Avoiding overfitting - decision tree learning , Computer Engineering

Assignment Help:

Avoiding Overfitting :

However remember there that in the previous lecture, there is over fitting that common problem in machine learning. Furthermore details to decision trees suffer from this is because they are trained to stop where they have perfectly classified all the training data that i.e., each branch is extended that is far enough to correctly categorise the examples relevant to that branch. In fact many other approaches to overcoming overfitting in decision trees have been attempted but as a summarised by Tom Mitchell there these attempts fit into two types as:

• Just stop growing the tree before it reaches perfection, and
• Now allow the tree to fully grow so then post-prune some of the branches from it.

Hence the second approach has been found to be more victorious in practice. Means that both approaches boil down to the question of determining the correct tree size. Here you can see Chapter 3 of Tom Mitchell's book for a more detailed description of overfitting avoidance in decision tree learning.


Related Discussions:- Avoiding overfitting - decision tree learning

Which job is admitted to the system for processing, Jobs which are admitted...

Jobs which are admitted to the system for processing is called ? Ans. Long-term scheduling is admitted to the system for processing.

Define mapping and list mapping procedure, Define Mapping and List  mappin...

Define Mapping and List  mapping procedure? The transformation of data from main memory to cache memory is known as an Mapping. Associative mapping Direct mapping

What is the scope of public members in all classes, What is the Scope of pu...

What is the Scope of public/private/friend/protected/protected friend?    Scope of public/private/friend/protected/protected friend. Visual Basic/Visual C# Public/pub

Explain post office protocol, Explain POP (Post Office Protocol). The P...

Explain POP (Post Office Protocol). The Post Office Protocol gives remote access to an electronic mail box. The protocol permits a user's mailbox to reside on a computer which

Future scope of the internet, Q. Future scope of the Internet? The futu...

Q. Future scope of the Internet? The future scope of the Internet, along with the World Wide Web (born in 1990), and the commercialization of the Internet are bound to grow exp

Rapid appllication development, Explain clearly the four stages in the Rapi...

Explain clearly the four stages in the Rapid Application Development

Explain in detail companding, Explain in detail companding. Companding...

Explain in detail companding. Companding: It is the process of compressing and expanding. This includes compressing the signal at the transmitter and expanding this at the re

How optimization is achieved in dns, How optimization is achieved in DNS? ...

How optimization is achieved in DNS? Two primary optimizations used in DNS and they are: replication and caching. All root servers is replicated; various copies of the server

Multiprogramming or multitasking, Multiprogramming or multitasking? An...

Multiprogramming or multitasking? Ans: The OS manages the concurrent execution of many application programs to make best possible use of computer resources. This pattern of si

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd