{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:35:11Z","timestamp":1767339311458,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030962982"},{"type":"electronic","value":"9783030962999"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96299-9_76","type":"book-chapter","created":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T17:09:04Z","timestamp":1645463344000},"page":"806-817","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Automated Fingerprint Biometric System for Crime Record Management"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4568-7566","authenticated-orcid":false,"given":"Muyideen","family":"AbdulRaheem","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3556-9331","authenticated-orcid":false,"given":"Sanjay","family":"Misra","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1020-4432","authenticated-orcid":false,"given":"Joseph Bamidele","family":"Awotunde","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1472-2237","authenticated-orcid":false,"given":"Idowu Dauda","family":"Oladipo","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Oluranti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"76_CR1","unstructured":"Nnadimma, C.E.: Design and implementation of an online crime reporting system. Dissertation, School of Postgraduate Studies, University of Lagos (2018)"},{"key":"76_CR2","first-page":"332","volume":"3","author":"F Jamal","year":"2019","unstructured":"Jamal, F., Barrow, M., Alam, M.J., Mustafa, N.: Unique model of criminal record management system in the perspective of Somalia. JOIV Int. J. Inform. Vis. 3, 332\u2013336 (2019)","journal-title":"JOIV Int. J. Inform. Vis."},{"key":"76_CR3","unstructured":"Macleod, R.: Crime and criminals in the north-west territories 1873\u20131905. In: The North-West Mounted Police and Law Enforcement, 1873\u20131905, pp. 114\u2013130. University of Toronto Press (2019)"},{"key":"76_CR4","unstructured":"Emmanuel, A.: School of computing and informatics a business intelligence system to support crime management in law enforcement agencies: a case of Uganda police force by supervisor dr. elisha t. o. opiyo a research paper report submitted in partial fulfillment for the requirements of the award of degree of master of science in computational intelligence, School of Computing and Informatics, University of Nairobi (2017)"},{"key":"76_CR5","unstructured":"Turner, B.S.: Crimes against humanity. In: Vulnerability and Human Rights, pp. 1\u201324. Penn State University Press (2021)"},{"key":"76_CR6","unstructured":"Ganiron Jr, T.U., Chen, J.S., Dela Cruz, R.: Development of an online crime management & reporting system, June 2019"},{"issue":"2","key":"76_CR7","first-page":"305","volume":"108","author":"A Ristroph","year":"2018","unstructured":"Ristroph, A.: The thin blue line from crime to punishment. J. Crim. Law Criminol. 108(2), 305\u2013334 (2018)","journal-title":"J. Crim. Law Criminol."},{"issue":"5","key":"76_CR8","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s00228-010-0986-z","volume":"67","author":"A Alrwisan","year":"2011","unstructured":"Alrwisan, A., Ross, J., Williams, D.: Medication incidents reported to an online incident reporting system. Eur. J. Clin. Pharmacol. 67(5), 527\u2013532 (2011). https:\/\/doi.org\/10.1007\/s00228-010-0986-z","journal-title":"Eur. J. Clin. Pharmacol."},{"key":"76_CR9","doi-asserted-by":"crossref","unstructured":"AbdulRaheem, M., et al.: An enhanced lightweight speck system for cloud-based smart healthcare.\u00a0 In: Communications in Computer and Information Science, 2021, 1455 CCIS, pp. 363\u2013376 (2021)","DOI":"10.1007\/978-3-030-89654-6_26"},{"key":"76_CR10","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-981-13-6351-1_19","volume-title":"Data, Engineering and Applications","author":"F Adesola","year":"2019","unstructured":"Adesola, F., Misra, S., Omoregbe, N., Damasevicius, R., Maskeliunas, R.: An IOT-based architecture for crime management in Nigeria. In: Shukla, R.K., Agrawal, J., Sharma, S., Singh Tomer, G. (eds.) Data, Engineering and Applications, pp. 245\u2013254. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-6351-1_19"},{"issue":"3","key":"76_CR11","first-page":"45","volume":"5","author":"JB Awotunde","year":"2014","unstructured":"Awotunde, J.B., Adewunmi-Olowabi, F.T., Owolabi, A.A., Akanbi, M.B.: Automated global system for mobile-based vehicle inspection using short-code: case study of Nigeria. Comput. Inf. Syst. Dev. Inform. Allied Res. J. 5(3), 45\u201350 (2014)","journal-title":"Comput. Inf. Syst. Dev. Inform. Allied Res. J."},{"key":"76_CR12","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-981-16-4435-1_35","volume-title":"Advanced Techniques for IoT Applications. EAIT 2020","author":"D Afah","year":"2022","unstructured":"Afah, D., Gautam, A., Misra, S., Agrawal, A., Dama\u0161evi\u010dius, R., Maskeli\u016bnas, R.: Smartphones verification and identification by the use of fingerprint. In: Mandal, J.K., De, D. (eds.) Advanced Techniques for IoT Applications. EAIT 2020. LNNS, vol. 292, pp. 365\u2013373. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-4435-1_35"},{"issue":"2","key":"76_CR13","first-page":"97","volume":"21","author":"JB Awotunde","year":"2014","unstructured":"Awotunde, J.B., Fatai, O.W., Akanbi, M.B., Abdulkadir, S.I., Idepefo, O.F.: A hybrid fingerprint identification system for immigration control using the Minutiae and correlation methods. J. Comput. Sci. Appl. 21(2), 97\u2013108 (2014)","journal-title":"J. Comput. Sci. Appl."},{"key":"76_CR14","unstructured":"Bhosale,\nM.R., Paradeshi, K.P.: Iot Based Online Police First Information Report (FIR)\nRecord System. 107\u2013112 (2019)"},{"key":"76_CR15","doi-asserted-by":"publisher","unstructured":"Usmani,\nZ., Irum, S., Mahmud, S.: How to build an automated fingerprint identification system\n(2013). https:\/\/doi.org\/10.1109\/ISBAST.2013.9","DOI":"10.1109\/ISBAST.2013.9"},{"key":"76_CR16","doi-asserted-by":"crossref","unstructured":"Belmon,\nL., Kozik, R., Demestichas, K.: Why do law enforcement agencies need AI for\nanalyzing big data?. In: Proceeding of the 20th International Conference, Computer\nInformation Systems and Industrial Management, CISIM 2021, E\u0142k, Poland, 24\u201326 September\n2021, vol. 12883, p. 331. Springer Nature (2021)","DOI":"10.1007\/978-3-030-84340-3_27"},{"key":"76_CR17","doi-asserted-by":"crossref","unstructured":"Gerstlauer,\nA., Haubelt, C., Pimentel, A.D., Stefanov, T.P., Gajski, D.D., Teich, J.: Electronic\nsystem-level synthesis methodologies. IEEE Trans. Comput.-Aided Des. Integr.\nCircuits Syst. 28(10), 1517\u20131530 (2009)","DOI":"10.1109\/TCAD.2009.2026356"},{"key":"76_CR18","unstructured":"Richardson,\nR., Director, C.S.I.: CSI computer crime and security survey. Comput. Secur. Inst.\n1, 1\u201330 (2008)"},{"key":"76_CR19","unstructured":"Ganiron,\nJr., T.U., Chen, J.S., Dela Cruz, R., Pelacio, J.G.: Development of an online\ncrime management & reporting system. 131(june),\n164\u2013180 (2019)"},{"key":"76_CR20","unstructured":"Nawale,\nS.D., Songra, M.P.C., Karnik, R.: Online criminal record. 12(8) (2012)"},{"key":"76_CR21","unstructured":"Awodele,\nO., Onuiri Ernest, E., Olaore Olufunmike, A., Anita, S.O.O.U.E.: A real-time\ncrime records management system for national security agencies. European J.\nComput. Sci. Infor. Tech. 3(2), 1\u201312\n(2015)"},{"key":"76_CR22","doi-asserted-by":"publisher","unstructured":"Lyoko,\nG., Phiri, J., Phiri, A.: Integrating biometrics into police information\nmanagement system: a case integrating biometrics into police information\nmanagement system: a case of Zambia police (2016). https:\/\/doi.org\/10.18178\/ijfcc.2016.5.1.433","DOI":"10.18178\/ijfcc.2016.5.1.433"}],"container-title":["Lecture Notes in Networks and Systems","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96299-9_76","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T17:19:06Z","timestamp":1645463946000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96299-9_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030962982","9783030962999"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96299-9_76","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IBICA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations in Bio-Inspired Computing and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ibica2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/ibica21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}