{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T04:20:32Z","timestamp":1751430032234,"version":"3.41.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/ssci.2017.8285260","type":"proceedings-article","created":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T22:52:06Z","timestamp":1518475926000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Development of crime in England and Wales 1898\u20132001: Data mining using self-organising map"],"prefix":"10.1109","author":[{"given":"Xingan","family":"Li","sequence":"first","affiliation":[]},{"given":"Henry","family":"Joutsijoki","sequence":"additional","affiliation":[]},{"given":"Jorma","family":"Laurikkala","sequence":"additional","affiliation":[]},{"given":"Martti","family":"Juhola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Great Britain and the European Integration","year":"2014","author":"sorokina","key":"ref39"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-10247-4","author":"garcia","year":"2015","journal-title":"Data Preprocessing in Data Mining"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.05.003"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1097\/00006199-200211000-00009","article-title":"Multinomial logistic regression","volume":"51","author":"wak","year":"2002","journal-title":"Nursing Research"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.01.017"},{"key":"ref36","first-page":"361","article-title":"Regression trees with unbiased variable selection and interaction detection","volume":"12","author":"loh","year":"2002","journal-title":"Statistica Sinica"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008082.80494.e0"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1023\/A:1018628609742","article-title":"Least squares support vector machine classifiers","volume":"9","author":"suykens","year":"1999","journal-title":"Neural Processing Letters"},{"journal-title":"European Empires from Conquest to Collapse 1815&#x2013;1960","year":"1982","author":"kiernan","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.011"},{"journal-title":"Culture and Society 1780&#x2013;1950","year":"1961","author":"williams","key":"ref11"},{"journal-title":"England in the Twentieth Century","year":"1978","author":"thomson","key":"ref12"},{"journal-title":"A History of 20th Century Britain","year":"2011","author":"marr","key":"ref13"},{"journal-title":"Textbook on EC Law","year":"1996","author":"steiner","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/actrade\/9780199681693.001.0001"},{"journal-title":"The National Archives Crime in the 20th Century 2016","year":"0","key":"ref16"},{"key":"ref17","first-page":"153","article-title":"Olympic Britain - Social and Economic Change since the 1908 and 1948 London Games, House Commons","author":"thompson","year":"2012","journal-title":"Home Office Historical recorded crime series"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"137","DOI":"10.3233\/ICA-2011-0385","article-title":"A scatter method for data and variable importance evaluation","volume":"19","author":"juhola","year":"2012","journal-title":"Integrated Computer-Aided Engineering"},{"journal-title":"Self-Organizing Maps","year":"1979","author":"kohonen","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0026666"},{"key":"ref4","article-title":"Crime vs. demographic factors revisited: Applications of data mining methods","volume":"12","author":"li","year":"2015","journal-title":"Webology"},{"journal-title":"Pattern Classification","year":"2001","author":"duda","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-013-0441-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSS.2014.062435"},{"key":"ref29","article-title":"Bandwidth selection in kernel density estimation: A review","author":"turlach","year":"1994","journal-title":"Working Paper"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1504\/IJDMMM.2015.069250"},{"journal-title":"An Illustrated History of Britain","year":"2006","author":"mcdowall","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2015.1016774"},{"journal-title":"Applications of data mining methods in the study of crime based on international data sources","year":"2014","author":"li","key":"ref2"},{"journal-title":"Years of Change Europe 1890&#x2013;1945","year":"1996","author":"wolfson","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2013.26"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/5.58325"},{"journal-title":"Viscovery Software Gmbl-l Viscovery SOMine","year":"2015","key":"ref22"},{"journal-title":"Neural Networks A Comprehensive Foundation","year":"1999","author":"haykin","key":"ref21"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-7138-7","author":"james","year":"2013","journal-title":"An Introduction to Statistical Learning with Applications in R"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.121"},{"key":"ref41","first-page":"1027","article-title":"k-mcans+i-: The advantages of careful seeding","author":"arthur","year":"2007","journal-title":"Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2476256"},{"journal-title":"Data Mining A Knowledge Discovery Approach","year":"2007","author":"cios","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/72.846731"}],"event":{"name":"2017 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2017,11,27]]},"location":"Honolulu, HI","end":{"date-parts":[[2017,12,1]]}},"container-title":["2017 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8267146\/8280782\/08285260.pdf?arnumber=8285260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T19:04:20Z","timestamp":1751396660000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8285260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ssci.2017.8285260","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}