{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T18:14:09Z","timestamp":1769278449831,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-11050-4","type":"journal-article","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T10:16:56Z","timestamp":1622197016000},"page":"28061-28085","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["A knowledge centric hybridized approach for crime classification incorporating deep bi-LSTM neural network"],"prefix":"10.1007","volume":"80","author":[{"given":"Gerard","family":"Deepak","sequence":"first","affiliation":[]},{"given":"S.","family":"Rooban","sequence":"additional","affiliation":[]},{"given":"A.","family":"Santhanavijayan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,28]]},"reference":[{"key":"11050_CR1","doi-asserted-by":"publisher","unstructured":"Abbass Z, Ali Z, Ali M, Akbar B, Saleem A (2020) \"a framework to predict social crime through twitter tweets by using machine learning,\" 2020 IEEE 14th International Conference on Semantic Computing (ICSC), San Diego, CA, USA, 2020, pp. 363\u2013368, https:\/\/doi.org\/10.1109\/ICSC.2020.00073.","DOI":"10.1109\/ICSC.2020.00073"},{"key":"11050_CR2","doi-asserted-by":"crossref","unstructured":"Alatrista-Salas H, Morz\u00e1n-Samam\u00e9 J, Nunez-del-Prado M (2020). \u201cCrime Alert! Crime Typification in News Based on Text Mining\u201d. In: Arai K., Bhatia R. (eds) Advances in Information and Communication. FICC 2019. Lecture notes in networks and systems, vol 69. Springer, Cham.","DOI":"10.1007\/978-3-030-12388-8_50"},{"key":"11050_CR3","doi-asserted-by":"crossref","unstructured":"Anuar S, Selamat A, Sallehuddin R (2015) \u201cHybrid artificial neural network with artificial bee Colony algorithm for crime classification\u201d. In: Phon-Amnuaisuk S., au T. (eds) computational intelligence in information systems. Advances in intelligent systems and computing, vol 331. Springer, Cham.","DOI":"10.1007\/978-3-319-13153-5_4"},{"key":"11050_CR4","doi-asserted-by":"publisher","unstructured":"Ashagrie M, Tekli J, Taddesse FG, Chbeir R, Tekli G (2019) Generic metadata representation framework for social-based event detection, description, and linkage. Knowledge-Based Systems 188. https:\/\/doi.org\/10.1016\/j.knosys.2019.06.025","DOI":"10.1016\/j.knosys.2019.06.025"},{"key":"11050_CR5","unstructured":"Bhalla A, Pawar RP (2019) Crime in India 2018, National Crime Records Bureau (Ministry of Home Affairs) Government of India"},{"key":"11050_CR6","doi-asserted-by":"publisher","unstructured":"Bhati S, Vikramaditya and Tiwari S, Mandloi J, (2019). \u201cMachine Learning and Deep Learning Integrated Model to Predict, Classify and Analyze Crime in Indore City\u201d. Proceedings of Recent Advances in Interdisciplinary Trends in Engineering & Applications (RAITEA) 2019. Available at SSRN: https:\/\/ssrn.com\/abstract=3364984 or https:\/\/doi.org\/10.2139\/ssrn.3364984.","DOI":"10.2139\/ssrn.3364984"},{"issue":"4","key":"11050_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.4018\/IJWLTT.2019100103","volume":"14","author":"PR Boppuru","year":"2019","unstructured":"Boppuru PR, Ramesha K (2019) Geo-spatial crime analysis using newsfeed data in Indian context. International Journal of Web-Based Learning and Teaching Technologies (IJWLTT) 14(4):49\u201364. https:\/\/doi.org\/10.4018\/IJWLTT.2019100103","journal-title":"International Journal of Web-Based Learning and Teaching Technologies (IJWLTT)"},{"issue":"4","key":"11050_CR8","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MC.2004.1297301","volume":"37","author":"H Chen","year":"2004","unstructured":"Chen H, Chung W, Xu J, Wang G, Qin Y, Chau M (2004) Crime data mining: a general framework and some examples. IEEE Explore-Computer 37(4):50\u201356","journal-title":"IEEE Explore-Computer"},{"key":"11050_CR9","doi-asserted-by":"crossref","unstructured":"Das P, Das AK (2020). \u201cGraph-based crime reports clustering using relations extracted from named entities\u201d. In: Behera H., Nayak J., Naik B., Pelusi D. (eds) computational intelligence in data mining. Advances in intelligent systems and computing, vol 990. Springer, Singapore","DOI":"10.1007\/978-981-13-8676-3_29"},{"key":"11050_CR10","doi-asserted-by":"publisher","unstructured":"Das P, Das A, Nayak J, Pelusi D, Ding W (2019) Group incremental adaptive clustering based on neural network and rough set theory for crime report categorization. Neurocomputing. https:\/\/doi.org\/10.1016\/j.neucom.2019.10.109","DOI":"10.1016\/j.neucom.2019.10.109"},{"key":"11050_CR11","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.knosys.2018.12.017","volume":"165","author":"M Fares","year":"2019","unstructured":"Fares M, Moufarrej A, Jreij E, Tekli J, Grosky W (2019) Unsupervised word-level affect analysis and propagation in a lexical knowledge graph. Knowl Based Syst 165:432\u2013459","journal-title":"Knowl Based Syst"},{"key":"11050_CR12","doi-asserted-by":"publisher","unstructured":"Gerber M (2014) Predicting crime using twitter and kernel density estimation. Decis Support Syst 61. https:\/\/doi.org\/10.1016\/j.dss.2014.02.003","DOI":"10.1016\/j.dss.2014.02.003"},{"key":"11050_CR13","doi-asserted-by":"publisher","unstructured":"Ghankutkar S, Sarkar N, Gajbhiye P, Yadav S, Kalbande D, Bakereywala N (2019) \"modelling machine learning for Analysing crime news\", 2019 International Conference on Advances in Computing, Communication and Control (ICAC3), Mumbai, India, pp. 1\u20135, https:\/\/doi.org\/10.1109\/ICAC347590.2019.9036769.","DOI":"10.1109\/ICAC347590.2019.9036769"},{"key":"11050_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1057\/s41300-019-00082-6","volume":"22","author":"J Hardy","year":"2020","unstructured":"Hardy J, Bell P, Allan D (2020) A crime script analysis of the Madoff investment scheme. Crime Prev Community Saf 22:68\u201397","journal-title":"Crime Prev Community Saf"},{"key":"11050_CR15","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long Short-term Memory. Neural computation 9:1735\u20131780. https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural computation"},{"key":"11050_CR16","unstructured":"Jurafsky D, Martin J. (2008). Speech and language processing: an introduction to natural language processing, Computational Linguistics, and Speech Recognition"},{"key":"11050_CR17","doi-asserted-by":"publisher","unstructured":"Kumar A, Verma A, Shinde G, Sukhdeve Y, Lal N (2020). \"crime prediction using K-nearest neighboring algorithm,\" 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), Vellore, India, 2020, pp. 1\u20134, https:\/\/doi.org\/10.1109\/ic-ETITE47903.2020.155","DOI":"10.1109\/ic-ETITE47903.2020.155"},{"key":"11050_CR18","doi-asserted-by":"publisher","unstructured":"Lal, Sangeeta & Tiwari, Lipika & Ranjan, Ravi & Verma, Ayushi & Sardana, Neetu & Mourya, Rahul. (2020). \u201cAnalysis and Classification of Crime Tweets\u201d. Procedia Computer Science. 167. 1911\u20131919. https:\/\/doi.org\/10.1016\/j.procs.2020.03.211.","DOI":"10.1016\/j.procs.2020.03.211"},{"key":"11050_CR19","unstructured":"Mikolov T, Chen K, Corrado G, Dean J (2013) \u201cEfficient estimation of word representations in vector space\u201d, CoRR (2013) 1\u201312 abs\/ 1301.3781."},{"key":"11050_CR20","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado G, Dean J (2013) \u201cDistributed representations of words and phrases and their compositionality\u201d, in: Proceedings of the 26th International Conference on Neural Information Processing Systems, Se- ries = NIPS\u201913, Vol. 2, 2013, pp. 3111\u20133119. abs\/ 1310.4546."},{"key":"11050_CR21","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.aci.2017.07.003","volume":"14","author":"K Munir","year":"2018","unstructured":"Munir K, Anjum MS (2018) The use of ontologies for effective knowledge modelling and information retrieval. Applied Computing and Informatics 14:116\u2013126","journal-title":"Applied Computing and Informatics"},{"key":"11050_CR22","doi-asserted-by":"crossref","unstructured":"Nair S, Soniminde S, Sureshbabu S, Tamhankar A, Kulkarni S, (2019). \u201cAssist Crime Prevention Using Machine Learning\u201d. Proceedings 2019: Conference on Technologies for Future Cities (CTFC).","DOI":"10.2139\/ssrn.3349683"},{"key":"11050_CR23","doi-asserted-by":"crossref","unstructured":"Noormanshah WMU, Nohuddin PNE, Zainol Z (2020) \u201cDocument content analysis based on random Forest algorithm\u201d. In: Peng SL., son L., Suseendran G., Balaganesh D. (eds) intelligent computing and innovation on data science. Lecture notes in networks and systems, vol 118. Springer, Singapore","DOI":"10.1007\/978-981-15-3284-9_55"},{"key":"11050_CR24","doi-asserted-by":"publisher","unstructured":"Pangestuti D, Herdiani A, Selviandro N (2019) \u201cAnalysis and implementation of ontology based text classification on criminality digital news\u201d. IOP conference series: materials science and engineering. 662. 022135. https:\/\/doi.org\/10.1088\/1757-899X\/662\/2\/022135.","DOI":"10.1088\/1757-899X\/662\/2\/022135"},{"key":"11050_CR25","doi-asserted-by":"crossref","unstructured":"Pennington J, Socher R, Manning C (2014). \u201cGlove: global vectors for word representation\u201d, in: proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), 2014, pp. 1532\u20131543","DOI":"10.3115\/v1\/D14-1162"},{"key":"11050_CR26","doi-asserted-by":"publisher","unstructured":"Priandini N, Zaman B, Purwanti E (2017). Categorizing document by fuzzy C-Means and K-nearest neighbors approach. AIP Conference Proceedings. 1867. 020012. https:\/\/doi.org\/10.1063\/1.4994415.","DOI":"10.1063\/1.4994415"},{"key":"11050_CR27","doi-asserted-by":"crossref","unstructured":"Ramasubbareddy S, Aditya Sai Srinivas T, Govinda K, Manivannan SS (2020). Crime prediction system. In: Saini H., Sayal R., Buyya R., Aliseri G. (eds) innovations in computer science and engineering. Lecture notes in networks and systems, vol 103. Springer, Singapore","DOI":"10.1007\/978-981-15-2043-3_16"},{"key":"11050_CR28","doi-asserted-by":"crossref","unstructured":"Saha R, Naskar A, Dasgupta T, and Dey L (2020) \u201cA System for Analysis, Visualization and Retrieval of Crime Documents\u201d. In Proceedings of the 7th ACM IKDD CoDS and 25th COMAD (CoDS COMAD 2020). Association for Computing Machinery, New York, NY, USA, 317\u2013321.","DOI":"10.1145\/3371158.3371405"},{"issue":"2","key":"11050_CR29","first-page":"78","volume":"6","author":"F Soleimanian Gharehchopogh","year":"2020","unstructured":"Soleimanian Gharehchopogh F, Haggi S (2020) An optimization K-modes clustering algorithm with elephant herding optimization algorithm for crime clustering. Journal of Advances in Computer Engineering and Technology 6(2):78\u201387","journal-title":"Journal of Advances in Computer Engineering and Technology"},{"key":"11050_CR30","doi-asserted-by":"crossref","unstructured":"Sreejith AG, Lansy A, Krishna KSA, Haran VJ, Rakhee M (2020). Crime analysis and prediction using graph mining. In: Ranganathan G., Chen J., Rocha \u00c1. (eds) inventive communication and computational technologies. Lecture notes in networks and systems, vol 89. Springer, Singapore","DOI":"10.1007\/978-981-15-0146-3_65"},{"key":"11050_CR31","doi-asserted-by":"crossref","unstructured":"Sundhara Kumar KB, Bhalaji N. (2020) A Novel Hybrid RNN-ELM Architecture for Crime Classification. In: Smys S., Senjyu T., Lafata P. (eds) Second International Conference on Computer Networks and Communication Technologies. ICCNCT 2019. Lecture notes on data engineering and communications technologies, vol 44. Springer, Cham","DOI":"10.1007\/978-3-030-37051-0_98"},{"key":"11050_CR32","doi-asserted-by":"publisher","unstructured":"Thilagam P, Karur S (2019) Crime base: Towards building a knowledge base for crime entities and their relationships from online news papers. Information Processing & Management:56. https:\/\/doi.org\/10.1016\/j.ipm.2019.102059","DOI":"10.1016\/j.ipm.2019.102059"},{"key":"11050_CR33","doi-asserted-by":"crossref","unstructured":"Wang P, Yu F, Niu S, Yang Z, Zhang Y, Guo J. 2019. Hierarchical matching network for crime classification. In proceedings of the 42nd international ACM SIGIR conference on Research and Development in information retrieval (SIGIR\u201919). Association for Computing Machinery, New York, NY, USA, 325\u2013334.","DOI":"10.1145\/3331184.3331223"},{"key":"11050_CR34","doi-asserted-by":"crossref","unstructured":"Wang M, Cai Q, Wang L, Li J, Wang X. (2020) \"Chinese news text classification based on attention-based CNN-BiLSTM\", proc. SPIE 11430, MIPPR 2019: pattern recognition and computer vision","DOI":"10.1117\/12.2538132"},{"key":"11050_CR35","doi-asserted-by":"crossref","unstructured":"Zaidi NAS, Mustapha A, Mostafa SA, Razali MN (2020) \u201cA classification approach for crime prediction\u201d. Communications in Computer and Information Science, 68\u201378.","DOI":"10.1007\/978-3-030-38752-5_6"},{"key":"11050_CR36","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/s10489-019-01531-3","volume":"50","author":"Z Zhang","year":"2020","unstructured":"Zhang Z, Huang J, Hao J et al (2020) Extracting relations of crime rates through fuzzy association rules mining. Appl Intell 50:448\u2013467","journal-title":"Appl Intell"},{"key":"11050_CR37","doi-asserted-by":"crossref","unstructured":"Haoxi Zhong, Guo Zhipeng, Cunchao Tu, Chaojun Xiao, Zhiyuan Liu, and Maosong Sun. 2018. Legal Judgment Prediction via Topological Learning. In Proceedings of the 2018 Conference on empirical methods in natural language processing. Association for Computational Linguistics, 3540\u20133549.","DOI":"10.18653\/v1\/D18-1390"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11050-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11050-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11050-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,24]],"date-time":"2021-07-24T15:24:52Z","timestamp":1627140292000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11050-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,28]]},"references-count":37,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["11050"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11050-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,28]]},"assertion":[{"value":"21 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}