International Journal of
Physical Sciences

  • Abbreviation: Int. J. Phys. Sci.
  • Language: English
  • ISSN: 1992-1950
  • DOI: 10.5897/IJPS
  • Start Year: 2006
  • Published Articles: 2573

Full Length Research Paper

Performance evaluation of law enforcement agency on crime information management using queuing network model

Chikodili H. Ugwuishiwu*
  • Chikodili H. Ugwuishiwu*
  • Department of Computer Science, University of Nigeria, Nsukka, Enugu State, Nigeria.
  • Google Scholar
Mathew C. Okoronkwo
  • Mathew C. Okoronkwo
  • Department of Computer Science, University of Nigeria, Nsukka, Enugu State, Nigeria.
  • Google Scholar
Caroline N. Asogwa
  • Caroline N. Asogwa
  • Nnamdi Azikiwe Library, University of Nigeria, Nsukka, Enugu State, Nigeria.
  • Google Scholar


  •  Received: 28 October 2016
  •  Accepted: 23 February 2017
  •  Published: 28 February 2017

 ABSTRACT

One of the greatest challenges facing every society today is crime control and management. It could be as little as pick–pocketing, or human trafficking, or even as deadly as terrorism. As criminal’s perfect ways of avoiding being detected, Law Enforcement Agencies (LEAs) must adopt innovative ways on crime prevention and control. This research applies Queuing Network (QN) model to evaluation the performance of LEAs on crime information management. The QN comprise two queuing theory models; single server (M/M/1) and multiple server (M/M/m) queuing models. To implement this model, crime data was collected from Eleme (2012) and Nsukka (2013) police stations with a table format to capture the timing such as case arrival time, service time (investigation and handling time) and termination time. The model was implemented using PHP programming language Excel application was used to plot some graphs to observe the system’s behaviour. The case timing captured (input data) were used to calculate the queuing theory performance measures (model parameters). Results from the analysis shows how many cases were handled by how many staff members in a specified period of time. This model will make LEA’s crime management system visible at different levels (local, state and federal) to both government, LEA’s admins and general public. Government can assess the LEA’s performance at any time. Use of this model will improve LEA’s productivity and public security as well.

Key words: Crime management, information system, law enforcement agency, performance evaluation, queueing network, single server queuing model, multiple server queueing model.


 INTRODUCTION

The driving force behind the continued adoption of information technology (IT) has been an ever increasing need to organize, and more rapidly access information necessary for the performance of various activities of government, non-governmental agencies, organizations and equally the Law Enforcement Agencies (LEA) (Texas Department of Public Safety, 2016).Today,appropriate application ofI Ti savery critical success factor for optimum functioning of any organization. LEA is one of the four major components of the criminal justice system along with prosecutors, courts and corrections agencies. LEAs at different levels of governments are charged with the responsibilities of providing first response to emergencies and threats to public safety, the protection of certain public facilities and infrastructure, maintenance of public order, and protection of public officials (Ehindero, 2006). The effective sustenance of any society is hinged on an efficient law enforcement process (Emmanuel, 2005). There are many LEAs and other governmental agencies established by government as a laudable effort towards crime prevention and control, yet crime is on the high rate of prevalence in the world today (Anthony, 2013).
 
In a developing country with high population density like Nigeria, it is becoming more difficult for the LEAs to control law and order, leading the society to an increase in the rising wave of crime. Unautomated static nature of the LEA’s system has made crime information flow within LEA to be inefficient. This results to a long term crime information processing, bribery and corruption, lack of appropriate flow of information in difference levels of LEA, etc. Crime information in LEAs is sometimes handled indefinitely without any body querying what is happening in the system. Based on the aforementioned problems, there is need to use an appropriate modelling approach to support the operations of the LEA such as time of capturing crime data from an informant to an agency, and throughout the life of that crime case within any of the agencies. This enables visibility of the operations of LEA crime information management to the government and the public at large. For this purpose, queueing Network model as an aspect of queueing theory (QT) concept was adopted.
 
QT deals with one of the most unpleasant experiences of life, that is, waiting. It is the mathematics of waiting lines. It is useful in predicting and evaluating system performance (http://williams.comp.ncat.edu/comp755/Q.pdf). QT is often used when making business decisions about the resources needed to provide an effective service. Queuing models help managers make decisions that balance service costs with waiting-line costs.
 
This article deals with how LEAs especially in developing countries capture crime information electronically and manage it at different levels of their operation (local, state and federal). The focus of the research is to apply queuing network model to evaluate the performance of LEAs on crime information capture and management to support the LEAs in performing their duties.
 
In order to apply this queueing network effectively, an Integrated Crime Information System (ICIS) for LEAs was developed to enable electronic crime information to be reported to LEAs by an informant or any crime eye witness within the country. This system captures relevant time during the flow of  this  report  such  as:  crime  case arrival time, time it was received by a receptionist staff (e.g. police station), time the case was forwarded to an officer that will handle the case, time investigation started and ended. If this crime case is forwarded to a higher level (state or federal), the system captures the time for that level (Ugwuishiwu, 2016).
 
Queueing model input parameters; case arrival rate (l) and case service rate (µ) were used to calculate the performance measures of the two models used in this work such as average number of customers in the system, average time a customer spends in the system, average number of crime cases waiting on the queue etc. Analysis was carried out on the result generated from the performance evaluation and some useful results were obtained. QN was used to determine the rate of crime information flow in LEA’s system, how long it takes a reported crime case to be processed and terminated or forwarded to a higher level and the expected number of staff in LEA offices to control resource waste on redundant workers.


 LITERATURE REVIEW

Crime is a threat to the economic, political and social security of a nation and a major factor associated with underdevelopment; because it discourages both local and foreign investments, reduces the quality of life, destroys human and social capital, damages relationship between citizens and the states, thus undermining democracy, rule of law and the ability of the country to promote development. So, the prevalence of crime in the world today is a cause for serious concern for all (Anthony, 2013). Government has adopted several strategies towards crime prevention and control such as establishment of security agencies like State Security Service (SSS), Independent Corrupt Practices and other offences Commission (ICPC), and the Economic and Financial crime Commission (EFCC) (Anthony, 2013). Government also approved community crime control and prevention strategies such as vigilante groups (Nwaeze, 2010) and yet as a matter of fact, many have lost faith in the security agencies going by the incessant increase in the crime rate. Due to the presence inefficiency of the LEA, a tool (QT) developed by Erlang in the beginning of 20th century is adopted as a strategy to assist LEAs in crime management for better performance.
 
QT constitutes a powerful tool in modelling and performance analysis of many complex systems, such as computer networks, telecommunication systems (e.g. telephone exchange), manufacturing systems and service systems (petrol station, supermarket, hospital etc.). Telephone exchange is the first problems (congestion problems) solved using queueing theory and was done by Erlang (Bandi et al., 2013; Quantitative Module D, 2009). His works inspired engineers,mathematicians to deal with queueing problems using probabilistic methods (Filipowicz and Kwiecien, 2008; Sztrik, 2012).
 
A queueing system most life scenario consists of three main components namely: inputs source, queue and servers at service centres as shown in Figure 1. Generally, it consists of one or more servers for serving customers arriving in some manner and having some service requirements. The customers (entities) represent users, jobs, crime cases, machines, customer order, electronic messages, transactions or programs. They arrive at the service facility for service, wait if the service cannot start immediately, and leave the system after being served. Sometimes customers are lost. Queue might be a physical line, customers on hold, jobs waiting to be printed, planes circling airport etc (https://www.me.utexas.edu/~jensen/.../powerpoint/or.../14_queuing.ppt).
 
 
The queueing systems are described by distribution of inter-arrival times, distribution of service times, the number of servers, the service discipline and the maximum system capacity etc.
 
How long customer waits on queue depends on a number of factors; number of people served before, the number of working servers, queuing system design and the amount of time it takes to serve each customer. Any time there is more demand for a service than can be provided, a queue forms (Waiting Line Models Supplement C, 2001).
 
In a queuing system, managers must decide what level of service to offer; a low level of service may be inexpensive, at least in the short run, but may incur high costs of customer dissatisfaction leading to lost future business and costs of complaints, while high processing costs of complaints. A high level of service will cost more to provide and will result in lower dissatisfaction costs. Because of this trade-off, management must consider the optimal level of service to be provided.
 
Types of queuing models
 
In this work, two queuing models were used among the existing varieties of them. These queuing models include: Single    server   (M/M/1)    and   Multiple-Server    M/M/m queuing model.
 
Single-server queuing model (M/M/1 queue)
 
Figure 2 shows single server queueing model (M/M/1), first M denotes exponentially distributed inter arrival time, second M denotes exponentially distributed service times and 1 denotes single server. The model follows some basic assumption such as: Poisson arrival process and exponential distribution service-times, First-in-First-out discipline, a multi-service phase (network of queues), the service rate is greater than the arrival rate (stability condition) and no item is discarded from the queue. Following the assumptions, the performance measures of the model is calculated. Performance measures are carried out to help managers make decisions that balance service costs with waiting-line costs.
 
 
Multiple-server queuing model (M/M/m)
 
The M/M/m model assumes m identical servers as shown in Figure 3 with the following assumptions, M/M/1 assumptions inclusive. All servers are equally loaded (parallel) and all servers have the same mean service time (µ). The parameter measures for this model provides the same information as in M/M/1. This model with infinite servers is called the M/M/∞ queue.
 
 
Queueing network
 
A queueing network model as a concept of queuing theory is composed of several interconnected stations, each with a queue. Customers, upon the completion of their service at a station, may re-enter the same service centre, moves to another station for additional service or leave the system according to some routing rules (deterministic or probabilistic). In a queueing networks, customers must receive service at some of or all the service facilities (Stallings, 2000; Wang, 2009; Bose, 2015). Queueing networks have been proved to be a powerful  tool  for   performance  analysis  and  prediction  (Balsamo, 1988).
 
Three types of Queueing network are: open, closed and mixed queuing network. Open queuing network allows jobs to enter and depart from the network. In a closed queuing network, jobs neither enter nor depart from the network. Queueing network is mixed if it is open for some types of customers and closed for other types of Customers. Open queuing networks has two types: Open feed forward and open feedback queuing networks. In an open feed forward queuing network, a job cannot appear in the same queue for more than one time. In an open feedback queuing network, after a job is served by a queue, it may re-enter the same queue (ITU{D SG 2/16 & ITC, 2001).
 
This research work adopted the open feed forward queueing network comprising single server queueing model (M/M/1) and multiple-server queueing (M/M/m) with Poisson Arrivals and Exponential Service-Times.
 
Queuing  network systems have been developed and applied in many human endeavour as in products made in a plant that usually pass several production stages with different machines which may experience delays in packing and billing, a computer job may be delayed at several successive visits to a processor and to memory devices, and also at the printer and finally, a message traveling from sender to receiver along a path in a communication network may have to wait at the entrance to the network, and also in various switches between the successive channels (Boxma, 2008).
 
Filipowicz and Kwiecien (2008) developed Queueing Network-Model Human Processor (QN-MHP) to model human behaviour. The model integrated the queueing network and human cognitive system. It was used to determine the reaction time (delay) between stimulus presentation and response. Information traversing servers (different brain area) is regarded as the customers of queueing network. The QN-MHP consists of three subnetworks of queueing servers: perceptual, cognitive and motor. Each subsystem of QN-MHP is a single-channel server that follows FIFO queue discipline.
 
The performance analysis of information system as reviewed in Filipowicz and Kwiecien (2008) helps to identify system bottlenecks and compare design alternatives (Filipowicz and Kwiecien, 2008). Queueing network was used to solve the problem of quick access to information resources in information systems by minimizing search time (reduction time of delivering information to users).The work also evaluated response times for different system load conditions for selected information systems.
 
Fomundam and Herrmann (2007) deals with contributions and applications of queuing theory in the field of healthcare. This work covers processes that provide direct patient treatment and processes that provide auxiliary services such as pharmacy and medical laboratory processing. The result from this work was summarized in areas such as: waiting time and utilization analysis, system design, and appointment systems. The author reported that the main challenge encountered was how to reduce patient waiting time without greatly increasing server idleness. The goal is to provide sufficient information to analysts who are interested in using queuing theory to model a healthcare process.
 
Ameh et al. (2013) discussed application of queueing theory in computer networks. Vast volumes of data organized into packets and supervised by communications protocols are constantly flowing across telecommunications networks, usually via intermediate nodes. At node, the incoming packets are queued to be sent according to network availability. Here customers represent packets, the queues are at routers, and the service time is the time to send a packet, bit-by-bit through an output gate of a router, hence it is proportional to the size of the packet.
 
A research was also carried out on obtaining demographic characteristics and the time spent on the queue by patients before seeing a doctor, time spent with the doctor, their views about the time spent on the queue and useful suggestions on how to reduce the time spent on the queue. The queuing method employed at the clinic is the multiple single channel type and the service discipline is priority service (Wu and Liu, 2009).
 
Wu and Liu (2009) developed a Visual Basic Application in Excel (VBA) software package to predict human performance and mental workload in multiple task situations. The study showed that naive users without prior simulation language programming experience can model human performance and mental workload in a complex multitask situation within 3 min; and this software package can save 71% of modelling time and reduce 30% of modelling errors.
 
In Ritchey (1996), state-dependent importance sampling heuristics was developed to estimate the total network overflow probability for different types of networks. It applied simulation to minimize losses during the transmission. The networks that were considered include: Jackson networks of nodes in tandem, in parallel, feed-forward networks and networks with feedback, as well as a 2-node non-Markovian tandem queuing network.
 
From the above review, it is obvious that theory of queueing network could be applied in numerous areas of life including operations of the Law Enforcement Agency. In this work, the customers come in form of crime cases, the servers are the LEA’s staff, the queue is formed with the crime cases waiting to treated when all the servers (staff) are busy with other cases applying FCFS queueing discipline.
 
 
 

 


 METHODOLOGY

This research adopted queuing network model concept in form of table as a research methodology as shown in Table  1. Data used for analysis and implementation in this work was collected from Eleme Police Station, Port Harcourt (2012) and Nsukka Police Station (2013) using a table format as shown in Table 1. This data was tested to prove that it follows the Poison and Exponential statistical distributions as mentioned on the assumptions of the model. To implement the queueing network model, a computer program was developed using PHP  programming language. The program takes as inputs the case arrival rate ( l) which is calculated from inter-arrival time of cases as inverse of the expected inter-arrival time (1/expected inter-arrival time), case service rate (µ) which is calculated from service time of cases as the inverse of expected service time (1/expected service time), number of servers (that is, number of workers working on the arriving cases) and year the crime data was collected. Queueing model input parameters were used to calculate the performance measures of the two models: M/M/1 and M/M/m used such as average number of customers in the system, average time a customer spends in the system, average number of crime cases waiting on the queue, average time a case spends waiting in the queue, utilization factor for the system etc. Analysis was carried out on the results generated from the performance evaluation and some useful results were obtained.
 
 
Figure 4 shows the queueing network system structure of M/M/1 and M/M/m queuing models that was built by handling each of these two models independently before merging the result in accordance with Burke’s theorem (Balsamo and Marin, 2007). The queueing network system captures the time of arrival, departure time of each case both in M/M/1 and M/M/m system, service time (departure time – arrival time) inter arrival time of two consecutive arrivals (case 2 arrival time – case 1 arrival time). These are input data to the system from where arrival rate and service rate are calculated.
 
 
The Queueing Network System notation descriptions and algorithm
 
Table 1 shows  the definition of notations in Queueing Network Model structure. The pseudo code below shows the steps followed in implementing the Queueing Network used to determine how long a crime case stays in the crime information system.
 
Read crime data/information from the database
Input the number of servers and year.
Sort the crime data into months (January, February, …December).
Loop through the months (January to December) of the selected year
Read a month
Read up all the arrival time of cases to M/M/1 system recorded in a specific month.
Read up all the departure time of cases from M/M/1 system recorded in a specific month.
Calculate inter-arrival time of cases to M/M/1 system (time difference in two successive arrivals measured in days).
Calculate mean inter-arrival time of cases to M/M/1 system (total of inter-arrival time/total number of arrivals in a month).
Calculate arrival rate (lq1) of cases to M/M/1 system (inverse of mean inter-arrival time)
Calculate the service time at M/M/1 system (departure time of a case - arrival time of a case).
Calculate mean service time of M/M/1 system (total service time/total number of cases serviced in a specified month).
Calculate the service rate (µq1) of M/M/1 system (inverse of mean
service time).
Read up all the arrival time and departure time of cases in M/M/m system.
Calculate the service time at M/M/m system (departure time of a case - arrival time of a case).
Calculate mean service time of M/M/m system (total service time/total number of cases serviced in a specified month).
Calculate the service rate (µq2) of M/M/m system (inverse of mean service time).
Calculate the probability that a case is considered genuine at M/M/1 node denoted as P (total number of genuine crime cases/total number of reported crime cases)
Calculate the arrival rate (lq2 = lq1 * P) of M/M/m model                (1)
 
Calculate the queuing parameter measures
 
Calculate the utilization factor (rq1 = lq1q1) of M/M/1 model         (2)
 
Calculate the utilization factor (rq2 = lq2q2) of M/M/m model         (3)
Calculate the prob of ni jobs in the ith queue of M/M/1, P(ni) = (1 - ri) rini…                                                                                               (4)
 
Calculate the prob that no customer is in the sys:                                                                     (5)
Calculate the prob of k customer in the system:               ..                                                                                     (6)
 k≤m     k>m
Calculate the total expected number of waiting cases in the entire system, Lq
M/M/1 queue:                                                       (7)
 
M/M/m queue:                                       (8)
 
Entire system: Lq = Lq1 + Lq2
 
Calculate the expected busy server of M/M/m;                (9)
 
Calculate the expected number of customers in M/M/m system L.
 
                                              
 
Evaluate total no of customers in the entire system (L) = L1 + L2 (12)
 
 Calculate expected waiting time for both queues, Wq
 
                                                           
 
Calculate the expected response time in the entire queuing network, W.
 
M/M/1 system:                                                           
 
 
 
Evaluate W = W1 + W2                                                  (18)
 
Calculate the Prob of status of each case handled by the agency (local level).
Prob. that a crime case handled was treated and terminated Ptt ………..
Prob. that a crime case handled was transferred to state level of the
agency Pts: ……..
Prob. that a crime case handled was charged to court Pcc:…..
Prob. that a crime case handled was undetected or pending Pun: …
Check the last month used
If month is not equal to December then repeat step 2.1- 2.12.3
4.1 Else go to step 5.0
Display Results
Print all the results in tabular form
End
 
Some of the algorithm parameters definition
 
Here definitions of some parameters in the algorithm that were not clearly defined within the algorithm are presented as shown in Table 2.
 
 
Study input and output designs
 
The input designs used in the research work is as shown in Table 3. Table 3 is the table format used to collect real data manually from the two Police stations.
 
 
Table 4 shows the queuing model output design. The output is made of 12 rows numbered 1 to 12 with months January to December. This table displays the values of parameters obtained from queuing network model implementation. These parameters were defined in the algorithm above that led to the implementation.
 
 
 

 


 RESULTS AND DISCUSSION

Here showed results, its analysis and discussions obtained from implementation of the queueing network model using  2013 crime data collected.Figures 5 and 6 are the snapshot results of parameters as shown in Table 2 for the years 2012 and 2013. Also, the analysis and discussion of results obtained from the queueing network model is as shown in graphs in Figures 7 to 13. The analysis was done by performing sensitivity analysis on the different parameters of the model to observe or study the entire system behaviour. Sensitivity analysisis done by keeping one or more parameter(s) constant and varying the other in order to understand the behaviour of the modelled object. These graphs were plotted using MS Excel application. Figure 6 shows the queuing model results that was analysed to plot some graphs earlier mentioned.
 
 
 
 
 
 
Analysis of Queueing Network results
 
Here contains a presentation of analysis of the queuing network result in a graphical form.
 
Response time (w) and w2 of M/M/m and the entire system against the Number of servers
 
Figure 7 shows that arrival rate and service rate remain constant while the number of servers vary. Here, it is observed that beyond five servers, the response time remains approximately constant regardless of the increase in the number of servers. This means that system needed maximum of five servers for its effective operation and keeping more than 5 workers makes them redundant which leads to waste of resources. From the graph, it is observed that it remains constant instead of tending to zero. The reason is because, provided that there are cases in the system, time must be spent in handling them. It is expected to have zero time when there are no cases in the system. The minimum time required is always dependent on the case ongoing (serious or less serious).
 
