Decision trees, Computer Engineering

Assignment Help:

Decision Trees:

Visualize you only ever do four things at the weekend such as go shopping or watch a movie or play tennis and just stay in. In such case what you do depends on three things as: the weather or windy, rainy or sunny; means how much money you have rich or poor and where your parents are visiting. However you say to yourself as:  there if my parents are visiting than we'll go to the cinema. And if they're not visiting or it's sunny so I'll play tennis further then if it's windy, and I'm rich, then I'll go shopping. Hence if they're not visiting so it's windy and I'm poor and I will go to the cinema. But if they're not visiting and it's rainy so I'll stay in. 

Always memorize all this as you draw a flowchart that will enable you to read off your decision. And now if we call such diagrams decision trees. Then a suitable decision tree for the weekend decision choices would be as follows: 

2022_Decision Trees.png

However we can justified by see that why such diagrams are called trees is just because of them, are admittedly upside down and they start from a root and have branches leading to leaves as the tips of the graph at the bottom. There is one important notice that the leaves are always decisions then a particular decision might be at the end of multiple branches like an example where we could choose to go to the cinema for two different reasons.


Related Discussions:- Decision trees

A global variable is a variable, A global variable is a variable A globa...

A global variable is a variable A global variable is declared outside the body of each function.

Performance of pipelines with stalls, Performance of Pipelines with Stalls:...

Performance of Pipelines with Stalls: A stall is reason of the pipeline performance to degrade the ideal performance.                                             Average in

Describe about the protection features present in ms access, If a programme...

If a programmer doesn't wish to make modifies to the document he can lock the document data and its code from more changes by changing the extension of the file system to .MDE. Cha

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

What is fan-out, What is fan-out? Estimate the average count of every "...

What is fan-out? Estimate the average count of every "many" association encountered with the path. Multiply the individual fan-outs who obtain the fan-out of the whole path, wh

Define in brief about the database management systems, Define in brief abou...

Define in brief about the Database Management Systems Databases (Database Management Systems - DBMS) Databases are used to organise and collect information. Most databas

Describe the three mapping techniques, Describe the three mapping technique...

Describe the three mapping techniques used in cache memories with suitable Example. The cache memory is a fast memory that is inserted among the larger slower main memory and t

Define entry section and exit section, Define entry section and exit sectio...

Define entry section and exit section. The critical section problem is to design a protocol that the processes can use to cooperate. Every process must request permission to e

Design 4 to 1 multiplexer with strobe input using nand gates, Design a 4 : ...

Design a 4 : 1 multiplexer with strobe input using NAND gates. Ans. Design of 4 : 1 multiplexer with strobe input using NAND gates.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd