Efficient Approach for Security Information Retrieval by Using Grid

: Problem statement: This article communicated an approach for determining the exact location/position of the target(s) (human) by applying Grid (matrix) method. Approach: The Main-Grid in-return further grouped into Mini-Grids; which will provide the target(s) information. To accomplish this idea the whole scenario is divided into three phases. Results: In the first phase data is collected from the targeted area, in second phase data activation/procedure(s) takes place at the target(s), whereas in the third phase data was processed to obtain the required results for the target(s). Conclusion/Recommendations: This study provided details on the first phase. It is faster in gathering data about the exact target location. It is also worth noticing that this approach is efficient, accurate and require very less processing time. The results achieved by this approach are highly reliable.


INTRODUCTION
The horrific scale of destruction caused by the terrorist attacks has ushered in a period of global uncertainty on various fronts: political, economic, military and technological. In essence, terrorism involves the use of violence to achieve political objectives, by deliberately trying to inflict mass casualties or cause other forms of costly damage against civilian/government populations. It is a form of psychological warfare, as the terrorist acts are designed to frighten targeted populations and attract global attention [1][2][3] .
Currently all nations are facing an economic crisis coupled with increasing insurgency concerns from militant organizations. Almost 40-60 percent of the budget of these nations is being spent on trying to accommodate these challenges, but still the results achieved are not encouraging [4][5][6][7] . This is mainly due to the fact that there are less sources of information involved in such undertakings and the field of Information Technology (IT) has not been fully utilized to stem these crises [8] .
To successfully, access, collect and timely interpret intelligent information is critical. Technology can be deployed to secure, control and deny critical access and information, in order to reduce the capability to inflict damage. The current trends in technological development point toward a combined use of several technologies such as biological technologies, robotics, information technology and nanotechnology in the fight against global terrorism. Developments in information technology facilitate data collection, analysis, security and integration; robotics can facilitate remote surveillance, the distancing of dangerous substances from human control, while biotechnologies can facilitate identification of biological hazards, forensic tools [9][10][11][12] .
Many countries have introduced identity cards and passports with a fingerprint and facial biometric/ facial-recognition and fingerprint-biometric technologies to control immigration. Scientific discoveries and breakthroughs, especially in information technology, are redefining how to plan, mobilize and engage in battles. For instance, consider the Internet and other national communication infrastructures. Similarly, there is a budding collection of research in the computer and information sciences domains that addresses new algorithms, techniques, models and methods for engaging in the battlefield with insights on everything from sensor technology to complex information discovery models. Research on terrorism is housed in the legal domain, philosophical studies (especially in ethics and law), management (especially crisis management), health sciences and engineering sciences. There is, however, a dart of cross-disciplinary research that involves meshing of two disciplines, e.g., computer science and public policy [13][14][15] .
The modern information theory and communication theory, it is often desirable to apply matrix techniques to simplify the problem by giving it  the form of mathematical expression, on which logic can later be applied [16][17][18][19] . Previously many methods are adopted for scanning objects such as laser beam, radio frequency, e-tags, cards, wireless technology and sensor for information gathering. The source used for information collection and, later processing this information to achieve the desired target, is implemented by using Grid [20][21][22] . This paper is divided into different sections and sub-section; the next section communicates materials and methods, with sub-section on the proposed architecture followed by the complete theory for Grid are analyzed and followed by the implementation of the algorithm. In the second last section results are given and in the last section conclusions are discussed.

MATERIALS AND METHODS
Proposed architecture: The proposed architecture, illustrated in Fig. 1, involves data collection from the area and fed into the processing phase. If the alert signal is raised from the database for certain area, the security panel desk will observe alert signal on their screen for further action. These alert signals have been clustered together by standard correlation and datamining techniques for further information processing. Proposed approach applies a recognition process to this observation by using the databases search.  This process involves first identifying individual(s) and then aggregating these observations into larger, coherent sets (composition). The results are then presented, along with information requests for that recommend targeted investigations for confirmation and alert the security personal around that individual(s) in the area/crowd to block in-progress attack(s). It is very important to make sure that database is made high level secured during operations.
Theoretical approach: A 'Grid' or 'Square matrix' will read data continuously from the area/ground and send it to the database for processing. Each Grid is a combination of 'Mini-Grids' with unique addresses. The structure of Grid is explained as follows: Grid network: When need arises the Grid network will be activated as shown in Table 1.
The size of the Grid network is fixed as shown in Table 1. The number of Grid network used depends during operation(s); one or many Grid(s) network may be involved for information collection(s), so it may be sequential or random selection of Main-Grid(s) from the Grid network.
Activating Main-Grid: All the grids in the Grid network are known as Main-Grids as shown in Table 1. The concerned Main-Grid in-return is the combination of Mini-Grids, which is activated for the information. The range of the sub-sections is set up inside the Mini-Grid, for example, if information is reported from the number '00234'; (the reading sequence is from right to left) which in-return represents column number '4', row number '3', Mini-Grid number '02' and finally Main-Grid number '0' as shown in Table 2.
The field width for a column is only one character, in-case of a row it is also one character, for Mini-Grid two characters and for Main-Grid two characters. The proposed algorithm will read the source number(s) from right to left. In the above number '00234', let suppose the position of '0' is changed, the new number '02034' will have different representation as shown in Table 3.    When ever change(s) in positions of numbers occur that will be immediately reported according to its address position to activate the concern Main-Grid or Mini-Grid.
Suppose from the Grid network, the Main-Grid-0 is selected and in-return the Mini-Grid-00 is activated later, then the complete coverage of information is as shown in Table 4. Table 4 shows the Main-Grid-0 schema, starting from Mini-Grid-00 and terminating at Mini-Grid-99. The entire Main-Grid-0 sub-sections (Mini-Grids) will hold a unique address. The next Mini-Grid in operation will be either Mini-Grid-01 or Mini-Grid-10 or any other Mini-Grid(s). If the area is not entirely covered by Main-Grid-0 then another Main-Grid-1 or any one in sequentially/randomly will be deployed for information collection.
Mini-Grid Internal structure: Each Main-Grid is the combinations of (10×10) Mini-Grids, see Table 4. Each Mini-Grid in-return having Sub-sections ((R 0 -R 9 ) and (C 0 C 9 )) as shown in Table 5. A Mini-Grid-0 can hold a total of 100 addresses, that is, starting from '0000' and terminating at '0099'.
Let's suppose data received at Main-Grid-0 at the location of Mini-Grid-00 then the data received will be '00000' as shown in Table 5.
Similarly, in Mini-Grid-01 the starting address is '0100' at location G 01 R 0 C 0 and the final address is '0199' at location G 01 R 9 C 9 . For Mini-Grid-02 starting address is '0200' at location G 02 R 0 C 0 and terminating addresses '0299' at location G 02 R 9 C 9 and so on.
Where as the sub-section is the representation of row(s) and column(s). The combination of a row number and a column number represents the address for that particular sub-section. Each address of sub-section is unique in the Mini-Grid, such as; G 00 R 0 C 0 is the only address in the complete Mini-Grid-00 set-up.
Experimental study: Let's suppose the number received from source is only '57'. As this number is composed of two digits therefore it belongs to Main-Grid-0 and Mini-Grid-00. The number representation is as shown in Table 6. : Sub-section 9 R9 In this case '7' is first digit which represents column no 'Col 7 ', where as '5' is second digit which represents row no 'R 5 ' and the Mini-Grid and Main-Grid numbers are not available. The algorithm will generate '00' and '0' respectively to recognize it as a Mini-Grid-00 and part of Main-Grid-0.
Similarly another data received from source is '157'. As the number is composed of three digits therefore it belongs to Main-Grid-0 and Mini-Grid-01. The number representation is as shown in Table 7.
In this case '7' is first digit which will represent column no 'Col 7 ', where as '5' is second digit which represents row no 'R 5 ' and '1' is last digit which represents the Mini-Grid-01 and the Main-Grid number is not available. The algorithm will generate '0' to recognize it as belong to Main-Grid-0.
Another number received from source is '61678'. As the number is composed of five digits therefore it belongs to Main-Grid-6 and Mini-Grid-16. The number representation is shown in Table 8.
In this case '8' is first digit which will represent column no 'Col 8 ', where as '7' is second digit which represents row no 'R 7 ' and '16' are two digits which represent the Mini-Grid-16, whereas number '6' represent the Main-Grid-6.

RESULTS AND DISCUSSION
The algorithm receives the number (minimum one character as an entry data), e.g., cases illustrated, in Table 6-8 as a demonstration. During experimental phase different lengths of numbers were fed and the results achieved were vary fast and reports generated as very encouraging. Further, proposed algorithm was easy in both designing and implementation. The old conventional systems, such as a walk-through gate and metal detectors all delivered their best possible services to the community at their own days. Now it's the time for change to manage huge flow of data with high speed processing techniques, by avoid delays and get quicker information to detect the culprit(s) and defuse the disaster spot well before time. Furthermore, new trends and new methods must be deployed to provide security to human lives/properties and yield high quality and promising results to minimize disaster damages by providing information in-advance.

CONCLUSION
The results achieved by simulation, which was inco-operated with the Computer Graphics approach and then applied together and the results observed were promising. The number of Columns and Rows can be increased to any length, that is, to yield a larger size of Mini-Grid and Main-Grids. Secondly, this technique can be applied for storing and retrieving data or movement of position in the shortest possible time, which is one of the major advantages as compared to other approaches.

Future application areas:
This approach can be applied in several different areas, such as, in case of scientific uses it can be applied successfully in finding position of neuron in the Neural-Network and in the case of Computer Networking, the expected node detection is easy and efficiently possible. Commercially, it can be used in controlling lifts to reach to the required height, both in aero-drum hangers (plane industry) and in the warehouses for loading and un-loading goods, etc. In defence sector it has possible applications for finding and measuring, distance and direction for targets. As far as minor/delicate surgical procedures can be performed by using robots with this approach. Above all it has enormous application in the field of security.

ACKNOWLEDGEMENT
A word of thanks to Prof. Mahboob-ur-Rehman for reading the script willingly inspite of his busy schedule. Thanks to my wife for her patience and understanding while I was composing my research. Thanks are also due to Mr. Zahid Ullah, Mr. Maqsood Muhmud and Mr. Ashan Ullah for assisting on the programming aspect of the paper. I deeply acknowledge the support extended on R and D by the King Saud University, Riyadh, Kingdom of Saudi Arabia. I extend my sincere gratitude to the Dean College of Computer and Information Sciences (CCIS) and Chairman Information Systems (IS) department for their continuous encouragement, support and providing the required facilities to make this research possible. Finally, thanks are also due to all those whom contributed to make this research successful.