{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:36:53Z","timestamp":1775745413323,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275858","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T21:27:30Z","timestamp":1443475650000},"page":"1701-1710","source":"Crossref","is-referenced-by-count":28,"title":["Hybrid approach to crime prediction using deep learning"],"prefix":"10.1109","author":[{"given":"Jazeem","family":"Azeez","sequence":"first","affiliation":[]},{"given":"D. John","family":"Aravindhar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433431"},{"key":"ref3","article-title":"Crime Hot-Spots Prediction Using Support Vector Machine","year":"0","journal-title":"Keivan Kianmehr Department of Computer Science University of Calgary 2006 IEEE"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.155"},{"key":"ref6","article-title":"Data Mining and Analysis of Large Scale Time Series Network Data","year":"0","journal-title":"Patricia Morreale Department of Computer Science Kean University Union 2013 27th International Conference on Advanced Information Networking and Applications Workshops"},{"key":"ref11","article-title":"Automatic Crime Prediction using Events Extracted from Twitter Posts","author":"wang","year":"2012","journal-title":"ACM International Conference on Advances in Social Networks Analysis"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500273"},{"key":"ref12","article-title":"Deep Learning and Its Applications to Signal and Information Processing","volume":"28","author":"yu","year":"0","journal-title":"Microsoft Res Redmond WA USA Li Deng Signal Processing Magazine IEEE"},{"key":"ref8","article-title":"Crime Pattern Detection Using Data Mining","author":"varan","year":"0","journal-title":"Nath Florida Atlantic University\/Oracle Corporation 2006 IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology"},{"key":"ref7","article-title":"Crime Using the ARIMA Model","author":"chen","year":"0","journal-title":"Fifth International Conference on Fuzzy Systems and Knowledge Discovery Forecasting"},{"key":"ref2","author":"liu","year":"2003","journal-title":"International Institute of Forecasters Published by Elsevier B V"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.63"},{"key":"ref1","article-title":"Proactive Spatiotemporal Resource Allocation and Predictive Visual Analytics for Community Policing and Law Enforcement","author":"malik","year":"2013","journal-title":"IEEE Transactions on Visualization and Computer Graphics"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Kochi, India","start":{"date-parts":[[2015,8,10]]},"end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275858.pdf?arnumber=7275858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T06:20:15Z","timestamp":1490422815000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275858","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}