Information gain, Computer Engineering

Information Gain:

Now next here instantly return to the problem of trying to determine the best attribute to choose for a particular node in a tree. As in the following measure calculates a numerical value for a given attribute and A and with respect to a set of examples and S. However notice that there the values of attribute A will range over a set of possibilities that we call Values(A), so that for a particular value from that set, v, we write Sv  for the set of examples that have value v for attribute A. 

Moreover the information gain of attribute A, that is relative to a collection of examples, S, is calculated as: 

2074_Information Gain.png

Thus the information gain of an attribute can be seen as the expected reduction in entropy caused through knowing the value of attribute A

Posted Date: 1/11/2013 6:41:41 AM | Location : United States







Related Discussions:- Information gain, Assignment Help, Ask Question on Information gain, Get Answer, Expert's Help, Information gain Discussions

Write discussion on Information gain
Your posts are moderated
Related Questions
Explain the meaning of BIND socket primitive The bind Primitiv: While created, a socket has neither a remote address nor a local address. A server utilizes the bind proce

What are the two ways of constructing a larger module to mount flash chips on a small card? The two ways are:- a) Flash cards b) Flash drivers.

how to build PVR set-top box using raspberry

Q. What is Combinational circuits? Combinational circuits are interconnected circuits of gates according to definite rules to generate an output relying on its input value. A w

What is most common biometrics? Explain in brief. The most common biometrics is as given below: Face geometry (Photo): The computer captures the picture of your face and m

What is low-level formatting?  Before a disk can store data, it must be divided into sectors that the disk controller can read and write. This process is known as low-level for

You should now have a reasonably clear understanding of what is meant by interaction design. However, there are several other terms which are often used to refer to particular aspe

Q. Explain the type of micro-operations? Let's first discuss type of micro-operations. Most common micro-operations performed in a digital computer can be categorized into 4 ca

Explain about the network security. Network security implies the protection of networks and their services through unauthorized access, destruction or disclosure, modificati

Describe Real and protected mode: Operation of Real mode interrupt:   When microprocessor completes executing the current instruction, it concludes whether an interrupt is act