Determine the indicator variables in a random forest, Computer Engineering

Given a dataset with 1000 rows and 25 predictors labeled x1, x2, ...,x25 to classify into two classes {a, b}. Consider the small random forest with 3 trees and one split in each tree as shown below. Here 5 predictors are selected randomly at each node. The class assigned to each leaf node is also shown.

591_Indicator Variables in a Random Forest.png

a) Given a row of data x0 with x1= green, x5 = 4, x9 = 9, predict the class label for the row.

b) For Tree1, it can be concluded that the best split among all 25 predictors is obtained from x1. Circle True or False.

c) Approximately 368 rows are expected to be out of bag for Tree 1. Circle True or False.

d) Categorical variables are coded to {0, 1} indicator variables in a random forest. Circle True or False.

 

 

Posted Date: 3/21/2013 2:33:07 AM | Location : United States







Related Discussions:- Determine the indicator variables in a random forest, Assignment Help, Ask Question on Determine the indicator variables in a random forest, Get Answer, Expert's Help, Determine the indicator variables in a random forest Discussions

Write discussion on Determine the indicator variables in a random forest
Your posts are moderated
Related Questions
Q. Graphic symbol of S-R flip-flop? R-S Flip flop - Graphic symbol of S-R flip-flop is displayed in Fig below. It has 3 inputs S (set), R (reset) and C (for clock). Q(t+1) is

How will this difference b interpreted? When one pointer is subtracted from another pointer, the number of elements between the two pointers always includes the element pointed

A vertical flashing line that permits the user where text will be inserted.

Superscalar architecture was designed to increase the speed of the scalar processor. But it has been realized it's not easy to apply. Subsequent are a number of problems faced in t

Explain pointers We can have a pointer pointing to a structure just the same way a pointer pointing to an int, such pointers are called as structure pointers

Define the term- encryption The user would then type in O P E and card purchase will be authorised. This extra protection is used as well as encryption. Some of the new syste

Which of the memories stores the most number of bits ? Ans. most number of bits stores in 32M x 8 As 2 5 x 2 20   = 2 25 Therefore 1M = 2 20 = 1K x 1K = 2 10 x 2 10

CISC Approach - CISC architecture: The main goal of CISC architecture is to finish a task in as few lines of assembly as possible as. This is gain by building processor hardwa

What are the "field" and "chain" Statements? The FIELD and CHAIN flow logic statements let you Program your own checks. FIELD and CHAIN tell the system which fields you are ch

What are the advantages of having e-commerce over extranets?     Extranets are about " joining up" the supply chain-suppliers, resellers, distributors, customers, etc.-enabling