{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T00:29:42Z","timestamp":1773188982365,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030578046","type":"print"},{"value":"9783030578053","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_10","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"97-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Crime Prediction for Patrol Routes Generation Using Machine Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1571-5829","authenticated-orcid":false,"given":"Cesar","family":"Guevara","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1993-8368","authenticated-orcid":false,"given":"Matilde","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"10_CR1","unstructured":"United Nations Office on Drugs and Crime UNODC. \nhttps:\/\/www.unodc.org\/\n\n. Accessed 01 May 2020"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Canon-Clavijo, R., Diaz, C., Garcia-Bedoya, O., Bolivar, H.: Study of crime status in Colombia and development of a citizen security app. Communications in Computer and Information Science, 1051 CCIS, 116\u2013130 (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-32475-9-9","DOI":"10.1007\/978-3-030-32475-9-9"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"San Juan, V., Santos, M., And\u00fajar, J.M.: Intelligent UAV map generation and discrete path planning for search and rescue operations. Complexity (2018)","DOI":"10.1155\/2018\/6879419"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Kamruzzaman, M. M.: E-crime management system for future smart city. In: Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019), pp. 261-271. Springer, Singapore (2020)","DOI":"10.1007\/978-981-15-1468-5_34"},{"key":"10_CR5","unstructured":"Junior, A., Cacho, N., Thome,A., Medeiros, A., Borges, J.: A predictive policing application to support patrol planning in smart cities. In: 2017 International Smart Cities Conference (ISC2), pp. 1\u20136 (2017)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Tayal, D., Jain, A., Arora, S., Agarwal, S., Gupta, T., Tyagi, N.: Crime detection and criminal identification in India using data mining techniques. AI Soc. 117\u2013127 (2015)","DOI":"10.1007\/s00146-014-0539-6"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Zhao, X., Tang, J.: Modeling temporal-spatial correlations for crime prediction. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management - CIKM 2017, pp. 497\u2013506 (2017)","DOI":"10.1145\/3132847.3133024"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Sivaranjani, S., Sivakumari, S., Aasha, M.: Crime prediction and forecasting in Tamilnadu using clustering approaches. In: International Conference on Emerging Technological Trends (ICETT), vol. 1\u20136 (2016)","DOI":"10.1109\/ICETT.2016.7873764"},{"key":"10_CR9","first-page":"135","volume":"441\u2013454","author":"F Albertetti","year":"2016","unstructured":"Albertetti, F., Grossrieder, L., Ribaux, O., Stoffel, K.: Change points detection in crime-related time series: an on-line fuzzy approach based on a shape space representation. Appl. Soft Comput. 441\u2013454, 135\u2013169 (2016)","journal-title":"Appl. Soft Comput."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Guevara, C., Jad\u00e1n, J., Zapata, C., Mart\u00ednez, L., Pozo, J., Manjarres, E.: Model of dynamic routes for intelligent police patrolling. In: Multidisciplinary Digital Publishing Institute Proceedings, vol. 1214 (2018)","DOI":"10.3390\/proceedings2191214"},{"key":"10_CR11","first-page":"151","volume-title":"Hypothesis Testing and ANOVA","author":"M Sarstedt","year":"2019","unstructured":"Sarstedt, M., Mooi, E.: Hypothesis Testing and ANOVA, pp. 151\u2013208. Springer, Heidelberg (2019)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Rachburee, N., Punlumjeak, W.: A comparison of feature selection approach between greedy, IG-ratio, Chi-square, and mRMR in educational mining. In: Proceedings 7th International Conference on Information Technology and Electrical Engineering: Envisioning the Trend of Computer, Information and Engineering, ICITEE 2015, pp. 420\u2013424 (2015)","DOI":"10.1109\/ICITEED.2015.7408983"},{"key":"10_CR13","unstructured":"Arora, P., Deepali, V.S.: Analysis of K-means and K-medoids algorithm for big data. Procedia Comput. Sci. 41, 507\u2013512 (2016)"},{"key":"10_CR14","unstructured":"Macedo-Cruz, A., Pajares-Martinsanz, G., Santos-Pe\u00f1as, M.: Clasificaci\u00f3n no supervisada con im\u00e1genes a color de cobertura terrestre. Agrociencia 711\u2013722, 56 (2010)"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1109\/TLA.2019.8891949","volume":"17","author":"J Rojas-Thomas","year":"2019","unstructured":"Rojas-Thomas, J., Santos, M., Mora, M., Duro, N.: Performance analysis of clustering internal validation indexes with asymmetric clusters. IEEE Latin Am. Trans. 17, 807\u2013814 (2019)","journal-title":"IEEE Latin Am. Trans."},{"issue":"2","key":"10_CR16","doi-asserted-by":"publisher","first-page":"133","DOI":"10.4995\/riai.2017.8846","volume":"15","author":"T Rodr\u00edguez-Blanco","year":"2018","unstructured":"Rodr\u00edguez-Blanco, T., Sarabia, D., De Prada, C.: Real-time optimization using the modifier adaptation methodology. Revista Iberoamericana de Autom\u00e1tica e Inform\u00e1tica industrial 15(2), 133\u2013144 (2018)","journal-title":"Revista Iberoamericana de Autom\u00e1tica e Inform\u00e1tica industrial"},{"issue":"3","key":"10_CR17","doi-asserted-by":"publisher","first-page":"264","DOI":"10.4995\/riai.2019.10604","volume":"16","author":"A Perez Ruiz","year":"2019","unstructured":"Perez Ruiz, A., Aldea Rivas, M., Gonzalez Harbour, M.: Real-time Ada applications on Android. Revista Iberoamericana de Autom\u00e1tica e Inform\u00e1tica Industrial 16(3), 264\u2013272 (2019)","journal-title":"Revista Iberoamericana de Autom\u00e1tica e Inform\u00e1tica Industrial"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:09:18Z","timestamp":1599476958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}