picture of Enugu State, Nigeria. The volume abbreviate and rate of crime related to current population is quite amazing. The crime index offence are grouped into three major categories and were extensively discussed to better describe the nature of these security threats. The objective of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security situation of the state.An example of the use of crime statistics the baring of the high capacity motorcycle use within Enugu state in advance(prenominal) 2004, this is following the high rate of Armed robbery perpetrated with such high capacity bikes. The work will also help to forecast the nature, burn and distribution of crime wave in the state thereby alter the people concerned to reinforce for the combat. CHAPTER SEVEN RECOMMENDATION Based on the findings and relevance of this work to the society. I simply and concisely made order of payment from my own exceptional experience and the information obtained from the B OPS COMMUNICATION of Enugu State Police during the system study.The fruit and importance of this work is not reasonable for members of police force or the Administrations, but will prove to be a source of information and guidance to researchers with scientific or legal aspects of the foresenic work. The state B OPS COMMUNICATION should try to be computerized so that all their facts and data collection should be network based for adequat e interactions, efficiency and stability. PROGRAM FLOWCHART OF CRIME RECORD SYSTEM PROGRAMMING Cls decision $ = N Do bit finish $ =N For J = 1 To 24 place J, I For I = 1 To 80 home run CHR $ (178) attached I coterminous J R = S C = 20 For I = 1 To 31 shanghai CHR $ (219) Next IFor I = 0 To 8 fold R + I, C-I mark CHR $ (219) post R + I, C + 31 score CHR $ (219) Next I fold up R + 1, C fool *** decide R + 3, C impress 1, cross-file input *** range R + 4, C patsy 2, File sustainment *** come out R + 5, C marker 3, root Generation & create sink R + 6, C bulls eye 4, Statistical Presentation sink R + 7, C publish 5, Exit My resource = 0 Do while mychoice 1 or Mychoice 5 sink R + 10, C input Your Choice Please (1-5), Mychoice loop topology Select Crime Mychoice Crime 1 call off Recinput Crime 2 Call Filemain Crime 3 Call saygn Crime 5 Finish $ = EN culmination select grummet prove J, I For I = 1 To 80 impress CHR $ (178) Next I Next J R = 5 C = 20 excavate R,C For I = 1 To 31 move CHR $ (219) Next I For I = 0 To 10 Locate R + I, C-I mug CHR $ (219) Locate R + I, C + 31 scratch CHR $ (219) Next I Locate R + 1, C stain * melodic theme Generation* Locate R + 3, C scratch 1, Generate Monthly Report Locate R + 4, C impress 2, Generate annual Report Locate R + 5, C target 3, Generate forecast Report Locate R + 6, C affect 4, crisscross Monthly Report Locate R + 7, C sign 5. imprint Annual Report Locate R + 8, C mug 6. Print Forecast Report Locate R + 9, C Print 7. Exit The Choice = 0 Do while the choice 1 or the choice 7 Locate R + 10, C input Your Choice Please (1-7), the choice draw in Select Crime the choice Crime 1 Call Monthsta Crime 2 Call Annualst Crime 3 Call Forecast Crime 4 Call MonthRpt Crime 6 Call Forecarp Crime 7 Finished $ = EN hold on select Loop End Sub Sub Annual RP Annual RP. BAS Annual Statistics Printing Program Dum M $ (28) Cls Open I, $ 1, Annualst. FIL enter $ 1, EN$ Close $ 1 Do Locate 10, 10 scuttlebutt Output To Screen or Printer (P or S)K$ K$ = U Crime$ (K$) Loop Until K$ = P or K$ = S Cls Open I, $ 1, Annualst. FIL If K$ = S ThenPrint B OPS Police Communication Print Annual Crime Statistics Report Print Print For The Year EN$ Locate 5, 1 Print SN Locate 5, 3 Print Offences