Design and Implementation of a Network Based Security Information System

DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM TABLE OF CONTENTS Cover page Title page Certification Dedication Acknowledgement Abstract Table of contents 1. INTRODUCTION 1. 1Security information 2. Objectives 3. Justification CHAPTER TWO 2. Security concept 2. 1Definition of security 2. Security threats 3. Security & Information CHAPTER THREE 3. Description of the exiting security information system 3. 1Organizational structure 2. Fact finding method 3. Objective of the existing system 4. Programs of the existing system 5. Equipment of the existing system 6. Forms CHAPTER FOUR 4.

Design of the network-based security information system 4. 1Method of data collection 2. System design – input, processing, output, information storage and retrieval CHAPTER FIVE 5. Implementation of the new system 5. 1Choice of programming language 2. Program flowchart of security record system CHAPTER SIX 6. Output interpretation CHAPTER SEVEN 7. Conclusion 7. 1Recommendation ABSTRACT The fundamental aim of this project is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system.

It also airs the different machines used in information processing system to reduce the much-engaged manual efforts. The system design is also introduced where cone is taken in the planning system, which is very close to the manually processed method, but with serious optimization. The proposed system is a network based expert system. All the work in the system will at the end achieve: -Data security -Handling of files -Speedy collection of information for security analysis -Storage of information for subsequent usage. – A forecast for the future security A dependable standard for decision taking on security matters as well as planning and control measures. -Existing equipment for security information listed and known. CHAPTER ONE 1. INTRODUCTION Law enforcement administrations, Justice systems, legislators and the government functionaries often need information to efficiently disseminate and fulfill their official responsibilities of ensuring maximum security for their subjects. To achieve this, a system of information technology network is needed to aid the management in decision taking about the security of lives and properties.

In this work “DESIGN AND IMPLEMENTATION OF A NETWORK BASED SECURITY INFORMATION SYSTEM” I will take a case study of “B’ OPS COMMUNICATION OF POLICE SHQ ENUGU” as an existing information network system in the police and analyze their process of data collection and hence design a new system which will enhance the output. 1. 1OBJECTIVE OF THE STUDY The objective of this program is strictly for the production of a reliable system of nation wide crime statistical information from all works and craning for administrative and operational use of the executive and law enforcement management system.

Another objective of this work is to make an improvement in the existing data security system. To create a way of speedy data collections for security analysis. For a network of information technology for security purpose and create a standard management information system forecasting for security together with good decision taking, planning and control programs. 2. JUSTIFICATION The process of executing the task of information management has been manually executed; quite unfortunately manual procedure reduces the output quality and consumed time.

This work will examine a new system where th3e much needed human efforts are replaced with machines to achieve fast collection of data and easy processing to obtain healthy outputs. Also the need for information and data in the knowledge base doest not only answer to the problem of information over load but also helps in a state of crime statistics request, wherefore the computerization of some of this areas is very necessary because its importance in making crime investigators imbibe new and modernized methods and create public awareness of the society security policy. CHAPTER TWO LITERATURE REVIEW . SECURITY CONCEPT Security is defined in many ways due to the many contexts of its existence. In other words, security generally has to do with protection. It might be protection from undue access. Some attributes security to safe guiding from that, which may or may not lead to destruction. It might also be interesting to understand that security has to do with protection of the environment. It also has to do with valuables; this means that anything has to be secured must have value. Things of less importance to humanity and therefore anything that pose threat to life must also be prevented.

Security is a very important issue in any organizations (system), no wonder VINCENT . E. ASOR in his seminar presentation at the Nigerian computer society’s conference of 2002 stated that an organization with 98 percent security is actually 100 percent insecure. This means that adequate security must be in place for a smooth running of an organizational affair or a system. The police, who is the case study organization here defined security in the police training manual as the protection of lives and property coupled with the maintenance of law and order in a society. 2. 1SECURITY THREATS

They are criminal acts, which have a particular harmful effects on peoples lives and property and do more than interfere with merely private rights. They are simply crimes, Now the above brings us to the crime concept. What is crime? According to the BLACKSTONE, crime is violation of public rights and duties due to the whole community considered as a community. Williams defined crime as acts that is capable of being followed by a criminal proceedings having one of the types of outcome – Punishments. Also Hulsbury’s Law (adopted by the House of Lord’s in Board of Trade V.

