当前位置:网站首页>Comparison between relu and SIGMOD
Comparison between relu and SIGMOD
2022-06-25 11:15:00 【User 9854323】
relu The advantages of :
First of all , Prevent gradient dispersion ,sigmod The function is only in 0 There is good activation nearby , When approaching the positive and negative saturation region , Too slow to change , Derivative tends to 0, Cause gradient dispersion , and relu The function is greater than 0 Part of the gradient is constant , Therefore, there will be no gradient dispersion phenomenon ;
second , sparsity ,Relu It's going to make the output of some of the neurons zero 0, This results in the sparsity of the network , The problem of overfitting is alleviated ,relu The derivative of the function in the negative half region is 0 , So once the neuron activation value enters the negative half region , Then the gradient will be 0, In other words, this neuron will not undergo training ;
Third , Speed up the calculation ,relu The derivative of a function is calculated faster , Program implementation is a if-else sentence , and sigmoid The function performs four floating-point operations .
边栏推荐
- June 24, 2022: golang multiple choice question, what does the following golang code output? A:1; B:3; C:4; D: Compilation failed. package main import ( “fmt“ ) func mai
- Arrays.asList()
- How to start the phpstudy server
- A difficult mathematical problem baffles two mathematicians
- Database Series: MySQL index optimization summary (comprehensive version)
- 每日3题(3)-检查整数及其两倍数是否存在
- Open source invites you to participate in the openssf Open Source Security Online Seminar
- Server rendering
- Cdn+cos ultra detailed steps for drawing bed construction
- Daily Mathematics Series 52: February 20
猜你喜欢

Dragon Book tiger Book whale Book gnawing? Try the monkey book with Douban score of 9.5

TASK03|概率论

开源社邀请您参加OpenSSF开源安全线上研讨会

龙书虎书鲸书啃不动?试试豆瓣评分9.5的猴书

金仓KFS数据级联场景部署

Open source invites you to participate in the openssf Open Source Security Online Seminar

金仓KFS数据集中场景(多对一)部署

zabbix分布式系统监控
![[file containing vulnerability-03] six ways to exploit file containing vulnerabilities](/img/4f/495c852eb0e634c58e576d911a2c14.png)
[file containing vulnerability-03] six ways to exploit file containing vulnerabilities

基于Minifilter框架的双缓冲透明加解密驱动 课程论文+项目源码
随机推荐
Double tampon transparent cryptage et décryptage basé sur le cadre minifilter
Is it safe to open an account through mobile phone if you open an account through stock speculation? Who knows?
ARM64汇编的函数有那些需要注意?
反应c语言程序结构特点的程序
Oracle彻底卸载的完整步骤
16 enterprise architecture strategies
Apache ShenYu 入门
一个数学难题,难倒两位数学家
Remove the problem of orange border on the desktop control in WebView
动态规划解决股票问题(上)
仿真与烧录程序有哪几种方式?(包含常用工具与使用方式)
Introduction to socket UDP and TCP
[the path of system analyst] Chapter 6: Double inventory demand engineering (comprehensive knowledge concept)
Leetcode 1249. 移除无效的括号(牛逼,终于做出来了)
Simple use of SVN
Coscon'22 lecturer solicitation order
FPGA displays characters and pictures based on VGA
Comparator(用于Arrays.sort)
zabbix分布式系统监控
[shangyun boutique] energy saving and efficiency improvement! Accelerating the transformation of "intelligent manufacturing" in the textile industry