{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:19:04Z","timestamp":1742962744949,"version":"3.40.3"},"publisher-location":"New Delhi","reference-count":18,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132204909"},{"type":"electronic","value":"9788132204916"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-81-322-0491-6_2","type":"book-chapter","created":{"date-parts":[[2012,4,12]],"date-time":"2012-04-12T08:55:10Z","timestamp":1334220910000},"page":"15-27","source":"Crossref","is-referenced-by-count":1,"title":["Analysis and Pattern Deduction on Linguistic, Numeric Based Mean and Fuzzy Association Rule Algorithm on Any Geo-referenced Crime Point Data Integrated with Google Map"],"prefix":"10.1007","author":[{"given":"R.","family":"Sridhar","sequence":"first","affiliation":[]},{"given":"S. R.","family":"Sathyraj","sequence":"additional","affiliation":[]},{"given":"S.","family":"Balasubramaniam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules between Sets of Items in Large Databases. In: Proceedings of the International Conference on Management of Data, Washington, D.C., May 1993, pp. 207\u2013216 (1993)","DOI":"10.1145\/170036.170072"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Buzack, A.L., Grifford, C.M.: Fuzzy Association Rule Mining for Community Crime Pattern Discovery. In: ISIKDD 2010 (July 2010)","DOI":"10.1145\/1938606.1938608"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"50","DOI":"10.4018\/jdwm.2006010103","volume":"2","author":"S. Bagui","year":"2006","unstructured":"Bagui, S.: An Approach to Mining Crime Patterns. International Journal of Data Warehousing and Mining\u00a02(1), 50\u201380 (2006)","journal-title":"International Journal of Data Warehousing and Mining"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Brown, D.: The Regional Crime Analysis Program (RECAP): A Framework for Mining Data to Catch Criminals. In: Proceedings of the International Conference on Systems, Man, and Cybernetics, pp. 2848\u20132853 (1998)","DOI":"10.1109\/ICSMC.1998.725094"},{"key":"2_CR5","unstructured":"Chau, M., Xu, J., Chen, H.: Extracting Meaningful Entities from Police Narrative Reports. In: Proceedings of the National Conference on Digital Government Research, pp. 1\u20135 (2002)"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MC.2004.1297301","volume":"37","author":"H. Chen","year":"2004","unstructured":"Chen, H., Chung, W., Xu, J., Wang, G., Qin, Y., Chau, M.: Crime Data Mining: A General Framework and Some Examples. Computer\u00a037(4), 50\u201356 (2004)","journal-title":"Computer"},{"key":"2_CR7","first-page":"171","volume-title":"Proceedings of the International Conference on Data Mining","author":"J. Bruin de","year":"2006","unstructured":"de Bruin, J., Cocx, T., Kosters, W., Laros, J., Kok, J.: Data Mining Approaches to Criminal Career Analysis. In: Proceedings of the International Conference on Data Mining, pp. 171\u2013177. IEEE Computer Society Press, Washington, D.C. (2006)"},{"key":"2_CR8","unstructured":"Dembsky, J.: United States Regions (October 2006), http:\/\/www.dembsky.net\/regions\/"},{"issue":"3","key":"2_CR9","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/2.989927","volume":"35","author":"R. Hauck","year":"2002","unstructured":"Hauck, R., Atabakhsh, H., Ongvasith, P., Gupta, H., Chen, H.: Using COPLINK to Analyze Criminal-Justice Data. Computer\u00a035(3), 30\u201337 (2002)","journal-title":"Computer"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Ku, C., Iriberri, A., Leroy, G.: Crime Information Extraction from Police and Witness Narrative Reports. In: Proceedings of the IEEE International Conference on Technologies for Homeland Security, Boston, MA, May 2008, pp. 193\u2013198 (2008)","DOI":"10.1109\/THS.2008.4534448"},{"issue":"1","key":"2_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/273244.273257","volume":"27","author":"C.M. Kuok","year":"1998","unstructured":"Kuok, C.M., Fu, A., Wong, H.: Mining Fuzzy Association Rules in Databases. ACM SIGMOD Record\u00a027(1), 41\u201346 (1998)","journal-title":"ACM SIGMOD Record"},{"key":"2_CR12","first-page":"41","volume-title":"Proceedings of the International Conference on Web Intelligence and Intelligent Agent Technology","author":"S. Nath","year":"2006","unstructured":"Nath, S.: Crime Pattern Detection Using Data Mining. In: Proceedings of the International Conference on Web Intelligence and Intelligent Agent Technology, pp. 41\u201344. IEEE Computer Society Press, Washington, D.C. (2006)"},{"key":"2_CR13","unstructured":"Ng, V., Chan, S., Lau, D., Ying, C.: Incremental Mining for Temporal Association Rules for Crime Pattern Discoveries. In: Proceedings of the Australasian Database Conference, Ballarat, Victoria, Australia, February 2007, pp. 123\u2013132 (2007)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Phillips, P., Lee, I.: Mining Top-k and Bottom-k Correlative Crime Patterns through Graph Representations. In: Proceedings of the IEEE International Conference on Intelligence and Security Informatics, Dallas, TX, June 2009, pp. 25\u201330 (2009)","DOI":"10.1109\/ISI.2009.5137266"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Srikant, R., Agrawal, R.: Mining Quantitative Association Rules in Large Relational Tables. In: Proceedings of the International Conference on Management of Data, Montreal, Quebec, Canada, pp. 1\u201312 (1996)","DOI":"10.1145\/233269.233311"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Thongtae, R., Srisuk, S.: An Analysis of Data Mining Applications in Crime Domain. In: Proceedings of the IEEE International Conference on Computer and Information Technology Workshops, pp. 122\u2013126. IEEE Computer Society Press (2006)","DOI":"10.1109\/CIT.2008.Workshops.80"},{"issue":"3","key":"2_CR17","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0164-1212(02)00128-0","volume":"67","author":"H. Yun","year":"2003","unstructured":"Yun, H., Ha, D., Hwang, B., Ryu, K.H.: Mining Association Rules on Significant Rare Data using Relative Support. Journal of Systems and Software\u00a067(3), 181\u2013191 (2003)","journal-title":"Journal of Systems and Software"},{"issue":"3","key":"2_CR18","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L.A. Zadeh","year":"1965","unstructured":"Zadeh, L.A.: Fuzzy Sets. Information and Control\u00a08(3), 338\u2013353 (1965)","journal-title":"Information and Control"}],"container-title":["Advances in Intelligent and Soft Computing","Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-0491-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:26:21Z","timestamp":1742930781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-0491-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9788132204909","9788132204916"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-0491-6_2","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2012]]}}}