{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:12:38Z","timestamp":1730297558386,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/snams.2018.8554740","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:03:09Z","timestamp":1543885389000},"page":"302-308","source":"Crossref","is-referenced-by-count":1,"title":["Child Maltreatment Forecast Using Bigdata Intelligent Approaches"],"prefix":"10.1109","author":[{"given":"Abdurazzag A","family":"Aburas","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Hilary","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Shreshtha","family":"Batshu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref33"},{"year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/1043946042000338922"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/15548732.2016.1209149"},{"journal-title":"SQL (Structured Query Language)","year":"0","author":"rouse","key":"ref10"},{"journal-title":"Government explains new Children's Act","year":"0","key":"ref11"},{"journal-title":"Artists Bar graph Depicting statistics of Abuse","year":"2018","author":"batshu","key":"ref12"},{"year":"0","author":"putnam-hornstein","key":"ref13"},{"journal-title":"Artists Reports 2010-2017 grouped by province","year":"2018","author":"lin","key":"ref14"},{"journal-title":"Artists Forecast 2018-2020","year":"2018","author":"lin","key":"ref15"},{"journal-title":"Descriptive Analytics","year":"0","author":"rouse","key":"ref16"},{"journal-title":"Descriptive Predictive and Prescriptive Analytics Explained","year":"0","key":"ref17"},{"journal-title":"Machine learning technique for finding hidden patterns or intrinsic structures in data","year":"0","key":"ref18"},{"journal-title":"A comparative study of decision tree ID3 and C4 5","year":"0","author":"hssina","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2010.5561610"},{"journal-title":"Data locality in Hadoop The Most Comprehensive Guide","year":"0","key":"ref4"},{"year":"0","key":"ref27"},{"journal-title":"HDFS Apache Hadoop Distributed File System","year":"0","key":"ref3"},{"journal-title":"IBM","year":"2014","author":"kawa","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.42"},{"journal-title":"Techopedia","year":"0","key":"ref5"},{"journal-title":"NDACAN","year":"0","key":"ref8"},{"journal-title":"Building the Business Case for Big Data","year":"2013","author":"krishnan","key":"ref7"},{"journal-title":"Big Data What Is Hadoop - An Easy Explanation For Absolutely Anyone","year":"0","author":"marr","key":"ref2"},{"journal-title":"HIPPO CMS APPLICATION ARCHITECTURE","year":"0","key":"ref9"},{"journal-title":"The Child Welfare System Kids Falling Through the Cracks","year":"0","author":"mclaughlin","key":"ref1"},{"journal-title":"Response Time [Art]","year":"2018","key":"ref20"},{"journal-title":"A beginner's tutorial on the apriori algorithm in data mining with R implementation","year":"0","author":"jain","key":"ref22"},{"key":"ref21","first-page":"11","article-title":"Decision Tree and Naive Bayes Algorithm for Classification and Generation of Actionable Knowledge for Direct Marketing","volume":"vi","author":"karim","year":"2013","journal-title":"Journal of Software Engineering and Applications"},{"journal-title":"A beginner's tutorial on the apriori algorithm in data mining with R implementation","year":"0","author":"jain","key":"ref24"},{"journal-title":"Mining Frequent Itemsets using the Apriori Algorithm","year":"0","author":"srikant","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/359634"},{"journal-title":"C4 5 Decision Tree Implementation","year":"0","key":"ref25"}],"event":{"name":"2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)","start":{"date-parts":[[2018,10,15]]},"location":"Valencia","end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536820\/8554420\/08554740.pdf?arnumber=8554740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:05:10Z","timestamp":1643288710000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/snams.2018.8554740","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}