{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:38:12Z","timestamp":1757777892975},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030310189"},{"type":"electronic","value":"9783030310196"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31019-6_16","type":"book-chapter","created":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T19:09:52Z","timestamp":1570561792000},"page":"179-189","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards a Deep Learning Approach for Urban Crime Forecasting"],"prefix":"10.1007","author":[{"given":"Freddy","family":"Piraj\u00e1n","sequence":"first","affiliation":[]},{"given":"Andrey","family":"Fajardo","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Melgarejo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,9]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.jcrimjus.2017.12.007","volume":"54","author":"EL Piza","year":"2018","unstructured":"Piza, E.L., Gilchrist, A.M.: J. Crim. Justice 54, 76 (2018). \n                    https:\/\/doi.org\/10.1016\/j.jcrimjus.2017.12.007","journal-title":"J. Crim. Justice"},{"issue":"8","key":"16_CR2","doi-asserted-by":"publisher","first-page":"eaar4644","DOI":"10.1126\/sciadv.aar4644","volume":"4","author":"C Brelsford","year":"2018","unstructured":"Brelsford, C., Martin, T., Hand, J., Bettencourt, L.M.A.: Sci. Adv. 4(8), eaar4644 (2018). \n                    https:\/\/doi.org\/10.1126\/sciadv.aar4644","journal-title":"Sci. Adv."},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-0-387-77650-7_2","volume-title":"Handbook of Quantitative Criminology","author":"J Ratcliffe","year":"2010","unstructured":"Ratcliffe, J.: Crime mapping: spatial and temporal challenges. In: Piquero, A., Weisburd, D. (eds.) Handbook of Quantitative Criminology, pp. 5\u201324. Springer, New York (2010). \n                    https:\/\/doi.org\/10.1007\/978-0-387-77650-7_2"},{"doi-asserted-by":"publisher","unstructured":"King, T.C., Aggarwal, N., Taddeo, M., Floridi, L.: Sci. Eng. Ethics (2019). \n                    https:\/\/doi.org\/10.1007\/s11948-018-00081-0","key":"16_CR4","DOI":"10.1007\/s11948-018-00081-0"},{"doi-asserted-by":"publisher","unstructured":"Mohler, G., Brantingham, P.J., Carter, J., Short, M.B.: J. Quant. Criminol. (2019). \n                    https:\/\/doi.org\/10.1007\/s10940-019-09404-1","key":"16_CR5","DOI":"10.1007\/s10940-019-09404-1"},{"unstructured":"Stalidis, P., Semertzidis, T., Daras, P.: Examining deep learning architectures for crime classification and prediction (2018)","key":"16_CR6"},{"issue":"1","key":"16_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/2330443X.2018.1438940","volume":"5","author":"PJ Brantingham","year":"2018","unstructured":"Brantingham, P.J., Valasik, M., Mohler, G.O.: Stat. Public Policy 5(1), 1 (2018). \n                    https:\/\/doi.org\/10.1080\/2330443X.2018.1438940","journal-title":"Stat. Public Policy"},{"issue":"4","key":"16_CR8","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1007\/s12103-019-09483-7","volume":"44","author":"Matt R. Nobles","year":"2019","unstructured":"Nobles, M.R.: Am. J. Crim. Justice (2019). \n                    https:\/\/doi.org\/10.1007\/s12103-019-09483-7","journal-title":"American Journal of Criminal Justice"},{"issue":"2","key":"16_CR9","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1111\/1745-9125.12103","volume":"54","author":"M Aaltonen","year":"2016","unstructured":"Aaltonen, M., Oksanen, A., Kivivuori, J.: Criminology 54(2), 307 (2016). \n                    https:\/\/doi.org\/10.1111\/1745-9125.12103","journal-title":"Criminology"},{"issue":"1","key":"16_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1140\/epjds\/s13688-018-0171-7","volume":"7","author":"SK Rumi","year":"2018","unstructured":"Rumi, S.K., Deng, K., Salim, F.D.: EPJ Data Sci. 7(1), 43 (2018). \n                    https:\/\/doi.org\/10.1140\/epjds\/s13688-018-0171-7","journal-title":"EPJ Data Sci."},{"doi-asserted-by":"publisher","unstructured":"Blattman, C., Green, D., Ortega, D., Tob\u00f3n, S.: Hotspot interventions at scale: the effects of policing and city services on crime in Bogot\u00e1, Colombia. Technical report, International Initiative for Impact Evaluation (3ie) (2018). \n                    https:\/\/doi.org\/10.23846\/DPW1IE88","key":"16_CR11","DOI":"10.23846\/DPW1IE88"},{"key":"16_CR12","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780190279707.013.38","volume-title":"The Oxford Handbook of Environmental Criminology","author":"GJN Bruinsma","year":"2018","unstructured":"Bruinsma, G.J.N., Johnson, S.D.: The Oxford Handbook of Environmental Criminology. Oxford University Press, Oxford (2018). Google-Books-ID: qPdJDwAAQBAJ"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Nature 521, 436 (2015)","journal-title":"Nature"},{"issue":"3","key":"16_CR14","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/JPROC.2018.2884923","volume":"107","author":"G Adamson","year":"2019","unstructured":"Adamson, G., Havens, J.C., Chatila, R.: Proc. IEEE 107(3), 518 (2019). \n                    https:\/\/doi.org\/10.1109\/JPROC.2018.2884923","journal-title":"Proc. IEEE"},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jcrimjus.2018.06.003","volume":"58","author":"M Quick","year":"2018","unstructured":"Quick, M., Li, G., Brunton-Smith, I.: J. Crim. Justice 58, 22 (2018). \n                    https:\/\/doi.org\/10.1016\/j.jcrimjus.2018.06.003","journal-title":"J. Crim. Justice"},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/e20110874","volume":"20","author":"M Melgarejo","year":"2018","unstructured":"Melgarejo, M., Obregon, N.: Entropy 20, 11 (2018). \n                    https:\/\/doi.org\/10.3390\/e20110874\n                    \n                  . \n                    http:\/\/www.mdpi.com\/1099-4300\/20\/11\/874","journal-title":"Entropy"},{"issue":"1","key":"16_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s41074-019-0053-3","volume":"11","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: IPSJ Trans. Comput. Vis. Appl. 11(1), 1 (2019). \n                    https:\/\/doi.org\/10.1186\/s41074-019-0053-3","journal-title":"IPSJ Trans. Comput. Vis. Appl."},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.eswa.2019.01.066","volume":"124","author":"D Mac\u00eado","year":"2019","unstructured":"Mac\u00eado, D., Zanchettin, C., Oliveira, A., Ludermir, T.: Expert Syst. Appl. 124, 271 (2019). \n                    https:\/\/doi.org\/10.1016\/j.eswa.2019.01.066","journal-title":"Expert Syst. Appl."},{"doi-asserted-by":"publisher","unstructured":"Gao, H., Yuan, H., Wang, Z., Ji, S.: IEEE Trans. Pattern Anal. Mach. Intell. 1 (2019). \n                    https:\/\/doi.org\/10.1109\/TPAMI.2019.2893965","key":"16_CR19","DOI":"10.1109\/TPAMI.2019.2893965"},{"unstructured":"Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., et al.: Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, OSDI 2016, pp. 265\u2013283. USENIX Association, Berkeley (2016)","key":"16_CR20"},{"unstructured":"Kingma, D.P., Ba, J.: \n                    arXiv:1412.6980\n                    \n                   [cs] (2014)","key":"16_CR21"},{"issue":"1","key":"16_CR22","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/S0034-4257(97)00083-7","volume":"62","author":"SV Stehman","year":"1997","unstructured":"Stehman, S.V.: Remote Sens. Environ. 62(1), 77 (1997). \n                    https:\/\/doi.org\/10.1016\/S0034-4257(97)00083-7","journal-title":"Remote Sens. Environ."},{"doi-asserted-by":"publisher","unstructured":"Tharwat, A.: Appl. Comput. Inform. (2018). \n                    https:\/\/doi.org\/10.1016\/j.aci.2018.08.003","key":"16_CR23","DOI":"10.1016\/j.aci.2018.08.003"},{"key":"16_CR24","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.sigpro.2019.06.018","volume":"165","author":"X Wang","year":"2019","unstructured":"Wang, X., Jiang, X.: Sig. Process. 165, 104 (2019). \n                    https:\/\/doi.org\/10.1016\/j.sigpro.2019.06.018","journal-title":"Sig. Process."},{"issue":"5","key":"16_CR25","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1080\/02664763.2017.1322556","volume":"45","author":"C Pierdzioch","year":"2018","unstructured":"Pierdzioch, C., Reid, M.B., Gupta, R.: J. Appl. Stat. 45(5), 884 (2018). \n                    https:\/\/doi.org\/10.1080\/02664763.2017.1322556","journal-title":"J. Appl. Stat."},{"unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (2016). \n                    arXiv:1512.00567","key":"16_CR26"},{"issue":"7","key":"16_CR27","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.1109\/TNNLS.2018.2876179","volume":"30","author":"Shuang Wu","year":"2019","unstructured":"Wu, S., et al.: IEEE Trans. Neural Netw. Learn. Syst. 1\u20139 (2018). \n                    https:\/\/doi.org\/10.1109\/TNNLS.2018.2876179","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"unstructured":"Caplan, J.M., Kennedy, L.W. (eds.): Risk Terrain Modeling Compendium for Crime Analysis, Rutgers Center on Public Security (2011)","key":"16_CR28"}],"container-title":["Communications in Computer and Information Science","Applied Computer Sciences in Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31019-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T19:14:56Z","timestamp":1570562096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-31019-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030310189","9783030310196"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31019-6_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"9 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WEA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshop on Engineering Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Marta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"woea2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ieee.udistrital.edu.co\/wea2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}