SlideShare a Scribd company logo
1 of 13
An Analysis of HINTON’s
mnistdeepauto program
1.
By Ali Riza SARAL
Arsaral ((at)) yahoo.com
This is the first of a series of analysis based on Hinton’s
program. The subsequent analysis will include
2- Rbm.m and rbmhidlinear.m
3- backprop.m amd mnistdisp.m
4- CG_MNIST.m
Copyright note
• Version 1.000
•
• Code provided by Ruslan Salakhutdinov and Geoff Hinton
•
• Permission is granted for anyone to copy, use, modify, or distribute this
• program and accompanying programs and documents for any purpose, provided
• this copyright notice is retained and prominently displayed, along with
• a note saying that the original programs are available from our
• web page.
• The programs and documents are distributed without any warranty, express or
• implied. As the programs were written for research purposes only, they have
• not been tested to the degree that would be advisable in any important
• application. All use of these programs is entirely at the user's own risk.
• This program pretrains a deep autoencoder for MNIST dataset
• You can set the maximum number of epochs for pretraining each layer
• and you can set the architecture of the multilayer net.
Mnistdeepauto input and output
diagram
Training data input output
Training data input output epoch=1
Test data distorted input output
Testdata input output epoch=1
Mnistdeepauto layers
Execution flow
CONVERTER.m
MNIST data
Makebatches.m

More Related Content

Similar to Mnistauto 1

Security stronghold presentation smart uac
Security stronghold presentation   smart uacSecurity stronghold presentation   smart uac
Security stronghold presentation smart uac
w_harker
 
Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...
Akond Rahman
 
Effective risk communication for android apps
Effective risk communication for android appsEffective risk communication for android apps
Effective risk communication for android apps
JPINFOTECH JAYAPRAKASH
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applications
JPINFOTECH JAYAPRAKASH
 

Similar to Mnistauto 1 (20)

160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
 
Hidden Speed Bumps on the Road to "Continuous"
Hidden Speed Bumps on the Road to "Continuous"Hidden Speed Bumps on the Road to "Continuous"
Hidden Speed Bumps on the Road to "Continuous"
 
open concept in GIS and open source software for GIS analysis
open concept in GIS and open source software for GIS analysisopen concept in GIS and open source software for GIS analysis
open concept in GIS and open source software for GIS analysis
 
Security stronghold presentation smart uac
Security stronghold presentation   smart uacSecurity stronghold presentation   smart uac
Security stronghold presentation smart uac
 
Bandwidth Efficient : On-Demand Multimedia Advertisements using Mobile Agents
Bandwidth Efficient : On-Demand Multimedia Advertisements using Mobile AgentsBandwidth Efficient : On-Demand Multimedia Advertisements using Mobile Agents
Bandwidth Efficient : On-Demand Multimedia Advertisements using Mobile Agents
 
Introduction to the advanced search functionality of Joinup
Introduction to the advanced search functionality of JoinupIntroduction to the advanced search functionality of Joinup
Introduction to the advanced search functionality of Joinup
 
Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...Predicting Android Application Security and Privacy Risk With Static Code Met...
Predicting Android Application Security and Privacy Risk With Static Code Met...
 
The Free Software Movement
The Free Software MovementThe Free Software Movement
The Free Software Movement
 
Are free Android app security analysis tools effective in detecting known vul...
Are free Android app security analysis tools effective in detecting known vul...Are free Android app security analysis tools effective in detecting known vul...
Are free Android app security analysis tools effective in detecting known vul...
 
Security in Android Application
Security in Android ApplicationSecurity in Android Application
Security in Android Application
 
Appstores imc13
Appstores imc13Appstores imc13
Appstores imc13
 
Icacci presentation- deep android
Icacci presentation- deep androidIcacci presentation- deep android
Icacci presentation- deep android
 
Intro To Mobile Analytics
Intro To Mobile AnalyticsIntro To Mobile Analytics
Intro To Mobile Analytics
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
 
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
Effective risk communication for android apps
Effective risk communication for android appsEffective risk communication for android apps
Effective risk communication for android apps
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applications
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 

More from Ali Rıza SARAL

More from Ali Rıza SARAL (9)

On the Role of Design in Creativity.pptx
On the Role of Design in Creativity.pptxOn the Role of Design in Creativity.pptx
On the Role of Design in Creativity.pptx
 
Mnistauto 5
Mnistauto 5Mnistauto 5
Mnistauto 5
 
Mnistauto 4
Mnistauto 4Mnistauto 4
Mnistauto 4
 
Mnistauto 3
Mnistauto 3Mnistauto 3
Mnistauto 3
 
Mnistauto 2
Mnistauto 2Mnistauto 2
Mnistauto 2
 
Human assisted computer creativity
Human assisted computer creativityHuman assisted computer creativity
Human assisted computer creativity
 
20160308 ars writing large music works
20160308 ars writing large music works20160308 ars writing large music works
20160308 ars writing large music works
 
Komut satırı JAVA
Komut satırı JAVAKomut satırı JAVA
Komut satırı JAVA
 
AR+S The Role Of Abstraction In Human Computer Interaction
AR+S   The Role Of Abstraction In Human Computer InteractionAR+S   The Role Of Abstraction In Human Computer Interaction
AR+S The Role Of Abstraction In Human Computer Interaction
 

Recently uploaded

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
dannyijwest
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Compressing and Sparsifying LLM in GenAI Applications
Compressing and Sparsifying LLM in GenAI ApplicationsCompressing and Sparsifying LLM in GenAI Applications
Compressing and Sparsifying LLM in GenAI Applications
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Databricks Generative AI Fundamentals .pdf
Databricks Generative AI Fundamentals  .pdfDatabricks Generative AI Fundamentals  .pdf
Databricks Generative AI Fundamentals .pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 

Mnistauto 1

  • 1. An Analysis of HINTON’s mnistdeepauto program 1. By Ali Riza SARAL Arsaral ((at)) yahoo.com This is the first of a series of analysis based on Hinton’s program. The subsequent analysis will include 2- Rbm.m and rbmhidlinear.m 3- backprop.m amd mnistdisp.m 4- CG_MNIST.m
  • 2. Copyright note • Version 1.000 • • Code provided by Ruslan Salakhutdinov and Geoff Hinton • • Permission is granted for anyone to copy, use, modify, or distribute this • program and accompanying programs and documents for any purpose, provided • this copyright notice is retained and prominently displayed, along with • a note saying that the original programs are available from our • web page. • The programs and documents are distributed without any warranty, express or • implied. As the programs were written for research purposes only, they have • not been tested to the degree that would be advisable in any important • application. All use of these programs is entirely at the user's own risk. • This program pretrains a deep autoencoder for MNIST dataset • You can set the maximum number of epochs for pretraining each layer • and you can set the architecture of the multilayer net.
  • 3. Mnistdeepauto input and output diagram
  • 5. Training data input output epoch=1
  • 6. Test data distorted input output
  • 10.