{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T05:22:00Z","timestamp":1701148920967},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T00:00:00Z","timestamp":1553212800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T00:00:00Z","timestamp":1553212800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput & Applic"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s00521-019-04150-8","type":"journal-article","created":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T13:02:51Z","timestamp":1553259771000},"page":"7671-7689","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A framework for crime data analysis using relationship among named entities"],"prefix":"10.1007","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4729-7652","authenticated-orcid":false,"given":"Priyanka","family":"Das","sequence":"first","affiliation":[]},{"given":"Asit Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Janmenjoy","family":"Nayak","sequence":"additional","affiliation":[]},{"given":"Danilo","family":"Pelusi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,22]]},"reference":[{"key":"4150_CR1","doi-asserted-by":"crossref","unstructured":"Agichtein E, Gravano L (2000) Snowball: extracting relations from large plain-text collections. In: Proceedings of the fifth ACM conference on digital libraries","DOI":"10.1145\/336597.336644"},{"key":"4150_CR2","doi-asserted-by":"publisher","first-page":"26636","DOI":"10.1109\/ACCESS.2018.2831667","volume":"6","author":"J An","year":"2018","unstructured":"An J, Kim H (2018) A data analytics approach to the cybercrime underground economy. IEEE Access 6:26636\u201326652","journal-title":"IEEE Access"},{"issue":"1","key":"4150_CR3","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.patcog.2012.07.021","volume":"46","author":"O Arbelaitz","year":"2013","unstructured":"Arbelaitz O, Gurrutxaga I, Muguerza J, Prez JM, Perona I (2013) An extensive comparative study of cluster validity indices. Pattern Recognit 46(1):243\u2013256","journal-title":"Pattern Recognit"},{"key":"4150_CR4","unstructured":"Arulanandam R, Savarimuthu BTR, Purvis MA (2014) Extracting crime information from online newspaper articles. In: Second Australasian Web Conference (AWC 2014), vol 155, pp 31\u201338"},{"key":"4150_CR5","unstructured":"Basili R, Giannone C, Del\u00a0Vescovo C, Moschitti A, Naggar P (2009) Kernel-based relation extraction for crime investigation. In: AI*IA, Citeseer, pp 161\u2013171"},{"key":"4150_CR6","doi-asserted-by":"crossref","unstructured":"Bergmanis T, Goldwater S (2018) Context sensitive neural lemmatization with lematus. In: 16th annual conference of the North American chapter of the association for computational linguistics: human language technologies, pp 1391\u20131400","DOI":"10.18653\/v1\/N18-1126"},{"key":"4150_CR7","unstructured":"Bird S, Klein E, Loper E (2009) Natural language processing in python. O\u2019Reilly Media"},{"key":"4150_CR8","doi-asserted-by":"crossref","unstructured":"Brin S (1999) Extracting patterns and relations from the World Wide Web. In: International workshop on the world wide web and databases, pp 172\u2013183","DOI":"10.1007\/10704656_11"},{"issue":"1","key":"4150_CR9","first-page":"1","volume":"3","author":"T Caliski","year":"1974","unstructured":"Caliski T, Harabasz J (1974) A dendrite method for cluster analysis. Commun Stat 3(1):1\u201327","journal-title":"Commun Stat"},{"key":"4150_CR10","unstructured":"Chau M, Xu JJ, Chen H (2002) Extracting meaningful entities from police narrative reports. In: Annual national conference on digital government research, pp 1\u20135"},{"issue":"4","key":"4150_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MC.2004.1297301","volume":"37","author":"H Chen","year":"2004","unstructured":"Chen H, Chung W, Xu JJ, Wang G, Qin Y, Chau M (2004) Crime data mining: a general framework and some examples. IEEE Comput Soc 37(4):50\u201356","journal-title":"IEEE Comput Soc"},{"issue":"2","key":"4150_CR12","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1023\/A:1014348124664","volume":"36","author":"H Cunningham","year":"2002","unstructured":"Cunningham H (2002) Gate, a general architecture for text engineering. Comput Humanit 36(2):223\u2013254","journal-title":"Comput Humanit"},{"key":"4150_CR13","doi-asserted-by":"crossref","unstructured":"Das P, Das AK (2017) An application of strength pareto evolutionary algorithm for feature selection from crime data. In: 8th international conference on computing, communication and networking technologies, pp 1\u20136","DOI":"10.1109\/ICCCNT.2017.8203948"},{"key":"4150_CR14","doi-asserted-by":"crossref","unstructured":"Das P, Das AK (2018) Crime pattern analysis by identifying named entities and relation among entities. In: Advanced computational and communication paradigms, pp 75\u201384","DOI":"10.1007\/978-981-10-8237-5_8"},{"issue":"2","key":"4150_CR15","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/TPAMI.1979.4766909","volume":"1","author":"DL Davies","year":"1979","unstructured":"Davies DL, Bouldin DW (1979) A cluster separation measure. IEEE Trans Pattern Anal Mach Intell 1(2):224\u2013227","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"4150_CR16","unstructured":"Doddington G, Mitchell A, Przybocki M, Ramshaw L, Strassel S, Weischedel R (2004) The automatic content extraction (ace) program tasks, data, and evaluation. In: Proceedings of the fourth international conference on language resources and evaluation (LREC-2004), pp 837\u2013840"},{"key":"4150_CR17","doi-asserted-by":"crossref","unstructured":"Fellbaum C (1998) WordNet: an electronic lexical database. Bradford Books, Cambridge","DOI":"10.7551\/mitpress\/7287.001.0001"},{"key":"4150_CR18","doi-asserted-by":"crossref","unstructured":"Grishman R, Sundheim B (1996) Message understanding conference-6: a brief history. In: Proceedings of the 16th conference on computational linguistics, vol 1, pp 466\u2013471","DOI":"10.3115\/992628.992709"},{"key":"4150_CR19","doi-asserted-by":"crossref","unstructured":"Hasegawa T, Sekine S, Grishman R (2004) Discovering relations among named entities from large corpora. In: Proceedings of the 42nd annual meeting on association for computational linguistics, p 415","DOI":"10.3115\/1218955.1219008"},{"key":"4150_CR20","unstructured":"Hasegawa T, Sekine S, Grishman R (2005) Unsupervised paraphrase acquisition via relation discovery. In: 11th annual meeting of the Japanese association for natural language processing"},{"key":"4150_CR21","unstructured":"IRSIG-CNR (2002\u20132006) Astrea, information and communication for justice. Italian Research Council\/Research Institute on Judicial Systems (IRSIG-CNR)"},{"key":"4150_CR22","doi-asserted-by":"crossref","unstructured":"Karaa WBA, Grib\u00e2a N (2013) Information retrieval with porter stemmer: a new version for English. In: Advances in computational science, engineering and information technology, pp 243\u2013254","DOI":"10.1007\/978-3-319-00951-3_24"},{"key":"4150_CR23","unstructured":"Ku CH, Iriberri A, Leroy G (2008) Natural language processing and e-government: crime information extraction from heterogeneous data sources. In: Ninth international conference on digital government research, pp 162\u2013170"},{"key":"4150_CR24","unstructured":"Ku CH, Iriberri A, Leroy G (2008) Crime information extraction from police and witness narrative reports. In: IEEE conference on technologies for Homeland security, pp 193\u2013198"},{"key":"4150_CR25","doi-asserted-by":"crossref","unstructured":"Lin D, Pantel P (2001) Dirt\u2014discovery of inference rules from text. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining, pp 323\u2013328","DOI":"10.1145\/502512.502559"},{"key":"4150_CR26","doi-asserted-by":"crossref","unstructured":"Loper E, Bird S (2002) Nltk: The natural language toolkit. In: Proceedings of the ACL-02 workshop on effective tools and methodologies for teaching natural language processing and computational linguistics, vol 1, pp 63\u201370","DOI":"10.3115\/1118108.1118117"},{"key":"4150_CR27","unstructured":"Mikolov T, Chen K, Corrado G, Dean J (2013a) Efficient estimation of word representations in vector space. CoRR abs\/1301.3781:1\u201312"},{"key":"4150_CR28","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado G, Dean J (2013b) Distributed representations of words and phrases and their compositionality. CoRR abs\/1310.4546:1\u20139"},{"key":"4150_CR29","unstructured":"Mohamed TP, Hruschka ER Jr, Mitchell TM (2011) Discovering relations between noun categories. In: Proceedings of the conference on empirical methods in natural language processing, Association for Computational Linguistics, EMNLP \u201911, pp 1447\u20131455"},{"key":"4150_CR30","doi-asserted-by":"crossref","unstructured":"Pinheiro V, Furtado V, Pequeno T, Nogueira D (2010) Natural language processing based on semantic inferentialism for extracting crime information from text. In: IEEE international conference on intelligence and security informatics (ISI), pp 19\u201324","DOI":"10.1109\/ISI.2010.5484783"},{"key":"4150_CR31","unstructured":"Rend\u00f3n E, Garcia R, Abundez I, Gutierrez C, Gasca E, Del\u00a0Razo F, Gonzalez A (2008) Niva: a robust cluster validity. In: Proceedings of the 12th WSEAS international conference on communications, pp 241\u2013248"},{"key":"4150_CR32","unstructured":"Rosvall M (2009) Infomap. \n www.mapequation.org\/code.html"},{"key":"4150_CR33","doi-asserted-by":"crossref","unstructured":"Rousseeuw PJ (1987) Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J Comput Appl Math 20(Supplement C):53\u201365","DOI":"10.1016\/0377-0427(87)90125-7"},{"key":"4150_CR34","unstructured":"Sekine S, Sudo K, Nobata C (2002) Extended named entity hierarchy. In: Third international conference on language resources and evaluation (LREC-2002), pp 1818\u20131824"},{"key":"4150_CR35","unstructured":"Sekine S (2005) Automatic paraphrase discovery based on context and keywords between ne pairs. In: Proceedings of IWP, pp 4\u20136"},{"key":"4150_CR36","doi-asserted-by":"crossref","unstructured":"Shabat H, Omar N, Rahem K (2014) Named entity recognition in crime using machine learning approach. In: Information retrieval technology, pp 280\u2013288","DOI":"10.1007\/978-3-319-12844-3_24"},{"issue":"6","key":"4150_CR37","first-page":"1215","volume":"23","author":"HA Shabat","year":"2015","unstructured":"Shabat HA, Omar N (2015) Named entity recognition in crime news documents using classifiers combination. Middle-East J Sci Res 23(6):1215\u20131221","journal-title":"Middle-East J Sci Res"},{"key":"4150_CR38","unstructured":"Syed Z, Viegas E (2010) A hybrid approach to unsupervised relation discovery based on linguistic analysis and semantic typing. In: First international workshop on formalisms and methodology for learning by reading, pp 105\u2013113"},{"key":"4150_CR39","unstructured":"Weir G, Anagnostou N (2007) Exploring newspapers: a case study in corpus analysis. In: ICTATLL Workshop"},{"key":"4150_CR40","doi-asserted-by":"crossref","unstructured":"Zhang M, Su J, Wang D, Zhou G, Tan CL (2005) Discovering relations between named entities from a large raw corpus using tree similarity-based clustering. In: Second international joint conference on natural language processing, pp 378\u2013389","DOI":"10.1007\/11562214_34"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04150-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-019-04150-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04150-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,11]],"date-time":"2020-10-11T07:16:30Z","timestamp":1602400590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-019-04150-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,22]]},"references-count":40,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["4150"],"URL":"https:\/\/doi.org\/10.1007\/s00521-019-04150-8","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,22]]},"assertion":[{"value":"12 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that this manuscript has no conflict of interest with any other published source and has not been published previously (partly or in full). No data have been fabricated or manipulated to support our conclusion.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}