Naïve bayesian approach-id3 algorithm, Database Management System

Assignment Help:

You are working for the ABC Telecom and are given some customer records for data mining. You are asked to discover, from the data, patterns that characterize low-, medium- and high-usage customers. He would like to make sure that newly recruited salespersons be able to recommend the right service plans (500-free-mins (low-usage), 2500-free-mins (medium-usage), and 5000-free-mins (high-usage)) to the right customers.

a)  Show how you can make use of the ID3 algorithm to discover in a sample of customer records (shown in Table 2) what best plan to make to which kind of customers. (Please show clearly your calculations and steps.)

b) You are given a testing data set (shown in Table 3) as follows, how much should you trust the recommendations made according to the rules discovered by ID3 algorithm?

c) Use the Naïve Bayesian Approach to check the recommendations against the testing data set. How many recommendation(s) is/are trustful?

d) Given a choice between the Naïve Bayesian Approach and the ID3 algorithm for this task, which one would you choose? Why?

 


Related Discussions:- Naïve bayesian approach-id3 algorithm

Microeconomic, anyone have a textbook solutions case fair, 8 edition of vo...

anyone have a textbook solutions case fair, 8 edition of vol 1 ?, please give me

Create an er diagram completely with attributes, A database is to be constr...

A database is to be constructed to remain track of the teams and games of a sport league. A team has a number of players, not all of whom participate in every game. It is desired

Question, I want to buy this but I want to see a couple sample questions fi...

I want to buy this but I want to see a couple sample questions first. http://www.expertsmind.com/library/what-happens-to-rms-error-for-the-training-data-set-51564843.aspx

Explain two phase locking protocol, Explain Two phase locking protocol ...

Explain Two phase locking protocol A transaction is consider as to follow the two-phase locking protocol if all locking operations precede the first unlock operation in the tra

Which model is record based logical model, Which model is record based logi...

Which model is record based logical model? Network Modelis basically known as record based logical model.

Compare three clustering algorithms in weka, Compare three clustering algor...

Compare three clustering algorithms in Weka. For this comparison, you will need to use at least two different datasets. Run the algorithms on the datasets, and use the visual

Explain weak and strong entity sets, Explain weak and strong entity sets? ...

Explain weak and strong entity sets? Weak and Strong entity sets: A physically powerful entity set has a primary key. All tuples in the group are distinguishable through that k

Define deferred update technique of recovery, Discuss deferred update techn...

Discuss deferred update technique of recovery.  What are the advantages?  Ans:  The deferred update methods do not physically update the database on disk till after a transact

Give the levels of data abstraction, Give the levels of data abstraction? ...

Give the levels of data abstraction? There are three levels of Data Abstraction a) Physical level b) logical level c) view level

State the process of inheritance adjustment, Inheritance Adjustment As...

Inheritance Adjustment As in object oriented analysis and design terms inheritance defines a relationship between classes, where as one class shares structure or behaviour def

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd