{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:35:06Z","timestamp":1775280906608,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3075140","type":"journal-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T20:09:28Z","timestamp":1619122168000},"page":"67488-67500","source":"Crossref","is-referenced-by-count":107,"title":["An Empirical Analysis of Machine Learning Algorithms for Crime Prediction Using Stacked Generalization: An Ensemble Approach"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2773-1586","authenticated-orcid":false,"given":"Sapna Singh","family":"Kshatri","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Bhavana","family":"Narain","sequence":"additional","affiliation":[]},{"given":"Surbhi","family":"Bhatia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5546-0405","authenticated-orcid":false,"given":"Mohammad Tabrez","family":"Quasim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2384-4591","authenticated-orcid":false,"given":"G. R.","family":"Sinha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012387582-2\/50040-X"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070603"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.03.084"},{"key":"ref30","first-page":"1","article-title":"Implementation of Na&#x00EF;ve Bayes classification method for predicting purchase","author":"harahap","year":"2018","journal-title":"Proc 6th Int Conf Cyber IT Service Manage (CITSM)"},{"key":"ref35","article-title":"The random forest classifier in WEKA: Discussion and new developments for imbalanced data","author":"amrehn","year":"2018","journal-title":"arXiv 1812 08102"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00250-8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2017.8203676"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICT-ISPC.2017.8075335"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37949-9_42"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0175383"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.08.261"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJIDSS.2018.099891"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jngse.2015.02.012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2542652.2542654"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40319-4_7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CITA.2013.6637562"},{"key":"ref28","first-page":"46","article-title":"Denoising of PCG signal by using wavelet transforms","volume":"4","author":"misal","year":"2012","journal-title":"Adv Comput Res"},{"key":"ref4","first-page":"317","article-title":"Deprivation, violence, and conflict: An analysis of Naxalite activity in the districts of India","volume":"2","author":"borooah","year":"2008","journal-title":"Int J Conf Violence"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WSE.2011.6081830"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3136825.3136854"},{"key":"ref6","article-title":"Application of new deep genetic cascade ensemble of SVM classifiers to predict the Australian credit scoring","volume":"84","author":"p?awiak","year":"2019","journal-title":"Appl Soft Comput"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5120\/8184-1538"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISBAST.2014.7013130"},{"key":"ref8","first-page":"133","article-title":"Survey paper on crime prediction using ensemble approach","volume":"118","author":"almaw","year":"2018","journal-title":"Int J Pure Appl Math"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2018.00040"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/07418825.2010.486037"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.vaccine.2012.08.029"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439307298925"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2014.7300605"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(05)80023-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.10.017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.scitotenv.2018.04.040"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2010.01.002"},{"key":"ref26","article-title":"Information systems security criticality and assurance evaluation","volume":"6059","author":"mouratidis","year":"2010","journal-title":"Advances in Computer Science and Information Technology"},{"key":"ref25","first-page":"279","article-title":"Towards modeling of resilience dynamics in manufacturing enterprises: Literature review and problem formulation","author":"hu","year":"2008","journal-title":"Proc IEEE Int Conf Automat Sci Eng"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09410543.pdf?arnumber=9410543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:46Z","timestamp":1639770946000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9410543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3075140","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}