{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:28:07Z","timestamp":1763641687800,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":8,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400769953"},{"type":"electronic","value":"9789400769960"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-6996-0_56","type":"book-chapter","created":{"date-parts":[[2013,7,13]],"date-time":"2013-07-13T14:05:32Z","timestamp":1373724332000},"page":"531-538","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["A Decision Tree-Based Classification Model for Crime Prediction"],"prefix":"10.1007","author":[{"given":"Aziz","family":"Nasridinov","sequence":"first","affiliation":[]},{"given":"Sun-Young","family":"Ihm","sequence":"additional","affiliation":[]},{"given":"Young-Ho","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"56_CR1","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1016\/j.knosys.2008.03.019","volume":"21","author":"K Baumgartner","year":"2008","unstructured":"Baumgartner K, Ferrari S, Palermo G (2008) Constructing Bayesian networks for criminal profiling from limited data. Knowl Based Syst 21(7):563\u2013572","journal-title":"Knowl Based Syst"},{"issue":"11","key":"56_CR2","first-page":"27","volume":"39","author":"UM Fayyad","year":"1996","unstructured":"Fayyad UM, Piatetsky-Shapiro G, Smyth P (1996) The KDD process for extracting useful knowledge from volumes of data. Commun ACM (Special Issue on Data mining) 39(11):27\u201334","journal-title":"Commun ACM (Special Issue on Data mining)"},{"key":"56_CR3","unstructured":"Lim N (2007) Classification by ensembles from random partitions using logistic regression models. Dissertation"},{"issue":"4","key":"56_CR4","first-page":"50","volume":"37","author":"H Chen","year":"2004","unstructured":"Chen H, Chung W, Xu JJ, Wang G, Qin Y, Chau M (2004) Crime data mining: a general framework and some examples. The Comp 37(4):50\u201356","journal-title":"The Comp"},{"key":"56_CR5","doi-asserted-by":"crossref","unstructured":"Liu X, Jian C, Lu CT (2010) A spatio-temporal-texture crime search engine. In: Proceeding of the 18th SIGSPATIAL international conference on advances in geographical information systems, pp 528\u2013529","DOI":"10.1145\/1869790.1869881"},{"key":"56_CR6","doi-asserted-by":"crossref","unstructured":"Shah S, Boa F, Lu CT, Chen IR. (2011) CROWDSAFE: Crowd sourcing of crime incidents and safe routing on mobile devices. In: Proceedings of the 18th SIGSPATIAL international conference on advances in geographical information systems, pp 521\u2013524","DOI":"10.1145\/2093973.2094064"},{"key":"56_CR7","doi-asserted-by":"crossref","unstructured":"Wang B, Dong H, Boedihardjo AP, Lu CT, Yu H, Chen IR, Dai J (2012) An integrated framework for spatio-temporal-textual search and mining. In: Proceeding of the 20th SIGSPATIAL international conference on advances in geographical information systems, pp 570\u2013573","DOI":"10.1145\/2424321.2424418"},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Yousef M, Najami N, Khalifa WA (2010) A comparison study between one-class and two-class machine learning for MicroRNA target detection. J. Biomed. Sci. Eng. 247\u2013252","DOI":"10.4236\/jbise.2010.33033"}],"container-title":["Lecture Notes in Electrical Engineering","Information Technology Convergence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-6996-0_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T07:08:50Z","timestamp":1715411330000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-6996-0_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9789400769953","9789400769960"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-6996-0_56","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"14 July 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}