Saturday, January 11, 2020
Design and Implementation of a Network Based Security Information System
DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM TABLE OF CONTENTS Cover page Title page Certification Dedication Acknowledgement Abstract Table of contents 1. INTRODUCTION 1. 1Security information 2. Objectives 3. Justification CHAPTER TWO 2. Security concept 2. 1Definition of security 2. Security threats 3. Security & Information CHAPTER THREE 3. Description of the exiting security information system 3. 1Organizational structure 2. Fact finding method 3. Objective of the existing system 4. Programs of the existing system 5. Equipment of the existing system 6. Forms CHAPTER FOUR 4.Design of the network-based security information system 4. 1Method of data collection 2. System design ââ¬â input, processing, output, information storage and retrieval CHAPTER FIVE 5. Implementation of the new system 5. 1Choice of programming language 2. Program flowchart of security record system CHAPTER SIX 6. Output interpretation CHAPTER SEVEN 7. Conclusion 7. 1Recommendati on ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system.It also airs the different machines used in information processing system to reduce the much-engaged manual efforts. The system design is also introduced where cone is taken in the planning system, which is very close to the manually processed method, but with serious optimization. The proposed system is a network based expert system. All the work in the system will at the end achieve: -Data security -Handling of files -Speedy collection of information for security analysis -Storage of information for subsequent usage. ââ¬â A forecast for the future security A dependable standard for decision taking on security matters as well as planning and control measures. -Existing equipment for security information listed and known. CHAPTER ONE 1. INTRODUCTION Law enforcement administrations, Justice systems, legislators and the government functionaries often need information to efficiently disseminate and fulfill their official responsibilities of ensuring maximum security for their subjects. To achieve this, a system of information technology network is needed to aid the management in decision taking about the security of lives and properties.In this work ââ¬Å"DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEMâ⬠I will take a case study of ââ¬Å"Bââ¬â¢ OPS COMMUNICATION OF POLICE SHQ ENUGUâ⬠as an existing information network system in the police and analyze their process of data collection and hence design a new system which will enhance the output. 1. 1OBJECTIVE OF THE STUDY The objective of this program is strictly for the production of a reliable system of nation wide crime statistical information from all works and craning for administrative and operational use of th e executive and law enforcement management system.Another objective of this work is to make an improvement in the existing data security system. To create a way of speedy data collections for security analysis. For a network of information technology for security purpose and create a standard management information system forecasting for security together with good decision taking, planning and control programs. 2. JUSTIFICATION The process of executing the task of information management has been manually executed; quite unfortunately manual procedure reduces the output quality and consumed time.This work will examine a new system where th3e much needed human efforts are replaced with machines to achieve fast collection of data and easy processing to obtain healthy outputs. Also the need for information and data in the knowledge base doest not only answer to the problem of information over load but also helps in a state of crime statistics request, wherefore the computerization of s ome of this areas is very necessary because its importance in making crime investigators imbibe new and modernized methods and create public awareness of the society security policy. CHAPTER TWO LITERATURE REVIEW . SECURITY CONCEPT Security is defined in many ways due to the many contexts of its existence. In other words, security generally has to do with protection. It might be protection from undue access. Some attributes security to safe guiding from that, which may or may not lead to destruction. It might also be interesting to understand that security has to do with protection of the environment. It also has to do with valuables; this means that anything has to be secured must have value. Things of less importance to humanity and therefore anything that pose threat to life must also be prevented.Security is a very important issue in any organizations (system), no wonder VINCENT . E. ASOR in his seminar presentation at the Nigerian computer societyââ¬â¢s conference of 2002 st ated that an organization with 98 percent security is actually 100 percent insecure. This means that adequate security must be in place for a smooth running of an organizational affair or a system. The police, who is the case study organization here defined security in the police training manual as the protection of lives and property coupled with the maintenance of law and order in a society. 2. 1SECURITY THREATSThey are criminal acts, which have a particular harmful effects on peoples lives and property and do more than interfere with merely private rights. They are simply crimes, Now the above brings us to the crime concept. What is crime? According to the BLACKSTONE, crime is violation of public rights and duties due to the whole community considered as a community. Williams defined crime as acts that is capable of being followed by a criminal proceedings having one of the types of outcome ââ¬â Punishments. Also Hulsburyââ¬â¢s Law (adopted by the House of Lordââ¬â¢s in Board of Trade V.Ower 1957 as correct) defined crime as an unlawful act or default which is an offence against the public and render the person guilty of the act liable to legal punishment. The summary of the above crime definitions by the police manual defined crime as an unlawful act committed by a person or a group of persons. 2. CHARACTERISTICS OF SECURITY THREATS They are wrong doings which Judges have held, or the parliament has from time to time laid down which are sufficiently injurious to the public to warrant the application of a criminal procedure to deal with them, of course this does not enable us to recognize an act as a crime when we see one.Some acts are obviously harmful to the public that anyone would say they should be criminal and such acts almost certainly are, but there are many others about which opinions may differ widely. According to SIR CARLETON ALLEN, crime is crime because it consists of wrongdoings which directly and in serious degree threatens the sec urity or well being of the society. This explains why acts have to be made crimes either by judicial decisions or by legislation. A crime may remain a crime long after it has ceased to be a threat to the security or well being of the society.This ALLENââ¬â¢S proposition tells us what (as he thinks) ought to be crime rather than what is crime. The public nature of crimes is evidenced by the contrast between the rulers of civil and criminal procedure. Any citizen can, as a general rule and in the absence of some provision to the contrary bring a criminal prosecution, whether or not he has suffered any special harm over and above other members of the public. As a member of the public he has an interest in the enforcement of the criminal law. 3. CLASSFICATION OF CRIMESThere is a problem that exist in the crime reporting system in Nigeria and especially the Bââ¬â¢OPS COMMUNICATION OF THE POLICY, ENUGU STATE BRANCH in particular. This arises in the variations in definition of crimes among localities. This obstacle, as far as uniformity in definitions is concerned was removed by the adoption of a standard set of crime classification generally connotes its content. However in reading the explanation of each category, it is very important to keep in mind that because of the differences between the state codes, there is no possibility in a system such as ââ¬Ëfelonyââ¬â¢ and ââ¬Ëmisdemeanorââ¬â¢.Crime classifications are in three categories. Viz crime against persons, crimes against property and crime of violence or crime against local acts. Crime against persons include: -Murder and non-negligent manslaughter -Aggravates assault forcible rape -Forcible rape -Robbery Crime against property includes: -Burglary -Arson -Stealing -Forgery and counterfeiting -Vandalism Crimes against local acts include; -Narcotic -Illegal possession, carrying of weapons -Prostitution and commercialized vice. 4. SECURITY AND INFORMATIONThere is no known security system that w orks without an information technology system. In fact security of a given society is to a high degree determined by the amount of information technology on ground. Thus it might interest one the to know that security are of differing contexts. An information system for a bankers dealing via an automatic teller machine differs from a network based information system for collecting, collating and analyzing statistical data for management use. There is also a system of inbuilt detectors in doors on entries to check explosives and metals.There is also a camera system on focus connected to a visual display unit for monitoring activities especially in banking halls and supermarkets. Hence information technology has a vital role to play in the task of ensuring maximum security. This work is based on an network based information system for collecting and collating as well as analyzing crime for the use of management at all levels of an organization in their task of decision taking, plannin g and control strategies based on security. CHAPTER THREE . DESCRIPTION OF THE EXISTING SYSTEM The existing system has been an almost manually operated system due to lack of sophisticated data processing machines that will by its efficiency replace the much engaged manual system in crime data analysis. The Bââ¬â¢OPS COMMUNICATION of the Nigerian Police, Enugu State Branch, which is my case study organisation is changed with the responsibility of information management, processing and analysis. They are fond of information dissemination and collection of crime data.This crime information is being communicated to the police Administrations at all levels in all functions to enable them in their timely decision taking about the security of their jurisdictions for which they are responsible. EQUIPMENT:Irrespective of the lack of modern machines like computers, the Bââ¬â¢OPS COMMUNITCATION SHQ ENUGU operates with some equipments and gates which includes -carrier wave radio sets (use d in receiving wireless telegraphy information). -Walkie talkies (used for timely interaction with men on duty). -Fax machines (for receiving documented information) Repeater set (enhances the reception of Transmitted messages) -Repeater station (enhances the signal strength of information at various stations) -Stand by Generator (used in cases of power failure) -Integration systems (for connecting different communication networks) FORMS:The organization makes use of three traditional forms for differing purpose. The form include the following: -Message form B1- Used for the reception and transmission of information. This is done manually by writing or talking with the recipient on the set. Signal register form B2 ââ¬â This is the form used to register the particulars of all information received such that an observer can at one glance read the information. -Wireless operators LDG form B3 ââ¬â This is a form used to write down events that took place at course of operation suc h as power outrage, atmospheric interference, Rainfall, thunders storm, generator braked down etc. that might interfere in operation. NATURE OF INFORMATION: Bââ¬â¢OPS COMMUNICATION offices are situated at all police stations and jurisdictions with a divisional control link as data base management in SHQ Enugu known to them as control.The divisions are expected to constantly collect crime data around their jurisdiction and transmit some individually to the control who forms a statistical update of the information should be based on weekly, monthly and fairly bases as demanded by the administrators for security actions. 3. 1FACT FINDING METHOD The fact finding methods here can be classified into internal and external sources of data collection. -The internal source: This involves the use of information as recorded in the crime diary at police stations under different headings according to the crime distinctions within the specified period under investigation.Another source of inter nal information is the signal register-form B2. -The external source: This involves the use information facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They mostly in this case communicate on events that need immediate intervention. Due to the fact that these events are legged down at each interval, the wireless operators log-form B3 is used as a medium whereby crime data can be collected. 2. ORGANISATIONAL STRUCTURE The Nigerian police force is an organization known to exhibit hierarchy.For the above reason the Bââ¬â¢OPS COMMUNICATION also fellowââ¬â¢s suit. The information flow is in a vertical dimension though there is horizontal flow at the operational levels. Information flow chart 3. THE INPUT, OUTPUT AND THE PROCESSING SYSTEM The process of executing this daily task of information dissemination and analysis though has some tools of automation is still lacking the basi c information technology (computer system) that will reduce or eliminate the much engaged manual system. The input method, which involves much writing, the processing which is also manual has to be automated. Examine the analysis in the diagram Below: . PROBLEMS OF THE EXISTING SYSTEM There has not been enough information technology that will replace the much-engaged manual effort such as in the input and processing systems. There is no dependable storage system for information. Infor-tech facilities that can be used to store information and retrieve them when needed is necessary to be introduced in other to achieve the needed security of information. The process of dispatching the received information in the Bââ¬â¢OPS COMMUNICATION, POLICE SHQ, ENUGU is purely manual thus this amounts to delay of information especially in cases of emergency.There is need to put adequate information technology in place to enhance the dispatch of this needed information and as well reduce human en gagement in this task. Mist of the wireless operators managing this information network are not properly trained especially in the area of operating modern information technology, therefore there is the need that expend in information management be trained properly in handling these modern tools. Barely all the formââ¬â¢s used in the existing system are traditional, there is the need to introduce the use of imaged form to enhance security of information and automation. . JUSTIFICATION OF THE NEW SYSTEM The new system to be introduced in this work will eliminate or reduce the much engaged manual effort, introduce the use of experts is the use of information technology, replace the use of old fashioned tools on use with modern information technology tools and crown it all the system will achieve. 1. Data security 2. Handling of files for easy assessment 3. Reduce of eliminate error of computation 4. Speedy collection of information for security analysis 5. Prompt supply of informat ion for use in timely decision taking hby the managers 6.Information storage for subsequent use. 7. Easy dispatch system 8. Forecast for security planning. CHAPTER FOUR 4. DESIGN OF THE NETWORK BASED SECURITY INFORMATION SYSTEM. SYSTEM DESIGN AND DEVELOPMENT The whole system involves the application of the system approach to problem solving with computers. The ingredients and materials are system elements, processes and information technology network. It is actually a customized approach to the use of computers for data analysis, automation and information management.This is reduction of the entire system by studying the various operations performed and their relationships within the system and examination of a business activity with a view to identifying problem areas and recommending alternative solutions. Also, for security of critical facts and restrictions, the system operation can best be operated in an INTRANET environment. 4. 1METHODS OF DATA COLLECTION The fact-finding meth od here should be a situation whereby the information technology is engaged (ie computer), such that data can be Rayed in directly into the system. The forms in this case should be imaged forms and not usual traditional forms.The aggregate data collected and stored can and the different programs of computer. The network system is aimed at establishing information links between the various angles. 2. SYSTEM DESIGN Having studied and analyzed the manual processing operated by the Bââ¬â¢ OPS CMMUNICATION of the Enugu State Police and the way it has been done; the proposed system design therefore enables one to achieve efficiency and effectiveness. In the system design, care is taken in the planning system very close to the manually processed method, but with serious optimization and automation.The proposed system is a computer based expert system. The system shall make use of expertise that has been gathered from skilled human resources about data management and information processi ng. All the work in the system will at the and achieve: Data security Handling of files or from. (the whole problem of missing file and statistics will be eliminated among the security circle). Reduce or Elimination the problems of computational error. Speedy collection of information Storage of information for subsequent or timely usage.Generally, the proposed system will help in the input, processing and output of information coupled with the storage which will be too cumbersome for individuals to handle in the manual system. During the process various crime facts will be collected within Enugu State as a jurisdiction under study. The data collected can be reported on daily, weekly , monthly or fairly bases as the case may be. The major crimes that were analyzed include: Armed robbery, murder, Burglary, House breaking, stealing, Kidnapping, child stealing, Arson, Rape and miscellaneous offence.The data collected will be arranged in a form to distinguish adult from juvenile crime s tatistics. 1. INPUT This system designed will create a situation where data will be keyed in directly into the computer the keyboard for immediate processing or storage. This expected to be carried out by a skilled expert in information technology management. 2. PROCESSING In this system the processing of data in order to achieve a pre-defined goal (information) is carried out electronically through some define instructions at a very fast pace (rate) with information technology tools (computes) which help; to improve efficiency and automation. . OUTPUT After actual processing is over the required information or output is generated and accessed by the user for importance. Thus an information is never confirmed until it is able to meet the need of the management which includes urgency, confidentiality and decision taking about the activities (here security) for which the activities are responsible. 4. INFORMATION STORAGE AND RETRIEVAL The computer network system have the advantage of providing a suitable information storage and retrieval system requiring data to be structured, tored and retrieved in a memory that suits the kind of data and information needs of the users at all the levels. CHAPTER FIVE IMPLEMENTATION OF THE NEW SYSTEM CHOICE OF PROGRAMMEING LANGUAGE Among the existing high level and low-level programming languages, I choose QBASIC programming language considering a lot of factors and features in the structure of my work. First, I observed that QBASIC consist of features that will help the writer achieve the logistic needs of the project work in terms of access methods such as the RANDOM ACCESS of some parts of the work and the SEQUENTIAL ACCESS of some other parts of the programs.CHAPTER SIX OUTPUT INTERPRETATION This program is purely more of an interactive system. It consists of the main program which houses a lot of subprograms of several analysis. Before the min menu, is a software restriction called PASSWORD which must be obeyed before acces s to the main menu form the main menu is provided multiple options of the sub menus which now ask a series of question as the case may b. in the main menu, there are four sub-menus of four major modules, THE RECORD INPUT MODULE, FILE MAINTENANCE MODULE, REPORT GENERATION MODULES AND GRAPHICAL PRESENTATION MODULE THEN THE EXIT.The REPORT GENERATION module comprises of five sub menu called monthly reports and monthly statistics, annual report, annual statistics from the entire jurisdiction and a forecast report. This module gives the monthly and annual state of crimes from the various divisions for use. The forecast report is projected as a result of the report generation. The FILE MAINTENANCE module takes care of the necessary treatment and enhancement of the files in the program. It houses a lot of submenus for the operation. Also, in the program a provision and/or module is created to check and access the present state of the work.CONCLUSION This work is carefully researched and pr epared for the citizens who are interested in the general security picture of Enugu State, Nigeria. The volume trend and rate of crime related to current population is quite amazing. The crime index offence are grouped into three major categories and were extensively discussed to better describe the nature of these security threats. The objective of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security situation of the state.An example of the use of crime statistics the baring of the high capacity motorcycle use within Enugu state in early 2004, this is following the high rate of Armed robbery perpetrated with such high capacity bikes. The work will also help to forecast the nature, trend and distribution of crime wave in the state thereby enabling the people concerned to reinforce for the combat. CHAPTER SEVEN RECOMMENDATION Based on the findings and relevance of this work t o the society. I simply and concisely made drawing from my own exceptional experience and the information obtained from the Bââ¬â¢ OPS COMMUNICATION of Enugu State Police during the system study.The fruit and importance of this work is not valid for members of police force or the Administrations, but will prove to be a source of information and guidance to researchers with scientific or legal aspects of the foresenic work. The state Bââ¬â¢ OPS COMMUNICATION should try to be computerized so that all their facts and data collection should be network based for adequate interactions, efficiency and stability. PROGRAM FLOWCHART OF CRIME RECORD SYSTEM PROGRAMMING Cls Finish $ = ââ¬Å"Nâ⬠Do while finish $ =â⬠Nâ⬠For J = 1 To 24 Locate J, I For I = 1 To 80 Print CHR $ (178): Next I Next J R = S : C = 20 For I = 1 To 31 Print CHR $ (219) Next IFor I = 0 To 8 Locate R + I, C-I : Print CHR $ (219) Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print â⠬Å"***â⬠Locate R + 3, C: Print ââ¬Å"1, Record Input ***â⬠Locate R + 4, C: Print ââ¬Å"2, File Maintenance ***â⬠Locate R + 5, C: Print ââ¬Å"3, Report Generation & Printingâ⬠Locate R + 6, C: Print ââ¬Å"4, Statistical Presentationâ⬠Locate R + 7, C: Print ââ¬Å"5, Exit â⬠Mychoice = 0 Do while mychoice < 1 or Mychoice > 5 Locate R + 10, C: Input ââ¬Å"Your Choice Please (1-5):â⬠, Mychoice Loop Select Crime Mychoice Crime 1 Call Recinput Crime 2 Call Filemain Crime 3 Call Reportgn Crime 5 Finish $ = ââ¬Å"ENâ⬠End selectLoop Locate J, I For I = 1 To 80 Print CHR $ (178); Next I Next J R = 5 : C = 20 Locate R,C For I = 1 To 31 Print CHR $ (219); Next I For I = 0 To 10 Locate R + I, C-I : Print CHR $ (219); Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print ââ¬Å"*Report Generation*â⬠Locate R + 3, C: Print ââ¬Å"1, Generate Monthly Reportâ⬠Locate R + 4, C: Print ââ¬Å"2, Generate Annual Reportâ⬠L ocate R + 5, C: Print ââ¬Å"3, Generate forecast Reportâ⬠Locate R + 6, C: Print ââ¬Å"4, Print Monthly Reportâ⬠Locate R + 7, C: Print ââ¬Å"5. Print Annual Reportâ⬠Locate R + 8, C: Print ââ¬Å"6. Print Forecast Reportâ⬠Locate R + 9, C: Print ââ¬Å"7. Exit â⬠The Choice = 0 Do while the choice < 1 or the choice > 7 Locate R + 10, C: Input ââ¬Å"Your Choice Please (1-7)â⬠, the choice Loop Select Crime the choice Crime 1 Call Monthsta Crime 2 Call Annualst Crime 3 Call Forecast Crime 4 Call MonthRpt Crime 6 Call Forecarp Crime 7 Finished $ = ââ¬Å"ENâ⬠End select Loop End Sub Sub Annual RP ââ¬ËAnnual RP. BAS ââ¬Ë Annual Statistics Printing Program Dum M $ (28) Cls Open ââ¬Å"Iâ⬠, $ 1, ââ¬Å"Annualst. FILâ⬠Input $ 1, EN$ Close $ 1 Do Locate 10, 10: Input ââ¬Å"Output To Screen or Printer (P or S):â⬠;K$ K$ = U Crime$ (K$) Loop Until K$ = ââ¬Å"Pâ⬠or K$ = ââ¬Å"Sâ⬠Cls Open ââ¬Å"Iâ⬠, $ 1, ââ¬Å"Annu alst. FILâ⬠If K$ = ââ¬Å"Sâ⬠ThenPrint ââ¬Å"Bâ⬠OPS Police Communicationâ⬠Print ââ¬Å"Annual Crime Statistics Reportâ⬠Print: Print ââ¬Å"For The Year;â⬠: EN$ Locate 5, 1 : Print ââ¬Å"SNâ⬠Locate 5, 3 : Print ââ¬Å"Offencesâ⬠Locate 5, 32 : Print ââ¬Å"Janâ⬠Locate 5, 44 : Print ââ¬Å"Febâ⬠Locate 5, 56 : Print ââ¬Å"Marâ⬠Locate 5, 68 : Print ââ¬Å"Aprâ⬠Locate 6, 30 : Print ââ¬Å"Mâ⬠Locate 6, 36 : Print ââ¬Å"Fâ⬠Locate 6, 42 : Print ââ¬Å"Mâ⬠Locate 6, 48 : Print ââ¬Å"Fâ⬠Locate 6, 54 : Print ââ¬Å"Mâ⬠Locate 6, 60 : Print ââ¬Å"Fâ⬠Locate 6, 66 : Print ââ¬Å"Mâ⬠Locate 6, 72 : Print ââ¬Å"Fâ⬠R = 7 : I = 1 Do while not EOF (I) Input N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 Input N1, M7, M8, M9, M10, M11, M12, M13, M14 Input #1, M15, M16, M17, M18, M19, M20, M21, M22Input #1, M23, M24, T Locate (R 8 + I), 1: Print C$ : Locate (R 8 + I), 3: Print F$ Locate (R 8 + I), 30 : Print M1 : Locate (R 8 + I), 36 : Print M2 Locate (R 8 + I), 42 : Print M3 : Locate (R 8 + I), 48 : Print M4 Locate (R 8 + I), 54 : Print M5 : Locate (R 8 + I), 60 : Print M6 Locate (R 8 + I), 66 : Print M7 : Locate (R 8 + I), 72 : Print M8 I = I + 1 Loop Close #1 Call Get Key Locate 5, 32 : Print ââ¬Å"Mayâ⬠Locate 5, 44 : Print ââ¬Å"Junâ⬠Locate 5, 56 : Print ââ¬Å"Julâ⬠Locate 5, 68 : Print ââ¬Å"Augâ⬠R8 = 7 : I = 1 OPEN ââ¬Å"Iâ⬠, #1, ââ¬Å"ANNUALST . FILâ⬠Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7Input #1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 Input #1, M18, M19, M20, M21, M22, M23, M24, T Locate (R 8 + I), 30 : Print M9 : Locate (R 8 + I) 36 : Print M10 Locate (R 8 + I), 42 : Print M11 : Locate (R 8 + I), 48 : Print M12 Locate (R 8 + I), 54 : Print M13 : Locate (R 8 + I) 60 : Print M14 Locate (R 8 + I), 66 : Print M15 : Locate (R 8 + I) 72 : Print M16 I = J + 1 Loop Close #1 Call Get Key L ocate 5, 32 : Print ââ¬Å"Sepâ⬠Locate 5, 44 : Print ââ¬Å"Octâ⬠Locate 5, 56 : Print ââ¬Å"Novâ⬠Locate 5, 68 : Print ââ¬Å"Decâ⬠R8 = 7 : I = 1 OPEN ââ¬Å"Iâ⬠, #1, ââ¬Å"ANNUALST . FILâ⬠Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6Input #1, M7,M8, M9, M10, M11, M12, M13, M14, M15 Input #1, M16, M17, M18, M19, M20, M21, M22, M23, Input #1, M24, T I = I + 1 Loop Close #1 Call Get Key Locate 5, 30 : Print ââ¬Å"Totalâ⬠R8 = 7 : I = 1 OPEN ââ¬Å"Iâ⬠, #1, ââ¬Å"ANNUALST . FILâ⬠Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5 Input #1, M6, M7,M8, M9, M10, M11, M12, M13 Input #1, M14, M15, M16, M17, M18, M19, M20, M21 Input #1, M22, M23, M24, T Locate (R8 + I), 30 : Print T I = I + 1 Loop Close # 1 CALL GETKEY ELSE L Print ââ¬Å"Bââ¬â¢ OPS Police Communicationâ⬠L Print ââ¬Å"Annual Crime Statistics Reportâ⬠L Print : L Print ââ¬Å"For Each Divisionâ⬠EN$ L PrintL Print ââ¬Å" SNâ⬠: Tab (3); ââ¬Å"Offencesâ⬠; Tab(31); ââ¬Å"Janâ⬠; Tab (39); ââ¬Å"Febâ⬠L Print Tab (47); ââ¬Å"Marâ⬠; Tab (55); ââ¬Å"Aprâ⬠; Tab (63); ââ¬Å"Mayâ⬠; L Print Tab (71); ââ¬Å"Junâ⬠; Tab (79); ââ¬Å"Julâ⬠; Tab (87); ââ¬Å"Augâ⬠; L Print Tab (95); ââ¬Å"Sepâ⬠; Tab (103); ââ¬Å"Octâ⬠; Tab (111); ââ¬Å"Novâ⬠; L Print Tab (119); ââ¬Å"Decâ⬠; Tab (127); ââ¬Å"Totalâ⬠Col 8 = 26 For I = 1 To 12 Col 8 = Col 8 + 4 L Print Tab (Col 8); ââ¬Å"Mâ⬠; Col 8 = Col 8 + 4 L Print Tab (Col 8); ââ¬Å"Fâ⬠; Next I Do While Not EOF (1) Cls OPEN ââ¬Å"Iâ⬠, #1, ââ¬Å"ANNUALST. FILâ⬠Input #1, Y$ YY$ = STR$ (Val (Y$) + 1) OPEN ââ¬Å"Oâ⬠, #2, ââ¬Å"FORECAST. FILâ⬠OPEN ââ¬Å"Iâ⬠, #1, ââ¬Å"ANNUALST. FILâ⬠Do While Not EOF (1) Input #1, Y$, C$, F4, M(1), F(1), M(2), F(2), M(3), F(3)Input #1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) Input #1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), Input #1, M(12), F(12), Total My = O : SM2 = 0 : Sm3 =0: Sm4 = 0: Smy = 0: M2y = 0 Fy = O : Sf = 0 Sf2 = : Sf3 = 0: SF4 = : Sfy = 0 : F2y = 0 For I = 1 To 12 Sm = Sm + I : Sf = Sf + 1 My = My + m (I) : Fy = Fy + F (I) Sm2 = Sm2 + I ^ 2 : Sf2 = Sf2 + I ^ 2 Sm3 = Sm3 + I ^ 3 : Sf3 = Sf3 + I ^ 3 Sm4 = Sm4 + I ^ 4 : Sf4 = Sf4 + I ^ 4 Smy = Smy + I * m (I) : Sfy + I * F (I) M2y = M2y + I ^ 2 * M(I) : F2y = F2y + I ^ 2 * F (I) Next I ââ¬Ë Store Values For Males In The A ââ¬â Array Ready ââ¬Ë For Gaussian EliminationA (1, 1) = 12 : A (1, 2) = Sm2 : A (1, 23) = Sm2 : B (1) = My A (2, 1) = Sm : A (2, 2) = Sm2 : A (2, 3) = Sm3 : B(2) = Smy A(3, 1) = Sm2 : A (3, 2) = Sm3 : A (3, 3) = Sm4 : B(3) = M2y Call Gauss (x1, x2, X3) ââ¬Ë Estimate the figures for males for the ââ¬Ënext three months Fm1 = X1, + X2 * 13 + X3 * 13 ^ 2 Fm2 = X1 + X2 * 14 + X3 * 14 ^ 2 Fm3 = X1 + X2 * 15 + X3 * 15 ^ 2 ââ¬ËStore values for females in the A? Array ââ¬ËReady for gaussian elim ination A (1, 1) = 12 : A(1, 2) = Sf : AC1, 3) = Sf2 : B(1) = Fy A(2,1 ) = Sf : A (2, 2) = Sf2 : A (2, 3) = Sf3 : B (2) = Sfy A (3, 1) = Sf2 : A (3, 2) = Sf3 : A (3, 3) = Sf4 : B(3) = F2y Call Guass (x1, X2, x3) Estimate the figures for females for the next ââ¬ËThree months Ff1 = x1 + x2 * 13 + x3 * 13 ^ 2 Ff2 = x1 + x2 * 14 + x3 * 14 ^ 2 Ff3 = x1 + x2 * 15 + x3 * 15 ^ 2 Print # 2, YY$, ââ¬Å" â⬠; C$; ââ¬Å" â⬠; F$; ââ¬Å" â⬠; Fm1; ââ¬Å" â⬠; FF1 Print # 2, Fm2; FF2 T Loop Close # 1 End Sub Sub Forecarp ââ¬ËForecarp . Bas ââ¬ËForecast Figure Printing Program Dm M$ (9) Cls Open ââ¬Å"1â⬠, # 1, ââ¬Å"Forecast . Filâ⬠`Input # 1, YY$ Close #1 Do Locate 10, 10 : Input ââ¬Å"Output to Screen (P or S) : ââ¬Å" ; K$ K$ = U Crime $ (K$) Loop Until K$ = ââ¬Å"Pâ⬠Or K$ = ââ¬Å"Sâ⬠Cls Open ââ¬Å"1â⬠, #1, ââ¬Å"Forecast. Fillâ⬠If K$ = ââ¬ËSâ⬠Then Print ââ¬Å"Bââ¬â¢ OPS Police Communicationâ⬠Print : P rint ââ¬Å"For The Year : YY$Locate 5, 1 : Print ââ¬Å"SNâ⬠Locate 5, 3 : Print ââ¬Å"Offencesâ⬠Locate 5, 32 : Print ââ¬Å" Janâ⬠Locate 5, 44 : Print ââ¬Å" Febâ⬠Locate 5, 56 : Print ââ¬Å"Marâ⬠Locate 6, 30 : Print ââ¬Å"Mâ⬠Locate 6, 36 : Print ââ¬Å"Fâ⬠Locate 6, 42 : Print ââ¬Å"Mâ⬠Locate 6, 48 : Print ââ¬Å"Fâ⬠Locate 6, 54 : Print ââ¬Å"Mâ⬠Locate 6, 60 : Print ââ¬Å"Fâ⬠R8 = 7 : I = 1 Do while not EOF (1) Input #1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 Locate (R8 + I), 1 : Print C$ : Locate (R8 + I), 3 : Print F$ Locate (R8 + I), 30 : Print M1 : Locate (R8 + I) 36 : Print M2 Locate (R8 + I), 42 : Print M3 : Locate (R8 + I) 48 : Print M4 Locate (R8 + I), 54 : Print M5 : Locate (R8 + I) 60 : Print M6 I = I + 1Loop Close #1 Else L PRINT ââ¬Å"Bââ¬â¢ OPS POLICE COMMUNICATIONâ⬠L Print : LPrint ââ¬Å"For the Year : ââ¬Å"; YY$ Lprint Lprint ââ¬Å"SNâ⬠; TAB(3); ââ¬Å"Oddwnxwaâ⬠; Tab(31); â⠬Å"Janâ⬠; Tab(39); ââ¬Å"Febâ⬠Lprint Tab (47); ââ¬Å"Marâ⬠Col 8 = 26 For I = 1 To 3 Col 8 = Col 8 + 4 Lprint Tab (Col 8); ââ¬Å"Mâ⬠; Col 8 = Col 8 + 4 Lprint Tab (Col 8); ââ¬Å"Fâ⬠; Next I Do While Not EOF (1) For I = 1 To 9 Input #1, M$ (I) Next I Lprint M$ (2); Tab(3); M$(3); Col 8 = 26 Total = 0 For I = 4 To 8 Step 2 Col 8 = Col 8 + 4 LPrint Tab (Col 8); M$ (I + 1); Total = Total + Val (M$ (I)) + Val (M$ (I + 1)) Next I L Print Tab (60) : Total Loop End ifClose #1 YY$ = Input $ (1) End Sub SUB GET KEY Locate 24, 10 : Print ââ¬Å"Press Any Key To Continueâ⬠Do A$ = INKEY$ Loop Until A$ < > ââ¬Å" â⬠END SUB ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â FORCE COMMUNICATION STATE COMMUNICATION DIVISIONAL COMMUNICATION Cls Screen 9,0,0 color 3 Finish $ = ââ¬Å"Nâ⬠Dowhile finish $ = ââ¬Å"Nâ⬠For J = 1 To 24 Locate J, 1 For I = 1 To 80 Print Chr $ (178) Next I: Next J Locate R + 1, C:? ââ¬Å"Main Menuâ⬠Locate R + 2, C:? ââ¬Å"1. Record Inputâ⬠Locate R + 3, C:? ââ¬Å"2. File Maintenanceâ⬠Locate R + 4, C:? ââ¬Å"3. Report generation and Printingâ⬠Locate R + 5, C:? ââ¬Å"4. Statistical Presentationâ⬠Locate R + 6, C:? ââ¬Å"5. Exitâ⬠MYCHOICE = 0 DO WHILE MYCHOICE < 1 OR MYCHOICE > 5 LOCATE R + 10, C:INPUT ââ¬Å"YOUR CHOICE PLEASE (1-5):â⬠MYCHOICE LOOP IF SELECT CRIME MYCHOICE CRIME 1 CRIME 2 CRIME 3 CRIME 4 CRIME 5 Finish $ = ââ¬Å"Yâ⬠End selected Locate 24, 10 Print ââ¬Å"Press Any key Toâ⬠ââ¬Å"Continueâ⬠Do A $ = In keys Loop until A$ ââ¬Å" ââ¬Å" END SUB EXIT CRIME 1 SUB REC INPUT ASSIGNMENT BOX IF PRINT = ââ¬Å"KEYâ⬠ââ¬Å"Murderâ⬠ââ¬Å"Suicideâ⬠ââ¬Å"Woundingâ⬠ââ¬Å"Assaultâ⬠ââ¬Å"Kidnappingâ⬠ââ¬Å"Rapeâ⬠ââ¬Å"Armed Robberyâ⬠ââ¬Å"Stealingâ⬠ââ¬Å"Burglaryâ⬠ââ¬Å"Arsonâ⬠ââ¬Å"Narcoticsâ⬠ââ¬Å"Traffic Offeenceâ⬠House Breaking â â¬Å"Store Breakingâ⬠Miscellaneousâ⬠STOP CRIME2 SUB FILEMAIN ASSIGNMENT BOX IF MAIN = ââ¬Å"yâ⬠DISPLAY RECORD DELETE RECORD REMOVE DELETE RECORD EDIT RECORD EDIT RECORD EXIT STOP CRIME 3 SUB REPORT GN ASSIGNMENT BOX IF MAIN T$ = ââ¬Å"yâ⬠Generate Monthly Report EXIT Generate Annual Report Generate Fore Cast Report Print Monthly Report Print Annual Report Print Annual Report IF EN =3 FEB MAR APR MAY JUN JUL CRIME 4 SUB ANNUALST INPUT ââ¬Å"DIVâ⬠; EN IF EN =2 IF EN =1 JAN JAN FEB FEB MAR MART APR APR MAY MAY JUN JUN JUL JUL AUG AUG AUG SEP SEP SEP JAN STOP OCT OCT OCT NOV NOV NOV DEC DEC DEC STOP STOP
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.