Computers and Technology

For this exercise, your goal is to build a model to identify inputs or predictors that differentiate risky customers from others (based on patterns pertaining to previous customers) and then use those inputs to predict new risk customers. this sample case is typical for this domain. the data to be used in this exercise are in online file w4.1_creditrisk. xlsthe data set has 425 cases and 15 variables pertaining to past and current customers who have borrowed from a bank for various reasons. the data set contains customer-related information such as financial standing, reason for the loan, employment, demographic information, and the outcome or dependent variable for credit standing, classifying each case as good or bad, based on the institution’s past experience. take 400 of the cases as training cases and set aside the other 25 for testing. build a decision tree model to learn the characteristics of the problem. test its performance on the other 25 cases. report on your model’s learning and testing performance. prepare a report that identifies the decision tree model and training parameters, as well as the resulting performance on the test set. use any decision tree software.

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 08:00, wgdelgado
What is the first step in creating a maintenance ?
Answers: 2
image
Computers and Technology, 22.06.2019 15:00, vladutraileanu7599
Which of the following has not been attributed at least in part to social media a. drug addiction b. depression c. kidnapping d. murder
Answers: 2
image
Computers and Technology, 22.06.2019 22:00, mrnotsosmart744
Discuss the ways in which electronic information associated with payments is addressed in terms of security. include encryption, secure sockets layers, and secure electronic transactions in your discussion. are there any other ways that consumers and businesses can keep their payment information secure in an electronic commerce environment? do you feel that your information is safe when conducting electronic business? why or why not?
Answers: 1
image
Computers and Technology, 24.06.2019 07:00, AnaiyaKirksey8
You are most likely to automatically encode information about
Answers: 1
Do you know the correct answer?
For this exercise, your goal is to build a model to identify inputs or predictors that differentiate...

Questions in other subjects:

Konu
Mathematics, 09.03.2021 18:50