{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T15:19:02Z","timestamp":1721834342597},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1016\/j.asoc.2022.109215","type":"journal-article","created":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T20:00:34Z","timestamp":1656446434000},"page":"109215","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Graph based ensemble classification for crime report prediction"],"prefix":"10.1016","volume":"125","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9886-1735","authenticated-orcid":false,"given":"Asit Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Priyanka","family":"Das","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.asoc.2022.109215_b1","first-page":"245","article-title":"An efficient classifier design integrating rough set and Dempster-Shafer theory","volume":"2","author":"Das","year":"2010","journal-title":"Int. J. Artif. Intell. Soft Comput."},{"key":"10.1016\/j.asoc.2022.109215_b2","series-title":"Ensemble classifiers and their applications: A review","author":"Rahman","year":"2014"},{"issue":"1","key":"10.1016\/j.asoc.2022.109215_b3","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MCI.2015.2471235","article-title":"Ensemble classification and regression-recent developments, applications and future directions","volume":"11","author":"Ren","year":"2016","journal-title":"IEEE Comput. Intell. Mag."},{"key":"10.1016\/j.asoc.2022.109215_b4","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.cmpb.2019.05.019","article-title":"Reviewing ensemble classification methods in breast cancer","volume":"177","author":"Hosni","year":"2019","journal-title":"Comput. Methods Programs Biomed."},{"key":"10.1016\/j.asoc.2022.109215_b5","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.asoc.2016.02.022","article-title":"Ensemble classification based on supervised clustering for credit scoring","volume":"43","author":"Xiao","year":"2016","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2022.109215_b6","series-title":"Multiple Classifier Systems","first-page":"1","article-title":"Ensemble methods in machine learning","author":"Dietterich","year":"2000"},{"key":"10.1016\/j.asoc.2022.109215_b7","series-title":"Data Mining and Knowledge Discovery Handbook","first-page":"957","article-title":"Ensemble methods for classifiers","author":"Rokach","year":"2005"},{"issue":"8","key":"10.1016\/j.asoc.2022.109215_b8","first-page":"133","article-title":"Survey paper on crime prediction using ensemble approach","volume":"118","author":"Almaw","year":"2018","journal-title":"Int. J. Pure Appl. Math."},{"key":"10.1016\/j.asoc.2022.109215_b9","series-title":"2016 Second Asian Conference on Defence Technology","first-page":"123","article-title":"A survey of data mining techniques for analyzing crime patterns","author":"Thongsatapornwatana","year":"2016"},{"key":"10.1016\/j.asoc.2022.109215_b10","doi-asserted-by":"crossref","unstructured":"B.S. Aldossari, F.M. Alqahtani, N.S. Alshahrani, M.M. Alhammam, R.M. Alzamanan, N. Aslam, Irfanullah, A Comparative Study of Decision Tree and Naive Bayes Machine Learning Model for Crime Category Prediction in Chicago, in: Proceedings of 2020 the 6th International Conference on Computing and Data Engineering, 2020, pp. 34\u201338.","DOI":"10.1145\/3379247.3379279"},{"key":"10.1016\/j.asoc.2022.109215_b11","doi-asserted-by":"crossref","unstructured":"A. Almaw, K. Kadam, Crime Data Analysis and Prediction using Ensemble Learning, in: Proceedings of the Second International Conference on Intelligent Computing and Control Systems, ICICCS 2018, 2018, pp. 1918\u20131923.","DOI":"10.1109\/ICCONS.2018.8663186"},{"key":"10.1016\/j.asoc.2022.109215_b12","unstructured":"L.L. Rui\u00a0Lu, Application of an Ensemble Learning based Classifier in Crime Prediction, in: Proceedings of of 2019 the 9th International Workshop on Computer Science and Engineering, 2019, pp. 130\u2013135."},{"key":"10.1016\/j.asoc.2022.109215_b13","doi-asserted-by":"crossref","first-page":"67488","DOI":"10.1109\/ACCESS.2021.3075140","article-title":"An empirical analysis of machine learning algorithms for crime prediction using stacked generalization: An ensemble approach","volume":"9","author":"Kshatri","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.asoc.2022.109215_b14","first-page":"188","article-title":"Crime prediction using decision tree (J48) classification algorithm","volume":"6","author":"Ahishakiye","year":"2017","journal-title":"Int. J. Comput. Inf. Technol."},{"issue":"4","key":"10.1016\/j.asoc.2022.109215_b15","first-page":"441","article-title":"FBI crime analysis and prediction using machine learning","volume":"11","author":"Sri","year":"2020","journal-title":"J. Eng. Sci."},{"issue":"3","key":"10.1016\/j.asoc.2022.109215_b16","doi-asserted-by":"crossref","first-page":"4219","DOI":"10.17485\/ijst\/2013\/v6i3.6","article-title":"An experimental study of classification algorithms for crime prediction","volume":"6","author":"Iqbal","year":"2013","journal-title":"Indian J. Sci. Technol."},{"key":"10.1016\/j.asoc.2022.109215_b17","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1016\/j.physa.2018.03.084","article-title":"Crime prediction through urban metrics and statistical learning","volume":"505","author":"Luiz G.A.\u00a0Alves","year":"2018","journal-title":"Physica A"},{"issue":"5","key":"10.1016\/j.asoc.2022.109215_b18","doi-asserted-by":"crossref","first-page":"1511","DOI":"10.1016\/j.asoc.2011.12.019","article-title":"Semi-supervised ensemble classification in subspaces","volume":"12","author":"Yu","year":"2012","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2022.109215_b19","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s10994-014-5465-9","article-title":"Multilabel classification through random graph ensembles","volume":"99","author":"Su","year":"2014","journal-title":"Mach. Learn."},{"issue":"2","key":"10.1016\/j.asoc.2022.109215_b20","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1177\/0165551515591724","article-title":"Classifier and feature set ensembles for web page classification","volume":"42","author":"Onan","year":"2016","journal-title":"J. Inf. Sci."},{"key":"10.1016\/j.asoc.2022.109215_b21","doi-asserted-by":"crossref","unstructured":"A. Qin, Z. Shang, J. Tian, T. Zhang, Y. Wang, Y. y.\u00a0Tang, Using Graph-Based Ensemble Learning to Classify Imbalanced Data, in: 2017 3rd IEEE International Conference on Cybernetics, CYBCONF, 2017, pp. 1\u20136.","DOI":"10.1109\/CYBConf.2017.7985820"},{"issue":"7","key":"10.1016\/j.asoc.2022.109215_b22","doi-asserted-by":"crossref","first-page":"1209","DOI":"10.1080\/02664763.2017.1363163","article-title":"Diverse classifier ensemble creation based on heuristic dataset modification","volume":"45","author":"Jamalinia","year":"2018","journal-title":"J. Appl. Stat."},{"key":"10.1016\/j.asoc.2022.109215_b23","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1016\/j.procs.2018.05.018","article-title":"Using ensemble stackingc method and base classifiers to ameliorate prediction accuracy of pedagogical data","volume":"132","author":"Ashraf","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.asoc.2022.109215_b24","series-title":"Forgenet: A graph deep neural network model using tree-based ensemble classifiers for feature extraction","author":"Kong","year":"2019"},{"key":"10.1016\/j.asoc.2022.109215_b25","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.knosys.2019.05.004","article-title":"Graph-based clustering of extracted paraphrases for labelling crime reports","volume":"179","author":"Das","year":"2019","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.asoc.2022.109215_b26","series-title":"Proceedings of the ACL-02 Workshop on Effective Tools and Methodologies for Teaching Natural Language Processing and Computational Linguistics, Vol. 1","first-page":"63","article-title":"NLTK: The natural language toolkit","author":"Loper","year":"2002"},{"key":"10.1016\/j.asoc.2022.109215_b27","first-page":"7671","article-title":"A framework for crime data analysis using relationship among named entities","volume":"32","author":"Priyanka\u00a0Das","year":"2019","journal-title":"Neural Comput. Appl."},{"key":"10.1016\/j.asoc.2022.109215_b28","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2019.105811","article-title":"Rough set based incremental crime report labelling in dynamic environment","volume":"85","author":"Das","year":"2019","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2022.109215_b29","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.ins.2019.12.031","article-title":"Phrase2Vec: Phrase embedding based on parsing","volume":"517","author":"Wu","year":"2020","journal-title":"Inform. Sci."},{"key":"10.1016\/j.asoc.2022.109215_b30","series-title":"International Conference on Big Data Analytics and Computational Intelligence","first-page":"140","article-title":"Crime analysis against women from online newspaper reports and an approach to apply it in dynamic environment","author":"Das","year":"2017"},{"issue":"2","key":"10.1016\/j.asoc.2022.109215_b31","doi-asserted-by":"crossref","first-page":"74","DOI":"10.9735\/0975-2927.3.2.74-88","article-title":"Feature selection by attribute clustering of infected rice plant images","volume":"3","author":"Santanu","year":"2011","journal-title":"Int. J. Mach. Intell."},{"key":"10.1016\/j.asoc.2022.109215_b32","first-page":"2349","article-title":"Orange: Data mining toolbox in Python","volume":"14","author":"Dem\u0161ar","year":"2013","journal-title":"J. Mach. Learn. Res."},{"key":"10.1016\/j.asoc.2022.109215_b33","doi-asserted-by":"crossref","first-page":"2279","DOI":"10.1016\/j.asoc.2010.08.008","article-title":"An efficient classifier design integrating rough set and set oriented database operations","volume":"11","author":"Asit Kumar\u00a0Das","year":"2011","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"10.1016\/j.asoc.2022.109215_b34","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/BF01001956","article-title":"Rough sets","volume":"11","author":"Pawlak","year":"1982","journal-title":"Int. J. Comput. Inf. Sci."},{"key":"10.1016\/j.asoc.2022.109215_b35","series-title":"Digital Logic Design","author":"Alam","year":"2016"},{"key":"10.1016\/j.asoc.2022.109215_b36","series-title":"Ibero-American Conference on Artificial Intelligence","first-page":"305","article-title":"Automatic text summarization with genetic algorithm-based attribute selection","author":"Silla","year":"2004"},{"key":"10.1016\/j.asoc.2022.109215_b37","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2021.107347","article-title":"Ensemble summarization of bio-medical articles integrating clustering and multi-objective evolutionary algorithms","volume":"106","author":"Mallick","year":"2021","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"10.1016\/j.asoc.2022.109215_b38","first-page":"46","article-title":"Statistical comparisons of the top 10 algorithms in data mining for classification task","volume":"4","author":"Settouti","year":"2016","journal-title":"Int. J. Interactive Multimedia Artif. Intell."},{"issue":"10","key":"10.1016\/j.asoc.2022.109215_b39","article-title":"Weka: A tool for data preprocessing, classification, ensemble, clustering and association rule mining","volume":"88","author":"Srivastava","year":"2014","journal-title":"Int. J. Comput. Appl."},{"issue":"4","key":"10.1016\/j.asoc.2022.109215_b40","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1111\/j.0006-341X.2003.00125.x","article-title":"Incorporation of clustering effects for the wilcoxon rank sum test: A large-sample approach","volume":"59","author":"Rosner","year":"2003","journal-title":"Biometrics"},{"issue":"2","key":"10.1016\/j.asoc.2022.109215_b41","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/s10115-019-01341-6","article-title":"Relevant feature selection and ensemble classifier design using bi-objective genetic algorithm","volume":"62","author":"Das","year":"2020","journal-title":"Knowl. Inf. Syst."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494622004458?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494622004458?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T03:22:11Z","timestamp":1716607331000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494622004458"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":41,"alternative-id":["S1568494622004458"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2022.109215","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2022,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Graph based ensemble classification for crime report prediction","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2022.109215","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"109215"}}