Tag：algorithm

Time：202159
The purpose of neural network is to find suitable parameters to make the value of loss function as small as possible. The process of solving this problem is called optimization. The algorithm used to solve this problem is called the optimizer. 1、 BGD、SGD、MSGD Bgd: the most primitive gradient descent algorithm, which calculates the loss of […]

Time：202158
1. The simplest schematic diagram of neural network It is divided into input layer, output layer and hidden layerFor such a simplest neural network, there is only one hidden layerIn the graph, the line represents the neuron, which is obtained by a certain operation from the node of the upper layer. That is to say, […]

Time：202158
Question type description There are n activities that need to use the same resource, and only one activity can use the resource at the same time.Each activity I has a start time Si and an end time fi, and Si < EI. If activity I is selected, it occupies resources in the half open time […]

Time：202157
AuthorCompile VKSource: analytics vidhya summary Learn how class weight optimization works and how to use sklearn to implement the same method in logistic regression or any other algorithm Learn how to overcome the problem of unbalanced class data by modifying the class weight without using any sampling method introduce The classification problem in machine learning […]

Time：202157
Title Description Find the maximum continuous number of 1 in the binary number corresponding to a byte number, for example, the binary number of 3 is 00000011, and the maximum continuous number of 2 1s. Problem solving code bit_num = 0b101110 k = 0 while bit_num != 0: bit_num &= (bit_num << 1) k += […]

Time：202156
Recently, when clearing cookies, we used thedocument.cookie = ”And then it didn’t work. So, with the above questions, I found a time to study the cookie. This article is mainly based on the idea that I encounter problems and then solve them. It’s not based on the idea of telling cookies from 0 to 1. […]

Time：202155
Working principle of gradient descent algorithm in machine learning By nikil_ REDDYCompile VKSource: analytics vidhya introduce Gradient descent algorithm is one of the most commonly used machine learning algorithms in industry. But it confuses a lot of new people. If you’re new to machine learning, the math behind gradient descent isn’t easy. In this article, […]

Time：202155
preface Recursion, is a very important concept, but also very like the interview test. Because it can not only examine a programmer’s algorithmic skills, but also a good examination of the algorithmTime space complexityThe understanding and analysis of. This article only talks about one problem, which is also the first problem of recursion in almost […]

Time：202154
Basic scene For example, if you have n cache servers (hereinafter referred to as cache), how to map an object to n caches? You will probably use the following general method to calculate the hash value of an object, and then map it evenly to n caches; Complement algorithm: hash (object)% n If everything is […]

Time：202154
On August 27, Beijing time, VLDB (very large data bases conferences), one of the top three global database conferences, was held in Rio de Janeiro, Brazil. Angel, Tencent AI open source project, was invited to attend the conference to show Tencent’s research achievements in big data mining and database management to the world’s top data […]

Time：202154
Front end bug record – bug caused by lobashjs debounce debounce optimizationThese two bugs are actually the same bug. How can we say that? Both are right, and the mistake is to use them at the same time. Because of meI didn’t deal with the boundary, which caused me to sort a large array, causing […]

Time：202153
This article is published in:Walker AI Due to the illegal duplication of computer software, the leakage of communication and data security are threatened, so encryption is often used in the development process. It has been applied in some important scenarios, such as login, payment and OAuth. Different scenarios require different signature encryption algorithms to achieve […]