{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:45:06Z","timestamp":1776444306171,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T00:00:00Z","timestamp":1632441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,24]]},"DOI":"10.1145\/3488933.3488973","type":"proceedings-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T11:36:59Z","timestamp":1645789019000},"page":"580-586","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Enhanced Na\u00efve Bayes Model for Crime Prediction using Recursive Feature Elimination"],"prefix":"10.1145","author":[{"given":"Sphamandla","family":"May","sequence":"first","affiliation":[{"name":"Computer Science Department, University of the Western Cape, South Africa"}]},{"given":"Omowunmi","family":"Isafiade","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of the Western Cape, South Africa"}]},{"given":"Olasupo","family":"Ajayi","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of the Western Cape, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663204.2663254"},{"key":"e_1_3_2_1_2_1","volume-title":"11 tourists robbed at gunpoint in Khayelitsha","author":"McCain Nicole","year":"2020","unstructured":"Nicole McCain , \u201c 11 tourists robbed at gunpoint in Khayelitsha ,\u201d news24, Jan. 11, 2020 . Nicole McCain, \u201c11 tourists robbed at gunpoint in Khayelitsha,\u201d news24, Jan. 11, 2020."},{"key":"e_1_3_2_1_3_1","volume-title":"IOL","author":"Francke R.-L.","year":"2021","unstructured":"R.-L. Francke , \u201c Two life terms for killer whose Table Mountain crime spree terrorised hikers and cyclists ,\u201d IOL , Jan. 29, 2021 . R.-L. Francke, \u201cTwo life terms for killer whose Table Mountain crime spree terrorised hikers and cyclists,\u201d IOL, Jan. 29, 2021."},{"key":"e_1_3_2_1_4_1","volume-title":"Accessed","author":"Arulanandam R.","year":"2021","unstructured":"R. Arulanandam , B. T. R. Savarimuthu , and M. A. Purvis , \u201c Extracting Crime Information from Online Newspaper Articles,\u201d 2014 , Accessed : Feb. 05, 2021 . [Online]. Available : https:\/\/www.researchgate.net\/publication\/259932789_Extracting_crime_information_from_online_newspaper_articles. R. Arulanandam, B. T. R. Savarimuthu, and M. A. Purvis, \u201cExtracting Crime Information from Online Newspaper Articles,\u201d 2014, Accessed: Feb. 05, 2021. [Online]. Available: https:\/\/www.researchgate.net\/publication\/259932789_Extracting_crime_information_from_online_newspaper_articles."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5690-2_128"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2008.222"},{"key":"e_1_3_2_1_8_1","volume-title":"Accessed","author":"Islam K.","year":"2021","unstructured":"K. Islam and A. Raza , \u201c Forecasting Crime Using ARIMA Model,\u201d arXiv, Mar. 2020 , Accessed : Feb. 05, 2021 . [Online]. Available : http:\/\/arxiv.org\/abs\/2003.08006. K. Islam and A. Raza, \u201cForecasting Crime Using ARIMA Model,\u201d arXiv, Mar. 2020, Accessed: Feb. 05, 2021. [Online]. Available: http:\/\/arxiv.org\/abs\/2003.08006."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v17i3.12233"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE.2018.8710398"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4236\/am.2014.521315"},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"257","article-title":"Crime Analysis and Prediction Using Enhanced Arima Model","volume":"2","author":"Vijayarani S.","year":"2021","unstructured":"S. Vijayarani , E. Suganya , and C. Navya , \u201c Crime Analysis and Prediction Using Enhanced Arima Model ,\u201d Int. J. Res. Publ. Rev. , vol. 2 , no. 1 , pp. 257 \u2013 266 , 2021 , [Online]. Available: www.ijrpr.com. S. Vijayarani, E. Suganya, and C. Navya, \u201cCrime Analysis and Prediction Using Enhanced Arima Model,\u201d Int. J. Res. Publ. Rev., vol. 2, no. 1, pp. 257\u2013266, 2021, [Online]. Available: www.ijrpr.com.","journal-title":"Int. J. Res. Publ. Rev."