{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:52:06Z","timestamp":1771613526124,"version":"3.50.1"},"reference-count":25,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T00:00:00Z","timestamp":1645747200000},"content-version":"vor","delay-in-days":55,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:p>The crime is difficult to predict; it is random and possibly can occur anywhere at any time, which is a challenging issue for any society. The study proposes a crime prediction model by analyzing and comparing three known prediction classification algorithms: Naive Bayes, Random Forest, and Gradient Boosting Decision Tree. The model analyzes the top ten crimes to make predictions about different categories, which account for 97% of the incidents. These two significant crime classes, that is, violent and nonviolent, are created by merging multiple smaller classes of crimes. Exploratory data analysis (EDA) is performed to identify the patterns and understand the trends of crimes using a crime dataset. The accuracies of Naive Bayes, Random Forest, and Gradient Boosting Decision Tree techniques are 65.82%, 63.43%, and 98.5%, respectively, and the proposed model is further evaluated for precision and recall matrices. The results show that the Gradient Boosting Decision Tree prediction model is better than the other two techniques for predicting crime, based on historical data from a city. The analysis and prediction model can help the security agencies utilize the resources efficiently, anticipate the crime at a specific time, and serve society well.<\/jats:p>","DOI":"10.1155\/2022\/4830411","type":"journal-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T15:05:06Z","timestamp":1645801506000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Predicting and Preventing Crime: A Crime Prediction Model Using San Francisco Crime Data by Classification Techniques"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4656-1041","authenticated-orcid":false,"given":"Muzammil","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5546-5866","authenticated-orcid":false,"given":"Azmat","family":"Ali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6523-628X","authenticated-orcid":false,"given":"Yasser","family":"Alharbi","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"e_1_2_10_1_2","volume-title":"Predictive Data Mining: A Practical Guide","author":"Weiss S. M.","year":"1998"},{"key":"e_1_2_10_2_2","first-page":"208","article-title":"An effective data warehousing system for rfid using novel data cleaning, data transformation and loading techniques","volume":"9","author":"Kochar B.","year":"2012","journal-title":"The International Arab Journal of Information Technology"},{"key":"e_1_2_10_3_2","first-page":"26","article-title":"Performance of clustering algorithms in healthcare database","volume":"2","author":"Santhi P.","year":"2010","journal-title":"International Journal for Advances in Computer Science"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.14569\/specialissue.2011.010304"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2016.9.9.05"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.33832\/ijgdc.2019.12.2.03"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2014.7.4.03"},{"key":"e_1_2_10_8_2","volume-title":"Data Mining: Concepts and Techniques","author":"Han J.","year":"2011"},{"key":"e_1_2_10_9_2","unstructured":"AbouelnagaY. San francisco crime classification 2016 arXiv preprint arXiv:1607.03626."},{"key":"e_1_2_10_10_2","volume-title":"San francisco Crime Classification","author":"Shen T. A.","year":"2015"},{"key":"e_1_2_10_11_2","first-page":"106","article-title":"Application of machine learning algorithms in crime classification and classification rule mining","volume":"4","author":"Saeed U.","year":"2015","journal-title":"Research Journal of Recent Sciences"},{"key":"e_1_2_10_12_2","article-title":"A study on classification learning algorithms to predict crime status","volume":"7","author":"Shojaee S.","year":"2013","journal-title":"International Journal of Digital Content Technology and its Applications"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2013\/v6i3.6"},{"key":"e_1_2_10_14_2","first-page":"1","article-title":"Naive bayes classifiers","volume":"18","author":"Murphy K. P.","year":"2006","journal-title":"University of British Columbia"},{"key":"e_1_2_10_15_2","volume-title":"Naive Bayesian Classifier","author":"Leung K. M.","year":"2007"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1177\/0165551516677911"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.52460\/src.2021.004"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.06.005"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1023\/a:1010933404324"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1108\/K-10-2016-0300"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2017.02.008"},{"key":"e_1_2_10_22_2","first-page":"1693","volume-title":"International Conference on Intelligent and Fuzzy Systems","author":"To\u00e7o\u011flu M. A.","year":"2020"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.7.1545"},{"key":"e_1_2_10_24_2","doi-asserted-by":"crossref","unstructured":"XiaXi ZhaoW. RuiX. WangY. BaiX. YinW. andJinD. A comprehensive evaluation of air pollution prediction improvement by a machine learning method Proceedings of the 2015 IEEE International Conference on Service Operations And Logistics And Informatics (SOLI) November 2015 Yasmine Hammamet Tunisia IEEE https:\/\/doi.org\/10.1109\/soli.2015.7367615 2-s2.0-84963594723.","DOI":"10.1109\/SOLI.2015.7367615"},{"key":"e_1_2_10_25_2","doi-asserted-by":"crossref","unstructured":"CaruanaR.andNiculescu-MizilA. Data mining in metric space: an empirical analysis of supervised learning performance criteria Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining Auguest 2004 Seattle WA USA ACM 69\u201378 https:\/\/doi.org\/10.1145\/1014052.","DOI":"10.1145\/1014052.1014063"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/4830411","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/2022\/4830411","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/4830411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:25:46Z","timestamp":1769117146000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2022\/4830411"}},"subtitle":[],"editor":[{"given":"Gonzalo","family":"Farias","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1155\/2022\/4830411"],"URL":"https:\/\/doi.org\/10.1155\/2022\/4830411","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"2021-08-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-25","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"4830411"}}