{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:56:15Z","timestamp":1773932175645,"version":"3.50.1"},"reference-count":82,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3531655","type":"journal-article","created":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:59:11Z","timestamp":1737399551000},"page":"29406-29431","source":"Crossref","is-referenced-by-count":2,"title":["Offender Characterization and Prediction: A Case Study of the Kingdom of Bahrain"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4319-3432","authenticated-orcid":false,"given":"Ebrahim Jaffar","family":"Alasfoor","sequence":"first","affiliation":[{"name":"Royal Academy of Police, Ministry of Interior, Manama, Bahrain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1350-8933","authenticated-orcid":false,"given":"Omar","family":"Alshaikh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9930-8117","authenticated-orcid":false,"given":"Isa","family":"Inuwa-Dutse","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8613-8200","authenticated-orcid":false,"given":"Saad","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1747-9914","authenticated-orcid":false,"given":"Simon","family":"Parkinson","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Huddersfield, Huddersfield, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/ojls\/gqm018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2022-0223"},{"issue":"6","key":"ref3","first-page":"603","article-title":"Criminological perspective of street crime","volume":"12","author":"Siregar","year":"2020","journal-title":"J. Adv. Res. Dyn. Control Systems-JARDCS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3028420"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0260-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/iiai-aai.2017.46"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/imitec50163.2020.9334069"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3286344"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3075140"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-020-00122-9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-024-00242-6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022808"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2015.1077710"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2023.301637"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icac49085.2019.9103425"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/IJOCI.2020040103"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1609\/icaps.v33i1.27230"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/icaps.v29i1.3520"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103694"},{"issue":"2","key":"ref20","first-page":"293","article-title":"Big data, data mining, machine learning, and deep learning concepts in crime data","volume":"8","author":"G\u00fczel","year":"2021","journal-title":"Ceza Hukuku Ve Kriminoloji Dergisi"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5121\/mlaij.2015.2101"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/iccmc53470.2022.9754066"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/iccst55948.2022.10040319"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.56726\/irjmets30223"},{"issue":"1","key":"ref25","first-page":"1","article-title":"Crime tracking system and people\u2019s safety in India using machine learning approaches","volume":"2","author":"Gupta","year":"2022","journal-title":"Int. J. Modern Res."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/02529203.2019.1639963"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939736"},{"issue":"10","key":"ref28","first-page":"106","article-title":"Application of machine learning algorithms in crime classification and classification rule mining","volume":"4","author":"Saeed","year":"2015","journal-title":"Res. J. Recent Sci."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11292-017-9286-2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10614-018-9821-x"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10940-020-09457-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3368691.3368731"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WiDS-PSU54548.2022.00016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97181-0_9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2018.8614828"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN53446.2022.9687156"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TOCS56154.2022.10016034"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE51582.2022.9831620"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ic-ETITE47903.2020.155"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CINE.2017.18"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3086230"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.seps.2021.101043"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TEMSCON47658.2020.9140074"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1186\/s42492-021-00075-z"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2017.8229823"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2019.0225"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSBA53075.2021.00011"},{"key":"ref48","volume-title":"R for Data Science: Import, Tidy, Transform, Visualize, and Model Data","author":"Wickham","year":"2016"},{"key":"ref49","first-page":"1","article-title":"Exploratory data analysis and crime prediction for smart cities","volume":"12","author":"Pradhan","year":"2019","journal-title":"Assoc. Comput. Machinery"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00516-9"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2868729"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.23919\/mipro48935.2020.9245120"},{"issue":"2","key":"ref53","article-title":"Classification vs regression in overparameterized regimes: Does the loss function matter?","volume":"22","author":"Muthukumar","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00332-z"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7993-3_565-2"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2018.08.003"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11192"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.11.004"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3416045"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcrimjus.2019.101627"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-023-04530-y"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1177\/1098611116667279"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.sj.8350066"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.587943"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1108\/JCP-09-2019-0032"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1063\/1.4822400"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/msr.2019.00077"},{"issue":"9","key":"ref68","first-page":"1","article-title":"Pandas: A foundational Python library for data analysis and statistics","volume":"14","author":"McKinney","year":"2011","journal-title":"Python High Perform. Sci. Comput."},{"issue":"1","key":"ref69","first-page":"2770","article-title":"Comparative analysis of data visualization libraries Matplotlib and Seaborn in Python","volume":"10","author":"Sial","year":"2021","journal-title":"Int. J. Adv. Trends Comput. Sci. Eng."},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/comptelix.2017.8004032"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.4236\/jdaip.2020.84020"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04020-7_57"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34062-8_32"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.17577\/ijertv9is020280"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-031219-041110"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.33899\/csmj.2020.164682"},{"key":"ref77","first-page":"41","article-title":"An empirical study of the naive Bayes classifier","volume-title":"Proc. IJCAI Workshop Empirical Methods Artif. Intell.","author":"Rish"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-05297-6"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.11919\/j.issn.1002\u20130829.215044"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1278"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/s0020-0255(02)00197-4"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1002\/9781119711629.ch6"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10845753.pdf?arnumber=10845753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:43:22Z","timestamp":1740084202000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10845753\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":82,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3531655","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}