Ower 1957 as correct) defined crime as an unlawful act or default which is an offence against the public and render the person guilty of the act liable to legal punishment. The summary of the above crime definitions by the police manual defined crime as an unlawful act committed by a person or a group of persons. 2. CHARACTERISTICS OF SECURITY THREATS They are wrong doings which Judges have held, or the parliament has from time to time laid down which are sufficiently injurious to the public to warrant the application of a criminal procedure to deal with them, of course this does not enable us to recognize an act as a crime when we see one.

Some acts are obviously harmful to the public that anyone would say they should be criminal and such acts almost certainly are, but there are many others about which opinions may differ widely. According to SIR CARLETON ALLEN, crime is crime because it consists of wrongdoings which directly and in serious degree threatens the security or well being of the society. This explains why acts have to be made crimes either by judicial decisions or by legislation. A crime may remain a crime long after it has ceased to be a threat to the security or well being of the society.

This ALLEN’S proposition tells us what (as he thinks) ought to be crime rather than what is crime. The public nature of crimes is evidenced by the contrast between the rulers of civil and criminal procedure. Any citizen can, as a general rule and in the absence of some provision to the contrary bring a criminal prosecution, whether or not he has suffered any special harm over and above other members of the public. As a member of the public he has an interest in the enforcement of the criminal law. 3. CLASSFICATION OF CRIMES

There is a problem that exist in the crime reporting system in Nigeria and especially the B’OPS COMMUNICATION OF THE POLICY, ENUGU STATE BRANCH in particular. This arises in the variations in definition of crimes among localities. This obstacle, as far as uniformity in definitions is concerned was removed by the adoption of a standard set of crime classification generally connotes its content. However in reading the explanation of each category, it is very important to keep in mind that because of the differences between the state codes, there is no possibility in a system such as ‘felony’ and ‘misdemeanor’.

Crime classifications are in three categories. Viz crime against persons, crimes against property and crime of violence or crime against local acts. Crime against persons include: -Murder and non-negligent manslaughter -Aggravates assault forcible rape -Forcible rape -Robbery Crime against property includes: -Burglary -Arson -Stealing -Forgery and counterfeiting -Vandalism Crimes against local acts include; -Narcotic -Illegal possession, carrying of weapons -Prostitution and commercialized vice. 4. SECURITY AND INFORMATION

There is no known security system that works without an information technology system. In fact security of a given society is to a high degree determined by the amount of information technology on ground. Thus it might interest one the to know that security are of differing contexts. An information system for a bankers dealing via an automatic teller machine differs from a network based information system for collecting, collating and analyzing statistical data for management use. There is also a system of inbuilt detectors in doors on entries to check explosives and metals.

There is also a camera system on focus connected to a visual display unit for monitoring activities especially in banking halls and supermarkets. Hence information technology has a vital role to play in the task of ensuring maximum security. This work is based on an network based information system for collecting and collating as well as analyzing crime for the use of management at all levels of an organization in their task of decision taking, planning and control strategies based on security. CHAPTER THREE . DESCRIPTION OF THE EXISTING SYSTEM The existing system has been an almost manually operated system due to lack of sophisticated data processing machines that will by its efficiency replace the much engaged manual system in crime data analysis. The B’OPS COMMUNICATION of the Nigerian Police, Enugu State Branch, which is my case study organisation is changed with the responsibility of information management, processing and analysis. They are fond of information dissemination and collection of crime data.

This crime information is being communicated to the police Administrations at all levels in all functions to enable them in their timely decision taking about the security of their jurisdictions for which they are responsible. EQUIPMENT:Irrespective of the lack of modern machines like computers, the B’OPS COMMUNITCATION SHQ ENUGU operates with some equipments and gates which includes -carrier wave radio sets (used in receiving wireless telegraphy information). -Walkie talkies (used for timely interaction with men on duty). -Fax machines (for receiving documented information) Repeater set (enhances the reception of Transmitted messages) -Repeater station (enhances the signal strength of information at various stations) -Stand by Generator (used in cases of power failure) -Integration systems (for connecting different communication networks) FORMS:The organization makes use of three traditional forms for differing purpose. The form include the following: -Message form B1- Used for the reception and transmission of information. This is done manually by writing or talking with the recipient on the set. Signal register form B2 – This is the form used to register the particulars of all information received such that an observer can at one glance read the information. -Wireless operators LDG form B3 – This is a form used to write down events that took place at course of operation such as power outrage, atmospheric interference, Rainfall, thunders storm, generator braked down etc. that might interfere in operation. NATURE OF INFORMATION: B’OPS COMMUNICATION offices are situated at all police stations and jurisdictions with a divisional control link as data base management in SHQ Enugu known to them as control.

The divisions are expected to constantly collect crime data around their jurisdiction and transmit some individually to the control who forms a statistical update of the information should be based on weekly, monthly and fairly bases as demanded by the administrators for security actions. 3. 1FACT FINDING METHOD The fact finding methods here can be classified into internal and external sources of data collection. -The internal source: This involves the use of information as recorded in the crime diary at police stations under different headings according to the crime distinctions within the specified period under investigation.

Another source of internal information is the signal register-form B2. -The external source: This involves the use information facilities (like the Walkill talkie) to communicate the law enforcement officers in the society (on enforcement officers in the society (on operation). They mostly in this case communicate on events that need immediate intervention. Due to the fact that these events are legged down at each interval, the wireless operators log-form B3 is used as a medium whereby crime data can be collected. 2. ORGANISATIONAL STRUCTURE The Nigerian police force is an organization known to exhibit hierarchy.

For the above reason the B’OPS COMMUNICATION also fellow’s suit. The information flow is in a vertical dimension though there is horizontal flow at the operational levels. Information flow chart 3. THE INPUT, OUTPUT AND THE PROCESSING SYSTEM The process of executing this daily task of information dissemination and analysis though has some tools of automation is still lacking the basic information technology (computer system) that will reduce or eliminate the much engaged manual system. The input method, which involves much writing, the processing which is also manual has to be automated. Examine the analysis in the diagram Below: . PROBLEMS OF THE EXISTING SYSTEM There has not been enough information technology that will replace the much-engaged manual effort such as in the input and processing systems. There is no dependable storage system for information. Infor-tech facilities that can be used to store information and retrieve them when needed is necessary to be introduced in other to achieve the needed security of information. The process of dispatching the received information in the B’OPS COMMUNICATION, POLICE SHQ, ENUGU is purely manual thus this amounts to delay of information especially in cases of emergency.

There is need to put adequate information technology in place to enhance the dispatch of this needed information and as well reduce human engagement in this task. Mist of the wireless operators managing this information network are not properly trained especially in the area of operating modern information technology, therefore there is the need that expend in information management be trained properly in handling these modern tools. Barely all the form’s used in the existing system are traditional, there is the need to introduce the use of imaged form to enhance security of information and automation. . JUSTIFICATION OF THE NEW SYSTEM The new system to be introduced in this work will eliminate or reduce the much engaged manual effort, introduce the use of experts is the use of information technology, replace the use of old fashioned tools on use with modern information technology tools and crown it all the system will achieve. 1. Data security 2. Handling of files for easy assessment 3. Reduce of eliminate error of computation 4. Speedy collection of information for security analysis 5. Prompt supply of information for use in timely decision taking hby the managers 6.

Information storage for subsequent use. 7. Easy dispatch system 8. Forecast for security planning. CHAPTER FOUR 4. DESIGN OF THE NETWORK BASED SECURITY INFORMATION SYSTEM. SYSTEM DESIGN AND DEVELOPMENT The whole system involves the application of the system approach to problem solving with computers. The ingredients and materials are system elements, processes and information technology network. It is actually a customized approach to the use of computers for data analysis, automation and information management.

This is reduction of the entire system by studying the various operations performed and their relationships within the system and examination of a business activity with a view to identifying problem areas and recommending alternative solutions. Also, for security of critical facts and restrictions, the system operation can best be operated in an INTRANET environment. 4. 1METHODS OF DATA COLLECTION The fact-finding method here should be a situation whereby the information technology is engaged (ie computer), such that data can be Rayed in directly into the system. The forms in this case should be imaged forms and not usual traditional forms.

The aggregate data collected and stored can and the different programs of computer. The network system is aimed at establishing information links between the various angles. 2. SYSTEM DESIGN Having studied and analyzed the manual processing operated by the B’ OPS CMMUNICATION of the Enugu State Police and the way it has been done; the proposed system design therefore enables one to achieve efficiency and effectiveness. In the system design, care is taken in the planning system very close to the manually processed method, but with serious optimization and automation.

The proposed system is a computer based expert system. The system shall make use of expertise that has been gathered from skilled human resources about data management and information processing. All the work in the system will at the and achieve: Data security Handling of files or from. (the whole problem of missing file and statistics will be eliminated among the security circle). Reduce or Elimination the problems of computational error. Speedy collection of information Storage of information for subsequent or timely usage.

Generally, the proposed system will help in the input, processing and output of information coupled with the storage which will be too cumbersome for individuals to handle in the manual system. During the process various crime facts will be collected within Enugu State as a jurisdiction under study. The data collected can be reported on daily, weekly , monthly or fairly bases as the case may be. The major crimes that were analyzed include: Armed robbery, murder, Burglary, House breaking, stealing, Kidnapping, child stealing, Arson, Rape and miscellaneous offence.

The data collected will be arranged in a form to distinguish adult from juvenile crime statistics. 1. INPUT This system designed will create a situation where data will be keyed in directly into the computer the keyboard for immediate processing or storage. This expected to be carried out by a skilled expert in information technology management. 2. PROCESSING In this system the processing of data in order to achieve a pre-defined goal (information) is carried out electronically through some define instructions at a very fast pace (rate) with information technology tools (computes) which help; to improve efficiency and automation. . OUTPUT After actual processing is over the required information or output is generated and accessed by the user for importance. Thus an information is never confirmed until it is able to meet the need of the management which includes urgency, confidentiality and decision taking about the activities (here security) for which the activities are responsible. 4. INFORMATION STORAGE AND RETRIEVAL The computer network system have the advantage of providing a suitable information storage and retrieval system requiring data to be structured, tored and retrieved in a memory that suits the kind of data and information needs of the users at all the levels. CHAPTER FIVE IMPLEMENTATION OF THE NEW SYSTEM CHOICE OF PROGRAMMEING LANGUAGE Among the existing high level and low-level programming languages, I choose QBASIC programming language considering a lot of factors and features in the structure of my work. First, I observed that QBASIC consist of features that will help the writer achieve the logistic needs of the project work in terms of access methods such as the RANDOM ACCESS of some parts of the work and the SEQUENTIAL ACCESS of some other parts of the programs.

CHAPTER SIX OUTPUT INTERPRETATION This program is purely more of an interactive system. It consists of the main program which houses a lot of subprograms of several analysis. Before the min menu, is a software restriction called PASSWORD which must be obeyed before access to the main menu form the main menu is provided multiple options of the sub menus which now ask a series of question as the case may b. in the main menu, there are four sub-menus of four major modules, THE RECORD INPUT MODULE, FILE MAINTENANCE MODULE, REPORT GENERATION MODULES AND GRAPHICAL PRESENTATION MODULE THEN THE EXIT.

The REPORT GENERATION module comprises of five sub menu called monthly reports and monthly statistics, annual report, annual statistics from the entire jurisdiction and a forecast report. This module gives the monthly and annual state of crimes from the various divisions for use. The forecast report is projected as a result of the report generation. The FILE MAINTENANCE module takes care of the necessary treatment and enhancement of the files in the program. It houses a lot of submenus for the operation. Also, in the program a provision and/or module is created to check and access the present state of the work.

CONCLUSION This work is carefully researched and prepared for the citizens who are interested in the general security picture of Enugu State, Nigeria. The volume trend and rate of crime related to current population is quite amazing. The crime index offence are grouped into three major categories and were extensively discussed to better describe the nature of these security threats. The objective of this work is achieved when managements at all levels and polices administrations can use the reports generated (information) in decision taking about the security situation of the state.

An example of the use of crime statistics the baring of the high capacity motorcycle use within Enugu state in early 2004, this is following the high rate of Armed robbery perpetrated with such high capacity bikes. The work will also help to forecast the nature, trend and distribution of crime wave in the state thereby enabling the people concerned to reinforce for the combat. CHAPTER SEVEN RECOMMENDATION Based on the findings and relevance of this work to the society. I simply and concisely made drawing from my own exceptional experience and the information obtained from the B’ OPS COMMUNICATION of Enugu State Police during the system study.

The fruit and importance of this work is not valid for members of police force or the Administrations, but will prove to be a source of information and guidance to researchers with scientific or legal aspects of the foresenic work. The state B’ OPS COMMUNICATION should try to be computerized so that all their facts and data collection should be network based for adequate interactions, efficiency and stability. PROGRAM FLOWCHART OF CRIME RECORD SYSTEM PROGRAMMING Cls Finish $ = “N” Do while finish $ =”N” For J = 1 To 24 Locate J, I For I = 1 To 80 Print CHR $ (178): Next I Next J R = S : C = 20 For I = 1 To 31 Print CHR $ (219) Next I

For I = 0 To 8 Locate R + I, C-I : Print CHR $ (219) Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print “***” Locate R + 3, C: Print “1, Record Input ***” Locate R + 4, C: Print “2, File Maintenance ***” Locate R + 5, C: Print “3, Report Generation & Printing” Locate R + 6, C: Print “4, Statistical Presentation” Locate R + 7, C: Print “5, Exit ” Mychoice = 0 Do while mychoice < 1 or Mychoice > 5 Locate R + 10, C: Input “Your Choice Please (1-5):”, Mychoice Loop Select Crime Mychoice Crime 1 Call Recinput Crime 2 Call Filemain Crime 3 Call Reportgn Crime 5 Finish $ = “EN” End select

Loop Locate J, I For I = 1 To 80 Print CHR $ (178); Next I Next J R = 5 : C = 20 Locate R,C For I = 1 To 31 Print CHR $ (219); Next I For I = 0 To 10 Locate R + I, C-I : Print CHR $ (219); Locate R + I, C + 31: Print CHR $ (219) Next I Locate R + 1, C: Print “*Report Generation*” Locate R + 3, C: Print “1, Generate Monthly Report” Locate R + 4, C: Print “2, Generate Annual Report” Locate R + 5, C: Print “3, Generate forecast Report” Locate R + 6, C: Print “4, Print Monthly Report” Locate R + 7, C: Print “5. Print Annual Report” Locate R + 8, C: Print “6. Print Forecast Report” Locate R + 9, C: Print “7. Exit ”

The Choice = 0 Do while the choice < 1 or the choice > 7 Locate R + 10, C: Input “Your Choice Please (1-7)”, the choice Loop Select Crime the choice Crime 1 Call Monthsta Crime 2 Call Annualst Crime 3 Call Forecast Crime 4 Call MonthRpt Crime 6 Call Forecarp Crime 7 Finished $ = “EN” End select Loop End Sub Sub Annual RP ‘Annual RP. BAS ‘ Annual Statistics Printing Program Dum M $ (28) Cls Open “I”, $ 1, “Annualst. FIL” Input $ 1, EN$ Close $ 1 Do Locate 10, 10: Input “Output To Screen or Printer (P or S):”;K$ K$ = U Crime$ (K$) Loop Until K$ = “P” or K$ = “S” Cls Open “I”, $ 1, “Annualst. FIL” If K$ = “S” Then

Print “B” OPS Police Communication” Print “Annual Crime Statistics Report” Print: Print “For The Year;”: EN$ Locate 5, 1 : Print “SN” Locate 5, 3 : Print “Offences” Locate 5, 32 : Print “Jan” Locate 5, 44 : Print “Feb” Locate 5, 56 : Print “Mar” Locate 5, 68 : Print “Apr” Locate 6, 30 : Print “M” Locate 6, 36 : Print “F” Locate 6, 42 : Print “M” Locate 6, 48 : Print “F” Locate 6, 54 : Print “M” Locate 6, 60 : Print “F” Locate 6, 66 : Print “M” Locate 6, 72 : Print “F” R = 7 : I = 1 Do while not EOF (I) Input N1, EN$, C$, F$, M1, M2, M3, M4, M5, M6 Input N1, M7, M8, M9, M10, M11, M12, M13, M14 Input #1, M15, M16, M17, M18, M19, M20, M21, M22

Input #1, M23, M24, T Locate (R 8 + I), 1: Print C$ : Locate (R 8 + I), 3: Print F$ Locate (R 8 + I), 30 : Print M1 : Locate (R 8 + I), 36 : Print M2 Locate (R 8 + I), 42 : Print M3 : Locate (R 8 + I), 48 : Print M4 Locate (R 8 + I), 54 : Print M5 : Locate (R 8 + I), 60 : Print M6 Locate (R 8 + I), 66 : Print M7 : Locate (R 8 + I), 72 : Print M8 I = I + 1 Loop Close #1 Call Get Key Locate 5, 32 : Print “May” Locate 5, 44 : Print “Jun” Locate 5, 56 : Print “Jul” Locate 5, 68 : Print “Aug” R8 = 7 : I = 1 OPEN “I”, #1, “ANNUALST . FIL” Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6, M7

Input #1, M8, M9, M10, M11, M12, M13, M14, M15, M16, M17 Input #1, M18, M19, M20, M21, M22, M23, M24, T Locate (R 8 + I), 30 : Print M9 : Locate (R 8 + I) 36 : Print M10 Locate (R 8 + I), 42 : Print M11 : Locate (R 8 + I), 48 : Print M12 Locate (R 8 + I), 54 : Print M13 : Locate (R 8 + I) 60 : Print M14 Locate (R 8 + I), 66 : Print M15 : Locate (R 8 + I) 72 : Print M16 I = J + 1 Loop Close #1 Call Get Key Locate 5, 32 : Print “Sep” Locate 5, 44 : Print “Oct” Locate 5, 56 : Print “Nov” Locate 5, 68 : Print “Dec” R8 = 7 : I = 1 OPEN “I”, #1, “ANNUALST . FIL” Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5, M6

Input #1, M7,M8, M9, M10, M11, M12, M13, M14, M15 Input #1, M16, M17, M18, M19, M20, M21, M22, M23, Input #1, M24, T I = I + 1 Loop Close #1 Call Get Key Locate 5, 30 : Print “Total” R8 = 7 : I = 1 OPEN “I”, #1, “ANNUALST . FIL” Do while not EOF (I) Input #1, EN$, C$, F$, M1, M2, M3, M4, M5 Input #1, M6, M7,M8, M9, M10, M11, M12, M13 Input #1, M14, M15, M16, M17, M18, M19, M20, M21 Input #1, M22, M23, M24, T Locate (R8 + I), 30 : Print T I = I + 1 Loop Close # 1 CALL GETKEY ELSE L Print “B’ OPS Police Communication” L Print “Annual Crime Statistics Report” L Print : L Print “For Each Division” EN$ L Print

L Print “SN” : Tab (3); “Offences”; Tab(31); “Jan”; Tab (39); “Feb” L Print Tab (47); “Mar”; Tab (55); “Apr”; Tab (63); “May”; L Print Tab (71); “Jun”; Tab (79); “Jul”; Tab (87); “Aug”; L Print Tab (95); “Sep” ; Tab (103); “Oct”; Tab (111); “Nov”; L Print Tab (119); “Dec”; Tab (127); “Total” Col 8 = 26 For I = 1 To 12 Col 8 = Col 8 + 4 L Print Tab (Col 8); “M”; Col 8 = Col 8 + 4 L Print Tab (Col 8); “F”; Next I Do While Not EOF (1) Cls OPEN “I”, #1, “ANNUALST. FIL” Input #1, Y$ YY$ = STR$ (Val (Y$) + 1) OPEN “O”, #2, “FORECAST. FIL” OPEN “I”, #1, “ANNUALST. FIL” Do While Not EOF (1) Input #1, Y$, C$, F4, M(1), F(1), M(2), F(2), M(3), F(3)

Input #1, M4, F(4), M5, F(5), M6, F(6), M7, F(7) Input #1, M(8), F(8), M(9), F(9), M(10), F(10), M(11), Input #1, M(12), F(12), Total My = O : SM2 = 0 : Sm3 =0: Sm4 = 0: Smy = 0: M2y = 0 Fy = O : Sf = 0 Sf2 = : Sf3 = 0: SF4 = : Sfy = 0 : F2y = 0 For I = 1 To 12 Sm = Sm + I : Sf = Sf + 1 My = My + m (I) : Fy = Fy + F (I) Sm2 = Sm2 + I ^ 2 : Sf2 = Sf2 + I ^ 2 Sm3 = Sm3 + I ^ 3 : Sf3 = Sf3 + I ^ 3 Sm4 = Sm4 + I ^ 4 : Sf4 = Sf4 + I ^ 4 Smy = Smy + I * m (I) : Sfy + I * F (I) M2y = M2y + I ^ 2 * M(I) : F2y = F2y + I ^ 2 * F (I) Next I ‘ Store Values For Males In The A – Array Ready ‘ For Gaussian Elimination

A (1, 1) = 12 : A (1, 2) = Sm2 : A (1, 23) = Sm2 : B (1) = My A (2, 1) = Sm : A (2, 2) = Sm2 : A (2, 3) = Sm3 : B(2) = Smy A(3, 1) = Sm2 : A (3, 2) = Sm3 : A (3, 3) = Sm4 : B(3) = M2y Call Gauss (x1, x2, X3) ‘ Estimate the figures for males for the ‘next three months Fm1 = X1, + X2 * 13 + X3 * 13 ^ 2 Fm2 = X1 + X2 * 14 + X3 * 14 ^ 2 Fm3 = X1 + X2 * 15 + X3 * 15 ^ 2 ‘Store values for females in the A? Array ‘Ready for gaussian elimination A (1, 1) = 12 : A(1, 2) = Sf : AC1, 3) = Sf2 : B(1) = Fy A(2,1 ) = Sf : A (2, 2) = Sf2 : A (2, 3) = Sf3 : B (2) = Sfy A (3, 1) = Sf2 : A (3, 2) = Sf3 : A (3, 3) = Sf4 : B(3) = F2y Call Guass (x1, X2, x3) Estimate the figures for females for the next ‘Three months Ff1 = x1 + x2 * 13 + x3 * 13 ^ 2 Ff2 = x1 + x2 * 14 + x3 * 14 ^ 2 Ff3 = x1 + x2 * 15 + x3 * 15 ^ 2 Print # 2, YY$, “ ” ; C$; “ ”; F$; “ ”; Fm1; “ ”; FF1 Print # 2, Fm2; FF2 T Loop Close # 1 End Sub Sub Forecarp ‘Forecarp . Bas ‘Forecast Figure Printing Program Dm M$ (9) Cls Open “1” , # 1, “Forecast . Fil” `Input # 1, YY$ Close #1 Do Locate 10, 10 : Input “Output to Screen (P or S) : “ ; K$ K$ = U Crime $ (K$) Loop Until K$ = “P” Or K$ = “S” Cls Open “1” , #1, “Forecast. Fill” If K$ = ‘S” Then Print “B’ OPS Police Communication” Print : Print “For The Year : YY$

Locate 5, 1 : Print “SN” Locate 5, 3 : Print “Offences” Locate 5, 32 : Print “ Jan” Locate 5, 44 : Print “ Feb” Locate 5, 56 : Print “Mar” Locate 6, 30 : Print “M” Locate 6, 36 : Print “F” Locate 6, 42 : Print “M” Locate 6, 48 : Print “F” Locate 6, 54 : Print “M” Locate 6, 60 : Print “F” R8 = 7 : I = 1 Do while not EOF (1) Input #1, YY$, C$, F$, M1, M2, M3, M4, M5, M6 Locate (R8 + I), 1 : Print C$ : Locate (R8 + I), 3 : Print F$ Locate (R8 + I), 30 : Print M1 : Locate (R8 + I) 36 : Print M2 Locate (R8 + I), 42 : Print M3 : Locate (R8 + I) 48 : Print M4 Locate (R8 + I), 54 : Print M5 : Locate (R8 + I) 60 : Print M6 I = I + 1

