Avoiding overfitting - decision tree learning , Computer Engineering

Avoiding Overfitting :

However remember there that in the previous lecture, there is over fitting that common problem in machine learning. Furthermore details to decision trees suffer from this is because they are trained to stop where they have perfectly classified all the training data that i.e., each branch is extended that is far enough to correctly categorise the examples relevant to that branch. In fact many other approaches to overcoming overfitting in decision trees have been attempted but as a summarised by Tom Mitchell there these attempts fit into two types as:

• Just stop growing the tree before it reaches perfection, and
• Now allow the tree to fully grow so then post-prune some of the branches from it.

Hence the second approach has been found to be more victorious in practice. Means that both approaches boil down to the question of determining the correct tree size. Here you can see Chapter 3 of Tom Mitchell's book for a more detailed description of overfitting avoidance in decision tree learning.

Posted Date: 1/10/2013 7:43:28 AM | Location : United States







Related Discussions:- Avoiding overfitting - decision tree learning , Assignment Help, Ask Question on Avoiding overfitting - decision tree learning , Get Answer, Expert's Help, Avoiding overfitting - decision tree learning Discussions

Write discussion on Avoiding overfitting - decision tree learning
Your posts are moderated
Related Questions
Q.What do you mean by Parallel virtual machine? PVM is essentially a simulation of a computer machine running parallel programs. It is a software package which allows a heterog

Q. Illustrate Decimal Fixed Point Representation? The point of this representation is to keep the number in decimal equivalent form and not binary as above. A decimal digit is

Slope Deflection Equations for a Member: In this section, we will develop a few general equations needed for further discussion in the moment distribution context. Fig

What is Dynamic Modelling  As you know that computer systems are built from the objects which respond to events. External events arrive at boundary of system; you understan

Perform the - 48 - 23 operations using the 2's complement method. Ans. - 48 - 23 = - 48 + (-23)     -48     =  1 1 0 1 0 0 0 0     -23     =  1 1 1 0 1 0 0 1       = -71

What is the difference between char a[] = "string"; and char *p = "string";? Ans) In the first case 6 bytes are assigned to the variable a which is fixed, where as in the secon

And-Elimination rule: In generally English says that "if you know that lots of things are all true, so you know like any one of them is also true". Because you can specify a c

Basically I need implement program using LC3 assembly language where I can type any message using ASCII code (this will my input). Then read the output in cipher text. It has to be


Digital versatile disk (DVD) This is an optical system for storing data. It's similar to CD though typically can hold 4.7 Gbyte of data compared to only 700 MB of data on a CD.