{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:38:27Z","timestamp":1743025107377,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031008276"},{"type":"electronic","value":"9783031008283"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-00828-3_32","type":"book-chapter","created":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T20:03:31Z","timestamp":1651608211000},"page":"320-327","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modeling Public Crime Type Using Multinomial Logistic Regression and K-Nearest Neighbor: Pre-and During-Pandemic COVID-19"],"prefix":"10.1007","author":[{"given":"Riswan","family":"Efendi","sequence":"first","affiliation":[]},{"given":"Yaumil","family":"Isnaini","sequence":"additional","affiliation":[]},{"given":"Sri Widya","family":"Rahayu","sequence":"additional","affiliation":[]},{"given":"Rohaidah","family":"Masri","sequence":"additional","affiliation":[]},{"given":"Noor Azah","family":"Samsudin","sequence":"additional","affiliation":[]},{"family":"Rasyidah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,4]]},"reference":[{"unstructured":"Wibowo, A.H., Wijaya, A.R.: Kajian awal profiling kejahatan dan strategi dalam usaha mencegah terjadinya tindak kriminalitas di Kabupaten Sleman. In: Proceeding of National Conference IDEC, pp. 1\u20138 (2018)","key":"32_CR1"},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"123","DOI":"10.13057\/ijas.v3i2.41917","volume":"3","author":"AD Putra","year":"2018","unstructured":"Putra, A.D., Martha, G.S., Fikram, M., Yuhan, R.J.: Faktor-faktor yang mempengaruhi tingkat kriminalitas di Indonesia tahun 2018. Indones. J. App. Stat. 3, 123\u2013131 (2018)","journal-title":"Indones. J. App. Stat."},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"012076","DOI":"10.1088\/1742-6596\/1450\/1\/012076","volume":"1450","author":"AH Wibowo","year":"2020","unstructured":"Wibowo, A.H., Oesman, T.I.: The comparative on the accuracy of K-NN, Na\u00efve Bayes and decision tree algorithms in predicting crimes and criminal actions in Sleman regency. J. Phys. Conf. Ser. 1450, 012076 (2020)","journal-title":"J. Phys. Conf. Ser."},{"key":"32_CR4","first-page":"1","volume":"9","author":"S Kang","year":"2021","unstructured":"Kang, S.: K-nearest neighbor learning with graph neural network. Mathematics 9, 1\u201312 (2021)","journal-title":"Mathematics"},{"key":"32_CR5","first-page":"124","volume":"6","author":"V Pednekar","year":"2018","unstructured":"Pednekar, V., Mahale, T., Gadhave, P., Gore, A.: Crime rate prediction using KNN. Int. J. Recent Innov. Trend Compt. Comm. 6, 124\u2013127 (2018)","journal-title":"Int. J. Recent Innov. Trend Compt. Comm."},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-981-15-7394-1_5","volume-title":"Soft Computing Techniques and Applications","author":"S Mahmud","year":"2021","unstructured":"Mahmud, S., Nuha, M., Sattar, A.: Crime rate prediction using machine learning and data mining. In: Borah, S., Pradhan, R., Dey, N., Gupta, P. (eds.) Soft Computing Techniques and Applications, vol. 1248, pp. 59\u201369. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-7394-1_5"},{"unstructured":"Kumar, A., Verma, A., Shinde, G., Sukhdeve, Y., Lal, N.: Crime prediction using K-NN algorithm. In: Proceeding ic-ETITE (2020)","key":"32_CR7"},{"key":"32_CR8","volume-title":"Categorical Data Analysis","author":"A Agresti","year":"2012","unstructured":"Agresti, A.: Categorical Data Analysis, 3rd edn. Wiley, Hoboken (2012)","edition":"3"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"271","DOI":"10.18187\/pjsor.v8i2.234","volume":"7","author":"AM El-Habil","year":"2012","unstructured":"El-Habil, A.M.: An application on multinomial logistic model. Pak. J. Stat. Oper. Res. 7, 271\u2013291 (2012)","journal-title":"Pak. J. Stat. Oper. Res."},{"issue":"1","key":"32_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42492-021-00075-z","volume":"4","author":"N Shah","year":"2021","unstructured":"Shah, N., Bhagat, N., Shah, M.: Crime forecasting: a machine learning and computer vision approach to crime prediction and prevention. Vis. Comput. Ind. Biomed. Art 4(1), 1\u201314 (2021). https:\/\/doi.org\/10.1186\/s42492-021-00075-z","journal-title":"Vis. Comput. Ind. Biomed. Art"},{"key":"32_CR11","first-page":"15","volume":"9","author":"K-S Kim","year":"2021","unstructured":"Kim, K.-S., Jeong, Y.-H.: A study on crime prediction to reduce crime rate based on artificial intelligence. Korea J. Art. Intel. 9, 15\u201320 (2021)","journal-title":"Korea J. Art. Intel."}],"container-title":["Lecture Notes in Networks and Systems","Recent Advances in Soft Computing and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-00828-3_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T20:04:38Z","timestamp":1651608278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-00828-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031008276","9783031008283"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-00828-3_32","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SCDM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Soft Computing and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scdm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/scdm.uthm.edu.my\/scdm2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}