当前位置:网站首页>Deep learning notes (constantly updating...)
Deep learning notes (constantly updating...)
2022-07-03 01:57:00 【North Village South】
Data preprocessing One-Hot - You know (zhihu.com)
A person without touching each other , In a special way , Have a series of questions and answers with each other . If for a long time , He can't judge whether the other party is a person or a computer based on these questions , Then it can be considered that the computer is intelligent .
—— Alan · Turing (Alan Turing)
《Computing Machinery and Intelligence 》
Knowledge system
Why does deep learning mainly use neural networks ?
The main reason is that the neural network model can use error back propagation BP Algorithm , So we can better solve the problem of contribution distribution
What neural networks need to learn : The weight parameter of the connection between each neuron
Why use activation functions : If you don't use the activation function , Then the output of each layer is the linear function of the input of the previous layer , Then eventually, the whole network is linear , That is, the most primitive perceptron (Perceptron), Its presentation ability is poor
Neuron
Neural networks are composed of Neuron Composed of , The structure of each neuron is as follows
Activation function
among f Is the activation function , common Activation function as follows
Sigmoid function
ReLu function
Swish function
Network structure
There are three common network structures , Feedforward networks FNN Similar to a directed acyclic graph , Information can only spread in one direction , It's simpler . Memory network MN Similar to a directed cyclic graph , Information can be transmitted in one direction or two directions , More complicated . Figure network GN It is the generalization of feedforward network and memory network , Each square is one or a group of neurons
Reference material
《 Neural networks and deep learning 》-- Professor Qiu Xipeng
《 Hands-on deep learning 》Pytorch Open source -- Li Mu
《2022 Deep learning and machine learning 》-- Wu enda
边栏推荐
- Storage basic operation
- 网络安全-破解系统密码
- Take you ten days to easily complete the go micro service series (I)
- A 30-year-old software tester, who has been unemployed for 4 months, is confused and doesn't know what to do?
- Network security - password cracking
- 502 (bad gateway) causes and Solutions
- [data mining] task 1: distance calculation
- When the epidemic comes, how to manage the team as a leader| Community essay solicitation
- Everything文件搜索工具
- 网络安全-中间人攻击
猜你喜欢
可視化yolov5格式數據集(labelme json文件)
Virtual list
MySQL学习03
His experience in choosing a startup company or a big Internet company may give you some inspiration
STM32 - GPIO input / output mode
Everything文件搜索工具
A 30-year-old software tester, who has been unemployed for 4 months, is confused and doesn't know what to do?
深度(穿透)选择器 ::v-deep/deep/及 > > >
PS remove watermark details
ByteDance data Lake integration practice based on Hudi
随机推荐
Network security - talking about security threats
mysql
7-25 read numbers (loop switch)
Comment le chef de file gère - t - il l'équipe en cas d'épidémie? Contributions communautaires
网络安全-浅谈安全威胁
Prohibited package name
Modify table structure
[camera topic] turn a drive to light up the camera
网络安全-动态路由协议RIP
网络安全-信息收集
What are the differences between software testers with a monthly salary of 7K and 25K? Leaders look up to you when they master it
PS去除水印详解
Network security ACL access control list
DML Foundation
[AUTOSAR cantp] -2.11-uds diagnostic response frame data segment data padding data filling and data optimization data optimization (Theory + configuration)
Visual yolov5 format data set (labelme JSON file)
Ni visa fails after LabVIEW installs the third-party visa software
树形结构数据的处理
网络安全-DNS欺骗与钓鱼网站
Network security - Information Collection