{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:50:47Z","timestamp":1767340247008,"version":"3.41.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T00:00:00Z","timestamp":1722211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19780-x","type":"journal-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T04:01:31Z","timestamp":1722225691000},"page":"21175-21202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Analysis &amp; forecasting of juvenile crime using variance threshold and time series algorithm"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7492-7779","authenticated-orcid":false,"given":"Harshita","family":"Jain","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ravindra","family":"Patel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,7,29]]},"reference":[{"key":"19780_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.procs.2020.05.018","volume":"172","author":"S Bandekar","year":"2020","unstructured":"Bandekar S, Vijayalakshmi C (2020) Design and analysis of machine learning algorithms for the reduction of crime rates in India. Procedia Comput Sci 172:122\u2013127. https:\/\/doi.org\/10.1016\/j.procs.2020.05.018","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"19780_CR2","doi-asserted-by":"publisher","first-page":"95","DOI":"10.47760\/ijcsmc.2022.v11i03.011","volume":"11","author":"V Balu","year":"2022","unstructured":"Balu V, Navya Sri T, Bupathi MA (2022) Crime prediction and analysis using machine learning. Int J Comput Sci Mob Comput 11(3):95\u2013101. https:\/\/doi.org\/10.47760\/ijcsmc.2022.v11i03.011","journal-title":"Int J Comput Sci Mob Comput"},{"key":"19780_CR3","doi-asserted-by":"publisher","unstructured":"Borowik G, Wawrzyniak ZM, Cichosz P (2018) Time series analysis for crime forecasting. In: 2018 26th International Conference on Systems Engineering (ICSEng), pp 1\u201310. https:\/\/doi.org\/10.1109\/ICSENG.2018.8638179","DOI":"10.1109\/ICSENG.2018.8638179"},{"key":"19780_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-07971-x","author":"AM Buttar","year":"2023","unstructured":"Buttar AM, Bano M, Akbar MA, Alabrah A, Gumaei AH (2023) Toward trustworthy human suspicious activity detection from surveillance videos using deep learning. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-023-07971-x","journal-title":"Soft Comput"},{"issue":"3","key":"19780_CR5","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.5194\/gmd-7-1247-2014","volume":"7","author":"T Chai","year":"2014","unstructured":"Chai T, Draxler RR (2014) Root mean square error (RMSE) or mean absolute error (MAE)? -Arguments against avoiding RMSE in the literature. Geosci Model Dev 7(3):1247\u20131250. https:\/\/doi.org\/10.5194\/gmd-7-1247-2014","journal-title":"Geosci Model Dev"},{"key":"19780_CR6","doi-asserted-by":"publisher","unstructured":"Chen P, Yuan H, Shu X (2008) Forecasting crime using the ARIMA model. In: Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, vol 5. pp 627\u2013630. https:\/\/doi.org\/10.1109\/FSKD.2008.222","DOI":"10.1109\/FSKD.2008.222"},{"issue":"2","key":"19780_CR7","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1093\/biomet\/76.2.297","volume":"76","author":"CM Hurvich","year":"1989","unstructured":"Hurvich CM, Tsai CL (1989) Regression and time series model selection in small samples. Biometrika 76(2):297\u2013307. https:\/\/doi.org\/10.1093\/biomet\/76.2.297","journal-title":"Biometrika"},{"issue":"3","key":"19780_CR8","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1177\/0022427819878220","volume":"57","author":"JE Copp","year":"2020","unstructured":"Copp JE, Giordano PC, Longmore MA, Manning WD (2020) Desistance from crime during the transition to adulthood: the influence of parents, peers, and shifts in identity. J Res Crime Delinq 57(3):294\u2013332. https:\/\/doi.org\/10.1177\/0022427819878220","journal-title":"J Res Crime Delinq"},{"key":"19780_CR9","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-981-10-8055-5_18","volume-title":"Application of classification techniques for prediction and analysis of crime in India","author":"P Das","year":"2019","unstructured":"Das P, Das A (2019) Application of classification techniques for prediction and analysis of crime in India, pp 191\u2013201. https:\/\/doi.org\/10.1007\/978-981-10-8055-5_18"},{"key":"19780_CR10","doi-asserted-by":"publisher","DOI":"10.1177\/0306624X231188231","author":"DP Farrington","year":"2023","unstructured":"Farrington DP, Malvaso CG (2023) Interactions between child-rearing and other risk factors in predicting delinquency, and implications for prevention. Int J Offender Ther Comp Criminol [Internet]. https:\/\/doi.org\/10.1177\/0306624X231188231","journal-title":"Int J Offender Ther Comp Criminol [Internet]"},{"key":"19780_CR11","doi-asserted-by":"publisher","unstructured":"Al Fatih Abil Fida M, Ahmad T, Ntahobari M (2021) Variance threshold as early screening to Boruta feature selection for intrusion detection system. In: 2021 13th International Conference on Information & Communication Technology and System (ICTS). pp 46\u201350. https:\/\/doi.org\/10.1109\/ICTS52701.2021.9608852","DOI":"10.1109\/ICTS52701.2021.9608852"},{"issue":"1","key":"19780_CR12","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/S0360-8352(98)00066-7","volume":"35","author":"SL Ho","year":"1998","unstructured":"Ho SL, Xie M (1998) The use of ARIMA models for reliability forecasting and analysis. Comput Ind Eng [Internet] 35(1):213\u2013216. https:\/\/doi.org\/10.1016\/S0360-8352(98)00066-7","journal-title":"Comput Ind Eng [Internet]"},{"key":"19780_CR13","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-981-15-6648-6_22","volume-title":"Crime prediction using spatio-temporal data","author":"S Hossain","year":"2020","unstructured":"Hossain S, Abtahee A, Kashem I, Hoque M, Sarker I (2020) Crime prediction using spatio-temporal data, pp 277\u2013289. https:\/\/doi.org\/10.1007\/978-981-15-6648-6_22"},{"issue":"3","key":"19780_CR14","first-page":"221","volume":"9","author":"S Aravindan","year":"2020","unstructured":"Aravindan S, Anusuya E, Ashok Kumar M (2020) GUI based prediction of crime rate using machine learning approach. Int J Comput Sci Mob Comput 9(3):221\u2013229","journal-title":"Int J Comput Sci Mob Comput"},{"issue":"1","key":"19780_CR15","first-page":"461","volume":"8","author":"P Jha","year":"2019","unstructured":"Jha P, Jha R, Sharma A (2019) Behavior analysis and crime prediction using big data and machine learning. Int J Recent Technol Eng 8(1):461\u2013468","journal-title":"Int J Recent Technol Eng"},{"issue":"4","key":"19780_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0176244","volume":"12","author":"H-W Kang","year":"2017","unstructured":"Kang H-W, Kang H-B (2017) Prediction of crime occurrence from multi-modal data using deep learning. PLoS One [Internet] 12(4):1\u201319. https:\/\/doi.org\/10.1371\/journal.pone.0176244","journal-title":"PLoS One [Internet]"},{"key":"19780_CR17","doi-asserted-by":"publisher","unstructured":"Kim S, Joshi P, Kalsi PS, Taheri P (2019) Crime analysis through machine learning. In: 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2018. Institute of Electrical and Electronics Engineers Inc., pp 415\u2013420. https:\/\/doi.org\/10.1109\/IEMCON.2018.8614828","DOI":"10.1109\/IEMCON.2018.8614828"},{"issue":"1","key":"19780_CR18","doi-asserted-by":"publisher","first-page":"62","DOI":"10.3968\/11803","volume":"21","author":"R Li","year":"2020","unstructured":"Li R (2020) On family causes in juvenile delinquency. Studies in Literature and Language [Internet] 21(1):62\u201365. https:\/\/doi.org\/10.3968\/11803","journal-title":"Studies in Literature and Language [Internet]"},{"key":"19780_CR19","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/ICMLC.2010.5580971","volume-title":"2010 international conference on machine learning and cybernetics, ICMLC 2010, 4","author":"R Liao","year":"2010","unstructured":"Liao R, Wang X, Li L, Qin Z (2010) A novel serial crime prediction model based on Bayesian learning theory. In: 2010 international conference on machine learning and cybernetics, ICMLC 2010, 4, pp 1757\u20131762. https:\/\/doi.org\/10.1109\/ICMLC.2010.5580971"},{"key":"19780_CR20","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.neucom.2015.12.114","volume":"192","author":"A de Myttenaere","year":"2016","unstructured":"de Myttenaere A, Golden B, Le Grand B, Rossi F (2016) Mean absolute percentage error for regression models. Neurocomputing 192:38\u201348. https:\/\/doi.org\/10.1016\/j.neucom.2015.12.114","journal-title":"Neurocomputing"},{"key":"19780_CR21","unstructured":"National Crime Records Bureau. https:\/\/ncrb.gov.in\/"},{"issue":"1","key":"19780_CR22","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3923\/jas.2013.167.172","volume":"13","author":"NMM Noor","year":"2013","unstructured":"Noor NMM, Retnowardhani A, Abd ML, Saman MYM (2013) Crime forecasting using ARIMA model and fuzzy alpha-cut. J Appl Sci 13(1):167\u2013172","journal-title":"J Appl Sci"},{"key":"19780_CR23","unstructured":"Pinto M, Wei H, Konate K, Touray I. Delving into factors influencing New York crime data with the tools of machine learning*"},{"key":"19780_CR24","doi-asserted-by":"publisher","first-page":"70080","DOI":"10.1109\/ACCESS.2021.3078117","volume":"9","author":"W Safat","year":"2021","unstructured":"Safat W, Asghar S, Gillani SA (2021) Empirical analysis for crime prediction and forecasting using machine learning and deep learning techniques. IEEE Access 9:70080\u201370094. https:\/\/doi.org\/10.1109\/ACCESS.2021.3078117","journal-title":"IEEE Access"},{"key":"19780_CR25","doi-asserted-by":"publisher","unstructured":"Shah N, Bhagat N, Shah M (2021) Crime forecasting: a machine learning and computer vision approach to crime prediction and prevention. Vis Comput Ind Biomed Art 4(1). https:\/\/doi.org\/10.1186\/s42492-021-00075-z","DOI":"10.1186\/s42492-021-00075-z"},{"issue":"4","key":"19780_CR26","doi-asserted-by":"publisher","first-page":"741","DOI":"10.3390\/forecast3040046","volume":"3","author":"P Stalidis","year":"2021","unstructured":"Stalidis P, Semertzidis T, Daras P (2021) Examining deep learning architectures for crime classification and prediction. Forecasting 3(4):741\u2013762. https:\/\/doi.org\/10.3390\/forecast3040046","journal-title":"Forecasting"},{"issue":"2","key":"19780_CR27","doi-asserted-by":"publisher","first-page":"67","DOI":"10.29121\/ijetmr.v5.i2.2018.615","volume":"5","author":"D Tyagi","year":"2020","unstructured":"Tyagi D, Sharma S (2020) An approach to crime data analysis: a systematic review. Int J Eng Technol Manag Res 5(2):67\u201374. https:\/\/doi.org\/10.29121\/ijetmr.v5.i2.2018.615","journal-title":"Int J Eng Technol Manag Res"},{"issue":"4","key":"19780_CR28","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s42979-023-01816-y","volume":"4","author":"M Vivek","year":"2023","unstructured":"Vivek M, Prathap BR (2023) Spatio-temporal crime analysis and forecasting on twitter data using machine learning algorithms. SN Comput Sci 4(4):383. https:\/\/doi.org\/10.1007\/s42979-023-01816-y","journal-title":"SN Comput Sci"},{"key":"19780_CR29","doi-asserted-by":"publisher","first-page":"1087368","DOI":"10.3389\/fpsyg.2023.1087368","volume":"14","author":"S Xu","year":"2023","unstructured":"Xu S, Yu J, Hu Y (2023) Formation mechanism and prediction model of juvenile delinquency. Front Psychol 14:1087368. https:\/\/doi.org\/10.3389\/fpsyg.2023.1087368","journal-title":"Front Psychol"},{"key":"19780_CR30","unstructured":"Yaffee R, McGee M (2000) Introduction to time series analysis and forecasting: with applications of SAS and SPSS"},{"key":"19780_CR31","first-page":"1","volume-title":"The 2012 international joint conference on neural networks (IJCNN)","author":"JHF Flores","year":"2012","unstructured":"Flores JHF, Engel PM, Pinto RC (2012) Autocorrelation and partial autocorrelation functions to improve neural networks models on univariate time series forecasting. In: The 2012 international joint conference on neural networks (IJCNN), pp 1\u20138. https:\/\/api.semanticscholar.org\/CorpusID:15750048"},{"key":"19780_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2017.8524232","volume-title":"2017 IEEE international conference on computational intelligence and computing research","author":"L Yermal","year":"2018","unstructured":"Yermal L, Balasubramanian P (2018) Application of auto ARIMA model for forecasting returns on minute wise amalgamated data in NSE. In: 2017 IEEE international conference on computational intelligence and computing research, vol 2017. ICCIC. https:\/\/doi.org\/10.1109\/ICCIC.2017.8524232"},{"issue":"12","key":"19780_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2022.e12239","volume":"8","author":"L Zhao","year":"2022","unstructured":"Zhao L, Li Z, Qu L (2022) Forecasting of Beijing PM2.5 with a hybrid ARIMA model based on integrated AIC and improved GS fixed-order methods and seasonal decomposition. Heliyon 8(12):e12239. https:\/\/doi.org\/10.1016\/j.heliyon.2022.e12239","journal-title":"Heliyon"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19780-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19780-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19780-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T13:07:55Z","timestamp":1751375275000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19780-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,29]]},"references-count":33,"journal-issue":{"issue":"19","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["19780"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19780-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,7,29]]},"assertion":[{"value":"17 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors whose names are listed have NO affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}