Reading notes of Python deep learning: Chapter 2 mathematical basis of neural network
catalogue
Chapter 2 mathematical basis of neural network
2.1 initial knowledge of neural network
2.2 data representation of neural network
2.2.1 scalar (0D tensor)
2.2.2 vector (1D tensor)
2.2.3 matrix (2D tensor)
2.2.4 3D tensor and higher dimensional tensor
2.2.5 key attributes
2.2.6 manipulating tensors in Numpy
2.2.7 concept of da ...
Posted by hcdarkmage on Fri, 11 Feb 2022 16:36:04 +0100
Multi-Agent Reinforcement Learning
Multi-Agent Reinforcement LearningThe core idea of reinforcement learning is "trial and error": agents optimize iteratively according to the feedback information obtained through interaction with the environmentModeling of multi-agent problem -- basis of game theoryMarkov gameNash equilibriumEquilibrium solving method is the basic met ...
Posted by ecxzqute on Fri, 11 Feb 2022 16:28:42 +0100
Golang learning notes - process control
Elif else structure
The left brace {after the keyword if and else must be on the same line as the keyword. If you use the else if structure, the right brace} of the previous code block must be on the same line as the else if keyword. Both of these rules are enforced by the compiler.
// Illegal code
if condition{
}
else { // invalid
}
In ...
Posted by rapmonkey on Fri, 11 Feb 2022 16:25:25 +0100
What you should know about Java parallel stream
parallelStream action
Multithreading can speed up the processing of collection operations. The underlying principle is to use the thread pool forkjoinpool (we look forward to your sharing)
Must parallel streams be faster than streams?
When the amount of data processed is not large, the code of "parallelStream()" is sometimes slower ...
Posted by burnside on Fri, 11 Feb 2022 16:21:38 +0100
Java time processing
Java time processing
1, Calendar
(1) Introduction to Calender
The Chinese translation of calendar is calendar. In fact, there are many methods of timing in history. Therefore, in order to unify timing, you must specify a calendar selection. Now the most popular and universal calendar is "Gregorian Calendar". That is, we often us ...
Posted by loudrake on Fri, 11 Feb 2022 16:14:07 +0100
Gobang based on human experience
Gobang based on human experience (2)
Based on the previously established rules, a primary Gobang computer is established. We use the rules to score each position on the chessboard, and then find the position with the highest score to choose; Despite a good start, this still cannot simulate a "visual" data for it.
Before proceeding t ...
Posted by afterburner on Fri, 11 Feb 2022 16:06:00 +0100
Sorting - the most complete knowledge summary of seven sorting algorithms
concept
Sorting: a series of records arranged in ascending or descending order according to the size of one or some keywords. Generally, sorting refers to sorting in place.
What is sort stability
Sorting stability: for two equal data, if the sorting algorithm can ensure that its relative position does not change after sorting, then the a ...
Posted by NikLP on Fri, 11 Feb 2022 16:01:40 +0100
Detailed explanation of Vue life cycle
Mount (initialize related properties) 1. beforeCreate Triggered when the instance of new Vue has not been created and the specific configuration of Vue instance has not been carried out according to the configuration object At this time, the option object of the component has not been created, and el and data have not been initialized, so t ...
Posted by praxiz on Fri, 11 Feb 2022 15:56:44 +0100
Sword finger offer89: House theft
Title: A professional thief plans to steal houses along the street. There is a certain amount of cash hidden in each room. The only restrictive factor affecting the thief's theft is that the adjacent houses are equipped with interconnected anti-theft systems. If two adjacent houses are intruded by thieves on the same night, the system will auto ...
Posted by zipp on Fri, 11 Feb 2022 15:53:42 +0100
Citrix_ Path traversal on xenmobile server
Citrix Endpoint Management (also known as XenMobile) is used to manage employees' mobile devices and mobile applications. Typically, due to Active Directory integration, it is deployed outside the network and has access to the internal network. This makes XenMobile the main target of security research.In such studies, path traversal vulnerabili ...
Posted by classifieds100 on Fri, 11 Feb 2022 15:53:43 +0100