— —
This post is written for documentation purpose. It covers the following topics of matplotlib:
See code: http://compassinbabel.org/post/e77f6371-b39b-469d-820a-61e65cd2a0c2
Here is an example of the usage of this function:
Flask is a light web framework written in Python. It’s easy to learn and use and it’s a perfect tool to build website prototypes. For example: in this website
most of the content is static and with the help of Jinja library, it only takes a couple of lines to generate the table. The website does need to store the thumbs-up and thumbs-down data but for a prototype it’s not a big deal and we don’t really need a database.
My blog: https://compassinbabel.org/post/1e251080-889b-4fc8-a2fa-2458ea6fdce7
Models such as VGG-16 have huge number of parameters and it is not practical to train those models on a home computer. However, it’s a known fact that using pre-trained model can help improve the performance. A natural idea is to reduce a large pre-trained model to a reasonable size so that it becomes possible to train it on an ordinary computer.
In Fully-adaptive Feature Sharing in Multi-Task Networks with Applications in Person Attribute Classification, the authors proposed a method to build a thin network from a pre-trained network model.
First, we can have a unified way…
My Blog: http://compassinbabel.org/post/90269433-4c45-4446-ad2c-259a1c0739e6
The objective of transfer learning is to transfer the learning experience from one domain to another and it usually involve at least two tasks. The task the allow us to get learn experience is called source task and the task that we want to apply the learned experience to is called target task.
A learning task consists of four components:
— —
This post explains the usage of is_authenticated
in the Flask-login User model.
The explanation of is_authenticated
in the official Flask-login documentation is confusing. It gives an impression that it indicates if a user is authenticated/validated/logged in. Following this direction, a natural question is when a user is logged in or logged out, should we set is_authenticated
dynamically and do we need a database to save the value?
In the following section, we try to clarify the notion a little bit.
Let’s ask the question in a different way. If is_authenticated
is always set to true when a user…
—
Disclaim: This post is a collection of information found online.
My blog: https://compassinbabel.org/post/eaad2a73-b282-464f-84de-36b73caba5e3
A Bean can be injected by the following methods:
— —
Text version of this post can be found here.
In this post, we briefly describe some classic geometric transformation in image processing. Most of the content in this post comes from the lecture notes listed in the Related Reading section. The following topics are covered in this post:
Before presenting the topics, we have a quick note on the topic of “projective transformations vs perspective transformation”. Quoted from Projective Transformation:
A transformation that maps lines to lines (but does not…
— —
This post is a brief summary of three algorithms for object detection and segmentation:
All of them are region based algorithm. The following concepts are involved in the discussion and paper
The input of the fast R-CNN are
In Fast R-CNN, the location proposals are calculated using traditional computer vision technique Selective…
— —
Text version of this post can be found here.
The standard gradient decent is given by
This post covers (1) cross entropy (2) softmax function and (3) hierarchical softmax method. Please find the well formatted version at Cross Entropy and Softmax.
In this post we will talk about cross entropy and softmax function. They are used in most of the neural network classification problems. The standard setup is to use the output layer to represent the distribution of label classes. For example, if we have M distinguish labels, then the size of the output layer of the neural network is M and the value of the neuron represents the probability of being the correspondent label.
Now…