{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T01:06:28Z","timestamp":1773795988312,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T00:00:00Z","timestamp":1740009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Artif Intell"],"DOI":"10.1007\/s44163-025-00234-8","type":"journal-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T13:58:45Z","timestamp":1740059925000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Uncertain crime data analysis using hybrid approach"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4058-3215","authenticated-orcid":false,"given":"Dileep Kumar","family":"Kadali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1457-0824","authenticated-orcid":false,"given":"R. N. V. Jagan","family":"Mohan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1279-8884","authenticated-orcid":false,"given":"M. Chandra","family":"Naik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,20]]},"reference":[{"issue":"5","key":"234_CR1","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1177\/0093854819826109","volume":"46","author":"MJ Eisenberg","year":"2019","unstructured":"Eisenberg MJ, et al. Static and dynamic predictors of general and violent criminal offense recidivism in the forensic outpatient population: a meta-analysis. Crim Justice Behav. 2019;46(5):732\u201350. https:\/\/doi.org\/10.1177\/0093854819826109.","journal-title":"Crim Justice Behav"},{"key":"234_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/2086185","volume":"2020","author":"M Aslam","year":"2020","unstructured":"Aslam M, Arif OH, Sherwani RAK. New diagnosis test under the neutrosophic statistics: an application to diabetic patients. Biomed Res Int. 2020;2020:1\u20137. https:\/\/doi.org\/10.1155\/2020\/2086185.","journal-title":"Biomed Res Int"},{"key":"234_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1002\/cpe.6973","volume":"34","author":"NVJM Remani","year":"2022","unstructured":"Remani NVJM, Naresh VS, Reddi S, Kumar KD. Crime data optimization using neutrosophic logic based game theory. Concurr Comput. 2022;34:15. https:\/\/doi.org\/10.1002\/cpe.6973.","journal-title":"Concurr Comput"},{"key":"234_CR4","doi-asserted-by":"publisher","unstructured":"D. K. Kadali, M. C. Naik, and R. N. V. J. Mohan, \u201cEstimation of data parameters using cluster optimization. in Lecture notes on data engineering and communications technologies, 2022, pp. 331\u2013342. https:\/\/doi.org\/10.1007\/978-981-19-2600-6_23. https:\/\/solidstatetechnology.us\/index.php\/JSST\/article\/view\/5760","DOI":"10.1007\/978-981-19-2600-6_23"},{"issue":"6","key":"234_CR5","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1080\/00450618.2022.2104370","volume":"55","author":"N Georgiou","year":"2022","unstructured":"Georgiou N, Morgan RM, French JC. The shifting narrative of uncertainty: a case for the coherent and consistent consideration of uncertainty in forensic science. Aust J Forensic Sci. 2022;55(6):781\u201397. https:\/\/doi.org\/10.1080\/00450618.2022.2104370.","journal-title":"Aust J Forensic Sci"},{"key":"234_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.11591\/ij-ict.v2i1.1779A","volume":"2","author":"RJ Mohan","year":"2021","unstructured":"Mohan RJ, Rao KR. Efficient K-Means fuzzy cluster reliability on angle oriented face recognition. Int J Inform Commun Technol. 2021;2:1. https:\/\/doi.org\/10.11591\/ij-ict.v2i1.1779A.","journal-title":"Int J Inform Commun Technol"},{"key":"234_CR7","doi-asserted-by":"publisher","first-page":"67488","DOI":"10.1109\/access.2021.3075140","volume":"9","author":"SS Kshatri","year":"2021","unstructured":"Kshatri SS, Singh D, Narain B, Bhatia S, Quasim MT, Sinha GR. An empirical analysis of machine learning algorithms for crime prediction using stacked generalization: an ensemble approach. IEEE Access. 2021;9:67488\u2013500. https:\/\/doi.org\/10.1109\/access.2021.3075140.","journal-title":"IEEE Access"},{"issue":"1","key":"234_CR8","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1093\/sf\/soaa102","volume":"100","author":"L Jacobs","year":"2020","unstructured":"Jacobs L, Van Spanje J. A Time-Series analysis of Contextual-Level effects on hate crime in the Netherlands. Soc Forces. 2020;100(1):169\u201393. https:\/\/doi.org\/10.1093\/sf\/soaa102.","journal-title":"Soc Forces"},{"issue":"23","key":"234_CR9","doi-asserted-by":"publisher","first-page":"2984","DOI":"10.3390\/electronics10232984","volume":"10","author":"M Mohamad","year":"2021","unstructured":"Mohamad M, Selamat A, Krejcar O, Crespo RG, Herrera-Viedma E, Fujita H. Enhancing big data feature selection using a hybrid Correlation-Based feature selection. Electronics. 2021;10(23):2984. https:\/\/doi.org\/10.3390\/electronics10232984.","journal-title":"Electronics"},{"issue":"4","key":"234_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.25103\/jestr.164.05","volume":"16","author":"DK Kadali","year":"2023","unstructured":"Kadali DK, Mohan RNVJ, Naik MC. Enhancing crime cluster reliability using neutrosophic logic and a Three-Stage model. J Eng Sci Technol Rev. 2023;16(4):35\u201340. https:\/\/doi.org\/10.25103\/jestr.164.05.","journal-title":"J Eng Sci Technol Rev"},{"issue":"3","key":"234_CR11","doi-asserted-by":"publisher","first-page":"2887","DOI":"10.1007\/s12652-023-04530-y","volume":"14","author":"K Jenga","year":"2023","unstructured":"Jenga K, Catal C, Kar G. Machine learning in crime prediction. J Amb Intell Human Comp. 2023;14(3):2887\u2013913. https:\/\/doi.org\/10.1007\/s12652-023-04530-y.","journal-title":"J Amb Intell Human Comp"},{"key":"234_CR12","unstructured":"Muzaffar, M. T. Nafis, and S. S. Sohail, \u201cNeutrosophy Logic and its Classification: An Overview,\u201d UNM Digital Repository. https:\/\/digitalrepository.unm.edu\/nss_journal\/vol35\/iss1\/15\/"},{"issue":"3","key":"234_CR13","doi-asserted-by":"publisher","first-page":"56","DOI":"10.18280\/rces.060302","volume":"6","author":"A Falade","year":"2019","unstructured":"Falade A, Azeta A, Oni A, Odun-Ayo I. Systematic literature review of crime prediction and data mining. Rev Comp Eng Stud. 2019;6(3):56\u201363. https:\/\/doi.org\/10.18280\/rces.060302.","journal-title":"Rev Comp Eng Stud"},{"key":"234_CR14","doi-asserted-by":"publisher","unstructured":"D. K. Kadali and R. N. V. J. Mohan, \u201cShortest route analysis for High-Level Slotting using Peer-to-Peer,\u201d in Apple Academic Press eBooks, 2022, pp. 113\u2013122. https:\/\/doi.org\/10.1201\/9781003048367-10.","DOI":"10.1201\/9781003048367-10"},{"key":"234_CR15","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.procs.2020.05.018","volume":"172","author":"SR Bandekar","year":"2020","unstructured":"Bandekar SR, Vijayalakshmi C. Design and analysis of machine learning algorithms for the reduction of crime rates in India. Procedia Computer Sci. 2020;172:122\u20137. https:\/\/doi.org\/10.1016\/j.procs.2020.05.018.","journal-title":"Procedia Computer Sci"},{"key":"234_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106286","volume":"141","author":"M Abdel-Basset","year":"2020","unstructured":"Abdel-Basset M, Ali M, Atef A. Uncertainty assessments of linear time-cost tradeoffs using neutrosophic set. Comput Ind Eng. 2020;141: 106286. https:\/\/doi.org\/10.1016\/j.cie.2020.106286.","journal-title":"Comput Ind Eng"},{"key":"234_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jisys-2022-0223","volume":"32","author":"RM Saeed","year":"2023","unstructured":"Saeed RM, Abdulmohsin HA. A study on predicting crime rates through machine learning and data mining using text. J Intell Syst. 2023;32:1. https:\/\/doi.org\/10.1515\/jisys-2022-0223.","journal-title":"J Intell Syst"},{"key":"234_CR18","doi-asserted-by":"publisher","unstructured":"Aarthi S, Samyuktha M, Sahana M. Crime hotspot detection with clustering algorithm using data mining. 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 2019, https:\/\/doi.org\/10.1109\/icoei.2019.8862587.","DOI":"10.1109\/icoei.2019.8862587"},{"key":"234_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jisys-2022-0223","volume":"32","author":"RM Saeed","year":"2023","unstructured":"Saeed RM, Abdulmohsin HA. A study on predicting crime rates through machine learning and data mining using text. J Intell Syst. 2023;32:1. https:\/\/doi.org\/10.1515\/jisys-2022-0223.","journal-title":"J Intell Syst"},{"key":"234_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/wi.2018.00016","author":"C Segovia","year":"2018","unstructured":"Segovia C, Smith-Miles K. Integrating game theory and data mining for dynamic distribution of police to combat crime. IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). 2018. https:\/\/doi.org\/10.1109\/wi.2018.00016.","journal-title":"IEEE\/WIC\/ACM International Conference on Web Intelligence (WI)"},{"issue":"4","key":"234_CR21","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1080\/07418825.2019.1666903","volume":"38","author":"R Lu","year":"2019","unstructured":"Lu R, et al. The cannabis Effect on Crime: Time-Series analysis of crime in Colorado and Washington State. Justice Q. 2019;38(4):565\u201395. https:\/\/doi.org\/10.1080\/07418825.2019.1666903.","journal-title":"Justice Q"},{"key":"234_CR22","doi-asserted-by":"publisher","unstructured":"Ghosal, A. Nandy, A. K. Das, S. Goswami, and M. Panday, \u201cA short review on different clustering techniques and their applications,\u201d in Advances in intelligent systems and computing, 2019, pp. 69\u201383. https:\/\/doi.org\/10.1007\/978-981-13-7403-6_9.","DOI":"10.1007\/978-981-13-7403-6_9"}],"container-title":["Discover Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00234-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44163-025-00234-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44163-025-00234-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T13:58:48Z","timestamp":1740059928000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44163-025-00234-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":22,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["234"],"URL":"https:\/\/doi.org\/10.1007\/s44163-025-00234-8","relation":{},"ISSN":["2731-0809"],"issn-type":[{"value":"2731-0809","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,20]]},"assertion":[{"value":"5 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No humans or animals are involved in the research.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and\/or animals"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"15"}}