{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:32:35Z","timestamp":1773246755159,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T00:00:00Z","timestamp":1668038400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,10]],"date-time":"2022-11-10T00:00:00Z","timestamp":1668038400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,10]]},"DOI":"10.1109\/csit56902.2022.10000587","type":"proceedings-article","created":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T19:14:26Z","timestamp":1672686866000},"page":"165-171","source":"Crossref","is-referenced-by-count":3,"title":["Relationships Knowledge Graphs Construction Between Evidence Based on Crime Reports"],"prefix":"10.1109","author":[{"given":"Svitlana","family":"Mazepa","sequence":"first","affiliation":[{"name":"West Ukrainian National University,Criminal Law and Procedure Department,Ternopil,Ukraine"}]},{"given":"Victoria","family":"Vysotska","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Lviv,Ukraine"}]},{"given":"Danylo","family":"Ivanchyshyn","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Information Systems and Networks Department,Lviv,Ukraine"}]},{"given":"Lyubomyr","family":"Chyrun","sequence":"additional","affiliation":[{"name":"Ivan Franko National University of Lviv,Applied Mathematics Department,Lviv,Ukraine"}]},{"given":"Vadim","family":"Schuchmann","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Software Engineering Department,Ternopil,Ukraine"}]},{"given":"Yuriy","family":"Ryshkovets","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Information Systems and Networks Department,Lviv,Ukraine"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-007-9078-0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IATW.2006.55"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1297301"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2010.12.143"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s40163-017-0074-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858207"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2018.01.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM.2017.8217766"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1061"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/088740349900900302"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/su10040995"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015906134"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW51313.2020.00115"},{"key":"ref14","volume-title":"Text Mining for Social Harm and Criminal Justice Applications","author":"Pandey","year":"2020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587384"},{"key":"ref16","article-title":"AI meets criminology: an nlp tool for criminal investigations","author":"Himmiche","journal-title":"AL Akhawayn University 2021"},{"key":"ref17","first-page":"311","article-title":"A comparative analysis for English and Ukrainian texts processing based on semantics and syntax approach","volume-title":"CEUR Workshop Proceedings","volume":"2870","author":"Vysotska"},{"key":"ref18","first-page":"26","article-title":"Knowledge Representation and Automated Formal Reasoning in Description Logic ALC","volume-title":"CEUR Workshop Proceedings","volume":"2917","author":"Lenko"},{"key":"ref19","first-page":"413","article-title":"Knowledge Based Situation Awareness Process Based on Ontologies","volume-title":"CEUR Workshop Proceedings","volume":"2870","author":"Burov"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33695-0_2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/STC-CSIT.2018.8526760"},{"key":"ref22","first-page":"1583","article-title":"Architecture of Online Automated Knowledge Testing Systems","volume-title":"CEUR Workshop Proceedings","volume":"3171","author":"Khavalko"},{"key":"ref23","first-page":"126","article-title":"The axiomatic-deductive strategy of knowledge organization in onto-based e-learning systems for Chinese image medicine","volume-title":"CEUR Workshop Proceedings","volume":"2255","author":"Lupenko"},{"key":"ref24","first-page":"1708","article-title":"Current Trends in Knowledge Management: Problems and Challenges","volume-title":"CEUR Workshop Proceedings","volume":"3171","author":"Miroshnyk"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DSMP47368.2020.9204321"},{"key":"ref26","first-page":"1184","article-title":"Methods of Adaptive Knowledge Testing Based on the Theory of Logical Networks","volume-title":"CEUR Workshop Proceedings","volume":"2870","author":"Shubin"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT52158.2021.9548394"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92435-5_27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/STC-CSIT.2019.8929868"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45991-2_14"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CSIT49958.2020.9321943"}],"event":{"name":"2022 IEEE 17th International Conference on Computer Sciences and Information Technologies (CSIT)","location":"Lviv, Ukraine","start":{"date-parts":[[2022,11,10]]},"end":{"date-parts":[[2022,11,12]]}},"container-title":["2022 IEEE 17th International Conference on Computer Sciences and Information Technologies (CSIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10000061\/10000064\/10000587.pdf?arnumber=10000587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T04:56:22Z","timestamp":1712984182000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10000587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/csit56902.2022.10000587","relation":{},"subject":[],"published":{"date-parts":[[2022,11,10]]}}}