Naïve bayesian approach-id3 algorithm, Database Management System

You are working for the ABC Telecom and are given some customer records for data mining. You are asked to discover, from the data, patterns that characterize low-, medium- and high-usage customers. He would like to make sure that newly recruited salespersons be able to recommend the right service plans (500-free-mins (low-usage), 2500-free-mins (medium-usage), and 5000-free-mins (high-usage)) to the right customers.

a)  Show how you can make use of the ID3 algorithm to discover in a sample of customer records (shown in Table 2) what best plan to make to which kind of customers. (Please show clearly your calculations and steps.)

b) You are given a testing data set (shown in Table 3) as follows, how much should you trust the recommendations made according to the rules discovered by ID3 algorithm?

c) Use the Naïve Bayesian Approach to check the recommendations against the testing data set. How many recommendation(s) is/are trustful?

d) Given a choice between the Naïve Bayesian Approach and the ID3 algorithm for this task, which one would you choose? Why?

 

Posted Date: 4/5/2013 5:20:21 AM | Location : United States







Related Discussions:- Naïve bayesian approach-id3 algorithm, Assignment Help, Ask Question on Naïve bayesian approach-id3 algorithm, Get Answer, Expert's Help, Naïve bayesian approach-id3 algorithm Discussions

Write discussion on Naïve bayesian approach-id3 algorithm
Your posts are moderated
Related Questions
" Wound-wait" scheme : It is based on a preemptive method. It is based on a simple rule:                   If Ti requests a database resource that is held by Tj

using the invoice table shown below,write the relational schema,draw a dependencies,inclunding all partial and transitive dependencies.assume that the table does not contain repeat

Fragmentation: It is definite as partitioning of a relation into various fragments.Every fragment can be stored at a dissimilar site.

The Maximum no of key fields that can be used in a header is?? 50

Normal 0 false false false EN-IN X-NONE X-NONE

Differentiate OO development from structured development. Structured approach of problem solving is based upon the idea of decomposition of system into subsystem. In this appro

Describe the candidate key functions ? Candidate Key and Alternate Key: In some instances, an entity will have more than one attribute which can serve as a primary key. Any key

Retrieve the S&S In-Chapter Database (in Microsoft Access format) from the text's Web site (or create the tables in Table 4-5 in a relational DBMS product). Write queries to answer

What is an E-R model? Draw an E-R Diagram for the company database with following Descriptions? The company is organized within departments. Each department has a unique name a

Consider student (std_id, std_name, date_of_birth, phone, dept_name). Put the data for a student with student id200, name arun, birth date 1 February, 1985, phone number (01110 328