当前位置:网站首页>Logistic regression and linear regression
Logistic regression and linear regression
2022-06-22 09:14:00 【code bean】
First Linear regression Both the definition field and the value field of are from negative infinity to positive infinity , It is used to predict a value , For example, knowing height predicts weight .
Logistic regression is actually evolved from linear regression

Logistic regression is generally used to do binary classification , That is, the sum of probability and 0.5 compare , The probability is greater than 0.5 Belong to one class , Others fall into another category . So I hope the value range is (0,1), So there is a logic function . Add the linear regression model and you have a logistic regression .
The decision boundary of logistic regression is linear

It can be inferred from the above formula , The decision boundary is a straight line .( The probability of all elements on the line is 0.5)
in other words , First, we can get the equation of decision boundary , From the equation, we can know whether the decision boundary is linear or nonlinear .
边栏推荐
猜你喜欢

Solidity from introduction to practice (6)
![[target detection] | detection error mechanism why object detectors fail: investigating the influence of the dataset](/img/d2/101c8ef5dac517718bbe44ee4fd607.png)
[target detection] | detection error mechanism why object detectors fail: investigating the influence of the dataset

【Tensorboard】所有雷区都踩,一文解决你所有问题
![Wireless routing attack and WiFi password cracking practice [penetration technology]](/img/b9/3551630c128e03731a956c6a6502e2.jpg)
Wireless routing attack and WiFi password cracking practice [penetration technology]

Manually mining XSS vulnerabilities

字符串与内存操作函数详解与模拟实现

pytorch OSError: DLL load failed: 问题解决方法

【uni-app】实战总结(含多端打包)

Solid from entry to practice (end)

Didi's two-sided summary
随机推荐
Apprentissage automatique | nltk Erreur de téléchargement des données | solution d'erreur de téléchargement du corpus stopwords pour nltk
container_ of
Sound and shadow 2022 heavy release! Detailed explanation of the new functions of Huisheng Huiying 2022
C语言刷题 | 温度转换(11)
机器学习|nltk_Data下载错误|nltk的stopwords语料下载错误解决方法
Continuous training on tensorflow breakpoint (principle + code explanation)
traefik ingress实践
C# 进程如何使用非静态方法
cocoscreator编译报错记录 Could not write cache value 。。。.gradle\daemon\4.10.3\regi
Kali Trojan invades win7 system
==Classic interview questions
kali木马入侵win7系统
The U.S. Department of justice established a national crypto enforcement team to combat illegal acts in related fields
模糊查询和聚合函数
What is defi and what mode is defi?
[target detection] | detection error mechanism why object detectors fail: investigating the influence of the dataset
[Architect (Part 39)] connecting MySQL database developed by server
Introduction to ten free and open source PHP online stores abroad
经典&&案例
Manually mining XSS vulnerabilities