Comparison of parameters: The findings in the above graph is summarized as follow:
 
1) Increase in the number of servers decreases the response time
2) There is always an optimal number of servers (5) beyond which response time remains constant.
Graph of W2 and W look alike because the bulk of the whole job is at the second queue (M/M/m) where the cases are actually investigated on and handled.
 
Response Time of M/M/1 against number of servers
 
Figure 8 shows that the arrival rate and service rate are constant while the number of servers vary. It is observed that as the number of servers increase, response time remains constant because increase in the number of servers does not affect the M/M/1queuing model.
 
Response Time of w1, w2, w against number of servers for March 2013
 
Figure 9 shows the relationship between Number of Server, Response Time of M/M/1 model (W1), M/M/m model (W2) and the entire system (W1 + W2 =W) at constant Arrival and service rates. It is observed from this graph that increase in the number of server does not affect the time spent on the M/M/1 system and cases usually spend less time in the said system than in M/M/m system. We can also observe that the bulk of the whole work is in the M/M/m system where the case is actually being handled. This is the reason time spent in M/M/m is very close to the total time spent in the entire system (W).
 
Queue length of M/M/1 queue against Utilization factor
 
It is expected that in Figure 10, increase in queue length increases the utilization factor. Utilization factor is the percentage of time a server is busy. The reason is that servers can only be busy when there are customers on the queue. The zig-zag nature of the graph might be that the server has been busy handling a severe case that requires a very long time.That is atalmost constant queue length the server’s business continued to increase.
 
Response time against Service rate
 
In Figure 11, it is expected that increase in service rate will result to a decrease in the response time. This is because, when the rate at which customers are being attended to is high, the time a customer spends on the queue and in service reduce. In some cases, the nature of a case may cause a constant response time at an increase of service rate, for instance, some cases may take a long time to finish while some take little time to be handled.
 
Expected busy server /Number of servers
 
Result   from   Figure  12  shows  that  as  the  number  of servers increase, expected busy server decreases at constant arrival and service rate. This is because the available cases are going to be shared at constant arrival rate and service rate. The expected busy server is a percentage of time servers that are busy. The smooth nature of the curve emphasizes that the server are parallel, meaning that they all have the same processing power (any of them can handle any case with the same capacity).
 
Number of customers in the entire system (L) against number of servers
 
Figure 13 shows that increase in the number of servers significantly reduces the number of customers at constant arrival rate and service rate. Note that the increase in the number of servers only affects the M/M/m model (Lq2)
because M/M/1 has nothing to do with more than one server.
 
The time captured for these individual cases helps to know how long a case has stayed in any agency level before leaving the agency. The model can also be used to know the detailed mode of operation such as the number of cases that arrived in a specified period of time, the efficiency of the system in terms of workers utilization capacity. Result from this queueing model enables LEA administrators to have an estimate on the number of workers needed in their offices for effective operation based on the crime case arrival at a particular period of time. The data analysis on the queueing network model shows the following values: at 2 servers, W (total time spent in the entire system) is 2.07097115; at 3 servers, W is 1.41746454; at 3 servers, W is 1.32997128 up to 10 servers. The result shows that beyond 5 servers, W remains constant meaning that the system needed maximum of 5 persons for an effective operation. The results of the system helps managers of organization to make effective decision on a way forward of the organization. Finally, result from these models also shows that it also helps in crime control. This means that when crime cases are handled instantly as it comes without much delay and prejudice, and the suspect or culprit is punished appropriately, others who are developing criminal intention may be discouraged because of the fear of severe punishment emanating from disobeying the law by committing crime.
 

 


 CONCLUSION

In   this   work,   the   queuing  network  model  has  been implemented to evaluate the performance of LEA on crime information management. Since parameters such as time cases spent on both queues (Wq1 or Wq2) and servers (W1 or W2), total time taken by each case to be handled were calculated as shown on the algorithm above; this enables LEA’s administrators to know the capacity of their staff members and the entire office i.e. how efficient the workers are in terms of how many cases handled in a specified time. This system also enables the admin to predict the number of workers expected in his or her office based on the rate of arrival of case in a specified time.
 
This work shows that queueing theory provides an effective and powerful modeling technique that helps LEAs in a more effective decision making to achieve their statutory goals. When results from the model are implemented, it leads to improvement on public security measure and more productivity of the LEAs.
 
Appropriate application of this system, solves the problems of staff redundancy, resource waste by government due to over staffing, under staffing due to miscalculation by the management and finally enhances the visibility of operations of the LEAs to government and the public at large.
 
It is recommended that in fuure  priority queuing discipline may be used instead of first come first served applied in this work to accommodate cases that may be handled urgently. Further research may also include multiple queues, multiple servers in order to observe area of specialization of staff if need be.
 
 

 


 CONFLICT OF INTERESTS

The authors have not declared any conflict of interest.



 REFERENCES

Adan I, Resing J (2015). Queueing Systems. Department of Mathematics and Computing Science. Eindhoven University of Technology, Netherlands. 

View

 

Ameh N, Sabo B, Oyefabi M O (2013). Application of queuing theory to patient satisfaction at a tertiary hospital in Nigeria. 
Crossref

 

Anthony IA (2013). Social Factors Affecting Effective Crime Prevention and Control in Nigeria. Int. J. Appl. Sociol. 3(4):71-72.

 

Balsam S, Marin A (2007). Queueing Networks. Università Ca' Foscari di Venezia, Dipartimento di Informatica, Venezia, Italy, School on Formal Methods. 
Crossref

 

Balsamo S (1988). Approximate Solution of Queueing Networks Based on Exact and Bounded Aggregation Technique, ITC 12 Torino. 

View

 

Balsamo S, Marin A (2007). Queueing Networks. Università Ca' Foscari di Venezia, Dipartimento di Informatica, Venezia, Italy, School on Formal Methods. 
Crossref

 

Bandi C, Bertsimasy D, Youssef N (2013). Robust Queueing Theory. 

 

Bose SK (2015). Queues and Queueing Networks. 

View

 

Boxma OJ (2008). Stochastic Performance Modelling. 

View

 

Ehindero S (2006). The Role of Law Enforcement Agencies in the Promotion and Sustainability of Participatory Democracy and Rule Of Law. 

View

 

Filipowicz B, Kwiecien J (2008). Queueing systems and networks, Models and Applications. Bull. Polish Acad. Sci. Tech. Sci. 56(4).

 

Fomundam S, Herrmann J (2007). A Survey of Queuing Theory Applications in Healthcare", ISR Technical Report. 

View

 

ITU D SG 2/16 & ITC (2001). Teletraffic Engineering Handbook, Villy B. Iversen COM Center,Technical University of Denmark, Draft. 

 

Nwaeze RI (2010). Vigilantism and Crime Control in Contemporary Nigeria: A Study of Udenu Local Government Area of Enugu State. M.sc Thesis, University of Nig, Nsukka. 

 

Quantitative Module D (2009) Waiting-Line Models.

 

Queueing Theory (2013). 

View

 

Queuing Systems (2012). 

 

Ritchey T (1996). Introduction to System Analysis and Design. 

View

 

Stallings W (2000). Queuing Analysis. 

View

 

Sztrik J (2012). Basic Queueing Theory. University of Debrecen, Faculty of Informatics. 

View

 

Texas Department of Public Safety (2016). Texas Law Enforcement Telecommunication System (TLETS), pp1. 

View

 

Ugwuishiwu CH (2016). Development of a Real-Time Integrated Crime Information Model. Ph.D. dissertation, University of Nigeria, Nsukka, Nigeria.

 

Waiting Line Models supplement C (2001). 

View

 

Wang JY (2009). Operation Research II. College of Management, NCTU, spring 

View

 

Wu C, Liu Y (2009). Development and evaluation of an ergonomic software package for predicting multiple-task human performance and mental workload in human–machine interface design and evaluation, Department of Industrial & Operations Engineering, University of Michigan, USA, P 1.

 




          */?>