当前位置:网站首页>9. Introduction to convolutional neural network
9. Introduction to convolutional neural network
2022-07-08 00:55:00 【booze-J】
article
Convolutional neural networks
summary
Convolutional neural network is developed in recent years , It is widely used in image processing and NLP And other fields .
Tradition BP Problems in image processing :
- 1. Too many weights , Too much computation
Suppose you use 100X100 Train with pictures of , that 100X100 The size pictures are 10000 Pixels , Then the input of building the network needs 10000 Neurons , The number of hidden layer neurons in the network is similar to that of input layer neurons , In this case , There will be a lot of weights to be trained and updated . The amount of calculation is very large .
- 2. Too many weights , A large number of samples are needed for training
The more neurons , The more parameters , When you have more parameters , Just like solving equations, the more unknown parameters , The more data is needed to solve the unknown parameters .
Since there are these problems, what should we do ?
CNN adopt Local receptive field and Weight sharing The number of parameters needed to be trained in neural network is reduced .
The first picture above shows a fully connected neural network , The second picture above and the first picture below are locally connected neural networks . Locally connected neural networks have fewer parameters than fully connected neural networks .
1. Convolution kernel
filter , The function of convolution kernel can be understood as extracting some different features of pictures , Different convolution kernels can extract different features .
2. Pooling
Pooling Three common ways :
max-pooling
-meaning-pooling
stochastic pooling
3. Convolution Padding
SAME PADDING
Supplement the outside of the plane 0, After convolution window sampling, a plane with the same size as the original is obtained
VALID PADDING
Not beyond the plane , After convolution window sampling, a plane smaller than the original plane is obtained
4. Pooling Padding
SAME PADDING: May be added to the outside of the plane 0
VALID PADDING: Not beyond the plane
If there is one 28*28 The plane of the , use 2*2 In steps of 2 Window to it pooling operation :
Use SAME PADDING The way , obtain 14*14 The plane of the ;
Use VALID PADDING The way , obtain 14*14 The plane of the .If there is one 2*3 The plane of the , use 2*2 In steps of 2 Window to it pooling operation :
Use SAME PADDING The way , obtain 1*2 The plane of the ;
Use VALID PADDING The way , obtain 1*1 The plane of the .
5.LeNET-5 Introduce
LeNET-5 It is one of the earliest convolutional neural networks , Once widely used in Bank of America . The recognition accuracy of handwritten digits is 99% above .
边栏推荐
- Huawei switch s5735s-l24t4s-qa2 cannot be remotely accessed by telnet
- QT establish signal slots between different classes and transfer parameters
- 应用实践 | 数仓体系效率全面提升!同程数科基于 Apache Doris 的数据仓库建设
- DNS 系列(一):为什么更新了 DNS 记录不生效?
- Reptile practice (VIII): reptile expression pack
- ReentrantLock 公平锁源码 第0篇
- Semantic segmentation model base segmentation_ models_ Detailed introduction to pytorch
- ABAP ALV LVC模板
- 炒股开户怎么最方便,手机上开户安全吗
- 22年秋招心得
猜你喜欢
"An excellent programmer is worth five ordinary programmers", and the gap lies in these seven key points
[note] common combined filter circuit
Jouer sonar
Fofa attack and defense challenge record
语义分割模型库segmentation_models_pytorch的详细使用介绍
How does the markdown editor of CSDN input mathematical formulas--- Latex syntax summary
Deep dive kotlin synergy (XXII): flow treatment
2022-07-07: the original array is a monotonic array with numbers greater than 0 and less than or equal to K. there may be equal numbers in it, and the overall trend is increasing. However, the number
Invalid V-for traversal element style
Cause analysis and solution of too laggy page of [test interview questions]
随机推荐
Redis, do you understand the list
A network composed of three convolution layers completes the image classification task of cifar10 data set
STL -- common function replication of string class
服务器防御DDOS的方法,杭州高防IP段103.219.39.x
jemter分布式
Codeforces Round #804 (Div. 2)(A~D)
[necessary for R & D personnel] how to make your own dataset and display it.
Password recovery vulnerability of foreign public testing
韦东山第二期课程内容概要
ReentrantLock 公平锁源码 第0篇
SDNU_ ACM_ ICPC_ 2022_ Summer_ Practice(1~2)
股票开户免费办理佣金最低的券商,手机上开户安全吗
Malware detection method based on convolutional neural network
Vscode software
1293_FreeRTOS中xTaskResumeAll()接口的实现分析
Solution to the problem of unserialize3 in the advanced web area of the attack and defense world
Which securities company has a low, safe and reliable account opening commission
New library online | information data of Chinese journalists
Cve-2022-28346: Django SQL injection vulnerability
ABAP ALV LVC template