Design of Portble Security System at Spinger Modifed
Design of Portble Security System at Spinger Modifed
Fig 2. Hybrid BPN network. Fig 4. Block diagram for the entitled paper.
In second stage, the back-propagation network is used which gives the person identity. Here also the output
as a string network to act as a database system with a is converted from binary to hexadecimal to address the
2,576 input units, maximum of 200 hidden units, and memory location where the information of a person
6 output units. The output is converted from binary to has stored. To analyze the efficiency of the back-
hexadecimal to address the memory location of the propagation network for varying inputs to identify the
database, where the information about a person is correct person, we trained the network in both
stored. This 6-bit output gives the person identity (Fig. continuous valued and discrete value features (Figs 4
3 ). and 5 ).
V. CONCLUSION