SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org
ISSN (e): 2250-3021, ISSN (p): 2278-8719
Vol. 05, Issue 02 (February. 2015), ||V1|| PP 10-12
International organization of Scientific Research 10 | P a g e
Neural Network for external devices control (finger print entry)
Mussab Elamien Abd Elmaggeed 1
,Abdelrasoul Jabar Alzubaidi 2 ,
1 Academy of Sciences (SAS)- Khartoum - Sudan
2 Sudan university of science and technology- Engineering Collage-School of electronics- Khartoum- Sudan
Abstract: Neural networks are composed of simple elements operating in parallel. These elements are inspired
by biological nervous systems. As in nature, the network function is determined largely by the connections
between elements. We can train a neural network to perform a particular function by adjusting the values of the
connections (weights) between elements. Commonly neural networks are adjusted, or trained, so that a
particular input leads to a specific target output. The network is adjusted, based on a comparison of the output
and the target, until the network output matches the target. Typically many such input/target pairs are used to
train a network. This paper takes the finger print as an input to the neural network .Once the finger print is
recognized by the neural network , the output will be used to activate an external device giving access
permission , welcome words and issuing a paper. In case of denial of the finger print by the neural network an
alarm occurs and a denial message get displayed. A Matlab package is used for accomplishing the neural
network algorithm plus an interface circuit is designed to drive the external devices.
Keywords:. neural network , finger print , external devices , Matlab ,interface.
I. INTRODUCTION
Neural networks have been trained to perform complex functions in various fields of application
including pattern recognition, identification, classification, speech, and vision and control systems. Today neural
networks can be trained to solve problems that are difficult for conventional computers or human beings.
Throughout the toolbox emphasis is placed on neural network paradigms that build up to or are themselves used
in engineering, financial and other practical applications. The supervised training methods are commonly used,
but other networks can be obtained from unsupervised training techniques or from direct design methods.
Unsupervised networks can be used, for instance, to identify groups of data. We do not view the Neural
Network Toolbox is simply a summary of established procedures that are known to work well. Rather, we hope
that it will be a useful tool for industry, education and research, a tool that will help users find what works and
what doesn't, and a tool that will help develop and extend the field of neural networks.
II. METHODOLOGY
First of all, it is necessary to analyze the system operation. According to the analysis procedures, the system is
designed . The finger print data acquisition circuit is used as an input . The output from the neural network is
directed to the interface circuit ,which in its turn drives the devices connected to the system. The sequence of
operations to be performed are :
 Finger print data acquisition circuit as input to the computer.
 Training the finger print data by the neural network using the Matlab package.
The number of epochs assumed is equal 300 as shown in equation (1).
Net.trainParam.epochs = 300 ; ……………(1)
Training is performed by equation (2).
[net.tr] = train [net , p , t ] …………………(2)
Where ;
p = input , t = target
 Neural network output comes out from the computer parallel port..
 The interface circuit latches the computer output and enhances the current drive ability..
 The output of the interface circuit drives the output devices .
Figure (1) below shows the block diagram of the system design using neural network technique.
Neural Network for external devices control (finger print entry)
International organization of Scientific Research 11 | P a g e
Figure (1) block diagram of the system design
The block diagram is an illustration of how to implement the design and the various parts involved in it. An
alarm signal is put in the design in order to demonstrate finger print denial .
III. HARDWARE COMPONENTS
The main hardware components in the design are :.
1. PC Computer:
PC computer hosts developed software to drive the devices connected to the computer .The software dictates
the processor to handle controlling process. A corresponding signal is then sent to the interface circuit.
2. HD74LS373 Latching IC:
The HD74LS373 is an eight bits latch. It is used as a buffer which stores signals coming from the computer.
3. ULN 2803A Darlington IC:
The ULN2803A is a high-voltage, high-current Darlington transistor array. The collector-current rating of each
Darlington pair is 500 mA. The Darlington pairs may be connected in parallel for higher current capability.
4. SIREN :
A siren is used to produce a sound signal when the finger print is not identified.
5. Devices :
Three devices are used in the design .One is for access permission .The second is for giving welcome words.
The third is for issuing a time record paper.
IV. SOFTWARE DESIGN
Neural network is implemented in Matlab package for finger print identification . Back propagation technique is
used .The computer program captures the input data from the finger print device . The captured data get
processed in order to take a decision .Then the decision pass to the interface circuit for driving the devices
connected to the system.
The algorithm for the system operation is ;
Start
Initialization:
--- Clear all output devices .
Data acquisition:
… Check the incoming input data from the finger print.
… If in put data is received , then go to neural network processing.
… Go to data acquisition.
Neural network processing:
… Take a two dimensional discrete Fourier transform (FFT2).
… Train the neural network.
… If the finger print coincides with the target , then go to drive devices.
… If the finger print does not coincide with the target , then go to drive siren.
Drive devices :
Neural Network for external devices control (finger print entry)
International organization of Scientific Research 12 | P a g e
… Operate device1 , Device2 ,Device3.
… Delay 20 seconds.
… Disable device1 , Device2 ,Device3.
… Go to Data acquisition.
Drive siren :
… Operate siren.
… Delay 30 seconds.
… Disable siren.
… Go to Data acquisition.
End.
V. RESULTS
The system model have been trained on five finger prints .These five finger prints represent samples for testing
the system operation. Figure (2) shows the results while training a finger print to the system.
Input
Figure (2 )Results of identifying an input data (coinciding with the target)
VI. CONCLSION
This paper adopts a concept to design a system that acts as a platform to feed finger prints to the neural
network and use its output to control external devices. There are a variety of kinds of design and learning
techniques that enrich the choices that a user can make. The field of neural networks has a history of some five
decades but has found solid application only in the past years, and the field is still developing rapidly. Thus, it is
distinctly different from the fields of control systems or optimization where the terminology, basic mathematics,
and design procedures have been firmly established and applied for many years. The system design is dynamic
and further development and modification can be done. The system is made user friendly and it can be
implemented for a variety of applications.
REFERANCES
[1] Panos J. Antsaklis, Kevin M. Passino, eds.,"An Introduction to Intelligent and Autonomous Control",Kluwer
Academic Publishers, Norwell, MA, 1993.
[2] Ayala Botto M.; Sa da Costa J.,"A comparison of nonlinear predictive control techniques using neural network
models" ,Source: Journal of Systems architecture, Volume 44, Number 8, April 1998, pp. 597-616(20).
[3] MICHAEL I. JORDAN,Massachusetts Institute of Technology ,CHRISTOPHER M. BISHOP,"Neural Networks" ,
Aston Universit ,1996, CRC Press
[4] Martin T. Hagan, School of Electrical & Computer Engineering, Oklahoma State University,Howard B.
Demuth,Electrical Engineering Department,University of Idaho Neural Networks for Control, 2001.
[5] Manuel CARCENAC ,Computer Engineering Department,Eastern editerranean University,Gazimagusa, via
Mersin 10-TURKEY,"An Implicit Surface Modeling Technique Based on a Modular Neural Network
Architecture",Turk J Elec Engin, VOL.12, NO.1, 2004