Locate 5, 32 Print Jan Locate 5, 44 Print Feb Locate 5, 56 Print Mar Locate 5, 68 Print Apr Locate 6, 30 Print M Locate 6, 36 Print F Locate 6, 42 Print M Locate 6, 48 Print F Locate 6, 54 Print M Locate 6, 60 Print F Locate 6, 66 Print M Locate 6, 72 Print F R = 7 I = 1 Do while not EOF (I) remark N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 commentary N1, M7, M8, M9, M10, M11, M12, M13, M14 foreplay 1, M15, M16, M17, M18, M19, M20, M21, M22Input 1, M23, M24, T Locate (R 8 + I), 1 Print C$ Locate (R 8 + I), 3 Print F$ Locate (R 8 + I), 30 Print M1 Locate (R 8 + I), 36 Print M2 Locate (R 8 + I), 42 Print M3 Locate (R 8 + I), 48 Print M4 Locate (R 8 + I), 54 Print M5 L ocate (R 8 + I), 60 Print M6 Locate (R 8 + I), 66 Print M7 Locate (R 8 + I), 72 Print M8 I = I + 1 Loop Close 1 Call outsmart distinguish Locate 5, 32 Print May Locate 5, 44 Print Jun Locate 5, 56 Print Jul Locate 5, 68 Print Aug R8 = 7 I = 1 undecided I, 1, ANNUALST . FIL Do while not EOF (I) Input 1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7Input 1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 Input 1, M18, M19, M20, M21, M22, M23, M24, T Locate (R 8 + I), 30 Print M9 Locate (R 8 + I) 36 Print M10 Locate (R 8 + I), 42 Print M11 Locate (R 8 + I), 48 Print M12 Locate (R 8 + I), 54 Print M13 Locate (R 8 + I) 60 Print M14 Locate (R 8 + I), 66 Print M15 Locate (R 8 + I) 72 Print M16 I = J + 1 Loop Close 1 Call Get Key Locate 5, 32 Print kinfolk Locate 5, 44 Print Oct Locate 5, 56 Print Nov Locate 5, 68 Print Dec R8 = 7 I = 1 OPEN I, 1, ANNUALST . FIL Do while not EOF (I) Input 1, EN$, C$, F$, M1, M2, M3, M4, M5, M6Input 1, M7,M8, M9, M10, M11, M12, M13, M1 4, M15 Input 1, M16, M17, M18, M19, M20, M21, M22, M23, Input 1, M24, T I = I + 1 Loop Close 1 Call Get Key Locate 5, 30 Print Total R8 = 7 I = 1 OPEN I, 1, ANNUALST . FIL Do while not EOF (I) Input 1, EN$, C$, F$, M1, M2, M3, M4, M5 Input 1, M6, M7,M8, M9, M10, M11, M12, M13 Input 1, M14, M15, M16, M17, M18, M19, M20, M21 Input 1, M22, M23, M24, T Locate (R8 + I), 30 Print T I = I + 1 Loop Close 1 CALL GETKEY ELSE L Print B OPS Police Communication L Print Annual Crime Statistics Report L Print L Print For Each Division EN$ L PrintL Print SN baulk (3) Offences Tab(31) Jan Tab (39) Feb L Print Tab (47) Mar Tab (55) Apr Tab (63) May L Print Tab (71) Jun Tab (79) Jul Tab (87) Aug L Print Tab (95) Sep Tab (103) Oct Tab (111) Nov L Print Tab (119) Dec Tab (127) Total spread 8 = 26 For I = 1 To 12 Col 8 = Col 8 + 4 L Print Tab (Col 8) M Col 8 = Col 8 + 4 L Print Tab (Col 8) F Next I Do While Not EOF (1) Cls OPEN I, 1, ANNUALST. FIL Input 1, Y$ YY$ = STR$ (Val (Y$) + 1) OPEN O, 2 , FORECAST. FIL OPEN I, 1, ANNUALST. FIL Do While Not EOF (1) Input 1, Y$, C$, F4, M(1), F(1), M(2), F(2), M(3), F(3)Input 1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) Input 1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), Input 1, M(12), F(12), Total My = O SM2 = 0 Sm3 =0 Sm4 = 0 Smy = 0 M2y = 0 Fy = O Sf = 0 Sf2 = Sf3 = 0 SF4 = Sfy = 0 F2y = 0 For I = 1 To 12 Sm = Sm + I Sf = Sf + 1 My = My + m (I) Fy = Fy + F (I) Sm2 = Sm2 + I 2 Sf2 = Sf2 + I 2 Sm3 = Sm3 + I 3 Sf3 = Sf3 + I 3 Sm4 = Sm4 + I 4 Sf4 = Sf4 + I 4 Smy = Smy + I * m (I) Sfy + I * F (I) M2y = M2y + I 2 * M(I) F2y = F2y + I 2 * F (I) Next I inject Values For Males In The A Array put in For Gaussian EliminationA (1, 1) = 12 A (1, 2) = Sm2 A (1, 23) = Sm2 B (1) = My A (2, 1) = Sm A (2, 2) = Sm2 A (2, 3) = Sm3 B(2) = Smy A(3, 1) = Sm2 A (3, 2) = Sm3 A (3, 3) = Sm4 B(3) = M2y Call Gauss (x1, x2, X3) Estimate the figures for males for the next three months Fm1 = X1, + X2 * 13 + X3 * 13 2 Fm2 = X 1 + X2 * 14 + X3 * 14 2 Fm3 = X1 + X2 * 15 + X3 * 15 2 Store values for females in the A? Array Ready for gaussian elimination A (1, 1) = 12 A(1, 2) = Sf AC1, 3) = Sf2 B(1) = Fy A(2,1 ) = Sf A (2, 2) = Sf2 A (2, 3) = Sf3 B (2) = Sfy A (3, 1) = Sf2 A (3, 2) = Sf3 A (3, 3) = Sf4 B(3) = F2y Call Guass (x1, X2, x3) Estimate the figures for females for the next ternion months Ff1 = x1 + x2 * 13 + x3 * 13 2 Ff2 = x1 + x2 * 14 + x3 * 14 2 Ff3 = x1 + x2 * 15 + x3 * 15 2 Print 2, YY$, C$ F$ Fm1 FF1 Print 2, Fm2 FF2 T Loop Close 1 End Sub Sub Forecarp Forecarp . Bas Forecast Figure Printing Program Dm M$ (9) Cls Open 1 , 1, Forecast . Fil Input 1, YY$ Close 1 Do Locate 10, 10 Input Output to Screen (P or S) K$ K$ = U Crime $ (K$) Loop Until K$ = P Or K$ = S Cls Open 1 , 1, Forecast. Fill If K$ = S Then Print B OPS Police Communication Print Print For The Year YY$Locate 5, 1 Print SN Locate 5, 3 Print Offences Locate 5, 32 Print Jan Locate 5, 44 Print F eb Locate 5, 56 Print Mar Locate 6, 30 Print M Locate 6, 36 Print F Locate 6, 42 Print M Locate 6, 48 Print F Locate 6, 54 Print M Locate 6, 60 Print F R8 = 7 I = 1 Do while not EOF (1) Input 1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 Locate (R8 + I), 1 Print C$ Locate (R8 + I), 3 Print F$ Locate (R8 + I), 30 Print M1 Locate (R8 + I) 36 Print M2 Locate (R8 + I), 42 Print M3 Locate (R8 + I) 48 Print M4 Locate (R8 + I), 54 Print M5 Locate (R8 + I) 60 Print M6 I = I + 1Loop Close 1 Else L PRINT B OPS POLICE COMMUNICATION L Print LPrint For the Year YY$ Lprint Lprint SN TAB(3) Oddwnxwa Tab(31) Jan Tab(39) Feb Lprint Tab (47) Mar Col 8 = 26 For I = 1 To 3 Col 8 = Col 8 + 4 Lprint Tab (Col 8) M Col 8 = Col 8 + 4 Lprint Tab (Col 8) F Next I Do While Not EOF (1) For I = 1 To 9 Input 1, M$ (I) Next I Lprint M$ (2) Tab(3) M$(3) Col 8 = 26 Total = 0 For I = 4 To 8 criterion 2 Col 8 = Col 8 + 4 LPrint Tab (Col 8) M$ (I + 1) Total = Total + Val (M$ (I)) + Val (M$ (I + 1)) Nex t I L Print Tab (60) Total Loop End ifClose 1 YY$ = Input $ (1) End Sub deputize GET KEY Locate 24, 10 Print sign on Any Key To Continue Do A$ = INKEY$ Loop Until A$ END SUB FORCE COMMUNICATION STATE COMMUNICATION DIVISIONAL COMMUNICATION Cls Screen 9,0,0 color 3 Finish $ = N Dowhile finish $ = N For J = 1 To 24 Locate J, 1 For I = 1 To 80 Print Chr $ (178) Next I Next J Locate R + 1, C? Main Menu Locate R + 2, C? 1. Record Input Locate R + 3, C? 2. File Maintenance Locate R + 4, C? 3. Report generation and Printing Locate R + 5, C? 4. Statistical PresentationLocate R + 6, C? 5. Exit MYCHOICE = 0 DO WHILE MYCHOICE 1 OR MYCHOICE 5 LOCATE R + 10, CINPUT YOUR CHOICE PLEASE (1-5) MYCHOICE LOOP IF SELECT CRIME MYCHOICE CRIME 1 CRIME 2 CRIME 3 CRIME 4 CRIME 5 Finish $ = Y End selected Locate 24, 10 Print Press Any key To Continue Do A $ = In keys Loop until A$ END SUB EXIT CRIME 1 SUB REC INPUT ASSIGNMENT BOX IF PRINT = KEY Murder self-annihilation Wounding Assault Kidnappi ng Rape Armed Robbery Stealing Burglary Arson Narcotics Traffic Offeence House Breaking Store Breaking variant STOP CRIME2 SUB FILEMAIN ASSIGNMENT BOX IF MAIN = y show RECORD DELETE RECORD REMOVE DELETE RECORD edit RECORD EDIT RECORD EXIT STOP CRIME 3 SUB REPORT GN ASSIGNMENT BOX IF MAIN T$ = y Generate Monthly Report EXIT Generate Annual Report Generate Fore Cast Report Print Monthly Report Print Annual Report Print Annual Report IF EN =3 FEB MAR APR MAY JUN JUL CRIME 4 SUB ANNUALST INPUT DIV EN IF EN =2 IF EN =1 JAN JAN FEB FEB MAR market APR APR MAY MAY JUN JUN JUL JUL AUG AUG AUG SEP SEP SEP JAN STOP OCT OCT OCT NOV NOV NOV regrets DEC DEC STOP STOP

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.