Personal loan acceptance

Assignment Help Basic Computer Science
Reference no: EM131163679

Personal Loan Acceptance. Universal Bank is a relatively young bank growing rapidly in terms of overall customer acquisition. The majority of these customers are liability customers (depositors) with varying sizes of relationship with the bank. The customer base of asset customers (borrowers) is quite small, and the bank is interested in expanding this base rapidly to bring in more loan business. In particular, it wants to explore ways of converting its liability customers to personal loan customers (while retaining them as depositors).

A campaign that the bank ran last year for liability customers showed a healthy conversion rate of over 9% success. This has encouraged the retail marketing department to devise smarter campaigns with better target marketing. The goal is to use k-NN to predict whether a new customer will accept a loan offer.

This will serve as the basis for the design of a new campaign.

The file UniversalBank.xls contains data on 5000 customers. The data include customer demographic information (age, income, etc.), the customer's relationship with the bank (mortgage, securities account, etc.), and the customer response to the last personal loan campaign (Personal Loan). Among these 5000 customers, only 480 (= 9.6%) accepted the personal loan that was offered to them in the earlier campaign.

Transform categorial predictors with more than two categories into dummy variables, then, partition the data into training (60%) and validation (40%) sets.

Consider the following customer:

, Experience = 10, Income = 84, Family = 2, CCAvg = 2, Education_1 = 0, Education_2 = 1, Education_3 = 0, Mortgage = 0, Securities Account = 0, CD Account = 0, Online = 1, and Credit Card = 1. Perform a k-NN classification with all predictors except ID and ZIP code using k = 1. Specify the success class as 1 (loan acceptance), and use the default cutoff value of 0.5. How would this customer be classified?

What is a choice of k that balances between overfitting and ignoring the predictor information?

Show the classification matrix for the validation data that results from using the best k.

Reference no: EM131163679

Questions Cloud

What are maximum profit and the corresponding buy levels : What are the maximum profit and the corresponding make/buy levels?- Compare the maximum profit in (a) to the maximum profit achievable without integer constraints.
What will the reaction rx on the test stand be now : What will the reaction Rx on the test stand be now? Is this reaction sufficient to serve as a braking force during airplane landing?
Which company has the most impressive broad-based : Which company has the most impressive broad-based or global equity plans and why? When sharing your company, provide supporting details followed by citations and references in your posting.
How will project communications and interactions work : How will project communications and interactions work between the project manager, the stakeholders and the project team
Personal loan acceptance : Universal Bank is a relatively young bank growing rapidly in terms of overall customer acquisition. The majority of these customers are liability customers (depositors) with varying sizes of relationship with the bank. The customer base of asset c..
Identify two services you believe are the most important : identify two services you believe are the most important and cite at least 3 reasons why. Also, choose two services that you think are most likely to decline due to human influence and cite at least 3 examples of the result of decline of those se..
Provide information about how the organization : Explain the incident and provide information about how the organization/ individuals responded to such attacks. Also, provide information about what are the lessons learned.
Explain the trade-offs between hubs and switches : Explain the trade-offs between hubs and switches when planning for a small business network. The network is spread across three floors of a building with roughly equal numbers of PCs and servers on each floor
Problem regarding the booting and editing : Describe two (2) major differences between the boot processes of Linux and Windows 7. Explain whether or not grub can be used to boot Windows. Provide a rationale for your response.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Define the weight-error vector

An alternative to the mean-square error (MSE) formulation of the learning curve that we sometimes find in the literature is the mean-square deviation (MSD) learning curve. Define the weight-error vector

  Identify people to interview to learn new training activity

Draft a project scope statement for the TIMS system and describe the constraints. She said be specific. Need to identify the people want to interview to learn more about the new training activity, and prepare a list of the questions I will ask.

  Write a java class to find occurence of a digit

Write a java class to Find occurence of a digit.

  Database trends

Database Trends

  What is the time complexity of the better method

Modern object-oriented software makes extensive use of the malloc and free operations. Unfortunately, they are generally quite expensive (in time) and thus efficient routines are important.

  What do you understand by thread-safety

What do you understand by thread-safety? Why is it required? And finally, how to achieve thread-safety in Java Applications?

  The caption element provides caption for image true or false

The caption element provides a caption for the image in a figure element. True or False

  Combination of electrical states in the inputs

What table shows the electrical state of a digital circuit's output for every possible combination of electrical states in the inputs?

  Data be loaded into the data warehouse

How frequently must the data be loaded into the data warehouse? Is it the same for each component?

  Recognize the historical development of database

Courses are categorized by course code and title. Certain courses have prerequisites and the university has asked for this to be cataloged as well.

  Identify organizations that may be susceptible

Acts considered cyberterrorism and / or information warfare can be divided into four separate categories; infrastructure attacks, information attacks, technological facilitation, and promotion.

  Stores them in variables of string data type

Write a c++ program that reads 2 words, stores them in variables of string data type, and displays the shortest length of these 2 words. Can u also please explain each line of coding in simple arithmetic.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd