{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:09Z","timestamp":1750220289912,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1145\/3488933.3488972","type":"proceedings-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T11:36:59Z","timestamp":1645789019000},"page":"536-541","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Hybridizing Extremely Randomized Trees with Bootstrap Aggregation for Crime Prediction"],"prefix":"10.1145","author":[{"given":"Sphamandla","family":"S. May","sequence":"first","affiliation":[{"name":"Computer Science Department, University of the Western Cape, South Africa"}]},{"given":"Omowunmi","family":"E. Isafiade","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of the Western Cape, South Africa"}]},{"given":"Olasupo","family":"O. Ajayi","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of the Western Cape, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-7967(93)90048-Y"},{"key":"e_1_3_2_1_2_1","first-page":"11","volume-title":"What is machine learning?","author":"El Naqa I.","year":"2015","unstructured":"I. El Naqa and M. J. Murphy , \u201c What is machine learning? ,\u201d in machine learning in radiation oncology, Springer , 2015 , pp. 3\u2013 11 . I. El Naqa and M. J. Murphy, \u201cWhat is machine learning?,\u201d in machine learning in radiation oncology, Springer, 2015, pp. 3\u201311."},{"key":"e_1_3_2_1_3_1","first-page":"420","volume-title":"Electronics and Mobile Communication Conference (IEMCON)","author":"Kim S.","year":"2018","unstructured":"S. Kim , P. Joshi , P. S. Kalsi , and P. Taheri , \u201c Crime analysis through machine learning,\u201d in 2018 IEEE 9th Annual Information Technology , Electronics and Mobile Communication Conference (IEMCON) , 2018 , pp. 415\u2013 420 . S. Kim, P. Joshi, P. S. Kalsi, and P. Taheri, \u201cCrime analysis through machine learning,\u201d in 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2018, pp. 415\u2013420."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-7967(93)90048-Y"},{"key":"e_1_3_2_1_5_1","first-page":"11","volume-title":"What is machine learning?","author":"El Naqa I.","year":"2015","unstructured":"I. El Naqa and M. J. Murphy , \u201c What is machine learning? ,\u201d in machine learning in radiation oncology, Springer , 2015 , pp. 3\u2013 11 . I. El Naqa and M. J. Murphy, \u201cWhat is machine learning?,\u201d in machine learning in radiation oncology, Springer, 2015, pp. 3\u201311."},{"key":"e_1_3_2_1_6_1","first-page":"420","volume-title":"Electronics and Mobile Communication Conference (IEMCON)","author":"Kim S.","year":"2018","unstructured":"S. Kim , P. Joshi , P. S. Kalsi , and P. Taheri , \u201c Crime analysis through machine learning,\u201d in 2018 IEEE 9th Annual Information Technology , Electronics and Mobile Communication Conference (IEMCON) , 2018 , pp. 415\u2013 420 . S. Kim, P. Joshi, P. S. Kalsi, and P. Taheri, \u201cCrime analysis through machine learning,\u201d in 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2018, pp. 415\u2013420."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi7080298"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.03.084"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663204.2663254"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3325112.3328221"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.02.003"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0015"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apgeog.2018.08.001"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICETT.2016.7873764"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.357"},{"key":"e_1_3_2_1_16_1","volume-title":"Deep learning for real time crime forecasting","author":"Wang B.","year":"2017","unstructured":"B. Wang , D. Zhang , D. Zhang , P. J. Brantingham , and A. L. Bertozzi , \u201c Deep learning for real time crime forecasting ,\u201d arXiv Prepr . arXiv1707.03340, 2017 . B. Wang, D. Zhang, D. Zhang, P. J. Brantingham, and A. L. Bertozzi, \u201cDeep learning for real time crime forecasting,\u201d arXiv Prepr. arXiv1707.03340, 2017."},{"key":"e_1_3_2_1_17_1","volume-title":"Crime Prediction Using Decision Tree (J48) Classification Algorithm","author":"Ivan N.","year":"2017","unstructured":"N. Ivan , E. Ahishakiye , E. O. Omulo , and D. Taremwa , \u201c Crime Prediction Using Decision Tree (J48) Classification Algorithm .,\u201d 2017 . N. Ivan, E. Ahishakiye, E. O. Omulo, and D. Taremwa, \u201cCrime Prediction Using Decision Tree (J48) Classification Algorithm.,\u201d 2017."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379247.3379279"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2013\/v6i3.6"},{"key":"e_1_3_2_1_20_1","volume-title":"A Performance Analysis of Business Intelligence Techniques on Crime Prediction","author":"Ivan N.","year":"2017","unstructured":"N. Ivan , E. Ahishakiye , E. O. Omulo , and R. Wario , \u201c A Performance Analysis of Business Intelligence Techniques on Crime Prediction ,\u201d 2017 . N. Ivan, E. Ahishakiye, E. O. Omulo, and R. Wario, \u201cA Performance Analysis of Business Intelligence Techniques on Crime Prediction,\u201d 2017."},{"key":"e_1_3_2_1_21_1","first-page":"501","volume-title":"2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)","author":"Llaha O.","unstructured":"O. Llaha , \u201c Crime Analysis and Prediction using Machine Learning ,\u201d in 2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO) , pp. 496\u2013 501 . O. Llaha, \u201cCrime Analysis and Prediction using Machine Learning,\u201d in 2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO), pp. 496\u2013501."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780429246593"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"},{"key":"e_1_3_2_1_26_1","first-page":"282","volume-title":"Proceedings of the International Conference on Document Analysis and Recognition, ICDAR","volume":"1","author":"Ho T. K.","year":"1995","unstructured":"T. K. Ho , \u201c Random decision forests ,\u201d in Proceedings of the International Conference on Document Analysis and Recognition, ICDAR , 1995 , vol. 1 , pp. 278\u2013 282 , doi: 10.1109\/ICDAR.1995.598994. 10.1109\/ICDAR.1995.598994 T. K. Ho, \u201cRandom decision forests,\u201d in Proceedings of the International Conference on Document Analysis and Recognition, ICDAR, 1995, vol. 1, pp. 278\u2013282, doi: 10.1109\/ICDAR.1995.598994."},{"volume-title":"The elements of statistical learning","author":"Friedman J.","key":"e_1_3_2_1_27_1","unstructured":"J. Friedman , T. Hastie , and R. Tibshirani , The elements of statistical learning , vol. 1 , no. 10. Springer series in statistics New York, 2001. J. Friedman, T. Hastie, and R. Tibshirani, The elements of statistical learning, vol. 1, no. 10. Springer series in statistics New York, 2001."},{"volume-title":"City of Chicago","year":"2001","key":"e_1_3_2_1_28_1","unstructured":"Crimes - 2001 to present - Dashboard | City of Chicago | Data Portal ,\u201d City of Chicago , Jan. 01, 2001. https:\/\/data.cityofchicago.org\/Public-Safety\/Crimes-2001-to-present-Dashboard\/5cd6-ry5g (accessed May 10, 2021). Crimes - 2001 to present - Dashboard | City of Chicago | Data Portal,\u201d City of Chicago, Jan. 01, 2001. https:\/\/data.cityofchicago.org\/Public-Safety\/Crimes-2001-to-present-Dashboard\/5cd6-ry5g (accessed May 10, 2021)."}],"event":{"name":"AIPR 2021: 2021 4th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2021","location":"Xiamen China"},"container-title":["2021 4th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488933.3488972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488933.3488972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:28Z","timestamp":1750188688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488933.3488972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":28,"alternative-id":["10.1145\/3488933.3488972","10.1145\/3488933"],"URL":"https:\/\/doi.org\/10.1145\/3488933.3488972","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"2022-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}