Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

The ID3 algorithm constructs a decision tree based on an estimate of the "best" attribute for the current set of data at that level in the tree.

(a) Outline the ID3 algorithm for constructing a decision tree. Assume that the initial set of examples is represented as the set S and that you have a supplied function that determines the next "best" attribute for splitting.

(b) The change in entropy is one approach to selecting the "best" attribute when deciding how to split the current node for a decision tree. Define a measure of entropy for the classification problem shown in part (c), and explain how it is used to select the "best" attribute for splitting.

(c) The ID3 algorithm is now applied to the following table of data, where the examples el ..e8 are based on three attributes (atl ..at3) and classified as either positive (+) or negative (-) examples.

 

Example

at1

at2

at3

Classification

el

a

x

n

+

e2

b

x

n

+

e3

b

y

n

-

e4

a

y

m

-

e5

a

y

n

+

e6

a

x

p

+

e7

c

z

p

-

e8

c

z

n

+

 

Assume that you are starting the construction of the decision tree, and that the "best" attribute for the first split in the tree has been determined to be at2.

Draw the decision tree after this initial split, and include at each node of the tree the new subset of examples that need to be split, or if the node is homogeneous then include the final classification for this node.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91628769
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Management Information System

Three discussions minimum 300 words each discussionuse your

Three discussions (minimum 300 words each discussion) Use your own words when you can (personal experience), if it needs to be cited please cite it correctly 1st Discussion (minimum 300 words) IT Project Management - Pro ...

Question 1 what aspect of display technology is unique and

Question : 1. What aspect of display technology is unique and potentially what drawbacks does this new technology eliminate? 2. Introducing traditional "non-disruptive products to market is facilitated with market studie ...

Instructionschoose one of the scenarios below a or b to

Instructions Choose one of the scenarios below (A or B) to complete the assignment. Scenario A You are the business owner of a local small engine repair shop, and you have been thinking about implementing a knowledge man ...

Question how are authentication and authorization alike and

Question : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two? Please write minimum of 200 words with 0 % plagiarism.

Assignment 1 cloud computingmany organizations have now

Assignment 1: Cloud Computing Many organizations have now adopted or begun to offer cloud computing. This type of computing has advantages and disadvantages that may vary from organization to organization. Select two (2) ...

Discussionconduct research using the library and the

Discussion Conduct research using the library and the Internet to find information about ethernet and nonethernet networking. Then, answer the following: Discuss the major differences between these types of networking te ...

Discussionsearch google scholar for a company school or

Discussion Search "google scholar" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to en ...

You are a member of the human resources department of a

You are a member of the Human Resources Department of a medium-sized organization that is implementing a new interorganizational system that will impact employees, customers, and suppliers. Your manager has requested tha ...

Case study 1read the article in the attachmentan overview

Case Study 1 Read the Article in the attachment An overview of cyber-attack and computer network operations simulation Write a four to five (4-5) page paper in which you: Identify at least three (3) benefits or key knowl ...

Assignment purpose the purpose of this assignment is to

Assignment Purpose: The purpose of this assignment is to explore exchange of heath information Assignment Description: Step One: Perform a web search and locate information about healthcare data interchange standards suc ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As