Loop Close #1 Else L PRINT “B’ OPS POLICE COMMUNICATION” L Print : LPrint “For the Year : “; YY$ Lprint Lprint “SN”; TAB(3); “Oddwnxwa”; Tab(31); “Jan”; Tab(39); “Feb” Lprint Tab (47); “Mar” Col 8 = 26 For I = 1 To 3 Col 8 = Col 8 + 4 Lprint Tab (Col 8); “M”; Col 8 = Col 8 + 4 Lprint Tab (Col 8); “F”; Next I Do While Not EOF (1) For I = 1 To 9 Input #1, M$ (I) Next I Lprint M$ (2); Tab(3); M$(3); Col 8 = 26 Total = 0 For I = 4 To 8 Step 2 Col 8 = Col 8 + 4 LPrint Tab (Col 8); M$ (I + 1); Total = Total + Val (M$ (I)) + Val (M$ (I + 1)) Next I L Print Tab (60) : Total Loop End if

Close #1 YY$ = Input $ (1) End Sub SUB GET KEY Locate 24, 10 : Print “Press Any Key To Continue” Do A$ = INKEY$ Loop Until A$ < > “ ” END SUB ———————– FORCE COMMUNICATION STATE COMMUNICATION DIVISIONAL COMMUNICATION Cls Screen 9,0,0 color 3 Finish $ = “N” Dowhile finish $ = “N” For J = 1 To 24 Locate J, 1 For I = 1 To 80 Print Chr $ (178) Next I: Next J Locate R + 1, C:? “Main Menu” Locate R + 2, C:? “1. Record Input” Locate R + 3, C:? “2. File Maintenance” Locate R + 4, C:? “3. Report generation and Printing” Locate R + 5, C:? “4. Statistical Presentation”

Locate R + 6, C:? “5. Exit” MYCHOICE = 0 DO WHILE MYCHOICE < 1 OR MYCHOICE > 5 LOCATE R + 10, C:INPUT “YOUR CHOICE PLEASE (1-5):” MYCHOICE LOOP IF SELECT CRIME MYCHOICE CRIME 1 CRIME 2 CRIME 3 CRIME 4 CRIME 5 Finish $ = “Y” End selected Locate 24, 10 Print “Press Any key To” “Continue” Do A $ = In keys Loop until A$ <> “ “ END SUB EXIT CRIME 1 SUB REC INPUT ASSIGNMENT BOX IF PRINT = “KEY” “Murder” “Suicide” “Wounding” “Assault” “Kidnapping” “Rape” “Armed Robbery” “Stealing” “Burglary” “Arson” “Narcotics” “Traffic Offeence” House Breaking “Store Breaking” Miscellaneous” STOP CRIME2 SUB FILEMAIN ASSIGNMENT BOX IF MAIN = “y” DISPLAY RECORD DELETE RECORD REMOVE DELETE RECORD EDIT RECORD EDIT RECORD EXIT STOP CRIME 3 SUB REPORT GN ASSIGNMENT BOX IF MAIN T$ = “y” Generate Monthly Report EXIT Generate Annual Report Generate Fore Cast Report Print Monthly Report Print Annual Report Print Annual Report IF EN =3 FEB MAR APR MAY JUN JUL CRIME 4 SUB ANNUALST INPUT “DIV”; EN IF EN =2 IF EN =1 JAN JAN FEB FEB MAR MART APR APR MAY MAY JUN JUN JUL JUL AUG AUG AUG SEP SEP SEP JAN STOP OCT OCT OCT NOV NOV NOV DEC DEC DEC STOP STOP

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyStudyWriters
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Criminal Justice
The paper was not accused of plagiarism and was written very well. I will let you know the grade once it is graded. Thank you
Customer 452671, April 26th, 2021
Great job
Customer 452773, February 13th, 2023
Customer 452591, March 18th, 2021
Business and administrative studies
Thank you
Customer 452773, March 19th, 2023
English 101
great summery in terms of the time given. it lacks a bit of clarity but otherwise perfect.
Customer 452747, June 9th, 2021
Business and administrative studies
excellent job
Customer 452773, March 12th, 2023
Impressive writing
Customer 452547, February 6th, 2021
Business and administrative studies
Excellent job
Customer 452773, March 9th, 2023
Business and administrative studies
Customer 452773, February 23rd, 2023
Thank you!!! I received my order in record timing.
Customer 452551, February 9th, 2021
Business and administrative studies
great job as always
Customer 452773, February 26th, 2023
Business and administrative studies
excellent paper
Customer 452773, March 3rd, 2023
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes



eskişehir eskort



eskişehir eskort

Live ChatWhatsApp