Bayesian neural network, in short, can be understood as regularization by introducing uncertainty into the weight of neural network, which is equivalent to integrating infinite groups of neural networks on a certain weight distribution for prediction.
As we all know, a neural network model can be regarded as a conditional distribution modelP(y∣x,w): inputx, output the predicted valueyThe distribution of,wIs the weight in the neural network.In the classification problem, this distribution corresponds to all kinds of probability. In regression problem, it is generally considered as Gaussian distribution with fixed standard deviation, and the mean value is taken as the prediction result.Accordingly, the learning of neural network can be regarded as a maximum likelihood estimation (MLE)
amongDIt corresponds to the dataset we use for training.In regression problem, we can get mean squared error (MSE) by substituting Gaussian distribution, and cross entropy can be deduced by substituting logistic function for classification problem.In general, gradient descent is used to find the minimum of neural network, which is based on back-propagation (BP). Wrong in MLEwA priori probability is assumedwThere is an equal opportunity to take whatever value.IfwWhen a priori is introduced, it becomes the maximum posteriori (map)
Substituting Gaussian distribution can lead to L2 regularization (tend to take small value), while substituting Laplace distribution (Laplace) can deduce L1 regularization (tend to take 0 to make weight sparse).
Bayes is up!
Bayesian estimation also introduces a priori hypothesis. The difference between Bayesian estimation and map is that Bayesian estimation is obtainedwPosterior distribution ofP(w∣D), but not limited toargmaxIn this way, we can introduce uncertainty into the prediction of neural network.Because we get the distribution based onwInput byx^forecasty^The probability model of the model becomes:
So every time we predicty^We have to find an expectation. The problem is that we can't really work out this expectation, because it means that we have to calculate the expected valueP(w∣D)Prediction values of all possible neural networks on. On the other hand, the posterior distribution is obtainedP(w∣D)It's also a troublesome thing.As we all know, according to Bayesian theory, theP(w∣D)Need to pass:
It's also intractable.
Therefore, in order to introduce Bayesian estimation into neural network, we need to find a method to approximate these things, and it is better to transform it into the form of solving optimization problems, which is more in line with the pursuit of our alchemists.
Using the variational approach, we can use a set of parametersθDistribution of controlq(w∣θ)To approach the real posteriorP(w∣D)For example, if we use Gaussian approximationθnamely(μ,σ)In this way, the problem of finding the posterior distribution is transformed into finding the best oneθSuch an optimization problem.This process can be realized by minimizing the distribution of legendiller
It still can't be worked out, but at least it looks more like something that can be calculated.Our prior and posteriori variation of KL is our prior;The value of the second term depends on the training data.The first term is called complexity cost, which describes the degree of agreement between weight and prior;The second term is called likelihood cost, which describes the degree of sample fitting.The objective function of optimization can be regarded as the most familiar regularization for alchemists, balancing the two costs.
In other words, the prior distribution of each weight is the superposition of two Gaussian distributions with the same mean and different standard deviations.
The next step is to continue to approximate the objective function until it can be solved.
Don't decide, Monte Carlo
The Monte Carlo method is a method engraved in the alchemist's DNA.(1) This method can not be used well.
It is well known that the variational auto encoder (VAE) is also derived from Bayesian estimationA wonderful reparameterize operation is introduced: forz∼N(μ,σtwo), directly fromN(μ,σtwo)Sample will makeμandσBecome indistinguishable;In order to get their gradients, thezRewrite asz=σϵ+μIn whichϵ∼N(zero,one)In this way, random variables can be sampled from the standard Gaussian distribution, and then can be inducedμandσ。
In this paper, we generalize it and prove that for a random variableϵAnd probability densityq(ϵ)As long as it can be satisfiedq(ϵ)dϵ=q(w∣θ)dwFor expectation, the derivable unbiased estimation of the expected partial derivative can also be obtained by using similar operations
amongw(i)Is the weight sampling when processing the ith data point.
 This approximation is proposed in this paperF(D∣θ)In fact, for many prior forms, the KL term can have analytical solutions. The reason for this is to fit the more complex a / P forms.In the other paper, we only consider Gaussian priori, so we take the analytic solution of KL term in the same lower bound of evidence.In practice, different approximations can be obtained according to different priors used.
Bayesian small batch gradient descent
(1) The objective function in (2) and the approximation in (2) are the lower bounds of the model on the whole dataset.In practice, modern alchemy adopts small batch gradient descent, so the complexity cost needs to be scaled accordingly.Suppose that the whole data set is divided into m batches, and the simplest form is to average each small batch
Just take itπ∈[zero,one]MAnd guarantee∑i=oneMπi=one, so∑i=oneMFiπ(Di,θ)namelyF(D,θ)The unbiased estimation of.In particular, takeπi=twoM−onetwoM−iIn the early stage of a round of training, we can focus on fitting a priori and later on fitting data, which can improve the performance.
So far, the uncertainties introduced in the weights of neural networks can be regarded as global uncertainties.In this case, it's more expensive to introduce the global inference in the neural networkonezerozerozero×onezerozerozeroFully connected layer forM×onezerozerozeroInput requirements forM×onezerozerozero×onezerozerozeroIn general neural networks, such a fully connected layer can be converted into multiplication between a (m, 1000) matrix and (1000, 1000) matrix because the parameters are the same matrix;After introducing the uncertainty, it is necessary to sample m groups of different (10001000) parameters for m times (11000) and (10001000), which are two completely different things for the general matrix parallel library.
In response to this problem,It is observed that if all the parameters are independent Gaussian distribution, the result of matrix multiplication will also be independent Gaussian distribution.In other words, forY=XW, if any
With this conclusion, it is not necessary to sample parameters every timeWWe can calculate the result directlyYThe mean and variance are sampled and then propagated back toWGo ahead.In this way, the sampling for each calculation is the local sampling of the corresponding data points. This technique is called local reparameterization.
Microsoft is really a pit father does not allow to use shared memory in uwp. As a result, wolf hung up and changed to windowsnamed pipeIt can be used after cross process interaction.
After picking up the five strokes again, I have been distressed that there is no suitable five stroke input method.As a half beginner, one of the functions I like very much is the five strokes reverse search;However, the WuBi Pinyin mixed input function is not easy to use.All kinds of old-fashioned five stroke input methods are either too ugly or not updated for a long time. What's more, they will display a rogue style.
A few years ago, I tried the rime input method and knew that it was a powerful input method, which could meet various customization requirements.But at the beginning, I did not have the development ability, and the customization of rime was slightly complicated, so I did not continue.Now there is a demand, looking back, found that rime is undoubtedly the most suitable for me now.
Rime has a new compatibility problem with windows.As the first batch of windows 10 users, there is no doubt that an input method that can be used normally in uwp applications is needed.However, rime's original windows front-end "little wolf hair" is not compatible with Metro applications starting from Windows 8, including the uwp of windows 10.The original author is too busy to be separatedGave up the maintenance of "little wolf hair"；Other front ends implemented by other developers have various unstable problems. For example, the users of rime bar have transplanted rim to a calledPIMEIn addition, its input service implementation is very painful, often crashes, and there is no reliable exception handling. In many cases, it needs to restart the input service manually.
One of the major principles of the open source industry is "you can go, you go" and "show me the code".At that time, it did not experience any abnormal collapse when using it, indicating that its design in this respect is very excellent;The main problem now is that it is not compatible with Metro applications.Now that you have the ability to develop, it's better to maintain yourself and others.
People's fate is so unpredictable. Finally, geisha's compiler implementation was actually taken out as a school curriculum design during the postgraduate entrance examination.
Because of various factors, the final result is far from the expected result. For example, there is no time to implement GC, so the closure is incomplete;For example, there is no custom type at all.But in the end, it turned out to be something with a result (though it was half broken).
This is a document submitted as a course report during the summer vacation.As for the follow-up work, although the postgraduate entrance examination has been completed, there are a lot of things suddenly. We can only see when we have time to continue to improve
Code, of courseOn GitHubIt's just that the stars are all on the front-end demo written by Haskell, so no one pays attention to emmmm
Usedrust-pegThe syntax analyzer is generated and llvm is used as the back end of code generation.
//Zhihu not only did not give me a column, but also said that my article ZZ sensitive, breaking the website to eat jujube pills
closure(English: closure), also known as closureLexical Closure (lexical closure) orFunction Closure Function closures are functions that reference free variables.The referenced free variable will exist with the function, even if it has left the environment in which it was created.Therefore, there is another view that a closure is an entity composed of a function and its associated reference environment.Closures can have multiple instances at runtime. Different reference environments and the same function combination can produce different instances.
In order to implement a programming language that supports both lexical scope and first class function, an important transformation is called lambda lifting: transforming nested function definition (including anonymous function) into independent global function definition;Convert the reference of free variable into parameter passing.
Considering the practical computing power, it is impossible to use the traditional text diff algorithm to compare the similarity between many large documents.Hash value can reflect the characteristics of data to a certain extent;However, the general hash method emphasizes avoiding collision, and a little change of source data can cause a big change of hash value.For duplicate checking, it is necessary to extract the feature of the document, which should also have similarity when the source data is similar.
Winnowing method is proposed by Saul schleimer and others to extract document features (document fingerprints).By hashing the k-gram sequence of documents, the feature value sequence which can reflect the similarity of documents is extracted, and then compared with the feature value sequence , the proportion of the same eigenvalue obtained can reflect the similarity between documents.
To be reasonable, the postgraduate entrance examination party is disturbed by this kind of thing with the environment, the life of salted fish is very unhappy.
The cause is Haskell's llvm binding——llvm-generalOnly version 3.5 is supported on hackage.Of course, there is a follow-up version in repo, but the author said in the issues that the follow-up version did not work well.
In that case, install 3.5.However, after downloading the source code of llvm 3.5.2, cmake is very smooth, and it is also very smooth to open it with vs 2017. However, an error is reported during compilation
Here we pretend to have a compiled log
In short, the method of a certain class has const qualifier after it, and then the calling context does not return const, so it is not given.
Strangely, the location of the error is the standard library file provided by vs.It's embarrassing.I can either change the vs standard library or study a wave of llvm source code.
I tried it in WSL and compiled painlessly.It seems that vs has some limitation on egg pain.After a little searching on the Internet, we didn't find any similar situation (after all, in the 3.5's, they didn't officially support vs compilation).So we decided to build on MinGW.
There is no problem using cmake to generate the makefile of MinGW, but the command syntax error will be prompted when making
Found this buildMake found the command in this line strange
cd /d C:\Users\hcyue\code\llvm-three point five.two.build\tools\lto &&"C:\Program Files\CMake\bin\cmake.exe"-E echo EXPORTS > LTO.def
cd /d C:\Users\hcyue\code\llvm-three point five.two.build\tools\lto && type C:/Users/hcyue/code/llvm-three point five.two.src/tools/lto/lto.exports >> LTO.def
I haven't seen a CD in windows for so many years. I can bring a CD/dParametricIt seems that the / D parameter is not supported by Shell's CD.Then delete it.
When the error occurs, continue to find the symbol.It is found that it is the target file generated by the two lines just changedLTO.defThere is a problem. I don't know why it is not written into a normal text file, but a binary file (vs code open prompt file is too large or binary file).directtypeIt came out in a strange, wide spaced format that looked like a text file.Very angry.
However, since.defIt's a text file anyway. I can't build it manuallydef。So manually run the commandlto.exportsWhat's in ittypecome out
type C:/Users/hcyue/code/llvm-three point five.two.src/tools/lto/lto.exports
I've got oneScheme interpreterIt's also like making something out of Haskell (although it's just a toy)
My biggest experience is that I am familiar with Haskell and consolidate scheme (although I have seen SiCp, I don't quite understand its quosiquote and call / cc, etc.)
I was going to define a language by myselfthis）However, it was very troublesome (FOG), and I was more concerned about explaining the execution process, so I decided to implement scheme.Basically, it followsWrite Yourself a Scheme in 48 HoursYes, we have added continuation and other things to it
The copyright belongs to the author.For commercial reprint, please contact the author for authorization. For non-commercial reprint, please indicate the source.
The biggest difference between functional programming and imperative programming is that:
Functional programming is concerned with data mapping, while imperative programming is concerned with problem solving steps
The mapping here is the mathematical concept of "function" - the correspondence between one thing and another.
This is why "functional programming" is called "functional programming.".
What does that mean?
If, now you come to Google for an interview, the interviewer asks you to reverse the image of the binary tree
Almost without thinking, you can write Python code like this:
root.left, root.right = root.right, root.left
Now, stop and see what this piece of code stands for——
Its meaning is: first, judge whether the node is empty;Then flip the left tree;Then flip the right tree;Finally, the left and right are exchanged.
This is imperative programming - what you do, you have to describe in detail the steps to get there, and then leave it to the machine to run.
This is also the theoretical model of command programming Turing machine characteristics.A paper tape full of data, a machine that moves according to the contents of the tape. Every move of the machine needs to write on the tape how to achieve it.
So, how to flip a binary tree without this method?
Functional thinking provides another way of thinking——
The so-called "flipped binary tree" can be seen as getting a new binary tree symmetrical with the original binary tree.
The feature of this new binary tree is that every node is recursively opposite to the original tree.
It is expressed in Haskell code as follows:
dataTreea =Nil|Nodea (Treea) (Treea)
invert(Nodev l r) =Nodev (invert r) (invert l)
(in case you can't understand it, translate it into equivalent Python)
The thinking reflected in this code is the mapping from the old tree to the new tree. For a binary tree, its image tree is the tree with recursive images of the left and right nodes.
The ultimate goal of this code is to flip the binary tree, but the way it gets the result is essentially different from that of Python code: by describing the mapping of an old tree to a new tree, rather than describing "how to get a new tree from an old tree".
So what's the advantage of thinking like this?
First of all, from the most intuitive point of view, functional style code can be written very concise, greatly reducing the loss of the keyboard（
More importantly, functional code is "the description of mapping". It can not only describe the corresponding relationship between data structures such as binary trees, but also describe the corresponding relationship between anything that can be reflected in the computer, such as the mapping between functions (such as functor);For example, the mapping between external operations and GUI (that is, the so-called FRP in the front-end is hot now).It can be highly abstract, which means that functional code can be more convenient to reuse.
At the same time, writing the code like this makes it easy to study it mathematically (that's why it's possible to refer to "in the category of" uuuuuuuuuuu "This mathematical concept of depth)
As for what Coriolis and what data are immutable, they are just denotations.