{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T08:21:50Z","timestamp":1720513310679},"reference-count":61,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1016\/j.asoc.2019.105811","type":"journal-article","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T01:52:44Z","timestamp":1569894764000},"page":"105811","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["Rough set based incremental crime report labelling in dynamic environment"],"prefix":"10.1016","volume":"85","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4729-7652","authenticated-orcid":false,"given":"Priyanka","family":"Das","sequence":"first","affiliation":[]},{"given":"Asit Kumar","family":"Das","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2019.105811_b1","article-title":"Mutual information based labelling and comparing clusters","volume":"abs\/1702.08199","author":"Koopman","year":"2017","journal-title":"CoRR"},{"issue":"1","key":"10.1016\/j.asoc.2019.105811_b2","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/09720502.2016.1259769","article-title":"Text feature selection algorithm based on Chi-square rank correlation factorization","volume":"20","author":"Li","year":"2017","journal-title":"J. Interdiscip. Math."},{"issue":"3","key":"10.1016\/j.asoc.2019.105811_b3","doi-asserted-by":"crossref","first-page":"14:1","DOI":"10.1145\/1993077.1993078","article-title":"Integrating document clustering and multidocument summarization","volume":"5","author":"Wang","year":"2011","journal-title":"ACM Trans. Knowl. Discov. Data"},{"issue":"2","key":"10.1016\/j.asoc.2019.105811_b4","first-page":"69","article-title":"Evaluation of text document clustering approach based on particle swarm optimization","volume":"3","author":"Karol","year":"2013","journal-title":"Central Eur. J. Comput. Sci."},{"issue":"1","key":"10.1016\/j.asoc.2019.105811_b5","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1186\/s40064-016-3252-8","article-title":"An overview of topic modeling and its current applications in bioinformatics","volume":"5","author":"Liu","year":"2016","journal-title":"SpringerPlus"},{"issue":"1","key":"10.1016\/j.asoc.2019.105811_b6","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1186\/s40163-017-0074-0","article-title":"Crime topic modeling","volume":"6","author":"Kuang","year":"2017","journal-title":"Crime Sci."},{"key":"10.1016\/j.asoc.2019.105811_b7","doi-asserted-by":"crossref","unstructured":"A. Hulth, B.B. Megyesi, A study on automatically extracted keywords in text categorization, in: Proceedings of the 21st International Conference on Computational Linguistics and the 44th Annual Meeting of the Association for Computational Linguistics, 2006, pp. 537\u2013544.","DOI":"10.3115\/1220175.1220243"},{"key":"10.1016\/j.asoc.2019.105811_b8","doi-asserted-by":"crossref","unstructured":"Y.W. Yan Zhao, Text categorization based on emergency domain words: a system engineering view, in: International Symposium on Engineering Emergency Management, 2012, pp. 8\u201314.","DOI":"10.1016\/j.sepro.2012.04.002"},{"issue":"1","key":"10.1016\/j.asoc.2019.105811_b9","first-page":"39","article-title":"A maximum entropy approach to natural language processing","volume":"22","author":"Berger","year":"1996","journal-title":"Comput. Linguist."},{"key":"10.1016\/j.asoc.2019.105811_b10","doi-asserted-by":"crossref","unstructured":"D. Ghosh, S. Bandyopadhyay, A fuzzy citation-kNN algorithm for multiple instance learning, in: 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2015, pp. 1\u20138.","DOI":"10.1109\/FUZZ-IEEE.2015.7338024"},{"key":"10.1016\/j.asoc.2019.105811_b11","doi-asserted-by":"crossref","unstructured":"M. Shaheen, S. Iqbal, F. e\u00a0Basit, Labeled clustering a unique method to label unsupervised classes, in: 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 2013, pp. 210\u2013214.","DOI":"10.1109\/ICITST.2013.6750193"},{"key":"10.1016\/j.asoc.2019.105811_b12","doi-asserted-by":"crossref","unstructured":"D. Carmel, H. Roitman, N. Zwerdling, Enhancing cluster labeling using wikipedia, in: Proceedings of the 32Nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2009, pp. 139\u2013146.","DOI":"10.1145\/1571941.1571967"},{"key":"10.1016\/j.asoc.2019.105811_b13","doi-asserted-by":"crossref","unstructured":"H. Roitman, S. Hummel, M. Shmueli-Scheuer, A fusion approach to cluster labeling, in: Proceedings of the 37th International ACM SIGIR Conference on Researc; Development in Information Retrieval, SIGIR \u201914, 2014, pp. 883\u2013886.","DOI":"10.1145\/2600428.2609465"},{"key":"10.1016\/j.asoc.2019.105811_b14","doi-asserted-by":"crossref","unstructured":"P. Treeratpituk, J. Callan, Automatically labeling hierarchical clusters, in: Proceedings of the 2006 International Conference on Digital Government Research, 2006, pp. 167\u2013176.","DOI":"10.1145\/1146598.1146650"},{"issue":"2","key":"10.1016\/j.asoc.2019.105811_b15","doi-asserted-by":"crossref","first-page":"2279","DOI":"10.1016\/j.asoc.2010.08.008","article-title":"An efficient classifier design integrating rough set and set oriented database operations","volume":"11","author":"Das","year":"2011","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2019.105811_b16","series-title":"Knowledge Discovery in Databases","first-page":"185","article-title":"Document classification through interactive supervision of document and term labels","author":"Godbole","year":"2004"},{"key":"10.1016\/j.asoc.2019.105811_b17","doi-asserted-by":"crossref","unstructured":"S. Hingmire, S. Chougule, G.K. Palshikar, S. Chakraborti, Document classification by topic labeling, in: Proceedings of the 36th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2013, pp. 877\u2013880.","DOI":"10.1145\/2484028.2484140"},{"issue":"1\/2","key":"10.1016\/j.asoc.2019.105811_b18","first-page":"145","article-title":"Cluster labelling using chi-square-based keyword ranking and mutual information score: a hybrid approach","volume":"1","author":"Roul","year":"2017","journal-title":"Int. J. Intell. Syst. Des. Comput."},{"key":"10.1016\/j.asoc.2019.105811_b19","unstructured":"E.K.A.F.E.B.M.H. Ahmet Aker, M. Paramita, R. Gaizauskas, Automatic label generation for news comment clusters, in: Proceedings of the 9th International Natural Language Generation Conference, 2016, pp. 61\u201369."},{"key":"10.1016\/j.asoc.2019.105811_b20","doi-asserted-by":"crossref","unstructured":"C.H. Ku, A. Iriberri, G. Leroy, Crime information extraction from police and witness narrative reports, in: IEEE Conference on Technologies for Homeland Security, 2008, pp. 193\u2013198. https:\/\/dx.doi.org\/10.1109\/THS.2008.4534448.","DOI":"10.1109\/THS.2008.4534448"},{"issue":"8","key":"10.1016\/j.asoc.2019.105811_b21","first-page":"11","article-title":"Analysis and prediction of crimes by clustering and classification","volume":"4","author":"Rasoul\u00a0Kiani","year":"2015","journal-title":"Int. J. Adv. Res. Artif. Intell."},{"key":"10.1016\/j.asoc.2019.105811_b22","doi-asserted-by":"crossref","first-page":"17","DOI":"10.3923\/jai.2015.17.34","article-title":"A review on a classification framework for supporting decision making in crime prevention","volume":"8","author":"Noor Maizura Mohamad Noor","year":"2015","journal-title":"J. Artif. Intell."},{"issue":"1","key":"10.1016\/j.asoc.2019.105811_b23","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/s11416-006-0015-z","article-title":"On the definition and classification of cybercrime","volume":"2","author":"Gordon","year":"2006","journal-title":"J. Comput. Virol."},{"key":"10.1016\/j.asoc.2019.105811_b24","doi-asserted-by":"crossref","unstructured":"S.L.T.W.I.P.A.W.I. Jayaweera, C. Sajeewa, Crime analytics: analysis of crimes through newspaper articles, in: Moratuwa Engineering Research Conference (MERCon), 2015.","DOI":"10.1109\/MERCon.2015.7112359"},{"key":"10.1016\/j.asoc.2019.105811_b25","doi-asserted-by":"crossref","unstructured":"A. Babakura, M.N. Sulaiman, M.A. Yusuf, Improved method of classification algorithms for crime prediction, in: International Symposium on Biometrics and Security Technologies, 2014, pp. 250\u2013255.","DOI":"10.1109\/ISBAST.2014.7013130"},{"key":"10.1016\/j.asoc.2019.105811_b26","series-title":"Information Technology Convergence","first-page":"531","article-title":"A decision tree-based classification model for crime prediction","author":"Nasridinov","year":"2013"},{"issue":"5","key":"10.1016\/j.asoc.2019.105811_b27","doi-asserted-by":"crossref","first-page":"382","DOI":"10.18178\/ijsps.4.5.382-388","article-title":"Criminal event detection and classification in web documents using ANN classifier","volume":"4","author":"Sheela","year":"2016","journal-title":"Int. J. Signal Process. Syst."},{"key":"10.1016\/j.asoc.2019.105811_b28","first-page":"1","article-title":"Feature selection generating directed rough-spanning tree for crime pattern analysis","author":"Das","year":"2018","journal-title":"Neural Comput. Appl."},{"issue":"C","key":"10.1016\/j.asoc.2019.105811_b29","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1016\/j.asoc.2018.01.040","article-title":"A group incremental feature selection for classification using rough set theory based genetic algorithm","volume":"65","author":"Das","year":"2018","journal-title":"Appl. Soft. Comput."},{"key":"10.1016\/j.asoc.2019.105811_b30","first-page":"1","article-title":"A rough set based reasoning approach for criminal identification","author":"Singh","year":"2017","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"10.1016\/j.asoc.2019.105811_b31","doi-asserted-by":"crossref","unstructured":"P. Das, A.K. Das, Crime pattern analysis by identifying named entities and relation among entities, in: International Conference on Advanced Computational and Communication Paradigms, 2018, pp. 75\u201384.","DOI":"10.1007\/978-981-10-8237-5_8"},{"key":"10.1016\/j.asoc.2019.105811_b32","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.knosys.2019.05.004","article-title":"Graph-based clustering of extracted paraphrases for labelling crime reports","volume":"179","author":"Das","year":"2019","journal-title":"Knowl.-Based Syst."},{"issue":"11","key":"10.1016\/j.asoc.2019.105811_b33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0165781","article-title":"A new weighted degree centrality measure: The application in an animal disease epidemic","volume":"11","author":"Candeloro","year":"2016","journal-title":"PLOS One"},{"issue":"6","key":"10.1016\/j.asoc.2019.105811_b34","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1088\/1367-2630\/9\/6\/188","article-title":"A measure of centrality based on network efficiency","volume":"9","author":"Latora","year":"2007","journal-title":"New J. Phys."},{"issue":"4","key":"10.1016\/j.asoc.2019.105811_b35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0010232","article-title":"Eigenvector centrality mapping for analyzing connectivity patterns in fMRI data of the human brain","volume":"5","author":"Lohmann","year":"2010","journal-title":"PLOS One"},{"key":"10.1016\/j.asoc.2019.105811_b36","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.3389\/fpsyg.2017.01683","article-title":"The influence of closeness centrality on lexical processing","volume":"8","author":"Goldstein","year":"2017","journal-title":"Front. Psych."},{"key":"10.1016\/j.asoc.2019.105811_b37","first-page":"1","article-title":"Efficient estimation of word representations in vector space","volume":"abs\/1301.3781","author":"Mikolov","year":"2013","journal-title":"CoRR"},{"key":"10.1016\/j.asoc.2019.105811_b38","unstructured":"Q. Le, T. Mikolov, Distributed representations of sentences and documents, in: Proceedings of the 31st International Conference on International Conference on Machine Learning, vol. 32, 2014, pp. II\u20131188\u2013II\u20131196."},{"key":"10.1016\/j.asoc.2019.105811_b39","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jbi.2016.06.001","article-title":"Topic detection using paragraph vectors to support active learning in systematic reviews","volume":"62","author":"Hashimoto","year":"2016","journal-title":"J. Biomed. Inform."},{"key":"10.1016\/j.asoc.2019.105811_b40","article-title":"Document embedding with paragraph vectors","volume":"abs\/1507.07998","author":"Dai","year":"2015","journal-title":"CoRR"},{"key":"10.1016\/j.asoc.2019.105811_b41","unstructured":"J.H.L. Shraey\u00a0Bhatia, T. Baldwin, Automatic labelling of topics with neural embeddings, in: Proceedings of the 26th International Conference on Computational Linguistics, 2016, pp. 953\u2014963."},{"key":"10.1016\/j.asoc.2019.105811_b42","unstructured":"K. Park, A. Yilmaz, A A social network analysis approach to analyze road networks, In: ASPRS Annual Conference, 2010."},{"issue":"3","key":"10.1016\/j.asoc.2019.105811_b43","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1007\/s10587-013-0044-y","article-title":"On betweenness-uniform graphs","volume":"63","author":"Gago","year":"2013","journal-title":"Czechoslovak Math. J."},{"issue":"5","key":"10.1016\/j.asoc.2019.105811_b44","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/BF01001956","article-title":"Rough sets","volume":"11","author":"Pawlak","year":"1982","journal-title":"Int. J. Comput. Inf. Sci."},{"key":"10.1016\/j.asoc.2019.105811_b45","doi-asserted-by":"crossref","unstructured":"P. Das, A.K. Das, Relation recognition among named entities from a crime corpus using a web-based semantic similarity measurement, in: 2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 2017, pp. 303\u2013308.","DOI":"10.1109\/ICRCICN.2017.8234525"},{"key":"10.1016\/j.asoc.2019.105811_b46","doi-asserted-by":"crossref","unstructured":"E. Loper, S. Bird, NLTK: the natural language toolkit, in: Proceedings of the ACL-02 Workshop on Effective Tools and Methodologies for Teaching Natural Language Processing and Computational Linguistics, vol. 1, 2002, pp. 63\u201370, http:\/\/dx.doi.org\/10.3115\/1118108.1118117.","DOI":"10.3115\/1118108.1118117"},{"key":"10.1016\/j.asoc.2019.105811_b47","doi-asserted-by":"crossref","unstructured":"P.K. Singh, P.S.V.S.S. Prasad, Scalable quick reduct algorithm: Iterative mapreduce approach, in: Proceedings of the 3rd IKDD Conference on Data Science, 2016, pp. 25:1\u201325:2.","DOI":"10.1145\/2888451.2888476"},{"issue":"1","key":"10.1016\/j.asoc.2019.105811_b48","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.patcog.2012.07.021","article-title":"An extensive comparative study of cluster validity indices","volume":"46","author":"Arbelaitz","year":"2013","journal-title":"Pattern Recognit."},{"issue":"4","key":"10.1016\/j.asoc.2019.105811_b49","first-page":"1","article-title":"ClValid: An r package for cluster validation","volume":"25","author":"Brock","year":"2008","journal-title":"J. Stat. Softw. Articles"},{"issue":"2","key":"10.1016\/j.asoc.2019.105811_b50","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1023\/A:1014348124664","article-title":"GATE, a general architecture for text engineering","volume":"36","author":"Cunningham","year":"2002","journal-title":"Comput. Humanit."},{"key":"10.1016\/j.asoc.2019.105811_b51","series-title":"AAAI","first-page":"123","article-title":"ChiMerge: Discretization of numeric attributes","author":"Kerber","year":"1992"},{"issue":"1","key":"10.1016\/j.asoc.2019.105811_b52","first-page":"46","article-title":"Statistical comparisons of the top 10 algorithms in data mining for classification task","volume":"4","author":"Settouti","year":"2016","journal-title":"Int. J. Interact. Multimedia Artif. Intell."},{"key":"10.1016\/j.asoc.2019.105811_b53","doi-asserted-by":"crossref","unstructured":"Q. Bsoul, J. Salim, L.Q. Zakaria, An intelligent document clustering approach to detect crime patterns, in: The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013), no. 11, 2013, pp. 1181\u20131187.","DOI":"10.1016\/j.protcy.2013.12.311"},{"key":"10.1016\/j.asoc.2019.105811_b54","doi-asserted-by":"crossref","unstructured":"W. Song, S.C. Park, Genetic algorithm-based text clustering technique: Automatic evolution of clusters with high efficiency, in: 2006 Seventh International Conference on Web-Age Information Management Workshops, 2006, pp. 17\u201317.","DOI":"10.1109\/WAIMW.2006.14"},{"key":"10.1016\/j.asoc.2019.105811_b55","doi-asserted-by":"crossref","unstructured":"C.C. Aggarwal, P.S. Yu, A framework for clustering massive text and categorical data streams, in: Proceedings of the 2006 SIAM International Conference on Data Mining, 2006, pp. 479\u2013483.","DOI":"10.1137\/1.9781611972764.44"},{"issue":"2","key":"10.1016\/j.asoc.2019.105811_b56","first-page":"9","article-title":"Comparison of clustering algorithms for learning analytics with educational datasets","volume":"5","author":"Navarro","year":"2018","journal-title":"Int. J. Interact. Multimedia Artif. Intell."},{"issue":"2","key":"10.1016\/j.asoc.2019.105811_b57","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/304181.304187","article-title":"OPTICS: Ordering points to identify the clustering structure","volume":"28","author":"Ankerst","year":"1999","journal-title":"SIGMOD Rec."},{"key":"10.1016\/j.asoc.2019.105811_b58","first-page":"13","article-title":"The map equation","author":"Rosvall","year":"2009"},{"key":"10.1016\/j.asoc.2019.105811_b59","first-page":"1","article-title":"Fast unfolding of communities in large networks","author":"Blondel","year":"2008","journal-title":"J. Stat. Mech. Theory Exp."},{"issue":"12","key":"10.1016\/j.asoc.2019.105811_b60","doi-asserted-by":"crossref","first-page":"7821","DOI":"10.1073\/pnas.122653799","article-title":"Community structure in social and biological networks","volume":"99","author":"Girvan","year":"2002","journal-title":"Proc. Natl. Acad. Sci. U.S.A."},{"key":"10.1016\/j.asoc.2019.105811_b61","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.bdr.2017.09.002","article-title":"Variations on the clustering algorithm BIRCH","volume":"11","author":"Lorbeer","year":"2018","journal-title":"Big Data Res."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494619305927?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494619305927?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T07:31:21Z","timestamp":1576308681000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494619305927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":61,"alternative-id":["S1568494619305927"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2019.105811","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Rough set based incremental crime report labelling in dynamic environment","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2019.105811","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"105811"}}