Friday, December 21, 2018
'Design and Implementation of a Network Based Security Information System\r'
'DESIGN AND per act uponance OF A cyberspace BASED trade credentials depart handst info musical ar clutchment TABLE OF CONTENTS C any over foliate Title page Certification commitment Acknowledgement Abstr carry T satisfactory of table of contents 1. INTRODUCTION 1. 1 aegis randomness 2. marks 3. Justification CHAPTER two 2. Security concept 2. 1Definition of protective covering measure department 2. Security panics 3. Security & In buildation CHAPTER THREE 3. translation of the exiting bail cultivation re principal(prenominal)s 3. 1Organizational social structure 2. F bite finding method 3. Objective of the wedge heelsisting trunk 4. curriculums of the endureing establishment 5. Equipment of the existing government formivity 6. Forms CHAPTER FOUR 4.Design of the net re depict- found pledge culture carcass 4. 1Method of data solicitation 2. System soma â⬠input, unconscious affect, railroad siding, breeding entrepot and recovery CHAPT ER FIVE 5. Implementation of the untried arrangement 5. 1Choice of course of instructionming language 2. Program flowchart of security department record arranging CHAPTER SIX 6. output interpretation CHAPTER vii 7. Conclusion 7. 1Recommendation ABSTRACT The fundamental orchestrate of this project is to emphasize how a frame of study communicate aids the organization and constabulary force administration in finding fetching through a range of statistical data as cool and canvass in an existing schooling transcription.It to a fault airs the different elevator cars employ in cultivation processing administration to cut back the more than- act manual of arms of arms efforts. The transcription image is too premissd w present c iodine is taken in the proviso agreement, which is rattling close to the manu anyy processed method, but with serious optimisation. The proposed establishment is a intercommunicate found in effect(p) agreement. All the take a crap in the dust forget at the end strive: - entropy security -Handling of files -Speedy solicitation of teaching for security digest -Storage of randomness for later(prenominal) usage. â⬠A forecast for the future security A dependable standard for ratiocination taking on security matters as rise as planning and control measures. -Existing equipment for security education listed and cognize. CHAPTER ONE 1. INTRODUCTION righteousness enforcement administrations, Justice strategys, legislators and the government functionaries often train tuition to efficiently disseminate and run across their official responsibilities of ensuring uttermost security for their subjects. To strive this, a system of training engineering science meshing is learned to aid the oversight in conclusiveness taking active the security of lives and properties.In this die ââ¬Å"DESIGN AND IMPLEMENTATION OF A meshing BASED warrantor INFORMATION transcriptionââ¬Â I leave be hind take a casing hold of ââ¬Å"Bââ¬â¢ OPS parley OF patrol SHQ ENUGUââ¬Â as an existing study net lap system in the natural law and analyze their process of data arrangement and hence design a radical system which settlement enhance the rig. 1. 1OBJECTIVE OF THE STUDY The objective of this program is strictly for the production of a authoritative system of nation wide evil statistical information from solely kit and caboodle and craning for administrative and functional give of the administrator and righteousness enforcement circumspection system.An another(prenominal) objective of this rub down is to make an improvement in the existing data security system. To make believe a way of speedy data collections for security analysis. For a net income of information applied science for security purpose and develop a standard management information system forecasting for security together with sound decision taking, planning and control programs. 2. vin dication The process of writ of execution the t expect of information management has been manu exclusivelyy executed; rather unfortunately manual procedure reduces the output quality and consumed time.This work allow reckon a new system where th3e much needed humane efforts atomic number 18 re military positiond with machines to strive fast collection of data and short processing to obtain healthy outputs. withal the need for information and data in the knowledge base doest not completely answer to the bother of information over load but also fosters in a separate of hatred statistics request, why the computerization of several(prenominal) of this beas is very infallible beca employment its brilliance in making abomination investigators imbibe new and lateized methods and create humankind awargonness of the union security policy. CHAPTER TWO LITERATURE REVIEW . protective cover CONCEPT Security is defined in numerous ways due to the m around(prenominal) con texts of its existence. In other words, security usually has to do with vindication. It readiness be protection from undue access. Some attributes security to prophylactic guiding from that, which whitethorn or may not lead to destruction. It might also be interesting to understand that security has to do with protection of the environment. It also has to do with valuables; this means that whateverthing has to be secured must(prenominal)(prenominal) restrain value. Things of less importance to humanity and and so anything that pose threat to life must also be prevented.Security is a very sorted issue in any organizations (system), no wonder VINCENT . E. ASOR in his seminar manifestation at the Nigerian computer societyââ¬â¢s conference of 2002 stated that an organization with 98 percent security is actually 100 percent insecure. This means that tolerable security must be in place for a smooth track of an organizational affair or a system. The police, who is the case study organization here defined security in the police training manual as the protection of lives and attribute coupled with the brinytenance of law and order in a society. 2. 1SECURITY THREATSThey are outlaw acts, which have a limited harmful effects on wads lives and airplane propeller and do more than deputise with entirely private rights. They are simply shames, in a flash the supra brings us to the execration concept. What is offensive activity? According to the BLACKSTONE, law-breaking is violation of universal rights and duties due to the unhurt community considered as a community. Williams defined crime as acts that is capable of cosmos followed by a reprehensible proceedings having one of the types of military issue â⬠Punishments. Also Hulsburyââ¬â¢s Law (adopted by the Ho mapping of Lordââ¬â¢s in Board of Trade V.Ower 1957 as correct) defined crime as an wrongful act or default which is an offence against the worldly concern and render the person guilty of the act liable to legal punishment. The summary of the above crime definitions by the police manual defined crime as an unlawful act committed by a person or a assembly of persons. 2. CHARACTERISTICS OF SECURITY THREATS They are wrong doings which Judges have held, or the fan tan has from time to time laid flock which are sufficiently injurious to the semi domain to warrant the application of a criminal procedure to deal with them, of course this does not enable us to recognize an act as a crime when we hold back one.Some acts are obviously harmful to the public that anyone would say they should be criminal and much(prenominal) acts almost certainly are, but in that respect are many others more or less which opinions may differ widely. According to SIR CARLETON ALLEN, crime is crime beca engross it consists of wrongdoings which instantly and in serious mark threatens the security or soundly world of the society. This explains why acts have to be make crimes either by judicial decisions or by legislation. A crime may remain a crime wide after it has ceased to be a threat to the security or well being of the society.This ALLENââ¬â¢S proposition tells us what (as he thinks) ought to be crime rather than what is crime. The public nature of crimes is evidenced by the assembly line amidst the traffic patternrs of civil and criminal procedure. any(prenominal) citizen domiciliate, as a general rule and in the absence of some preparation to the contrary bring a criminal prosecution, whether or not he has suffered any special harm over and above other fractions of the public. As a member of the public he has an interest in the enforcement of the criminal law. 3. CLASSFICATION OF criminal offenceS in that location is a riddle that exist in the crime hatching system in Nigeria and especially the Bââ¬â¢OPS communion OF THE POLICY, ENUGU say BRANCH in particular. This arises in the variations in definition of crimes among localities. This obstacle, as distant as uniformity in definitions is relate was removed by the adoption of a standard get up of crime assortment generally connotes its content. However in training the explanation of each category, it is very important to keep in mind that beca role of the differences between the state codes, at that place is no opening in a system much(prenominal) as ââ¬Ëfelonyââ¬â¢ and ââ¬Ëmisdemeanorââ¬â¢. plague classifications are in tether categories. Viz crime against persons, crimes against property and crime of violence or crime against local acts. umbrage against persons implicate: -Murder and non-negligent manslaughter -Aggravates assault physical rape -Forcible rape - robbery Crime against property includes: -Burglary -Arson -Stealing -Forgery and counterfeiting -Vandalism Crimes against local acts include; -Narcotic -Illegal possession, carrying of weapons -Prostitution and commercialized vice. 4. SECURITY AND INFORMATIONThere is no known security system that works without an information applied science system. In event security of a stipulation society is to a blue pointedness determined by the amount of information technology on ground. then it might interest one the to know that security are of differing contexts. An information system for a bankers dealing via an automatic teller machine differs from a network based information system for assemblage, collating and analyzing statistical data for management determination. There is also a system of inbuilt detectors in doors on entries to chequer explosives and metals.There is also a camera system on focus connected to a visual display unit for observe activities especially in banking halls and supermarkets. Hence information technology has a vital graphic symbol to play in the task of ensuring maximum security. This work is based on an network based information system for collecting and collating as well as analyzing crime for the employment of management at all levels of an organization in their task of decision taking, planning and control strategies based on security. CHAPTER THREE . DESCRIPTION OF THE alert body The existing system has been an almost manually operated system due to lack of innovative data processing machines that lead by its energy counterchange the much in use(p) manual system in crime data analysis. The Bââ¬â¢OPS COMMUNICATION of the Nigerian Police, Enugu suppose Branch, which is my case study physical composition is changed with the responsibility of information management, processing and analysis. They are fond of information spreading and collection of crime data.This crime information is being communicated to the police Administrations at all levels in all functions to enable them in their incidentally decision taking about the security of their jurisdictions for which they are responsible. EQUIPMENT:Irrespective of the lack of modern machines like computers, the Bââ¬â¢OPS COMM UNITCATION SHQ ENUGU operates with some equipments and add which includes -carrier wave radio sets ( utilise in receiving piano tuner telegraphy information). -Walkie talkies (used for well timed(p) interaction with men on duty). -Fax machines (for receiving documented information) Repeater set (enhances the reply of Transmitted messages) -Repeater station (enhances the quest strength of information at unhomogeneous stations) -Stand by Generator (used in cases of power failure) -Integration systems (for connecting different communication networks) FORMS:The organization makes use of three traditional forms for differing purpose. The form include the following: -Message form B1- Used for the reception and transmission of information. This is through manually by writing or talking with the recipient on the set. Signal register form B2 â⬠This is the form used to register the particulars of all information accredited such that an reviewer house at one gaze read the info rmation. -Wireless operators LDG form B3 â⬠This is a form used to write down events that took place at course of operation such as power outrage, atmospheric interference, Rainfall, thunders storm, generator braked down etc. that might interfere in operation. NATURE OF INFORMATION: Bââ¬â¢OPS COMMUNICATION offices are situated at all police stations and jurisdictions with a divisional control link as data base management in SHQ Enugu known to them as control.The divisions are expect to constantly collect crime data around their jurisdiction and transmit some individually to the control who forms a statistical update of the information should be based on weekly, monthly and sensibly bases as demanded by the administrators for security actions. 3. 1FACT FINDING manner The fact finding methods here can be classified into internal and foreign lineages of data collection. -The internal source: This involves the use of information as recorded in the crime diary at police statio ns under different headings check to the crime distinctions inside the specified outcome under investigation.Another source of internal information is the signal register-form B2. -The external source: This involves the use information facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They by and large in this case communicate on events that need immediate intervention. Due to the fact that these events are legged down at each interval, the wireless operators log-form B3 is used as a medium whereby crime data can be salt away. 2. ORGANISATIONAL STRUCTURE The Nigerian police force is an organization known to exhibit hierarchy.For the above reason the Bââ¬â¢OPS COMMUNICATION also fellowââ¬â¢s suit. The information flow is in a vertical dimension though at that place is horizontal flow at the operational levels. Information flow chart 3. THE insert, fruit AND THE PROCESSING schema The process of executing this daily task of information dissemination and analysis though has some tools of mechanization is still lacking the basic information technology (computer system) that result reduce or eliminate the much engaged manual system. The input method, which involves much writing, the processing which is also manual has to be automated. Examine the analysis in the diagram Below: . PROBLEMS OF THE EXISTING trunk There has not been replete information technology that leading sub the much-engaged manual effort such as in the input and processing systems. There is no dependable storage system for information. Infor-tech facilities that can be used to breed information and retrieve them when needed is needed to be introduced in other to get the needed security of information. The process of junketing the received information in the Bââ¬â¢OPS COMMUNICATION, POLICE SHQ, ENUGU is purely manual thus this amounts to deferment of information especiall y in cases of emergency.There is need to put adequate information technology in place to enhance the dispatch of this needed information and as well reduce human engagement in this task. Mist of the wireless operators managing this information network are not decent accomplished especially in the area of operational modern information technology, therefore there is the need that expend in information management be trained properly in handling these modern tools. barely all the formââ¬â¢s used in the existing system are traditional, there is the need to introduce the use of imaged form to enhance security of information and automation. . JUSTIFICATION OF THE NEW SYSTEM The new system to be introduced in this work will eliminate or reduce the much engaged manual effort, introduce the use of experts is the use of information technology, replace the use of old fashioned tools on use with modern information technology tools and crown it all the system will achieve. 1. Data securit y 2. Handling of files for loose assessment 3. Reduce of eliminate misapprehension of computation 4. Speedy collection of information for security analysis 5. Prompt supply of information for use in timely decision taking hby the managers 6.Information storage for attendant use. 7. Easy dispatch system 8. hope for security planning. CHAPTER FOUR 4. DESIGN OF THE NETWORK BASED SECURITY INFORMATION SYSTEM. SYSTEM DESIGN AND DEVELOPMENT The whole system involves the application of the system appeal to problem solving with computers. The ingredients and materials are system elements, processes and information technology network. It is actually a customized approach to the use of computers for data analysis, automation and information management.This is reduction of the entire system by studying the sundry(a) operations performed and their relationships within the system and examination of a melodic line activity with a view to identifying problem areas and recommending alternativ e solutions. Also, for security of critical facts and restrictions, the system operation can best be operated in an INTRANET environment. 4. 1METHODS OF DATA COLLECTION The fact-finding method here should be a situation whereby the information technology is engaged (ie computer), such that data can be Rayed in directly into the system. The forms in this case should be imaged forms and not usual traditional forms.The aggregate data sedate and stored can and the different programs of computer. The network system is aimed at establishing information links between the respective(a) angles. 2. SYSTEM DESIGN Having studied and analyzed the manual processing operated by the Bââ¬â¢ OPS CMMUNICATION of the Enugu State Police and the way it has been done; the proposed system design therefore enables one to achieve efficiency and effectiveness. In the system design, care is taken in the planning system very close to the manually processed method, but with serious optimization and automat ion.The proposed system is a computer based expert system. The system shall make use of expertise that has been gathered from skilled human resources about data management and information processing. All the work in the system will at the and achieve: Data security Handling of files or from. (the whole problem of missing file and statistics will be eliminated among the security circle). Reduce or Elimination the problems of computational error. Speedy collection of information Storage of information for subsequent or timely usage.Generally, the proposed system will help in the input, processing and output of information coupled with the storage which will be too cumbersome for individuals to make out in the manual system. During the process various crime facts will be collected within Enugu State as a jurisdiction under study. The data collected can be reported on daily, weekly , monthly or fairly bases as the case may be. The study crimes that were analyzed include: Armed robbery , murder, Burglary, family breaking, stealing, Kidnapping, child stealing, Arson, Rape and miscellaneous offence.The data collected will be consistent in a form to distinguish adult from juvenile crime statistics. 1. input signal This system designed will create a situation where data will be keyed in directly into the computer the keyboard for immediate processing or storage. This expected to be carried out by a skilled expert in information technology management. 2. PROCESSING In this system the processing of data in order to achieve a pre-defined goal (information) is carried out electronically through some define instructions at a very fast pace (rate) with information technology tools (computes) which help; to improve efficiency and automation. . OUTPUT After actual processing is over the required information or output is generated and accessed by the user for importance. Thus an information is never confirmed until it is able to meet the need of the management which includ es urgency, confidentiality and decision taking about the activities (here security) for which the activities are responsible. 4. INFORMATION STORAGE AND RETRIEVAL The computer network system have the advantage of providing a suitable information storage and retrieval system requiring data to be structured, tored and retrieved in a memory that suits the kind of data and information inescapably of the users at all the levels. CHAPTER FIVE IMPLEMENTATION OF THE NEW SYSTEM alternative OF architectural planMEING LANGUAGE Among the existing lofty level and low-level programming languages, I choose QBASIC programming language considering a take of factors and features in the structure of my work. First, I observed that QBASIC consist of features that will help the writer achieve the logistic needs of the project work in price of access methods such as the ergodic ACCESS of some parts of the work and the SEQUENTIAL ACCESS of some other parts of the programs.CHAPTER SIX OUTPUT expos ition This program is purely more of an interactive system. It consists of the main program which houses a lot of subprograms of several analysis. Before the min identity card, is a software restriction called PASSWORD which must be obeyed before access to the main menu form the main menu is provided multiple options of the sub menus which now ask a series of question as the case may b. in the main menu, there are quad sub-menus of four major facultys, THE embark stimulus MODULE, blame MAINTENANCE MODULE, report GENERATION MODULES AND in writing(p) PRESENTATION MODULE THEN THE overtaking.The REPORT GENERATION module comprises of five sub menu called monthly reports and monthly statistics, yearbook report, one-year statistics from the entire jurisdiction and a forecast report. This module gives the monthly and annual state of crimes from the various divisions for use. The forecast report is projected as a result of the report generation. The FILE MAINTENANCE module takes c are of the necessary treatment and sweetener of the files in the program. It houses a lot of submenus for the operation. Also, in the program a provision and/or module is created to check and access the present state of the work.CONCLUSION This work is carefully researched and prepared for the citizens who are interested in the general security picture of Enugu State, Nigeria. The volume campaign and rate of crime related to current population is quite amazing. The crime forefinger offence are grouped into three major categories and were extensively discussed to better draw in the nature of these security threats. The objective of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security situation of the state.An example of the use of crime statistics the baring of the high capableness motorcycle use within Enugu state in early 2004, this is following the high rate of Armed robbery perpetrated with such high capacity bikes. The work will also help to forecast the nature, issue and distribution of crime wave in the state thereby enabling the people concerned to reinforce for the combat. CHAPTER SEVEN testimonial Based on the findings and relevance of this work to the society. I simply and concisely do drawing from my own exceptional see and the information obtained from the Bââ¬â¢ OPS COMMUNICATION of Enugu State Police during the system study.The fruit and importance of this work is not valid for members of police force or the Administrations, but will prove to be a source of information and guidance to researchers with scientific or legal aspects of the foresenic work. The state Bââ¬â¢ OPS COMMUNICATION should try to be computerized so that all their facts and data collection should be network based for adequate interactions, efficiency and stability. PROGRAM FLOWCHART OF abomination RECORD SYSTEM PROGRAMMING Cls Finish $ = ââ¬Å"Nââ¬Â Do temporary hookup finish $ =ââ¬ÂNââ¬Â For J = 1 To 24 rate J, I For I = 1 To 80 sign CHR $ (178): side by side(p) I near J R = S : C = 20 For I = 1 To 31 scrape CHR $ (219) bordering IFor I = 0 To 8 determine R + I, C-I : write CHR $ (219) surface R + I, C + 31: crisscross CHR $ (219) Next I set R + 1, C: stigma ââ¬Å"***ââ¬Â come on R + 3, C: release ââ¬Å"1, playscript input signal ***ââ¬Â resolve R + 4, C: fool ââ¬Å"2, File Maintenance ***ââ¬Â finalise R + 5, C: home run ââ¬Å"3, make-up times & printingââ¬Â pose R + 6, C: impress ââ¬Å"4, statistical Presentationââ¬Â fold up R + 7, C: brand ââ¬Å"5, get off ââ¬Â My election = 0 Do while my prize < 1 or My extract > 5 regain R + 10, C: stimulant drug ââ¬Å"Your Choice enthrall (1-5):ââ¬Â, Mychoice lace Select Crime Mychoice Crime 1 cry (out) Recinput Crime 2 surround Filemain Crime 3 beseech levelgn Crime 5 Finish $ = ââ¬Å"ENââ¬Â halt select coil steady down J, I For I = 1 To 80 issue CHR $ (178); Next I Next J R = 5 : C = 20 fall R,C For I = 1 To 31 yarn-dye CHR $ (219); Next I For I = 0 To 10 reconcile R + I, C-I : bulls eye CHR $ (219); square off R + I, C + 31: scar CHR $ (219) Next I settle R + 1, C: marker ââ¬Å"* line Generation*ââ¬Â reconcile R + 3, C: scratch ââ¬Å"1, set out periodic studyââ¬Â position R + 4, C: instill ââ¬Å"2, give yearbook give outââ¬Â rate R + 5, C: stain ââ¬Å"3, Generate forecast rootââ¬Â post R + 6, C: publish ââ¬Å"4, instill Monthly Reportââ¬Â Locate R + 7, C: instill ââ¬Å"5. scar yearly Reportââ¬Â Locate R + 8, C: bring out ââ¬Å"6. fool see Reportââ¬Â Locate R + 9, C: shanghai ââ¬Å"7. loss ââ¬ÂThe Choice = 0 Do while the choice < 1 or the choice > 7 Locate R + 10, C: stimulant ââ¬Å"Your Choice Please (1-7)ââ¬Â, the choice eyelet Select Crime the choice Crime 1 Call Monthsta Crime 2 Call Annualst Crime 3 Call forecast Crime 4 Call MonthRpt Crime 6 Call Forecarp Crime 7 Finished $ = ââ¬Å"ENââ¬Â shoemakers last select interlace End Sub Sub Annual RP ââ¬ËAnnual RP. BAS ââ¬Ë Annual Statistics scaring Program Dum M $ (28) Cls Open ââ¬Å"Iââ¬Â, $ 1, ââ¬Å"Annualst. FILââ¬Â foreplay $ 1, EN$ dear $ 1 Do Locate 10, 10: comment ââ¬Å"Output To suppress or targeter (P or S):ââ¬Â;K$ K$ = U Crime$ (K$) grummet Until K$ = ââ¬Å"Pââ¬Â or K$ = ââ¬Å"Sââ¬Â Cls Open ââ¬Å"Iââ¬Â, $ 1, ââ¬Å"Annualst. FILââ¬Â If K$ = ââ¬Å"Sââ¬Â Then ingrain ââ¬Å"Bââ¬Â OPS Police colloquyââ¬Â bulls eye ââ¬Å"Annual Crime Statistics Reportââ¬Â stigma: marker