{"version":"1.0","provider_name":"InfoSecML","provider_url":"https:\/\/infosecml.com","author_name":"Steve Gailey","author_url":"https:\/\/infosecml.com\/index.php\/author\/stevegailey-org-uk\/","title":"Understanding Neural Networks - Part Two - InfoSecML","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"gXVBGDRhTa\"><a href=\"https:\/\/infosecml.com\/index.php\/2020\/11\/11\/understanding-neural-networks-part-two\/\">Understanding Neural Networks &#8211; Part Two<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/infosecml.com\/index.php\/2020\/11\/11\/understanding-neural-networks-part-two\/embed\/#?secret=gXVBGDRhTa\" width=\"600\" height=\"338\" title=\"&#8220;Understanding Neural Networks &#8211; Part Two&#8221; &#8212; InfoSecML\" data-secret=\"gXVBGDRhTa\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/infosecml.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/infosecml.com\/wp-content\/uploads\/2020\/11\/Activation_Functions.png","thumbnail_width":7458,"thumbnail_height":4547,"description":"In Part 1, we introduced the idea of a neuron as the building block for neural networks, it has inputs and outputs and uses an activation function to generate the output from the weighted inputs. This time we are going to explore the activation function in a bit more detail and talk about how neural [&hellip;]"}