{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T17:16:16Z","timestamp":1776532576451,"version":"3.51.2"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030387518","type":"print"},{"value":"9783030387525","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38752-5_6","type":"book-chapter","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T20:02:41Z","timestamp":1578427361000},"page":"68-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Classification Approach for Crime Prediction"],"prefix":"10.1007","author":[{"given":"Nur Ain Syahira","family":"Zaidi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9077-4995","authenticated-orcid":false,"given":"Aida","family":"Mustapha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5348-502X","authenticated-orcid":false,"given":"Salama A.","family":"Mostafa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4726-8325","authenticated-orcid":false,"given":"Muhammad Nazim","family":"Razali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,8]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.labeco.2018.02.002","volume":"52","author":"P Bennett","year":"2018","unstructured":"Bennett, P.: The heterogeneous effects of education on crime: evidence from Danish administrative twin data. Labour Econ. 52, 160\u2013177 (2018)","journal-title":"Labour Econ."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Sathyadevan, S., Gangadharan, S.: Crime analysis and prediction using data mining. In: 2014 First International Conference on Networks & Soft Computing (ICNSC), pp. 406\u2013412. IEEE, August 2014","DOI":"10.1109\/CNSC.2014.6906719"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Malathi, A., Baboo, S.S.: An enhanced algorithm to predict a future crime using data mining (2011)","DOI":"10.5120\/2478-3335"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.cogsys.2018.12.004","volume":"54","author":"SA Mostafa","year":"2019","unstructured":"Mostafa, S.A., et al.: Examining multiple feature evaluation and classification methods for improving the diagnosis of Parkinson\u2019s disease. Cogn. Syst. Res. 54, 90\u201399 (2019)","journal-title":"Cogn. Syst. Res."},{"issue":"3","key":"6_CR5","doi-asserted-by":"crossref","first-page":"4219","DOI":"10.17485\/ijst\/2013\/v6i3.6","volume":"6","author":"R Iqbal","year":"2013","unstructured":"Iqbal, R., Murad, M.A.A., Mustapha, A., Panahy, P.H.S., Khanahmadliravi, N.: An experimental study of classification algorithms for crime prediction. Indian J. Sci. Technol. 6(3), 4219\u20134225 (2013)","journal-title":"Indian J. Sci. Technol."},{"key":"6_CR6","unstructured":"Chandrasekar, A., Raj, A.S., Kumar, P.: Crime Prediction and Classification in San Francisco City (2015). http:\/\/cs229.stanford.edu\/proj2015\/228_report.pdf"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Yadav, S., Timbadia, M., Yadav, A., Vishwakarma, R., Yadav, N.: Crime pattern detection, analysis & prediction. In: 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), vol. 1, pp. 225\u2013230. IEEE, April 2017","DOI":"10.1109\/ICECA.2017.8203676"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Wijenayake, S., Graham, T., Christen, P.: A decision tree approach to predicting recidivism in domestic violence. arXiv preprint arXiv:1803.09862 (2018)","DOI":"10.1007\/978-3-030-04503-6_1"},{"key":"6_CR9","unstructured":"Wirth, R., Hipp, J.: CRISP-DM: towards a standard process model for data mining. In: Proceedings of the 4th International Conference on the Practical Applications of Knowledge Discovery and Data Mining, pp. 29\u201339. Citeseer, April 2000"},{"issue":"2","key":"6_CR10","first-page":"438","volume":"2","author":"S Kalmegh","year":"2015","unstructured":"Kalmegh, S.: Analysis of Weka data mining algorithm REPTree, simple cart and RandomTree for classification of Indian news. Int. J. Innov. Sci. Eng. Technol. 2(2), 438\u2013446 (2015)","journal-title":"Int. J. Innov. Sci. Eng. Technol."},{"issue":"1","key":"6_CR11","first-page":"507","volume":"5","author":"SR Kalmegh","year":"2015","unstructured":"Kalmegh, S.R.: Comparative analysis of WEKA data mining algorithm RandomForest, RandomTree and LADTree for classification of indigenous news data. Int. J. Emerg. Technol. Adv. Eng. 5(1), 507\u2013517 (2015)","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"6_CR12","series-title":"AISC","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-72550-5_5","volume-title":"SCDM 2018","author":"SA Mostafa","year":"2018","unstructured":"Mostafa, S.A., Mustapha, A., Khaleefah, S.H., Ahmad, M.S., Mohammed, M.A.: Evaluating the performance of three classification methods in diagnosis of Parkinson\u2019s disease. In: Ghazali, R., Deris, M., Nawi, N., Abawajy, J. (eds.) SCDM 2018. AISC, vol. 700, pp. 43\u201352. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-72550-5_5"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.ijmedinf.2018.02.001","volume":"112","author":"SA Mostafa","year":"2018","unstructured":"Mostafa, S.A., Mustapha, A., Mohammed, M.A., Ahmad, M.S., Mahmoud, M.A.: A fuzzy logic control in adjustable autonomy of a multi-agent system for an automated elderly movement monitoring application. Int. J. Med. Inform. 112, 173\u2013184 (2018)","journal-title":"Int. J. Med. Inform."},{"issue":"7","key":"6_CR14","first-page":"374","volume":"7","author":"A Gupta","year":"2016","unstructured":"Gupta, A., Mohammad, A., Syed, A., Halgamuge, M.N.: A comparative study of classification algorithms using data mining: crime and accidents in Denver City the USA. Education 7(7), 374\u2013381 (2016)","journal-title":"Education"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Arunkumar, N., Mohammed, M.A., Mostafa, S.A., Ibrahim, D.A., Rodrigues, J.J., de Albuquerque, V.H.C.: Fully automatic model\u2010based segmentation and classification approach for MRI brain tumor using artificial neural networks. Concurr. Comput. Pract. Exp. e4962 (2018)","DOI":"10.1002\/cpe.4962"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Hassan, M.H., Mostafa, S.A., Mustapha, A., Wahab, M.H.A., Nor, D.M.: A survey of multi-agent system approach in risk assessment. In: 2018 International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR), pp. 1\u20136. IEEE, August 2018","DOI":"10.1109\/ISAMSR.2018.8540551"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Khaleefah, S.H., Mostafa, S.A., Mustapha, A., Darman, R.: A general framework of multi-agent features extraction operators for deformed images identification. In: 2018 International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR), pp. 1\u20135. IEEE, August 2018","DOI":"10.1109\/ISAMSR.2018.8540560"},{"issue":"3","key":"6_CR18","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/TPAMI.2009.187","volume":"32","author":"JD Rodriguez","year":"2010","unstructured":"Rodriguez, J.D., Perez, A., Lozano, J.A.: Sensitivity analysis of k-fold cross validation in prediction error estimation. IEEE Trans. Pattern Anal. Mach. Intell. 32(3), 569\u2013575 (2010)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"51691","DOI":"10.1109\/ACCESS.2019.2908998","volume":"7","author":"BA Khalaf","year":"2019","unstructured":"Khalaf, B.A., Mostafa, S.A., Mustapha, A., Mohammed, M.A., Abduallah, W.M.: Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access 7, 51691\u201351713 (2019)","journal-title":"IEEE Access"},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/j.procs.2018.01.150","volume":"127","author":"Y Al Amrani","year":"2018","unstructured":"Al Amrani, Y., Lazaar, M., El Kadiri, K.E.: Random forest and support vector machine based hybrid approach to sentiment analysis. Proc. Comput. Sci. 127, 511\u2013520 (2018)","journal-title":"Proc. Comput. Sci."}],"container-title":["Communications in Computer and Information Science","Applied Computing to Support Industry: Innovation and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38752-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,15]],"date-time":"2021-02-15T17:36:10Z","timestamp":1613410570000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38752-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030387518","9783030387525"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38752-5_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACRIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Computing to Support Industry: Innovation and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ramadi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iraq","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acrit2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acritt.org.uk\/wp\/acrit-conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}