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.01.003"},{"key":"e_1_3_2_1_14_1","volume-title":"City of Chicago","year":"2001","unstructured":"\u201c Crimes - 2001 to present - Dashboard | City of Chicago | Data Portal ,\u201d City of Chicago , Jan. 01, 2001 . https:\/\/data.cityofchicago.org\/Public-Safety\/Crimes-2001-to-present-Dashboard\/5cd6-ry5g (accessed May 10, 2021). \u201cCrimes - 2001 to present - Dashboard | City of Chicago | Data Portal,\u201d City of Chicago, Jan. 01, 2001. https:\/\/data.cityofchicago.org\/Public-Safety\/Crimes-2001-to-present-Dashboard\/5cd6-ry5g (accessed May 10, 2021)."},{"key":"e_1_3_2_1_15_1","volume-title":"2017 IEEE Symp. Ser. Comput. Intell. SSCI 2017 - Proc.","volume":"8","author":"Rodriguez C. D. R.","year":"2018","unstructured":"C. D. R. Rodriguez , D. M. Gomez , and M. A. M. Rey , \u201cForecasting time series from clustering by a memetic differential fuzzy approach: An application to crime prediction ,\u201d 2017 IEEE Symp. Ser. Comput. Intell. SSCI 2017 - Proc. , vol. 2018-January, pp. 1\u2013 8 , 2018 , doi: 10.1109\/SSCI.2017.8285373. 10.1109\/SSCI.2017.8285373 C. D. R. Rodriguez, D. M. Gomez, and M. A. M. Rey, \u201cForecasting time series from clustering by a memetic differential fuzzy approach: An application to crime prediction,\u201d 2017 IEEE Symp. Ser. Comput. Intell. SSCI 2017 - Proc., vol. 2018-January, pp. 1\u20138, 2018, doi: 10.1109\/SSCI.2017.8285373."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.357"},{"key":"e_1_3_2_1_17_1","volume-title":"Crime prediction and forecasting in Tamilnadu using clustering approaches","author":"Sivaranjani S.","year":"2017","unstructured":"S. Sivaranjani , S. Sivakumari , and M. Aasha , \u201c Crime prediction and forecasting in Tamilnadu using clustering approaches ,\u201d Mar. 2017 , doi: 10.1109\/ICETT.2016.7873764. 10.1109\/ICETT.2016.7873764 S. Sivaranjani, S. Sivakumari, and M. Aasha, \u201cCrime prediction and forecasting in Tamilnadu using clustering approaches,\u201d Mar. 2017, doi: 10.1109\/ICETT.2016.7873764."},{"key":"e_1_3_2_1_18_1","first-page":"523","volume-title":"Proc. Int. Conf. I-SMAC (IoT Soc. Mobile, Anal. Cloud), I-SMAC 2018","author":"Kiran J.","year":"2019","unstructured":"J. Kiran and K. Kaishveen , \u201c Prediction analysis of crime in India using a hybrid clustering approach ,\u201d Proc. Int. Conf. I-SMAC (IoT Soc. Mobile, Anal. Cloud), I-SMAC 2018 , no. 1, pp. 520\u2013 523 , 2019 , doi: 10.1109\/I-SMAC.2018.8653744. 10.1109\/I-SMAC.2018.8653744 J. Kiran and K. Kaishveen, \u201cPrediction analysis of crime in India using a hybrid clustering approach,\u201d Proc. Int. Conf. I-SMAC (IoT Soc. Mobile, Anal. Cloud), I-SMAC 2018, no. 1, pp. 520\u2013523, 2019, doi: 10.1109\/I-SMAC.2018.8653744."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.357"},{"key":"e_1_3_2_1_20_1","unstructured":"I. Hussain \u201cClustering in Machine Learning.\u201d  I. Hussain \u201cClustering in Machine Learning.\u201d"},{"key":"e_1_3_2_1_21_1","volume-title":"Crime Prediction Using Decision Tree (J48) Classification Algorithm","author":"Ivan N.","year":"2017","unstructured":"N. Ivan , E. Ahishakiye , E. O. Omulo , and D. Taremwa , \u201c Crime Prediction Using Decision Tree (J48) Classification Algorithm .,\u201d 2017 . N. Ivan, E. Ahishakiye, E. O. Omulo, and D. Taremwa, \u201cCrime Prediction Using Decision Tree (J48) Classification Algorithm.,\u201d 2017."},{"key":"e_1_3_2_1_22_1","first-page":"78","volume-title":"International Conference on Applied Computing to Support Industry: Innovation and Technology","author":"Zaidi N. A. S.","year":"2019","unstructured":"N. A. S. Zaidi , A. Mustapha , S. A. Mostafa , and M. N. Razali , \u201c A classification approach for crime prediction ,\u201d in International Conference on Applied Computing to Support Industry: Innovation and Technology , 2019 , pp. 68\u2013 78 . N. A. S. Zaidi, A. Mustapha, S. A. Mostafa, and M. N. Razali, \u201cA classification approach for crime prediction,\u201d in International Conference on Applied Computing to Support Industry: Innovation and Technology, 2019, pp. 68\u201378."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2013\/v6i3.6"},{"key":"e_1_3_2_1_24_1","volume-title":"A Performance Analysis of Business Intelligence Techniques on Crime Prediction","author":"Ivan N.","year":"2017","unstructured":"N. Ivan , E. Ahishakiye , E. O. Omulo , and R. Wario , \u201c A Performance Analysis of Business Intelligence Techniques on Crime Prediction ,\u201d 2017 . N. Ivan, E. Ahishakiye, E. O. Omulo, and R. Wario, \u201cA Performance Analysis of Business Intelligence Techniques on Crime Prediction,\u201d 2017."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2011.11.066"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/eva.12524"},{"key":"e_1_3_2_1_27_1","volume-title":"Geeks for Geeks","year":"2020","unstructured":"\u201c ML | Extra Tree Classifier for Feature Selection - GeeksforGeeks ,\u201d Geeks for Geeks , Jul. 01, 2020 . https:\/\/www.geeksforgeeks.org\/ml-extra-tree-classifier-for-feature-selection\/ (accessed Feb. 09, 2021). \u201cML | Extra Tree Classifier for Feature Selection - GeeksforGeeks,\u201d Geeks for Geeks, Jul. 01, 2020. https:\/\/www.geeksforgeeks.org\/ml-extra-tree-classifier-for-feature-selection\/ (accessed Feb. 09, 2021)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-0790-8_6"},{"key":"e_1_3_2_1_29_1","first-page":"2","article-title":"RIDGE: A COMPUTER PROGRAM FOR CALCULATING RIDGE REGRESSION ESTIMATES","volume":"1","author":"Hilt D.","year":"1977","unstructured":"D. Hilt and S. Donald , \u201c RIDGE: A COMPUTER PROGRAM FOR CALCULATING RIDGE REGRESSION ESTIMATES ,\u201d North. For. Exp. Stn., no. Table 1 , pp. 2 \u2013 4 , 1977 . D. Hilt and S. Donald, \u201cRIDGE: A COMPUTER PROGRAM FOR CALCULATING RIDGE REGRESSION ESTIMATES,\u201d North. For. Exp. Stn., no. Table 1, pp. 2\u20134, 1977.","journal-title":"Table"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-018-0251-3"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.10.018"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379247.3379279"},{"key":"e_1_3_2_1_33_1","first-page":"62","article-title":"Gene selection for cancer classification using DCA","volume":"5139","author":"Le Thi H. A.","year":"2008","unstructured":"H. A. Le Thi , V. V. Nguyen , and S. Ouchani , \u201c Gene selection for cancer classification using DCA ,\u201d Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) , vol. 5139 LNAI, pp. 62 \u2013 72 , 2008 , doi: 10.1007\/978-3-540-88192-6_8. 10.1007\/978-3-540-88192-6_8 H. A. Le Thi, V. V. Nguyen, and S. Ouchani, \u201cGene selection for cancer classification using DCA,\u201d Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5139 LNAI, pp. 62\u201372, 2008, doi: 10.1007\/978-3-540-88192-6_8.","journal-title":"Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics)"},{"issue":"06","key":"e_1_3_2_1_34_1","first-page":"123","article-title":"Comparison of Model Performance for Basic and Advanced Modeling Approaches to Crime Prediction","volume":"10","author":"Zhu Y.","year":"2018","unstructured":"Y. Zhu , \u201c Comparison of Model Performance for Basic and Advanced Modeling Approaches to Crime Prediction ,\u201d Intell. Inf. Manag. , vol. 10 , no. 06 , pp. 123 \u2013 132 , 2018 , doi: 10.4236\/iim.2018.106011. 10.4236\/iim.2018.106011 Y. Zhu, \u201cComparison of Model Performance for Basic and Advanced Modeling Approaches to Crime Prediction,\u201d Intell. Inf. Manag., vol. 10, no. 06, pp. 123\u2013132, 2018, doi: 10.4236\/iim.2018.106011.","journal-title":"Intell. Inf. Manag."},{"key":"e_1_3_2_1_35_1","first-page":"190","volume-title":"28th Mod. Artif. Intell. Cogn. Sci. Conf. MAICS 2017, no. February","author":"Cristina K.","year":"2018","unstructured":"K. Cristina , P. Irena , and J. Ira , \u201c Exploring Foursquare-derived features for crime prediction in New York City ,\u201d 28th Mod. Artif. Intell. Cogn. Sci. Conf. MAICS 2017, no. February , pp. 189\u2013 190 , 2018 , doi: 10.1145\/1235. 10.1145\/1235 K. Cristina, P. Irena, and J. Ira, \u201cExploring Foursquare-derived features for crime prediction in New York City,\u201d 28th Mod. Artif. Intell. Cogn. Sci. Conf. MAICS 2017, no. February, pp. 189\u2013190, 2018, doi: 10.1145\/1235."},{"key":"e_1_3_2_1_36_1","volume-title":"Calculus of thought: neuromorphic logistic regression in cognitive machines\u0642\u0627\u0646\u0648\u0646 \u0637\u0628","author":"Rice D. M.","year":"2014","unstructured":"D. M. Rice , Calculus of thought: neuromorphic logistic regression in cognitive machines\u0642\u0627\u0646\u0648\u0646 \u0637\u0628 . Elsevier , 2014 . D. M. Rice, Calculus of thought: neuromorphic logistic regression in cognitive machines\u0642\u0627\u0646\u0648\u0646 \u0637\u0628. Elsevier, 2014."},{"key":"e_1_3_2_1_37_1","volume-title":"J.R. Stat. Soc.","author":"Dawid A. P.","unstructured":"A. P. Dawid , \u201c Conditional Independence in Statistical Theory Author ( s ): A . P . Dawid Source: Journal of the Royal Statistical Society . Series B ( Methodological ), Vol . 41 , No . 1 Published by: Blackwell Publishing for the Royal Statistical Society Stable URL ,\u201d J.R. Stat. Soc. , vol. 41 , no. 1, pp. 1\u201331, 1979. A. P. Dawid, \u201cConditional Independence in Statistical Theory Author ( s ): A . P . Dawid Source: Journal of the Royal Statistical Society . Series B ( Methodological ), Vol . 41 , No . 1 Published by: Blackwell Publishing for the Royal Statistical Society Stable URL,\u201d J.R. Stat. Soc., vol. 41, no. 1, pp. 1\u201331, 1979."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-410407-5.00004-0"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"e_1_3_2_1_41_1","first-page":"282","volume-title":"Proceedings of the International Conference on Document Analysis and Recognition, ICDAR","volume":"1","author":"Ho T. K.","year":"1995","unstructured":"T. K. Ho , \u201c Random decision forests ,\u201d in Proceedings of the International Conference on Document Analysis and Recognition, ICDAR , 1995 , vol. 1 , pp. 278\u2013 282 , doi: 10.1109\/ICDAR.1995.598994. 10.1109\/ICDAR.1995.598994 T. K. Ho, \u201cRandom decision forests,\u201d in Proceedings of the International Conference on Document Analysis and Recognition, ICDAR, 1995, vol. 1, pp. 278\u2013282, doi: 10.1109\/ICDAR.1995.598994."},{"key":"e_1_3_2_1_42_1","volume-title":"The elements of statistical learning","author":"Friedman J.","unstructured":"J. Friedman , T. Hastie , and R. Tibshirani , The elements of statistical learning , vol. 1 , no. 10. Springer series in statistics New York, 2001. J. Friedman, T. Hastie, and R. Tibshirani, The elements of statistical learning, vol. 1, no. 10. Springer series in statistics New York, 2001."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-006-6226-1"}],"event":{"name":"AIPR 2021: 2021 4th International Conference on Artificial Intelligence and Pattern Recognition","location":"Xiamen China","acronym":"AIPR 2021"},"container-title":["2021 4th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488933.3488973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488933.3488973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:28Z","timestamp":1750188688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488933.3488973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,24]]},"references-count":43,"alternative-id":["10.1145\/3488933.3488973","10.1145\/3488933"],"URL":"https:\/\/doi.org\/10.1145\/3488933.3488973","relation":{},"subject":[],"published":{"date-parts":[[2021,9,24]]},"assertion":[{"value":"2022-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}