Más contenido relacionado

La actualidad más candente

Neural Network Classification and its Applications in Insurance Industry
Neural Network Classification and its Applications in Insurance IndustryNeural Network Classification and its Applications in Insurance Industry
Neural Network Classification and its Applications in Insurance Industry
Inderjeet Singh
 
Soft Computing-173101
Soft Computing-173101Soft Computing-173101
Soft Computing-173101
AMIT KUMAR
 
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREASON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
cscpconf
 

La actualidad más candente (19)

IRJET- Intelligent Character Recognition of Handwritten Characters using ...
IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...IRJET-  	  Intelligent Character Recognition of Handwritten Characters using ...
IRJET- Intelligent Character Recognition of Handwritten Characters using ...
 
Soft Computing
Soft ComputingSoft Computing
Soft Computing
 
Neural networks of artificial intelligence
Neural networks of artificial  intelligenceNeural networks of artificial  intelligence
Neural networks of artificial intelligence
 
What is Neural Network?
What is Neural Network?What is Neural Network?
What is Neural Network?
 
Neural Networks for Pattern Recognition
Neural Networks for Pattern RecognitionNeural Networks for Pattern Recognition
Neural Networks for Pattern Recognition
 
Soft computing approach to control system
Soft computing approach to control systemSoft computing approach to control system
Soft computing approach to control system
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Neural networks
Neural networksNeural networks
Neural networks
 
Neural Network Classification and its Applications in Insurance Industry
Neural Network Classification and its Applications in Insurance IndustryNeural Network Classification and its Applications in Insurance Industry
Neural Network Classification and its Applications in Insurance Industry
 
Soft Computing-173101
Soft Computing-173101Soft Computing-173101
Soft Computing-173101
 
Deep learning
Deep learningDeep learning
Deep learning
 
Introduction to soft computing V 1.0
Introduction to soft computing  V 1.0Introduction to soft computing  V 1.0
Introduction to soft computing V 1.0
 
Brain access
Brain accessBrain access
Brain access
 
IRJET- The Essentials of Neural Networks and their Applications
IRJET- The Essentials of Neural Networks and their ApplicationsIRJET- The Essentials of Neural Networks and their Applications
IRJET- The Essentials of Neural Networks and their Applications
 
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
Overview of Machine Learning and Deep Learning Methods in Brain Computer Inte...
 
