Avoiding overfitting - decision tree learning , Computer Engineering

Assignment Help:

Avoiding Overfitting :

However remember there that in the previous lecture, there is over fitting that common problem in machine learning. Furthermore details to decision trees suffer from this is because they are trained to stop where they have perfectly classified all the training data that i.e., each branch is extended that is far enough to correctly categorise the examples relevant to that branch. In fact many other approaches to overcoming overfitting in decision trees have been attempted but as a summarised by Tom Mitchell there these attempts fit into two types as:

• Just stop growing the tree before it reaches perfection, and
• Now allow the tree to fully grow so then post-prune some of the branches from it.

Hence the second approach has been found to be more victorious in practice. Means that both approaches boil down to the question of determining the correct tree size. Here you can see Chapter 3 of Tom Mitchell's book for a more detailed description of overfitting avoidance in decision tree learning.


Related Discussions:- Avoiding overfitting - decision tree learning

What is asp.net authentication providers and iis security, What is ASP.NET ...

What is ASP.NET Authentication Providers and IIS Security? ASP.NET implements authentication using authentication providers, which are code modules that verify credentials and

Detemine the major building blocks of uml, Detemine the major building bloc...

Detemine the major building blocks of UML UML could be used in visualizing, specifying, constructing and documenting object oriented systems. The major building blocks of UML a

Megaflops, Speed in scientific computing is measured in megaflops, gigaflop...

Speed in scientific computing is measured in megaflops, gigaflops, teraflops and petaflops. A megaflop is 10 6 floating point arithmetic operations (+, -, *, /) in one second What

Explain the term thread scheduling, Problem: a) Most RMI and RPC system...

Problem: a) Most RMI and RPC systems expect to be supported by the "Request-Reply Protocol". Describe what "Request-Reply Protocol" is. b) Describe the invocation semantics

What is an i/o buffer, What is an I/O buffer? I/O buffer: One ty...

What is an I/O buffer? I/O buffer: One type of input-output requirement arises from devices which have a very high character density as disks and tapes. With these chara

Unencoded micro-instructions, Unencoded micro-instructions One bit ...

Unencoded micro-instructions One bit is required for each control signal; so number of bits needed in a micro-instruction is high. It represents a detailed hardware vi

How does the internet work, Every computer connected to Internet has a uniq...

Every computer connected to Internet has a unique address. Let's just say your IP address is 1.2.3.4 and you want to send a message to computer with IP address 5.6.7.8. Message you

Explain about api s of olap, Microsoft in the late 1997 introduced a standa...

Microsoft in the late 1997 introduced a standard API called as OLE DB. After which XML was used for analysis specification and this specification was largely used by a lot of vendo

Determine number of final selector in 10000 line exchange, In a 10000 line ...

In a 10000 line exchange, 0000 to 2999 is allotted to x group of subscribers, out of which 40% are active during busy hour. The remaining numbers are domestic numbers out of which

What is imprecise and precise exception, What is imprecise and precise exce...

What is imprecise and precise exception? Situation in which one or more of the succeeding instructions have been implemented to completion is known as imprecise exception. Situ

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd