Reading decision trees, Computer Engineering

Reading Decision Trees:

However we can justified by see that a link between decision tree representations and logical representations that can be exploited to make it easier to understand as read learned decision trees. But if we really think about it that every decision tree is essentially a disjunction of implications as "if ... then statements" so the implications are Horn clauses: and a conjunction of literals implying a single literal. Thus in the above tree here we can see this by reading from the root node to each leaf node: 

If go to the cinema, then the parents are visiting

or

If play tennis, then the parents are not visiting and it is sunny.

or

If go shopping, then the parents are not visiting and it is windy and you're rich.

or

If go to cinema, then the parents are not visiting and it is windy and you're poor.

or

If stay in, then the parents are not visiting and it is rainy. 

Obviously there is fact is just a re-statement of the original mental decision making process as we described. But retain information moreover we will be programming an agent to learn decision trees from example and this kind of situation will not occur as we will begin with only example situations. Furthermore it will therefore be important for us to be able to read the decision tree the agent suggests.

Posted Date: 1/11/2013 6:35:42 AM | Location : United States







Related Discussions:- Reading decision trees, Assignment Help, Ask Question on Reading decision trees, Get Answer, Expert's Help, Reading decision trees Discussions

Write discussion on Reading decision trees
Your posts are moderated
Related Questions
The ISCII is an 8-bit code which contains standard ASCII values till 127 from 128-225 it contains characters necessary in ten Brahmi-based Indian scripts. It is defined in IS 13194

Explain the transport layer in detail. Transport Layer: The transport layer controls and makes sure the end-to-end integrity of the data message propagated by the network am

You have been asked to become the consulting technician for MobTex, a local auto servicing centre. The general manager (Jo) realises that the IT system has evolved over time with l

Q. Show the Importance of RISC Processors? Reduced Instruction Set Computers recognize a comparatively limited number of instructions. One benefit of a reduced instruction set

Which is most general phase structured grammar? Context – Sensitive is most common phase structured grammar.

Q. What do you mean by Single Construct in FORTAN? Single construct specifies the associated structured block is executed by just one thread in team (not essentially the master

How can I go in the symbol for the new Euro currency in my spreadsheet? Ans) Microsoft suggestted a new Tahoma font with the Euro symbol.

'On many systems, you can describe a function matherr which will be known as when there are certain floating-point errors, like errors in the math routines in .

What are primary keys and foreign keys? Primary keys are the unique identifiers for every row. They must have unique values and cannot be null. Due to their significance in rel

What are types of firewalls? There are conceptually two types of firewalls as: 1. Network Level 2. Application Level