{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T04:35:53Z","timestamp":1729226153672,"version":"3.27.0"},"reference-count":54,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1016\/j.asoc.2023.110261","type":"journal-article","created":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T06:36:12Z","timestamp":1681194972000},"page":"110261","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Graph based fuzzy clustering algorithm for crime report labelling"],"prefix":"10.1016","volume":"141","author":[{"given":"Aparna","family":"Pramanik","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9886-1735","authenticated-orcid":false,"given":"Asit Kumar","family":"Das","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3180-7347","authenticated-orcid":false,"given":"Weiping","family":"Ding","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2023.110261_b1","series-title":"2018 9th International Conference on Computing, Communication and Networking Technologies","first-page":"1","article-title":"A novel graph based clustering approach to document topic modeling","author":"Chanda","year":"2018"},{"key":"10.1016\/j.asoc.2023.110261_b2","series-title":"Soft Computing in Data Analytics","first-page":"137","article-title":"Graph-based text summarization using modified TextRank","author":"Mallick","year":"2019"},{"issue":"1","key":"10.1016\/j.asoc.2023.110261_b3","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/S0306-4379(01)00008-4","article-title":"Cure: an efficient clustering algorithm for large databases","volume":"26","author":"Guha","year":"2001","journal-title":"Inf. Syst."},{"issue":"1\u20132","key":"10.1016\/j.asoc.2023.110261_b4","first-page":"441","article-title":"Novel meta-heuristic algorithms for clustering web documents","volume":"201","author":"Mahdavi","year":"2008","journal-title":"Appl. Math. Comput."},{"issue":"3","key":"10.1016\/j.asoc.2023.110261_b5","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1007\/s11192-014-1321-8","article-title":"Clustering scientific documents with topic modeling","volume":"100","author":"Yau","year":"2014","journal-title":"Scientometrics"},{"key":"10.1016\/j.asoc.2023.110261_b6","doi-asserted-by":"crossref","unstructured":"Q. Bsoul, J. Salim, L.Q. Zakaria, An Intelligent Document Clustering Approach to Detect Crime Patterns, in: The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013), (11) 2013, pp. 1181\u20131187.","DOI":"10.1016\/j.protcy.2013.12.311"},{"key":"10.1016\/j.asoc.2023.110261_b7","series-title":"Data & Knowledge Engineering","first-page":"381","article-title":"Text document clustering based on frequent word meaning sequences","author":"Li","year":"2008"},{"key":"10.1016\/j.asoc.2023.110261_b8","doi-asserted-by":"crossref","unstructured":"A. Abraham, S. Das, A. Konar, Document Clustering Using Differential Evolution, in: 2006 IEEE International Conference on Evolutionary Computation, 2006, pp. 1784\u20131791.","DOI":"10.1109\/CEC.2006.1688523"},{"issue":"3","key":"10.1016\/j.asoc.2023.110261_b9","doi-asserted-by":"crossref","first-page":"14:1","DOI":"10.1145\/1993077.1993078","article-title":"Integrating document clustering and multidocument summarization","volume":"5","author":"Wang","year":"2011","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"10.1016\/j.asoc.2023.110261_b10","doi-asserted-by":"crossref","unstructured":"C.C. Aggarwal, P.S. Yu, A Framework for Clustering Massive Text and Categorical Data Streams, in: Proceedings of the 2006 SIAM International Conference on Data Mining, 2006, pp. 479\u2013483.","DOI":"10.1137\/1.9781611972764.44"},{"key":"10.1016\/j.asoc.2023.110261_b11","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s13173-010-0027-x","article-title":"A graph clustering algorithm based on a clustering coefficient for weighted graphs","volume":"17","author":"Mari\u00e1 C.V.\u00a0Nascimento","year":"2010","journal-title":"J. Braz. Comput. Soc."},{"year":"2009","series-title":"Infomap","author":"Rosvall","key":"10.1016\/j.asoc.2023.110261_b12"},{"key":"10.1016\/j.asoc.2023.110261_b13","doi-asserted-by":"crossref","unstructured":"P. Das, A.K. Das, Behavioural Analysis of Crime against Women using a Graph Based Clustering Approach, in: 2017 International Conference on Computer Communication and Informatics (ICCCI-2017), ISBN: 978-1-4673-8855-9, 2017, In Press, pp. 204\u2013209.","DOI":"10.1109\/ICCCI.2017.8117714"},{"issue":"37","key":"10.1016\/j.asoc.2023.110261_b14","first-page":"1","article-title":"A graph database representation of portuguese criminal-related documents","volume":"8","author":"Carnaz","year":"2021","journal-title":"Informatics"},{"key":"10.1016\/j.asoc.2023.110261_b15","doi-asserted-by":"crossref","first-page":"101269","DOI":"10.1109\/ACCESS.2019.2929597","article-title":"A graph based clustering approach for relation extraction from crime data","volume":"7","author":"Das","year":"2019","journal-title":"IEEE Access"},{"issue":"9","key":"10.1016\/j.asoc.2023.110261_b16","first-page":"1","article-title":"Crime forecasting: a machine learning and computer vision approach to crime prediction and prevention","volume":"4","author":"Shah","year":"2021","journal-title":"Visual Computing for Industry, Biomedicine, and Art"},{"issue":"1","key":"10.1016\/j.asoc.2023.110261_b17","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MCI.2018.2881643","article-title":"Fuzzy clustering: A historical perspective","volume":"14","author":"Ruspini","year":"2019","journal-title":"IEEE Comput. Intell. Mag."},{"issue":"11","key":"10.1016\/j.asoc.2023.110261_b18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0895-7177(93)90202-A","article-title":"A survey of fuzzy clustering","volume":"18","author":"Yang","year":"1993","journal-title":"Math. Comput. Modelling"},{"key":"10.1016\/j.asoc.2023.110261_b19","doi-asserted-by":"crossref","unstructured":"J. Li, H.W. Lewis, Fuzzy Clustering Algorithms \u2014 Review of the Applications, in: 2016 IEEE International Conference on Smart Cloud (SmartCloud), 2016, pp. 282\u2013288.","DOI":"10.1109\/SmartCloud.2016.14"},{"key":"10.1016\/j.asoc.2023.110261_b20","doi-asserted-by":"crossref","unstructured":"S.D. Anjana\u00a0Gosain, Performance Analysis of Various Fuzzy Clustering Algorithms: A Review, in: Procedia Computer Science, 79, 2016, pp. 100\u2013111.","DOI":"10.1016\/j.procs.2016.03.014"},{"key":"10.1016\/j.asoc.2023.110261_b21","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/s10115-018-1156-3","article-title":"DFuzzy: a deep learning-based fuzzy clustering model for large graphs","volume":"57","author":"Bhatia","year":"2018","journal-title":"Knowl. Inf. Syst."},{"issue":"2","key":"10.1016\/j.asoc.2023.110261_b22","first-page":"329","article-title":"A systematic review on page ranking algorithms","volume":"12","author":"Sharma","year":"2020","journal-title":"Int. J. Inf. Technol."},{"key":"10.1016\/j.asoc.2023.110261_b23","doi-asserted-by":"crossref","unstructured":"L. Chen, L. Guo, X. Lu, C.L.P. Chen, Fuzzy clustering method with graph-based regularization, in: 2016 International Conference on Fuzzy Theory and Its Applications (IFuzzy), 2016, pp. 1\u20136.","DOI":"10.1109\/iFUZZY.2016.8004973"},{"key":"10.1016\/j.asoc.2023.110261_b24","series-title":"2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing","first-page":"65","article-title":"An improved fuzzy clustering method for text mining","volume":"1","author":"Deng","year":"2010"},{"issue":"2","key":"10.1016\/j.asoc.2023.110261_b25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3106164","article-title":"Fuzzy clustering of crowdsourced test reports for apps","volume":"18","author":"Jiang","year":"2018","journal-title":"ACM Trans. Internet Technol."},{"issue":"1","key":"10.1016\/j.asoc.2023.110261_b26","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s10940-005-9003-6","article-title":"On the application of fuzzy clustering for crime hot spot detection","volume":"22","author":"Grubesic","year":"2006","journal-title":"J. Quant. Criminol."},{"issue":"3","key":"10.1016\/j.asoc.2023.110261_b27","first-page":"1939","article-title":"A violent crime analysis using fuzzy C-means clustering approach","volume":"9","author":"Premasundari","year":"2019","journal-title":"ICTACT J. Soft Comput."},{"key":"10.1016\/j.asoc.2023.110261_b28","first-page":"400","article-title":"Fuzzy clustering based methodology for multidimensional data analysis in computational forensic domain","volume":"4","author":"Kilian\u00a0Stoffel","year":"2012","journal-title":"Int. J. Comput. Inf. Syst. Ind. Manag. Appl."},{"issue":"34","key":"10.1016\/j.asoc.2023.110261_b29","first-page":"5","article-title":"Crime analysis tool using kernelized fuzzy C-means (KFCM) algorithm","volume":"12","author":"J.A.","year":"2020","journal-title":"Int. J. Appl. Inf. Syst."},{"issue":"4","key":"10.1016\/j.asoc.2023.110261_b30","doi-asserted-by":"crossref","first-page":"374","DOI":"10.14429\/dsj.68.12518","article-title":"Application of spatiotemporal fuzzy C-means clustering for crime spot detection","volume":"68","author":"Ansari","year":"2018","journal-title":"Def. Sci. J."},{"key":"10.1016\/j.asoc.2023.110261_b31","doi-asserted-by":"crossref","unstructured":"B. Sivanagaleela, S. Rajesh, Crime Analysis and Prediction Using Fuzzy C-Means Algorithm, in: 2019 3rd International Conference on Trends in Electronics and Informatics, 2019, pp. 595\u2013599.","DOI":"10.1109\/ICOEI.2019.8862691"},{"issue":"5","key":"10.1016\/j.asoc.2023.110261_b32","first-page":"526","article-title":"A survey of fuzzy based ARM clustering on crime pattern discovery","volume":"5","author":"J.\u00a0Mohana\u00a0Sundaram","year":"2014","journal-title":"Int. J. Sci. Eng. Res."},{"issue":"3","key":"10.1016\/j.asoc.2023.110261_b33","doi-asserted-by":"crossref","first-page":"1907","DOI":"10.1007\/s11192-020-03561-y","article-title":"A context-aware citation recommendation model with BERT and graph convolutional networks","volume":"124","author":"Jeong","year":"2020","journal-title":"Scientometrics"},{"issue":"1","key":"10.1016\/j.asoc.2023.110261_b34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41109-019-0248-7","article-title":"Graph-based data clustering via multiscale community detection","volume":"5","author":"Liu","year":"2020","journal-title":"Appl. Netw. Sci."},{"issue":"2","key":"10.1016\/j.asoc.2023.110261_b35","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1137\/0201010","article-title":"Depth-first search and linear graph algorithms","volume":"1","author":"Tarjan","year":"1972","journal-title":"SIAM J. Comput."},{"year":"2018","series-title":"News category dataset","author":"Misra","key":"10.1016\/j.asoc.2023.110261_b36"},{"key":"10.1016\/j.asoc.2023.110261_b37","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2022.109215","article-title":"Graph based ensemble classification for crime report prediction","volume":"125","author":"Das","year":"2022","journal-title":"Appl. Soft Comput."},{"issue":"10","key":"10.1016\/j.asoc.2023.110261_b38","doi-asserted-by":"crossref","first-page":"P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008","article-title":"Fast unfolding of communities in large networks","volume":"2008","author":"Blondel","year":"2008","journal-title":"J. Stat. Mech. Theory Exp."},{"issue":"12","key":"10.1016\/j.asoc.2023.110261_b39","doi-asserted-by":"crossref","first-page":"7821","DOI":"10.1073\/pnas.122653799","article-title":"Community structure in social and biological networks","volume":"99","author":"Girvan","year":"2002","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"2","key":"10.1016\/j.asoc.2023.110261_b40","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.78.026112","article-title":"Multistep greedy algorithm identifies community structure in real-world and computer-generated networks","volume":"78","author":"Schuetz","year":"2008","journal-title":"Phys. Rev. E"},{"key":"10.1016\/j.asoc.2023.110261_b41","doi-asserted-by":"crossref","DOI":"10.1155\/2014\/627581","article-title":"A node influence based label propagation algorithm for community detection in networks","volume":"2014","author":"Xing","year":"2014","journal-title":"Sci. World J."},{"key":"10.1016\/j.asoc.2023.110261_b42","series-title":"International Symposium on Computer and Information Sciences","first-page":"284","article-title":"Computing communities in large networks using random walks","author":"Pons","year":"2005"},{"issue":"11","key":"10.1016\/j.asoc.2023.110261_b43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjb\/e2013-40829-0","article-title":"A smart local moving algorithm for large-scale modularity-based community detection","volume":"86","author":"Waltman","year":"2013","journal-title":"Eur. Phys. J. B"},{"key":"10.1016\/j.asoc.2023.110261_b44","series-title":"International Conference on Computational Science and Its Applications","first-page":"146","article-title":"Modularity based hierarchical community detection in networks","author":"F\u00a0Vieira","year":"2014"},{"key":"10.1016\/j.asoc.2023.110261_b45","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.future.2021.01.027","article-title":"Generation of overlapping clusters constructing suitable graph for crime report analysis","volume":"118","author":"Das","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2023.110261_b46","series-title":"2010 IEEE International Conference on Data Mining","first-page":"911","article-title":"Understanding of internal clustering validation measures","author":"Liu","year":"2010"},{"issue":"8","key":"10.1016\/j.asoc.2023.110261_b47","doi-asserted-by":"crossref","first-page":"1706","DOI":"10.1016\/j.physa.2008.12.021","article-title":"Detect overlapping and hierarchical community structure in networks","volume":"388","author":"Shen","year":"2009","journal-title":"Phys. A"},{"issue":"4","key":"10.1016\/j.asoc.2023.110261_b48","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0018961","article-title":"Finding statistically significant communities in networks","volume":"6","author":"Lancichinetti","year":"2011","journal-title":"PLoS One"},{"key":"10.1016\/j.asoc.2023.110261_b49","series-title":"2010 International Conference on Advances in Social Networks Analysis and Mining","first-page":"112","article-title":"Detecting highly overlapping communities with model-based overlapping seed expansion","author":"McDaid","year":"2010"},{"key":"10.1016\/j.asoc.2023.110261_b50","series-title":"2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining","first-page":"73","article-title":"Ensemble-based algorithms to detect disjoint and overlapping communities in networks","author":"Chakraborty","year":"2016"},{"issue":"10","key":"10.1016\/j.asoc.2023.110261_b51","doi-asserted-by":"crossref","DOI":"10.1088\/1367-2630\/12\/10\/103018","article-title":"Finding overlapping communities in networks by label propagation","volume":"12","author":"Gregory","year":"2010","journal-title":"New J. Phys."},{"key":"10.1016\/j.asoc.2023.110261_b52","series-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","first-page":"25","article-title":"Towards linear time overlapping community detection in social networks","author":"Xie","year":"2012"},{"issue":"6","key":"10.1016\/j.asoc.2023.110261_b53","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1016\/0167-8655(96)00026-8","article-title":"Validating fuzzy partitions obtained through c-shells clustering","volume":"17","author":"Dave","year":"1996","journal-title":"Pattern Recognit. Lett."},{"issue":"32","key":"10.1016\/j.asoc.2023.110261_b54","doi-asserted-by":"crossref","first-page":"325","DOI":"10.3182\/20131218-3-IN-2045.00117","article-title":"A new cluster validity index for fuzzy clustering","volume":"46","author":"Joopudi","year":"2013","journal-title":"IFAC Proc. Vol."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S156849462300279X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S156849462300279X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:42:44Z","timestamp":1729212164000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S156849462300279X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":54,"alternative-id":["S156849462300279X"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2023.110261","relation":{},"ISSN":["1568-4946"],"issn-type":[{"type":"print","value":"1568-4946"}],"subject":[],"published":{"date-parts":[[2023,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Graph based fuzzy clustering algorithm for crime report labelling","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2023.110261","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"110261"}}