当前位置:网站首页>Maximum entropy model
Maximum entropy model
2022-07-04 01:26:00 【YaoHa_】
The principle of maximum entropy
principle : Select the model with the maximum entropy from the model set that meets the constraint conditions .
Ideas : From training data T Extract several features from , These characteristics are in T on Expectations of empirical distribution With them in the model p(x,y) The mathematical expectation of is equal , such , A feature corresponds to a constraint .
Suppose the classification model is a conditional probability distribution 𝑃(𝑌|𝑋), 𝑋 ∈ 𝒳 ⊆ 𝑅𝑛 Indicates input ,𝑌 ∈ 𝒴 Table condition overview
rate 𝑃(𝑌|𝑋) Output 𝑌. Given a training data set 𝑇 = {(𝑥1,𝑦1), (𝑥2,𝑦2), ⋯ , (𝑥𝑁,𝑦𝑁)}.
1. Consider the conditions that the model satisfies .
Joint distribution 𝑃(𝑋,𝑌) Empirical distribution and marginal distribution 𝑃(𝑋) The distribution of experience .
ν(𝑋 = 𝑥,𝑌 = 𝑦) Represents the sample in the training data (𝑥,𝑦) Frequency of occurrence ,
ν(𝑋 = 𝑥) Indicates that... Is entered in the training data 𝑥 Frequency of occurrence ,
𝑁 Represents the training sample size .
2. The characteristic function (feature function)𝑓(𝑥,𝑦) Description input 𝑥 And the output 𝑦 A fact between .
3. The characteristic function 𝑓(𝑥,𝑦) About the distribution of experience 𝑃̃(𝑋,𝑌) The expected value of is expressed as :
The characteristic function 𝑓(𝑥, 𝑦) About the model 𝑃(𝑌|𝑋) And experience distribution 𝑃̃(𝑋) The expected value of is expressed as :
If the model can capture the information in the training data , Then we can assume that the two expectations are equal . namely
or
Definition : Suppose that the set of models satisfying all the constraints is
Defined in conditional probability distribution 𝑃(𝑌|𝑋) The conditional entropy on is
Then the model set C Intermediate conditional entropy H ( P ) H(P) H(P) The largest model is called the largest direct model . The logarithm in the formula is the natural logarithm .
For a given set of training data 𝑇 = {(𝑥1, 𝑦1), (𝑥2, 𝑦2), ⋯ , (𝑥𝑁, 𝑦𝑁)} And the characteristic function 𝑓𝑖(𝑥, 𝑦), 𝑖 = 1,2, ⋯ , 𝑛,
The maximum problem is rewritten as an equivalent minimum problem :
Using Lagrange multiplier method, the maximum entropy model is transformed from a constrained optimization problem into an equivalent unconstrained optimization problem . Solve the original problem by solving the dual problem .
Derivation process :
边栏推荐
- Logical operator, displacement operator
- Design of database table foreign key
- All in one 1407: stupid monkey
- PMP 考试常见工具与技术点总结
- mysql使用视图报错,EXPLAIN/SHOW can not be issued; lacking privileges for underlying table
- C import Xls data method summary V (complete code)
- A-Frame虚拟现实开发入门
- Print diamond pattern
- 基于.NetCore开发博客项目 StarBlog - (14) 实现主题切换功能
- QML add gradient animation during state transition
猜你喜欢
swagger中响应参数为Boolean或是integer如何设置响应描述信息
OS interrupt mechanism and interrupt handler
长文综述:大脑中的熵、自由能、对称性和动力学
Weekly open source project recommendation plan
机器学习基础:用 Lasso 做特征选择
How can enterprises optimize the best cost of cloud computing?
It's OK to have hands-on 8 - project construction details 3-jenkins' parametric construction
[common error] UART cannot receive data error
Some other configurations on Huawei's spanning tree
Thinkphp6 integrated JWT method and detailed explanation of generation, removal and destruction
随机推荐
Analysis and solution of lazyinitializationexception
Audio resource settings for U3D resource management
Design of database table foreign key
Sequence list and linked list
Stringutils and collectionutils
It's OK to have hands-on 8 - project construction details 3-jenkins' parametric construction
C import Xls data method summary III (processing data in datatable)
Introduction to unity shader essentials reading notes Chapter III unity shader Foundation
Huawei BFD and NQA
Fundamentals of machine learning: feature selection with lasso
Introduction to Tianchi news recommendation: 4 Characteristic Engineering
Cesiumjs 2022^ source code interpretation [8] - resource encapsulation and multithreading
String hash, find the string hash value after deleting any character, double hash
C library function int fprintf (file *stream, const char *format,...) Send formatted output to stream
A malware detection method for checking PLC system using satisfiability modulus theoretical model
中电资讯-信贷业务数字化转型如何从星空到指尖?
Human resource management online assignment
Functions and arrays of shell scripts
[turn] solve the problem of "RSA public key not find" appearing in Navicat premium 15 registration
Release and visualization of related data