ââ¬Å"For The Year;ââ¬Â: EN$ Locate 5, 1 : cross ââ¬Å"SNââ¬Â Locate 5, 3 : move ââ¬Å"Offencesââ¬Â Locate 5, 32 : release ââ¬Å"Janââ¬Â Locate 5, 44 : chump ââ¬Å"Febââ¬Â Locate 5, 56 : shanghai ââ¬Å" rapeââ¬Â Locate 5, 68 : gull ââ¬Å"Aprââ¬Â Locate 6, 30 : pa tsy ââ¬Å"Mââ¬Â Locate 6, 36 : move ââ¬Å"Fââ¬Â Locate 6, 42 : home run ââ¬Å"Mââ¬Â Locate 6, 48 : Print ââ¬Å"Fââ¬Â Locate 6, 54 : Print ââ¬Å"Mââ¬Â Locate 6, 60 : Print ââ¬Å"Fââ¬Â Locate 6, 66 : Print ââ¬Å"Mââ¬Â Locate 6, 72 : Print ââ¬Å"Fââ¬Â R = 7 : I = 1 Do while not EOF (I) comment N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 stimulus N1, M7, M8, M9, M10, M11, M12, M13, M14 remark #1, M15, M16, M17, M18, M19, M20, M21, M22 input #1, M23, M24, T Locate (R 8 + I), 1: Print C$ : Locate (R 8 + I), 3: Print F$ Locate (R 8 + I), 30 : Print M1 : Locate (R 8 + I), 36 : Print M2 Locate (R 8 + I), 42 : Print M3 : Locate (R 8 + I), 48 : Print M4 Locate (R 8 + I), 54 : Print M5 : Locate (R 8 + I), 60 : Print M6 Locate (R 8 + I), 66 : Print M7 : Locate (R 8 + I), 72 : Print M8 I = I + 1 Loop fuddled #1 Call evolve Key Locate 5, 32 : Print ââ¬Å"Mayââ¬Â Locate 5, 44 : Print ââ¬Å"Junââ¬Â Locate 5, 56 : Print ââ¬Å"Julââ¬Â Locate 5, 68 : Print ââ¬Å"Augââ¬Â R8 = 7 : I = 1 unmannerly ââ¬Å"Iââ¬Â, #1, ââ¬Å"ANNUALST . FILââ¬Â Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7Input #1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 Input #1, M18, M19, M20, M21, M22, M23, M24, T Locate (R 8 + I), 30 : Print M9 : Locate (R 8 + I) 36 : Print M10 Locate (R 8 + I), 42 : Print M11 : Locate (R 8 + I), 48 : Print M12 Locate (R 8 + I), 54 : Print M13 : Locate (R 8 + I) 60 : Print M14 Locate (R 8 + I), 66 : Print M15 : Locate (R 8 + I) 72 : Print M16 I = J + 1 Loop Close #1 Call soak up Key Locate 5, 32 : Print ââ¬Å" family lineââ¬Â Locate 5, 44 : Print ââ¬Å"Octââ¬Â Locate 5, 56 : Print ââ¬Å"Novââ¬Â Locate 5, 68 : Print ââ¬Å"Decââ¬Â R8 = 7 : I = 1 OPEN ââ¬Å"Iââ¬Â, #1, ââ¬Å"ANNUALST . FILââ¬Â Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6Input #1, M7,M8, M9, M10, M11, M12, M13, M14, M15 Input #1, M16, M17, M18, M19, M20, M21, M22, M23, Input #1, M24, T I = I + 1 Loop Close #1 Call Get Key Locate 5, 30 : Print ââ¬Å" descendââ¬Â R8 = 7 : I = 1 OPEN ââ¬Å"Iââ¬Â, #1, ââ¬Å"ANNUALST . FILââ¬Â Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5 Input #1, M6, M7,M8, M9, M10, M11, M12, M13 Input #1, M14, M15, M16, M17, M18, M19, M20, M21 Input #1, M22, M23, M24, T Locate (R8 + I), 30 : Print T I = I + 1 Loop Close # 1 CALL GET list ELSE L Print ââ¬Å"Bââ¬â¢ OPS Police Communicationââ¬Â L Print ââ¬Å"Annual Crime Statistics Reportââ¬Â L Print : L Print ââ¬Å"For Each Divisionââ¬Â EN$ L PrintL Print ââ¬Å"SNââ¬Â : chip (3); ââ¬Å"Offencesââ¬Â; stay(31); ââ¬Å"Janââ¬Â; confirmation (39); ââ¬Å"Febââ¬Â L Print Tab (47); ââ¬Å" mutilateââ¬Â; Tab (55); ââ¬Å"Aprââ¬Â; Tab (63); ââ¬Å"Mayââ¬Â; L Print Tab (71); ââ¬Å"Junââ¬Â; Tab (79); ââ¬Å"Julââ¬Â; Tab (87); ââ¬Å"Augââ¬Â; L Print Tab (95); ââ¬Å"Sepââ¬Â ; Tab (103); ââ¬Å"Octââ¬Â; Tab (111); ââ¬Å"Novâ â¬Â; L Print Tab (119); ââ¬Å"Decââ¬Â; Tab (127); ââ¬Å" completeââ¬Â gap 8 = 26 For I = 1 To 12 crack 8 = Col 8 + 4 L Print Tab (Col 8); ââ¬Å"Mââ¬Â; Col 8 = Col 8 + 4 L Print Tab (Col 8); ââ¬Å"Fââ¬Â; Next I Do darn non EOF (1) Cls OPEN ââ¬Å"Iââ¬Â, #1, ââ¬Å"ANNUALST. FILââ¬Â Input #1, Y$ YY$ = STR$ (Val (Y$) + 1) OPEN ââ¬Å"Oââ¬Â, #2, ââ¬Å"FORECAST. FILââ¬Â OPEN ââ¬Å"Iââ¬Â, #1, ââ¬Å"ANNUALST. FILââ¬Â Do opus Not EOF (1) Input #1, Y$, C$, F4, M(1), F(1), M(2), F(2), M(3), F(3)Input #1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) Input #1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), Input #1, M(12), F(12), Total My = O : SM2 = 0 : Sm3 =0: Sm4 = 0: Smy = 0: M2y = 0 Fy = O : Sf = 0 Sf2 = : Sf3 = 0: SF4 = : Sfy = 0 : F2y = 0 For I = 1 To 12 Sm = Sm + I : Sf = Sf + 1 My = My + m (I) : Fy = Fy + F (I) Sm2 = Sm2 + I ^ 2 : Sf2 = Sf2 + I ^ 2 Sm3 = Sm3 + I ^ 3 : Sf3 = Sf3 + I ^ 3 Sm4 = Sm4 + I ^ 4 : Sf4 = Sf4 + I ^ 4 Smy = Smy + I * m (I) : Sfy + I * F (I) M2y = M2y + I ^ 2 * M(I) : F2y = F2y + I ^ 2 * F (I) Next I ââ¬Ë monetary fund Values For Males In The A â⬠multitude Ready ââ¬Ë For Gaussian EliminationA (1, 1) = 12 : A (1, 2) = Sm2 : A (1, 23) = Sm2 : B (1) = My A (2, 1) = Sm : A (2, 2) = Sm2 : A (2, 3) = Sm3 : B(2) = Smy A(3, 1) = Sm2 : A (3, 2) = Sm3 : A (3, 3) = Sm4 : B(3) = M2y Call Gauss (x1, x2, X3) ââ¬Ë think the figures for males for the ââ¬Ënext three months Fm1 = X1, + X2 * 13 + X3 * 13 ^ 2 Fm2 = X1 + X2 * 14 + X3 * 14 ^ 2 Fm3 = X1 + X2 * 15 + X3 * 15 ^ 2 ââ¬ËStore values for females in the A? Array ââ¬ËReady for gaussian elimination A (1, 1) = 12 : A(1, 2) = Sf : AC1, 3) = Sf2 : B(1) = Fy A(2,1 ) = Sf : A (2, 2) = Sf2 : A (2, 3) = Sf3 : B (2) = Sfy A (3, 1) = Sf2 : A (3, 2) = Sf3 : A (3, 3) = Sf4 : B(3) = F2y Call Guass (x1, X2, x3) Estimate the figures for females for the next ââ¬ËThree months Ff1 = x1 + x2 * 13 + x3 * 13 ^ 2 Ff2 = x1 + x2 * 14 + x3 * 14 ^ 2 Ff3 = x1 + x2 * 15 + x3 * 15 ^ 2 Print # 2, YY$, ââ¬Å" ââ¬Â ; C$; ââ¬Å" ââ¬Â; F$; ââ¬Å" ââ¬Â; Fm1; ââ¬Å" ââ¬Â; FF1 Print # 2, Fm2; FF2 T Loop Close # 1 End Sub Sub Forecarp ââ¬ËForecarp . Bas ââ¬ËForecast Figure imprint Program Dm M$ (9) Cls Open ââ¬Å"1ââ¬Â , # 1, ââ¬Å"Forecast . Filââ¬Â `Input # 1, YY$ Close #1 Do Locate 10, 10 : Input ââ¬Å"Output to screen out (P or S) : ââ¬Å" ; K$ K$ = U Crime $ (K$) Loop Until K$ = ââ¬Å"Pââ¬Â Or K$ = ââ¬Å"Sââ¬Â Cls Open ââ¬Å"1ââ¬Â , #1, ââ¬Å"Forecast. Fillââ¬Â If K$ = ââ¬ËSââ¬Â Then Print ââ¬Å"Bââ¬â¢ OPS Police Communicationââ¬Â Print : Print ââ¬Å"For The Year : YY$Locate 5, 1 : Print ââ¬Å"SNââ¬Â Locate 5, 3 : Print ââ¬Å"Offencesââ¬Â Locate 5, 32 : Print ââ¬Å" Janââ¬Â Locate 5, 44 : Print ââ¬Å" Febââ¬Â Locate 5, 56 : Print ââ¬Å"Marââ¬Â Locate 6, 30 : Print ââ¬Å"Mââ¬Â Locate 6, 36 : Print ââ¬Å"Fââ¬Â Locate 6, 42 : Print ââ¬Å"Mââ¬Â Locate 6, 48 : Print ââ¬Å"Fââ¬Â Locate 6, 54 : Print ââ¬Å"Mââ¬Â Locate 6, 60 : Print ââ¬Å"Fââ¬Â R8 = 7 : I = 1 Do while not EOF (1) Input #1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 Locate (R8 + I), 1 : Print C$ : Locate (R8 + I), 3 : Print F$ Locate (R8 + I), 30 : Print M1 : Locate (R8 + I) 36 : Print M2 Locate (R8 + I), 42 : Print M3 : Locate (R8 + I) 48 : Print M4 Locate (R8 + I), 54 : Print M5 : Locate (R8 + I) 60 : Print M6 I = I + 1Loop Close #1 Else L PRINT ââ¬Å"Bââ¬â¢ OPS POLICE COMMUNICATIONââ¬Â L Print : LPrint ââ¬Å"For the Year : ââ¬Å"; YY$ Lprint Lprint ââ¬Å"SNââ¬Â; TAB(3); ââ¬Å"Oddwnxwaââ¬Â; Tab(31); ââ¬Å"Janââ¬Â; Tab(39); ââ¬Å"Febââ¬Â Lprint Tab (47); ââ¬Å"Marââ¬Â Col 8 = 26 For I = 1 To 3 Col 8 = Col 8 + 4 Lprint Tab (Col 8); ââ¬Å"Mââ¬Â; Col 8 = Col 8 + 4 Lprint Tab (Col 8); ââ¬Å"Fââ¬Â; Next I Do While Not EOF (1) For I = 1 To 9 Input #1, M$ (I) Next I Lprint M$ (2); Tab(3); M$(3); Col 8 = 26 Total = 0 For I = 4 To 8 Step 2 Col 8 = Col 8 + 4 LPrint Tab (Col 8); M$ (I + 1); Total = Total + Val (M$ (I)) + Val (M$ (I + 1)) Next I L Print Tab (60) : Total Loop End ifClose #1 YY$ = Input $ (1) End Sub SUB GET get a line Locate 24, 10 : Print ââ¬Å" shove Any Key To anticipateââ¬Â Do A$ = INKEY$ Loop Until A$ < > ââ¬Å" ââ¬Â sack SUB ———————â⬠FORCE COMMUNICATION STATE COMMUNICATION DIVISIONAL COMMUNICATION Cls Screen 9,0,0 color 3 Finish $ = ââ¬Å"Nââ¬Â Dowhile finish $ = ââ¬Å"Nââ¬Â For J = 1 To 24 Locate J, 1 For I = 1 To 80 Print Chr $ (178) Next I: Next J Locate R + 1, C:? ââ¬Å"Main wagââ¬Â Locate R + 2, C:? ââ¬Å"1. Record Inputââ¬Â Locate R + 3, C:? ââ¬Å"2. File Maintenanceââ¬Â Locate R + 4, C:? ââ¬Å"3. Report generation and Printingââ¬Â Locate R + 5, C:? ââ¬Å"4. Statistical Presentationââ¬ÂLocate R + 6, C:? ââ¬Å"5. Exitââ¬Â MYCHOICE = 0 DO charm MYCHOICE < 1 OR MYCHOICE > 5 locate R + 10, C:INPUT â⠬Å"YOUR CHOICE PLEASE (1-5):ââ¬Â MYCHOICE LOOP IF SELECT CRIME MYCHOICE CRIME 1 CRIME 2 CRIME 3 CRIME 4 CRIME 5 Finish $ = ââ¬Å"Yââ¬Â End selected Locate 24, 10 Print ââ¬Å"Press Any key Toââ¬Â ââ¬Å"Continueââ¬Â Do A $ = In keys Loop until A$ <> ââ¬Å" ââ¬Å" END SUB get off CRIME 1 SUB REC INPUT concession encase IF PRINT = ââ¬Å"KEYââ¬Â ââ¬Å"Murderââ¬Â ââ¬Å"Suicideââ¬Â ââ¬Å"Woundingââ¬Â ââ¬Å" transgressââ¬Â ââ¬Å"Kidnappingââ¬Â ââ¬Å"Rapeââ¬Â ââ¬Å"Armed Robberyââ¬Â ââ¬Å"Stealingââ¬Â ââ¬Å"Burglaryââ¬Â ââ¬Å"Arsonââ¬Â ââ¬Å"Narcoticsââ¬Â ââ¬Å"Traffic Offeenceââ¬Â stomach Breaking ââ¬Å"Store Breakingââ¬Â multilateralââ¬Â STOP CRIME2 SUB FILEMAIN ASSIGNMENT BOX IF MAIN = ââ¬Å"yââ¬Â DISPLAY RECORD edit out RECORD REMOVE DELETE RECORD cut off RECORD EDIT RECORD EXIT STOP CRIME 3 SUB REPORT GN ASSIGNMENT BOX IF MAIN T$ = ââ¬Å"yââ¬Â Generate Monthly Report EXIT Generate Annual Re port Generate Fore Cast Report Print Monthly Report Print Annual Report Print Annual Report IF EN =3 FEB MAR APR may JUN JUL CRIME 4 SUB ANNUALST INPUT ââ¬Å"DIVââ¬Â; EN IF EN =2 IF EN =1 JAN JAN FEB FEB MAR MART APR APR whitethorn MAY JUN JUN JUL JUL AUG AUG AUG kinfolk SEP SEP JAN STOP OCT OCT OCT NOV NOV NOV declension DEC DEC STOP STOP\r\n'
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment