当前位置:网站首页>Swintransformer network architecture
Swintransformer network architecture
2022-06-12 16:55:00 【QT-Smile】
SwinTransformer
1. original text :
2.
3.
4.
For different versions of Swin Transformer Model , there C It's different
5.
Conduct Linear Embedding after , Each channel is also Layer Norm
6.
Both of these are implemented according to the convolution layer
7.
Here are two Swin Transformer Blocks, But these two are usually used in pairs
8.
The multi-layer perceptron here is Vision Transformer The author said , So I didn't talk about it in this video
9.
This position , For classified networks , In fact, there is a network structure behind it , It's just not drawn here
10.
after Patch Merging Then the length and width of the characteristic matrix will be halved , The number of channels will be doubled
11.
12.
MSA Namely transformer The long attention mechanism in ,MSA That is, every pixel of the characteristic matrix will calculate its Q,K,V, And every pixel will also go with other pixels K Multiply , Calculate the relevant weights , Finally multiply by the relevant V, Finally hungry to the final result .
W-MSA Is to use for each small characteristic matrix MSA, The author did this to reduce the amount of computation .
W-MSA shortcoming : There is no information exchange between windows , So I can put MDTA and W-MSA Make two branches , Calculate details and global information respectively , Or use convolution layers and W-MSA Make two branches , Convolution layer calculates global information ,W-MSA Calculate local information .14.
15.
In order to solve W-MSA The disadvantage of not being able to communicate between different windows , Created SW-MSA
16.
Put the matrix above , First move two pixels up , Then move two pixels to the left to get the following characteristic matrix
17.
18.
The final functions of the two structures are the same
21.
With Swin-T give an example
边栏推荐
- Unit sshd.service could not be found
- Unit sshd. service could not be found
- \begin{algorithm} 笔记
- redis. clients. jedis. exceptions. JedisDataException: NOAUTH Authentication required
- [MySQL] Cartesian product - multi table query (detailed explanation)
- Three paradigms of database
- Golang recursively encrypts and decrypts all files under the specified folder
- How to base on CCS_ V11 new tms320f28035 project
- \begin{algorithm} 笔记
- Sudo of uabntu
猜你喜欢
What's the matter with pbootcms' if judgment failure and direct display of labels?
The safety of link 01 was questioned, and "ultra high strength" became "high strength"_ Publicity_ Steel_ problem
D. master router setting and 401 networking
Contract awarding and AQS
5、Embedding
How to play the map with key as assertion
Leetcode 2190. The number that appears most frequently in the array immediately after the key (yes, once)
软件工程 学生信息管理系统 结构化的需求分析
邱盛昌:OPPO商业化数据体系建设实战
Preprocessing command section 3
随机推荐
叶子分享站PHP源码下载
SwinTransformer网络架构
JVM memory model and local memory
\Begin{algorithm} notes
Recommend 6 open source projects of yyds
The C programming language (2nd Edition) notes / 7 input and output / 7.8 other functions
Three paradigms of database
The C programming language (version 2) notes / 8 UNIX system interface / 8.1 file descriptor
Canvas image processing (Part 1)
CVPR 2022 | 元学习在图像回归任务的表现
有趣的 LD_PRELOAD
快速入门scrapy爬虫框架
\Begin{algorithm} notes
Idea displays services on the console to uniformly manage all jetty services,
The C programming language (version 2) notes / 8 UNIX system interfaces / 8.6 instances (directory list)
Extract the new Chinese cross modal benchmark zero from 5billion pictures and texts, and Qihoo 360's new pre training framework surpasses many SOTAS
图片在线收款发货系统源码
[adult Liu Er - pytorch deep learning practice] notes with learning (I)
Google browser debugging skills
反馈式编译