Artificial Neural Network for hand Gesture recognition
Artificial Neural Network for hand Gesture recognitionArtificial Neural Network for hand Gesture recognition
Artificial Neural Network for hand Gesture recognition
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
Soft computing
Soft computingSoft computing
Soft computing
 
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREASON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
 

Destacado

Baguio education
Baguio educationBaguio education
Baguio education
bestFighter
 
Conceptos para construir el mapa conceptual de la unidad
Conceptos para construir el mapa conceptual de la unidadConceptos para construir el mapa conceptual de la unidad
Conceptos para construir el mapa conceptual de la unidad
Eulogio Escárcega Bernal
 

Destacado (18)

Ajedrez
AjedrezAjedrez
Ajedrez
 
Baguio education
Baguio educationBaguio education
Baguio education
 
D05212736
D05212736D05212736
D05212736
 
211 Ortiz Tobon Dayna Iran REGGAE
211 Ortiz Tobon Dayna Iran REGGAE211 Ortiz Tobon Dayna Iran REGGAE
211 Ortiz Tobon Dayna Iran REGGAE
 
Presentación de Internet Explorer
Presentación de Internet ExplorerPresentación de Internet Explorer
Presentación de Internet Explorer
 
E05213741
E05213741E05213741
E05213741
 
Conceptos para construir el mapa conceptual de la unidad
Conceptos para construir el mapa conceptual de la unidadConceptos para construir el mapa conceptual de la unidad
Conceptos para construir el mapa conceptual de la unidad
 
watchFrance vs England live coverage
watchFrance vs England live coveragewatchFrance vs England live coverage
watchFrance vs England live coverage
 
Enlace Ciudadano Nro 270 tema: juicios a medios
Enlace Ciudadano Nro 270 tema: juicios a mediosEnlace Ciudadano Nro 270 tema: juicios a medios
Enlace Ciudadano Nro 270 tema: juicios a medios
 
Diagrama de flujo (programacion)
Diagrama de flujo (programacion)Diagrama de flujo (programacion)
Diagrama de flujo (programacion)
 
Enlace Ciudadano Nro 270 tema: homenaje a tomas borge poema
Enlace Ciudadano Nro 270 tema: homenaje a tomas borge poemaEnlace Ciudadano Nro 270 tema: homenaje a tomas borge poema
Enlace Ciudadano Nro 270 tema: homenaje a tomas borge poema
 
Neolab brief
Neolab briefNeolab brief
Neolab brief
 
Drug Rehabs - Alcohol Rehab Centers
Drug Rehabs - Alcohol Rehab CentersDrug Rehabs - Alcohol Rehab Centers
Drug Rehabs - Alcohol Rehab Centers
 
Analisisdel textoexpositivo
Analisisdel textoexpositivoAnalisisdel textoexpositivo
Analisisdel textoexpositivo
 
C05211326
C05211326C05211326
C05211326
 
F05214252
F05214252F05214252
F05214252
 
watch stream France vs England live
watch stream France vs England livewatch stream France vs England live
watch stream France vs England live
 
I05216877
I05216877I05216877
I05216877
 

Similar a B05211012

Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networks
ijbuiiir1
 
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
RioCarthiis
 

Similar a B05211012 (20)

Artificial Neural Network: A brief study
Artificial Neural Network: A brief studyArtificial Neural Network: A brief study
Artificial Neural Network: A brief study
 
40120140507007
4012014050700740120140507007
40120140507007
 
Project Report -Vaibhav
Project Report -VaibhavProject Report -Vaibhav
Project Report -Vaibhav
 
Artificial Neural Network and its Applications
Artificial Neural Network and its ApplicationsArtificial Neural Network and its Applications
Artificial Neural Network and its Applications
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural Networks
 
P2-Artificial.pdf
P2-Artificial.pdfP2-Artificial.pdf
P2-Artificial.pdf
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
 
Neural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile RobotNeural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile Robot
 
Stock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural NetworksStock Prediction Using Artificial Neural Networks
Stock Prediction Using Artificial Neural Networks
 
Artificial Neural Networks in Human Life: Future Challenges and its Applications
Artificial Neural Networks in Human Life: Future Challenges and its ApplicationsArtificial Neural Networks in Human Life: Future Challenges and its Applications
Artificial Neural Networks in Human Life: Future Challenges and its Applications
 
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
modeling-a-perceptron-neuron-using-verilog-developed-floating-point-numbering...
 
Neuro-Fuzzy Model for Strategic Intellectual Property Cost Management
Neuro-Fuzzy Model for Strategic Intellectual Property Cost ManagementNeuro-Fuzzy Model for Strategic Intellectual Property Cost Management
Neuro-Fuzzy Model for Strategic Intellectual Property Cost Management
 
Neuro-Fuzzy Model for Strategic Intellectual Property Cost Management
Neuro-Fuzzy Model for Strategic Intellectual Property Cost ManagementNeuro-Fuzzy Model for Strategic Intellectual Property Cost Management
Neuro-Fuzzy Model for Strategic Intellectual Property Cost Management
 
The Dawn of the Age of Artificially Intelligent Neuroprosthetics
The Dawn of the Age of Artificially Intelligent NeuroprostheticsThe Dawn of the Age of Artificially Intelligent Neuroprosthetics
The Dawn of the Age of Artificially Intelligent Neuroprosthetics
 
M010237578
M010237578M010237578
M010237578
 
An Overview On Neural Network And Its Application
An Overview On Neural Network And Its ApplicationAn Overview On Neural Network And Its Application
An Overview On Neural Network And Its Application
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
 
50120130406033
5012013040603350120130406033
50120130406033
 

Más de IOSR-JEN

Más de IOSR-JEN (20)

C05921721
C05921721C05921721
C05921721
 
B05921016
B05921016B05921016
B05921016
 
A05920109
A05920109A05920109
A05920109
 
J05915457
J05915457J05915457
J05915457
 
I05914153
I05914153I05914153
I05914153
 
H05913540
H05913540H05913540
H05913540
 
G05913234
G05913234G05913234
G05913234
 
F05912731
F05912731F05912731
F05912731
 
E05912226
E05912226E05912226
E05912226
 
D05911621
D05911621D05911621
D05911621
 
C05911315
C05911315C05911315
C05911315
 
B05910712
B05910712B05910712
B05910712
 
A05910106
A05910106A05910106
A05910106
 
B05840510
B05840510B05840510
B05840510
 
I05844759
I05844759I05844759
I05844759
 
H05844346
H05844346H05844346
H05844346
 
G05843942
G05843942G05843942
G05843942
 
F05843238
F05843238F05843238
F05843238
 
E05842831
E05842831E05842831
E05842831
 
D05842227
D05842227D05842227
D05842227
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

B05211012

  • 1. IOSR Journal of Engineering (IOSRJEN) www.iosrjen.org ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 02 (February. 2015), ||V1|| PP 10-12 International organization of Scientific Research 10 | P a g e Neural Network for external devices control (finger print entry) Mussab Elamien Abd Elmaggeed 1 ,Abdelrasoul Jabar Alzubaidi 2 , 1 Academy of Sciences (SAS)- Khartoum - Sudan 2 Sudan university of science and technology- Engineering Collage-School of electronics- Khartoum- Sudan Abstract: Neural networks are composed of simple elements operating in parallel. These elements are inspired by biological nervous systems. As in nature, the network function is determined largely by the connections between elements. We can train a neural network to perform a particular function by adjusting the values of the connections (weights) between elements. Commonly neural networks are adjusted, or trained, so that a particular input leads to a specific target output. The network is adjusted, based on a comparison of the output and the target, until the network output matches the target. Typically many such input/target pairs are used to train a network. This paper takes the finger print as an input to the neural network .Once the finger print is recognized by the neural network , the output will be used to activate an external device giving access permission , welcome words and issuing a paper. In case of denial of the finger print by the neural network an alarm occurs and a denial message get displayed. A Matlab package is used for accomplishing the neural network algorithm plus an interface circuit is designed to drive the external devices. Keywords:. neural network , finger print , external devices , Matlab ,interface. I. INTRODUCTION Neural networks have been trained to perform complex functions in various fields of application including pattern recognition, identification, classification, speech, and vision and control systems. Today neural networks can be trained to solve problems that are difficult for conventional computers or human beings. Throughout the toolbox emphasis is placed on neural network paradigms that build up to or are themselves used in engineering, financial and other practical applications. The supervised training methods are commonly used, but other networks can be obtained from unsupervised training techniques or from direct design methods. Unsupervised networks can be used, for instance, to identify groups of data. We do not view the Neural Network Toolbox is simply a summary of established procedures that are known to work well. Rather, we hope that it will be a useful tool for industry, education and research, a tool that will help users find what works and what doesn't, and a tool that will help develop and extend the field of neural networks. II. METHODOLOGY First of all, it is necessary to analyze the system operation. According to the analysis procedures, the system is designed . The finger print data acquisition circuit is used as an input . The output from the neural network is directed to the interface circuit ,which in its turn drives the devices connected to the system. The sequence of operations to be performed are :  Finger print data acquisition circuit as input to the computer.  Training the finger print data by the neural network using the Matlab package. The number of epochs assumed is equal 300 as shown in equation (1). Net.trainParam.epochs = 300 ; ……………(1) Training is performed by equation (2). [net.tr] = train [net , p , t ] …………………(2) Where ; p = input , t = target  Neural network output comes out from the computer parallel port..  The interface circuit latches the computer output and enhances the current drive ability..  The output of the interface circuit drives the output devices . Figure (1) below shows the block diagram of the system design using neural network technique.
  • 2. Neural Network for external devices control (finger print entry) International organization of Scientific Research 11 | P a g e Figure (1) block diagram of the system design The block diagram is an illustration of how to implement the design and the various parts involved in it. An alarm signal is put in the design in order to demonstrate finger print denial . III. HARDWARE COMPONENTS The main hardware components in the design are :. 1. PC Computer: PC computer hosts developed software to drive the devices connected to the computer .The software dictates the processor to handle controlling process. A corresponding signal is then sent to the interface circuit. 2. HD74LS373 Latching IC: The HD74LS373 is an eight bits latch. It is used as a buffer which stores signals coming from the computer. 3. ULN 2803A Darlington IC: The ULN2803A is a high-voltage, high-current Darlington transistor array. The collector-current rating of each Darlington pair is 500 mA. The Darlington pairs may be connected in parallel for higher current capability. 4. SIREN : A siren is used to produce a sound signal when the finger print is not identified. 5. Devices : Three devices are used in the design .One is for access permission .The second is for giving welcome words. The third is for issuing a time record paper. IV. SOFTWARE DESIGN Neural network is implemented in Matlab package for finger print identification . Back propagation technique is used .The computer program captures the input data from the finger print device . The captured data get processed in order to take a decision .Then the decision pass to the interface circuit for driving the devices connected to the system. The algorithm for the system operation is ; Start Initialization: --- Clear all output devices . Data acquisition: … Check the incoming input data from the finger print. … If in put data is received , then go to neural network processing. … Go to data acquisition. Neural network processing: … Take a two dimensional discrete Fourier transform (FFT2). … Train the neural network. … If the finger print coincides with the target , then go to drive devices. … If the finger print does not coincide with the target , then go to drive siren. Drive devices :
  • 3. Neural Network for external devices control (finger print entry) International organization of Scientific Research 12 | P a g e … Operate device1 , Device2 ,Device3. … Delay 20 seconds. … Disable device1 , Device2 ,Device3. … Go to Data acquisition. Drive siren : … Operate siren. … Delay 30 seconds. … Disable siren. … Go to Data acquisition. End. V. RESULTS The system model have been trained on five finger prints .These five finger prints represent samples for testing the system operation. Figure (2) shows the results while training a finger print to the system. Input Figure (2 )Results of identifying an input data (coinciding with the target) VI. CONCLSION This paper adopts a concept to design a system that acts as a platform to feed finger prints to the neural network and use its output to control external devices. There are a variety of kinds of design and learning techniques that enrich the choices that a user can make. The field of neural networks has a history of some five decades but has found solid application only in the past years, and the field is still developing rapidly. Thus, it is distinctly different from the fields of control systems or optimization where the terminology, basic mathematics, and design procedures have been firmly established and applied for many years. The system design is dynamic and further development and modification can be done. The system is made user friendly and it can be implemented for a variety of applications. REFERANCES [1] Panos J. Antsaklis, Kevin M. Passino, eds.,"An Introduction to Intelligent and Autonomous Control",Kluwer Academic Publishers, Norwell, MA, 1993. [2] Ayala Botto M.; Sa da Costa J.,"A comparison of nonlinear predictive control techniques using neural network models" ,Source: Journal of Systems architecture, Volume 44, Number 8, April 1998, pp. 597-616(20). [3] MICHAEL I. JORDAN,Massachusetts Institute of Technology ,CHRISTOPHER M. BISHOP,"Neural Networks" , Aston Universit ,1996, CRC Press [4] Martin T. Hagan, School of Electrical & Computer Engineering, Oklahoma State University,Howard B. Demuth,Electrical Engineering Department,University of Idaho Neural Networks for Control, 2001. [5] Manuel CARCENAC ,Computer Engineering Department,Eastern editerranean University,Gazimagusa, via Mersin 10-TURKEY,"An Implicit Surface Modeling Technique Based on a Modular Neural Network Architecture",Turk J Elec Engin, VOL.12, NO.1, 2004