problem about data mining for business intelligence, Database Management System

Assignment Help:
Do the 11.1

11.1 Credit Card Use. Consider the following
hypothetical bank data on consumers’ use of credit card
credit facilities in Table 11.3. Create a small worksheet in
Excel, like that used in Example 1, to illustrate one pass


through a simple neural network.

Here is the Table 11.3

a. Use XLMiner’s neural network routine to fit a model
using the XLMiner default values for the neural net
parameters, except normalizing the data. Record the RMS
error for the training data and the validation data. Repeat
the process, changing the number of epochs (and only this)
to 300, 3000, and 10,000.

i. What happens to the RMS error for the training data as
the number of epochs increases?

ii. What happens to the RMS error for the validation data?

iii. Comment on the appropriate number of epochs for the
model.

b. Conduct a similar experiment to assess the effect of

changing the number of layers

Related Discussions:- problem about data mining for business intelligence

Three level architecture of dbms-logical architecture, Three Level Architec...

Three Level Architecture of DBMS or Logical DBMS Architecture The logical architecture defines how data in the database is perceived by users. It is not deals with how the da

Join relation of two tuples, Consider the join of a relation R with relatio...

Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the maximum size of join is: If R has m tuples and S has n tuples then maximum siz

Dbms, You are managing the following database system: • DBMS: Oracle 11g ...

You are managing the following database system: • DBMS: Oracle 11g • OS: Sun Solaris • System architecture: Web-based application using ASP.Net • Purpose of Server: HR managem

Shadow copy, why shadow copy technique is used?

why shadow copy technique is used?

Briefly describe concurrency execution, Briefly describe concurrency execut...

Briefly describe concurrency execution? Lock - based protocols Locks There are several modes in which a data item may be locked in this section we restrict our attention

Describe the definition of a transaction in sql, Describe the definition of...

Describe the definition of a transaction in SQL  Ans: The SQL transaction starts implicitly. Transactions are finished by either Commit work that commits the transaction and st

The logical dbms architecture, Normal 0 false false false ...

Normal 0 false false false EN-IN X-NONE X-NONE

Advantages to copying records from one table to another, What kind of advan...

What kind of advantages to copying records from one table to another? -) When an algorithm that modifies a table is used after that it's safer to work with the copy -) When

Relationship, what is the relationship between receipt and owner entities i...

what is the relationship between receipt and owner entities in computer sales and service company

What is bcnf boyce-codd normal form, BCNF Boyce-Codd Normal Form A rel...

BCNF Boyce-Codd Normal Form A relation schema R is in BCNF if it is in 3NF and accepts an additional constraint that for every FD X A, X has to be a candidate key. If a relati

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd