Friday, May 17, 2019

Design and Implementation of a Network Based Security Information System

origination AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION transcription TABLE OF CONTENTS C ein truthplace page human activity page Certification Dedication Ack presentlyledgement Abstract chiple of contents 1. mental home 1. 1Security development 2. Objectives 3. vindication CHAPTER TWO 2. Security concept 2. 1Definition of certification department 2. Security threats 3. Security & In take shapeation CHAPTER THREE 3. Description of the exiting security measures info frame 3. 1Organizational structure 2. Fact finding method 3. Objective of the lively carcass 4. Programs of the alert arranging 5. Equipment of the existing constitution 6. Forms CHAPTER FOUR 4.Design of the net pass away-based security entropy carcass 4. 1Method of teaching show 2. system of rules design input, figure out, output, nurture storage and retrieval CHAPTER FIVE 5. Implementation of the new system 5. 1Choice of programming quarrel 2. Program flowchart of security recor d system CHAPTER SIX 6. production interpretation CHAPTER SEVEN 7. finding 7. 1Recommendation ABSTRACT The fundamental aim of this project is to emphasize how a system of randomness network acquired immune deficiency syndrome the government and jurisprudence administration in purpose taking through a range of statistical training as collected and analyzed in an existing in establishation system.It to a fault airs the variant machines mappingd in knowledge affect system to get down the very much-engaged manual of arms efforts. The system design is also introduced w here(predicate) cone is taken in the planning system, which is very close to the manually processed method, but with unspoiled optimization. The proposed system is a network based expert system. All the work in the system ordain at the end come across - data security -Handling of files -Speedy collection of culture for security analysis -Storage of information for consequent usage. A direct for the futu re security A dependable standard for decision taking on security matters as well up as planning and control measures. -Existing equipment for security information listed and cognize. CHAPTER ONE 1. INTRODUCTION truth enforcement administrations, Justice systems, legislators and the government functionaries often privation information to efficiently disseminate and fulfill their functionary responsibilities of ensuring maximum security for their subjects. To achieve this, a system of information engineering network is unavoidablenessed to attend to the management in decision taking to the in high spiritsest degree(predicate) the security of lives and properties.In this work DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION transcription I allow take a typesetters case study of B OPS COMMUNICATION OF POLICE SHQ ENUGU as an existing information network system in the police and analyze their process of data collection and hence design a new system which wil l enhance the output. 1. 1OBJECTIVE OF THE STUDY The accusing of this program is strictly for the production of a reliable system of nation wide hatred statistical information from all plant life and craning for administrative and movemental use of the executive and law enforcement management system.An otherwise objective of this work is to make an improvement in the existing data security system. To create a way of speedy data collections for security analysis. For a network of information applied science for security purpose and create a standard management information system anticipation for security together with good decision taking, planning and control programs. 2. JUSTIFICATION The process of executing the designate of information management has been manually executed quite unfortunately manual procedure reduces the output feeling and consumed condemnation.This work will examine a new system where th3e much needed human efforts be re grazed with machines to achiev e fast collection of data and easy treat to obtain healthy outputs. Also the need for information and data in the knowledge base doest not only answer to the problem of information over load but also helps in a enounce of offensive activity statistics request, wherefore the cybernation of some of this areas is very necessary because its importance in making plague investigators imbibe new and innovationalise methods and create public awareness of the party security policy. CHAPTER TWO LITERATURE REVIEW . SECURITY ideal Security is define in many ways due to the many contexts of its existence. In other words, security generally has to do with protection. It might be protection from undue access. Some attributes security to safe channelise from that, which may or may not lead to destruction. It might also be participationing to see to it that security has to do with protection of the environment. It also has to do with valuables this means that anything has to be secured must have value. Things of less(prenominal) importance to humanity and thitherfore anything that pose threat to life must also be prevented.Security is a very important issue in any governing bodys (system), no wonder VINCENT . E. ASOR in his seminar presentation at the Nigerian estimator societys conference of 2002 stated that an organization with 98 percent security is unfeignedly 100 percent insecure. This means that adequate security must be in place for a smooth running of an organizational affair or a system. The police, who is the case study organization here defined security in the police training manual as the protection of lives and airplane propeller coupled with the maintenance of law and order in a society. 2. 1SECURITY THREATSThey are unlawful acts, which have a particular harmful effects on peoples lives and property and do more than interfere with merely reclusive rights. They are simply crimes, Now the above brings us to the crime concept. What is crime? Acco rding to the BLACKSTONE, crime is rape of public rights and duties due to the whole community considered as a community. Williams defined crime as acts that is equal of being followed by a lamentable proceedings having one of the types of outcome Punishments. Also Hulsburys Law (adopted by the House of Lords in Board of Trade V.Ower 1957 as correct) defined crime as an unlawful act or default which is an offence against the public and render the person shamefaced of the act liable to legal punishment. The summary of the above crime definitions by the police manual defined crime as an unlawful act committed by a person or a group of persons. 2. CHARACTERISTICS OF SECURITY THREATS They are wrong doings which Judges have held, or the parliament has from time to time laid down which are sufficiently injurious to the public to warrant the occupation of a vile procedure to deal with them, of course this does not enable us to recognize an act as a crime when we see one.Some acts ar e obviously harmful to the public that anyone would say they should be criminal and such acts almost certainly are, but in that respect are many others about which opinions may disagree widely. According to SIR CARLETON ALLEN, crime is crime because it consists of wrongdoings which directly and in serious degree threatens the security or well being of the society. This explains why acts have to be made crimes either by judicial decisions or by legislation. A crime may remain a crime long after it has ceased to be a threat to the security or well being of the society.This ALLENS proposition tells us what (as he thinks) ought to be crime rather than what is crime. The public nature of crimes is evidenced by the contrast between the rulers of civil and criminal procedure. Any citizen faecal matter, as a general rule and in the absence of some provision to the reversal bring a criminal prosecution, whether or not he has suffered any special harm over and above other members of the p ublic. As a member of the public he has an interest in the enforcement of the criminal law. 3. CLASSFICATION OF disgustS on that point is a problem that exist in the crime breeding system in Nigeria and in particular the BOPS COMMUNICATION OF THE POLICY, ENUGU STATE BRANCH in particular. This arises in the variations in definition of crimes among localities. This obstacle, as far as uniformity in definitions is concerned was removed by the adoption of a standard set of crime classification generally connotes its content. However in realizeing the explanation of each category, it is very important to redeem in mind that because of the differences between the state codes, there is no possibility in a system such as felony and misdemeanor. wickedness classifications are in three categories. Viz crime against persons, crimes against property and crime of vehemence or crime against local acts. criminal offence against persons include - murder and non-negligent manslaughter -Aggrav ates assault forcible rape -Forcible rape -Robbery Crime against property includes -Burglary -Arson -Stealing -Forgery and counterfeiting -Vandalism Crimes against local acts include -Narcotic -Illegal possession, carrying of weapons -Prostitution and commercialized vice. 4. SECURITY AND INFORMATIONThere is no known security system that works without an information technology system. In fact security of a given society is to a senior high school degree determined by the amount of information technology on ground. Thus it might interest one the to know that security are of differing contexts. An information system for a bankers dealing via an automatic fabricator machine differs from a network based information system for collecting, collating and analyzing statistical data for management use. There is also a system of inbuilt detectors in doors on entries to check explosives and metals.There is also a photographic camera system on focus connected to a visual display unit for monit oring activities especially in banking halls and supermarkets. Hence information technology has a vital role to play in the labour of ensuring maximum security. This work is based on an network based information system for collecting and collating as well as analyzing crime for the use of management at all levels of an organization in their problem of decision taking, planning and control strategies based on security. CHAPTER THREE . DESCRIPTION OF THE EXISTING SYSTEM The existing system has been an almost manually operated system due to lack of sophisticated data processing machines that will by its susceptibility replace the much engaged manual system in crime data analysis. The BOPS COMMUNICATION of the Nigerian natural law, Enugu State Branch, which is my case study organisation is changed with the responsibility of information management, processing and analysis. They are fond of information dissemination and collection of crime data.This crime information is being communic ated to the police Administrations at all levels in all functions to enable them in their timely decision taking about the security of their jurisdictions for which they are responsible. EQUIPMENTIrrespective of the lack of modern machines like computers, the BOPS COMMUNITCATION SHQ ENUGU operates with some equipments and gates which includes -carrier wheel radio sets (used in receiving wireless telegraphy information). -Walkie talkies (used for timely interaction with men on duty). -Fax machines (for receiving documented information) repeating firearm set (enhances the reception of Transmitted messages) -Repeater station (enhances the augury strength of information at various post) -Stand by Generator (used in cases of power failure) -Integration systems (for connecting polar communication networks) FORMSThe organization makes use of three traditional forms for differing purpose. The form include the following -Message form B1- Used for the reception and transmission of inform ation. This is done manually by writing or talking with the recipient on the set. Signal evidence form B2 This is the form used to register the particulars of all information received such that an observer can at one glance read the information. -Wireless operators LDG form B3 This is a form used to write down events that took place at course of operation such as power outrage, atmospheric interference, Rainfall, thunders storm, generator braked down etc. that might interfere in operation. NATURE OF INFORMATION BOPS COMMUNICATION offices are situated at all police stations and jurisdictions with a divisional control link as data base management in SHQ Enugu known to them as control.The divisions are expected to constantly collect crime data around their jurisdiction and transfer some individually to the control who forms a statistical update of the information should be based on weekly, periodical and fairly bases as demanded by the administrators for security actions. 3. 1FAC T FINDING METHOD The fact finding methods here can be classified into internal and external sources of data collection. -The internal source This involves the use of information as recorded in the crime diary at police stations under different headings according to the crime distinctions at bottom the specified period under investigation.Another source of internal information is the signal register-form B2. -The external source This involves the use information facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They mostly in this case communicate on events that need immediate intervention. Due to the fact that these events are legged down at each interval, the wireless operators log-form B3 is used as a medium whereby crime data can be collected. 2. ORGANISATIONAL STRUCTURE The Nigerian police force is an organization known to show up hierarchy.For the above reason the BOPS COMMUN ICATION also fellows suit. The information flow is in a vertical dimension though there is horizontal flow at the operational levels. information flow chart 3. THE INPUT, OUTPUT AND THE PROCESSING SYSTEM The process of executing this daily task of information dissemination and analysis though has some tools of automation is still lacking the basic information technology (computer system) that will reduce or eliminate the much engaged manual system. The input method, which involves much writing, the processing which is also manual has to be automated. Examine the analysis in the diagram Below . PROBLEMS OF THE EXISTING SYSTEM There has not been enough information technology that will replace the much-engaged manual effort such as in the input and processing systems. There is no dependable storage system for information. Infor-tech facilities that can be used to store information and retrieve them when needed is necessary to be introduced in other to achieve the needed security of inf ormation. The process of dispatching the received information in the BOPS COMMUNICATION, POLICE SHQ, ENUGU is rigorously manual thus this amounts to delay of information especially in cases of emergency.There is need to put adequate information technology in place to enhance the dispatch of this needed information and as well reduce human engagement in this task. Mist of the wireless operators managing this information network are not powerful trained especially in the area of operating modern information technology, so there is the need that expend in information management be trained properly in handling these modern tools. Barely all the forms used in the existing system are traditional, there is the need to introduce the use of imaged form to enhance security of information and automation. . JUSTIFICATION OF THE NEW SYSTEM The new system to be introduced in this work will eliminate or reduce the much engaged manual effort, introduce the use of experts is the use of information technology, replace the use of old fashion tools on use with modern information technology tools and crown it all the system will achieve. 1. Data security 2. Handling of files for easy assessment 3. Reduce of eliminate error of computation 4. Speedy collection of information for security analysis 5. Prompt supply of information for use in timely decision taking hby the managers 6.Information storage for subsequent use. 7. Easy dispatch system 8. Forecast for security planning. CHAPTER FOUR 4. DESIGN OF THE NETWORK BASED SECURITY INFORMATION SYSTEM. SYSTEM DESIGN AND DEVELOPMENT The whole system involves the application of the system approach to problem solving with computers. The ingredients and materials are system elements, processes and information technology network. It is actually a customized approach to the use of computers for data analysis, automation and information management.This is reduction of the entire system by canvass the various operations performed and their r elationships within the system and examination of a business activity with a collect to identifying problem areas and recommending alternative solutions. Also, for security of critical facts and restrictions, the system operation can best be operated in an INTRANET environment. 4. 1METHODS OF DATA COLLECTION The fact-finding method here should be a situation whereby the information technology is engaged (ie computer), such that data can be Rayed in directly into the system. The forms in this case should be imaged forms and not usual traditional forms.The aggregate data collected and stored can and the different programs of computer. The network system is aimed at establishing information links between the various angles. 2. SYSTEM DESIGN Having studied and analyzed the manual processing operated by the B OPS CMMUNICATION of the Enugu State Police and the way it has been done the proposed system design therefore enables one to achieve efficiency and effectiveness. In the system desi gn, care is taken in the planning system very close to the manually processed method, but with serious optimization and automation.The proposed system is a computer based expert system. The system shall make use of expertise that has been gathered from skilled human resources about data management and information processing. All the work in the system will at the and achieve Data security Handling of files or from. (the whole problem of missing file and statistics will be eliminated among the security circle). Reduce or Elimination the problems of computational error. Speedy collection of information Storage of information for subsequent or timely usage.Generally, the proposed system will help in the input, processing and output of information coupled with the storage which will be too cumbersome for individuals to handle in the manual system. During the process various crime facts will be collected within Enugu State as a jurisdiction under study. The data collected can be reported on daily, weekly , monthly or fairly bases as the case may be. The major crimes that were analyzed include Armed robbery, murder, Burglary, House breaking, stealing, Kidnapping, nestling stealing, Arson, Rape and miscellaneous offence.The data collected will be arranged in a form to distinguish adult from juvenile crime statistics. 1. INPUT This system designed will create a situation where data will be keyed in directly into the computer the keyboard for immediate processing or storage. This expected to be carried out by a skilled expert in information technology management. 2. PROCESSING In this system the processing of data in order to achieve a pre-defined goal (information) is carried out electronically through some define instructions at a very fast pace (rate) with information technology tools (computes) which help to improve efficiency and automation. . OUTPUT After actual processing is over the required information or output is generated and accessed by the user for impor tance. Thus an information is never confirmed until it is able to meet the need of the management which includes urgency, confidentiality and decision taking about the activities (here security) for which the activities are responsible. 4. INFORMATION STORAGE AND RETRIEVAL The computer network system have the advantage of providing a suitable information storage and retrieval system requiring data to be structured, tored and retrieved in a memory that suits the liberal of data and information needs of the users at all the levels. CHAPTER FIVE IMPLEMENTATION OF THE NEW SYSTEM woof OF PROGRAMMEING LANGUAGE Among the existing high level and low-level programming oral communications, I choose QBASIC programming language considering a treat of factors and features in the structure of my work. First, I observed that QBASIC consist of features that will help the author achieve the logistic needs of the project work in terms of access methods such as the RANDOM ACCESS of some split of the work and the SEQUENTIAL ACCESS of some other parts of the programs.CHAPTER SIX OUTPUT INTERPRETATION This program is purely more of an interactive system. It consists of the main program which houses a lot of subprograms of several analysis. Before the min placard, is a software restriction called PASSWORD which must be obeyed before access to the main menu form the main menu is provided multiple options of the sub menus which now ask a series of question as the case may b. in the main menu, there are four sub-menus of four major modules, THE memorialize INPUT MODULE, FILE importantTENANCE MODULE, REPORT genesis MODULES AND GRAPHICAL PRESENTATION MODULE THEN THE EXIT.The REPORT GENERATION module comprises of five sub menu called monthly reports and monthly statistics, annual report, annual statistics from the entire jurisdiction and a forecast report. This module gives the monthly and annual state of crimes from the various divisions for use. The forecast report is projecte d as a result of the report generation. The FILE MAINTENANCE module takes care of the necessary treatment and enhancement of the files in the program. It houses a lot of submenus for the operation. Also, in the program a provision and/or module is created to check and access the present state of the work.CONCLUSION This work is carefully researched and prepared for the citizens who are interested in the general security picture of Enugu State, Nigeria. The vividness trend and rate of crime related to current population is quite amazing. The crime index offence are grouped into three major categories and were extensively discussed to better describe the nature of these security threats. The objective of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security situation of the state.An example of the use of crime statistics the baring of the high capacity motorcycle use within En ugu state in early 2004, this is following the high rate of Armed robbery perpetrated with such high capacity bikes. The work will also help to forecast the nature, trend and distribution of crime beckon in the state thereby enabling the people concerned to reinforce for the combat. CHAPTER SEVEN RECOMMENDATION base on the findings and relevance of this work to the society. I simply and concisely made drawing from my own transcendent experience and the information obtained from the B OPS COMMUNICATION of Enugu State Police during the system study.The fruit and importance of this work is not valid for members of police force or the Administrations, but will prove to be a source of information and guidance to researchers with scientific or legal aspects of the foresenic work. The state B OPS COMMUNICATION should deform to be computerized so that all their facts and data collection should be network based for adequate interactions, efficiency and stability. PROGRAM FLOWCHART OF CRI ME RECORD SYSTEM PROGRAMMING Cls Finish $ = N Do dapple finish $ =N For J = 1 To 24 descend J, I For I = 1 To 80 sign CHR $ (178) abutting I Next J R = S C = 20 For I = 1 To 31 strike CHR $ (219) Next IFor I = 0 To 8 deposit R + I, C-I bulls eye CHR $ (219) locate R + I, C + 31 imprint CHR $ (219) Next I range R + 1, C affect *** set R + 3, C home run 1, Record comment *** come in R + 4, C ingrain 2, File Maintenance *** ensconce R + 5, C home run 3, history generation & create commit R + 6, C soft touch 4, Statistical Presentation fold up R + 7, C stain 5, Exit Mychoice = 0 Do while mychoice 1 or Mychoice 5 steady down R + 10, C enter Your Choice Please (1-5), Mychoice grummet Select Crime Mychoice Crime 1 surround Recinput Crime 2 key out Filemain Crime 3 ring saygn Crime 5 Finish $ = EN give the sack select coil Locate J, I For I = 1 To 80 Print CHR $ (178) Next I Next J R = 5 C = 20 Locate R,C For I = 1 To 31 Print CHR $ (219) Next I For I = 0 To 10 Locate R + I, C-I Print CHR $ (219) Locate R + I, C + 31 Print CHR $ (219) Next I Locate R + 1, C Print *Report Generation* Locate R + 3, C Print 1, Generate Monthly Report Locate R + 4, C Print 2, Generate Annual Report Locate R + 5, C Print 3, Generate forecast Report Locate R + 6, C Print 4, Print Monthly Report Locate R + 7, C Print 5. Print Annual Report Locate R + 8, C Print 6. Print Forecast Report Locate R + 9, C Print 7. Exit The Choice = 0 Do while the choice 1 or the choice 7 Locate R + 10, C comment Your Choice Please (1-7), the choice Loop Select Crime the choice Crime 1 Call Monthsta Crime 2 Call Annualst Crime 3 Call Forecast Crime 4 Call MonthRpt Crime 6 Call Forecarp Crime 7 Finished $ = EN End select Loop End Sub Sub Annual RP Annual RP. BAS Annual Statistics Printing Program Dum M $ (28) Cls plainspoken I, $ 1, Annualst. FIL foreplay $ 1, EN$ unaired $ 1 Do Locate 10, 10 Input Output To Screen or Printer (P or S)K$ K$ = U Crime$ (K$) Loop Until K$ = P or K$ = S Cls Open I, $ 1, Annualst. FIL If K$ = S ThenPrint B OPS Police Communication Print Annual Crime Statistics Report Print Print For The grade EN$ Locate 5, 1 Print SN Locate 5, 3 Print Offences Locate 5, 32 Print Jan Locate 5, 44 Print Feb Locate 5, 56 Print Mar Locate 5, 68 Print Apr Locate 6, 30 Print M Locate 6, 36 Print F Locate 6, 42 Print M Locate 6, 48 Print F Locate 6, 54 Print M Locate 6, 60 Print F Locate 6, 66 Print M Locate 6, 72 Print F R = 7 I = 1 Do while not EOF (I) Input N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 Input N1, M7, M8, M9, M10, M11, M12, M13, M14 Input 1, M15, M16, M17, M18, M19, M20, M21, M22Input 1, M23, M24, T Locate (R 8 + I), 1 Print C$ Locate (R 8 + I), 3 Print F$ Locate (R 8 + I), 30 Print M1 Locate (R 8 + I), 36 Print M2 Locate (R 8 + I), 42 Print M3 Locate (R 8 + I), 48 Print M4 Locate (R 8 + I), 54 Print M5 Locate (R 8 + I), 60 Print M6 Locate (R 8 + I), 66 Print M7 Locate (R 8 + I), 72 Print M8 I = I + 1 Loop Close 1 Call Get Key Locate 5, 32 Print whitethorn Locate 5, 44 Print Jun Locate 5, 56 Print Jul Locate 5, 68 Print Aug R8 = 7 I = 1 render I, 1, ANNUALST . FIL Do while not EOF (I) Input 1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7Input 1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 Input 1, M18, M19, M20, M21, M22, M23, M24, T Locate (R 8 + I), 30 Print M9 Locate (R 8 + I) 36 Print M10 Locate (R 8 + I), 42 Print M11 Locate (R 8 + I), 48 Print M12 Locate (R 8 + I), 54 Print M13 Locate (R 8 + I) 60 Print M14 Locate (R 8 + I), 66 Print M15 Locate (R 8 + I) 72 Print M16 I = J + 1 Loop Close 1 Call Get Key Locate 5, 32 Print Sep Locate 5, 44 Print Oct Locate 5, 56 Print Nov Locate 5, 68 Print Dec R8 = 7 I = 1 OPEN I, 1, ANNUALST . FIL Do while not EOF (I) Input 1, EN$, C$, F$, M1, M2, M3, M4, M5, M6Input 1, M7,M8, M9, M10, M11, M12, M13, M14, M15 Input 1, M16, M17, M18, M19, M20, M21, M22, M23, Input 1, M24, T I = I + 1 Loop Close 1 Call Get Key Locate 5, 30 Print quantity R8 = 7 I = 1 OPEN I, 1, ANNUALST . FIL Do while not EOF (I) Input 1, EN$, C$, F$, M1, M2, M3, M4, M5 Input 1, M6, M7,M8, M9, M10, M11, M12, M13 Input 1, M14, M15, M16, M17, M18, M19, M20, M21 Input 1, M22, M23, M24, T Locate (R8 + I), 30 Print T I = I + 1 Loop Close 1 CALL GETKEY ELSE L Print B OPS Police Communication L Print Annual Crime Statistics Report L Print L Print For Each Division EN$ L PrintL Print SN impediment (3) Offences check-out procedure(31) Jan bridle (39) Feb L Print Tab (47) Mar Tab (55) Apr Tab (63) May L Print Tab (71) Jun Tab (79) Jul Tab (87) Aug L Print Tab (95) Sep Tab (103) Oct Tab (111) Nov L Print Tab (119) Dec Tab (127) Total break 8 = 26 For I = 1 To 12 spread 8 = Col 8 + 4 L Print Tab (Col 8) M Col 8 = Col 8 + 4 L Print Tab (Col 8) F Next I Do While Not EOF (1) Cls OPEN I, 1, ANNUALST. FIL Input 1, Y$ YY$ = STR$ (Val (Y$) + 1) OPEN O, 2, FORECAST. FIL OPEN I, 1, ANNUALST. FIL Do While Not EOF (1) Input 1, Y$, C$, F4, M( 1), F(1), M(2), F(2), M(3), F(3)Input 1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) Input 1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), Input 1, M(12), F(12), Total My = O SM2 = 0 Sm3 =0 Sm4 = 0 Smy = 0 M2y = 0 Fy = O Sf = 0 Sf2 = Sf3 = 0 SF4 = Sfy = 0 F2y = 0 For I = 1 To 12 Sm = Sm + I Sf = Sf + 1 My = My + m (I) Fy = Fy + F (I) Sm2 = Sm2 + I 2 Sf2 = Sf2 + I 2 Sm3 = Sm3 + I 3 Sf3 = Sf3 + I 3 Sm4 = Sm4 + I 4 Sf4 = Sf4 + I 4 Smy = Smy + I * m (I) Sfy + I * F (I) M2y = M2y + I 2 * M(I) F2y = F2y + I 2 * F (I) Next I Store set For Males In The A Array Ready For Gaussian EliminationA (1, 1) = 12 A (1, 2) = Sm2 A (1, 23) = Sm2 B (1) = My A (2, 1) = Sm A (2, 2) = Sm2 A (2, 3) = Sm3 B(2) = Smy A(3, 1) = Sm2 A (3, 2) = Sm3 A (3, 3) = Sm4 B(3) = M2y Call Gauss (x1, x2, X3) Estimate the figures for males for the next three months Fm1 = X1, + X2 * 13 + X3 * 13 2 Fm2 = X1 + X2 * 14 + X3 * 14 2 Fm3 = X1 + X2 * 15 + X3 * 15 2 Store determine for females in th e A? Array Ready for gaussian elimination A (1, 1) = 12 A(1, 2) = Sf AC1, 3) = Sf2 B(1) = Fy A(2,1 ) = Sf A (2, 2) = Sf2 A (2, 3) = Sf3 B (2) = Sfy A (3, 1) = Sf2 A (3, 2) = Sf3 A (3, 3) = Sf4 B(3) = F2y Call Guass (x1, X2, x3) Estimate the figures for females for the next Three months Ff1 = x1 + x2 * 13 + x3 * 13 2 Ff2 = x1 + x2 * 14 + x3 * 14 2 Ff3 = x1 + x2 * 15 + x3 * 15 2 Print 2, YY$, C$ F$ Fm1 FF1 Print 2, Fm2 FF2 T Loop Close 1 End Sub Sub Forecarp Forecarp . Bas Forecast pick up Printing Program Dm M$ (9) Cls Open 1 , 1, Forecast . Fil Input 1, YY$ Close 1 Do Locate 10, 10 Input Output to Screen (P or S) K$ K$ = U Crime $ (K$) Loop Until K$ = P Or K$ = S Cls Open 1 , 1, Forecast. claim If K$ = S Then Print B OPS Police Communication Print Print For The Year YY$Locate 5, 1 Print SN Locate 5, 3 Print Offences Locate 5, 32 Print Jan Locate 5, 44 Print Feb Locate 5, 56 Print Mar Locate 6, 30 Print M Locate 6, 36 Print F Locate 6, 42 P rint M Locate 6, 48 Print F Locate 6, 54 Print M Locate 6, 60 Print F R8 = 7 I = 1 Do while not EOF (1) Input 1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 Locate (R8 + I), 1 Print C$ Locate (R8 + I), 3 Print F$ Locate (R8 + I), 30 Print M1 Locate (R8 + I) 36 Print M2 Locate (R8 + I), 42 Print M3 Locate (R8 + I) 48 Print M4 Locate (R8 + I), 54 Print M5 Locate (R8 + I) 60 Print M6 I = I + 1Loop Close 1 Else L PRINT B OPS POLICE COMMUNICATION L Print LPrint For the Year YY$ Lprint Lprint SN TAB(3) Oddwnxwa Tab(31) Jan Tab(39) Feb Lprint Tab (47) Mar Col 8 = 26 For I = 1 To 3 Col 8 = Col 8 + 4 Lprint Tab (Col 8) M Col 8 = Col 8 + 4 Lprint Tab (Col 8) F Next I Do While Not EOF (1) For I = 1 To 9 Input 1, M$ (I) Next I Lprint M$ (2) Tab(3) M$(3) Col 8 = 26 Total = 0 For I = 4 To 8 Step 2 Col 8 = Col 8 + 4 LPrint Tab (Col 8) M$ (I + 1) Total = Total + Val (M$ (I)) + Val (M$ (I + 1)) Next I L Print Tab (60) Total Loop End ifClose 1 YY$ = Input $ (1) End Sub hitman GET KEY Loc ate 24, 10 Print military press Any Key To Continue Do A$ = INKEY$ Loop Until A$ END gun for hire FORCE COMMUNICATION STATE COMMUNICATION DIVISIONAL COMMUNICATION Cls Screen 9,0,0 intensity 3 Finish $ = N Dowhile finish $ = N For J = 1 To 24 Locate J, 1 For I = 1 To 80 Print Chr $ (178) Next I Next J Locate R + 1, C? Main Menu Locate R + 2, C? 1. Record Input Locate R + 3, C? 2. File Maintenance Locate R + 4, C? 3. Report generation and Printing Locate R + 5, C? 4. Statistical PresentationLocate R + 6, C? 5. Exit MYCHOICE = 0 DO WHILE MYCHOICE 1 OR MYCHOICE 5 LOCATE R + 10, CINPUT YOUR CHOICE amuse (1-5) MYCHOICE LOOP IF SELECT CRIME MYCHOICE CRIME 1 CRIME 2 CRIME 3 CRIME 4 CRIME 5 Finish $ = Y End selected Locate 24, 10 Print Press Any key To Continue Do A $ = In keys Loop until A$ END SUB EXIT CRIME 1 SUB REC INPUT ASSIGNMENT cuff IF PRINT = KEY Murder Suicide Wounding Assault Kidnapping Rape Armed Robbery Stealing Burglary Arson Narcotics avocation Offeence House Breaking Store Breaking Miscellaneous STOP CRIME2 SUB FILEMAIN ASSIGNMENT BOX IF MAIN = y DISPLAY RECORD DELETE RECORD REMOVE DELETE RECORD EDIT RECORD EDIT RECORD EXIT STOP CRIME 3 SUB REPORT GN ASSIGNMENT BOX IF MAIN T$ = y Generate Monthly Report EXIT Generate Annual Report Generate Fore Cast Report Print Monthly Report Print Annual Report Print Annual Report IF EN =3 FEB MAR APR whitethorn JUN JUL CRIME 4 SUB ANNUALST INPUT DIV EN IF EN =2 IF EN =1 JAN JAN FEB FEB MAR MART APR APR MAY MAY JUN JUN JUL JUL AUG AUG AUG SEP SEP SEP JAN STOP OCT OCT OCT NOV NOV NOV DEC DEC DEC STOP STOP

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.