{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T19:28:25Z","timestamp":1775071705461,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T00:00:00Z","timestamp":1619654400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T00:00:00Z","timestamp":1619654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis. Comput. Ind. Biomed. Art"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A crime is a deliberate act that can cause physical or psychological harm, as well as property damage or loss, and can lead to punishment by a state or other authority according to the severity of the crime. The number and forms of criminal activities are increasing at an alarming rate, forcing agencies to develop efficient methods to take preventive measures. In the current scenario of rapidly increasing crime, traditional crime-solving techniques are unable to deliver results, being slow paced and less efficient. Thus, if we can come up with ways to predict crime, in detail, before it occurs, or come up with a \u201cmachine\u201d that can assist police officers, it would lift the burden of police and help in preventing crimes. To achieve this, we suggest including machine learning (ML) and computer vision algorithms and techniques. In this paper, we describe the results of certain cases where such approaches were used, and which motivated us to pursue further research in this field. The main reason for the change in crime detection and prevention lies in the before and after statistical observations of the authorities using such techniques. The sole purpose of this study is to determine how a combination of ML and computer vision can be used by law agencies or authorities to detect, prevent, and solve crimes at a much more accurate and faster rate. In summary, ML and computer vision techniques can bring about an evolution in law agencies.<\/jats:p>","DOI":"10.1186\/s42492-021-00075-z","type":"journal-article","created":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T03:52:04Z","timestamp":1619668324000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":144,"title":["Crime forecasting: a machine learning and computer vision approach to crime prediction and prevention"],"prefix":"10.1186","volume":"4","author":[{"given":"Neil","family":"Shah","sequence":"first","affiliation":[]},{"given":"Nandish","family":"Bhagat","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8665-5010","authenticated-orcid":false,"given":"Manan","family":"Shah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,29]]},"reference":[{"key":"75_CR1","doi-asserted-by":"publisher","unstructured":"Shah D, Dixit R, Shah A, Shah P, Shah M (2020) A comprehensive analysis regarding several breakthroughs based on computer intelligence targeting various syndromes. Augment Hum Res 5(1):14.\u00a0https:\/\/doi.org\/10.1007\/s41133-020-00033-z","DOI":"10.1007\/s41133-020-00033-z"},{"key":"75_CR2","doi-asserted-by":"publisher","unstructured":"Patel H, Prajapati D, Mahida D, Shah M (2020) Transforming petroleum downstream sector through big data: a holistic review. J Pet Explor Prod Technol 10(6):2601\u20132611.\u00a0https:\/\/doi.org\/10.1007\/s13202-020-00889-2","DOI":"10.1007\/s13202-020-00889-2"},{"key":"75_CR3","first-page":"1","volume-title":"Computer vision: algorithms and applications","author":"R Szeliski","year":"2010","unstructured":"Szeliski R (2010) Computer vision: algorithms and applications. Springer-Verlag, Berlin, pp 1\u2013979"},{"key":"75_CR4","doi-asserted-by":"publisher","unstructured":"Vedaldi A, Fulkerson B (2010) Vlfeat: an open and portable library of computer vision algorithms. Paper presented at the 18th ACM international conference on multimedia. ACM, Firenze. https:\/\/doi.org\/10.1145\/1873951.1874249","DOI":"10.1145\/1873951.1874249"},{"key":"75_CR5","doi-asserted-by":"publisher","unstructured":"Le TL, Nguyen MQ, Nguyen TTM (2013) Human posture recognition using human skeleton provided by Kinect. In: Paper presented at the 2013 international conference on computing, management and telecommunications. IEEE, Ho Chi Minh City. https:\/\/doi.org\/10.1109\/ComManTel.2013.6482417","DOI":"10.1109\/ComManTel.2013.6482417"},{"key":"75_CR6","doi-asserted-by":"publisher","unstructured":"Ahir K, Govani K, Gajera R, Shah M (2020) Application on virtual reality for enhanced education learning, military training and sports. Augment Hum Res 5(1):7. (https:\/\/doi.org\/10.1007\/s41133-019-0025-2)","DOI":"10.1007\/s41133-019-0025-2"},{"key":"75_CR7","doi-asserted-by":"publisher","unstructured":"Talaviya T, Shah D, Patel N, Yagnik H, Shah M (2020) Implementation of artificial intelligence in agriculture for optimisation of irrigation and application of pesticides and herbicides. Artif Intell Agric 4:58\u201373.\u00a0https:\/\/doi.org\/10.1016\/j.aiia.2020.04.002","DOI":"10.1016\/j.aiia.2020.04.002"},{"key":"75_CR8","doi-asserted-by":"publisher","unstructured":"Jha K, Doshi A, Patel P, Shah M (2019) A comprehensive review on automation in agriculture using artificial intelligence. Artif Intell Agric 2:1\u201312.\u00a0https:\/\/doi.org\/10.1016\/j.aiia.2019.05.004","DOI":"10.1016\/j.aiia.2019.05.004"},{"key":"75_CR9","doi-asserted-by":"publisher","unstructured":"Kakkad V, Patel M, Shah M (2019) Biometric authentication and image encryption for image security in cloud framework. Multiscale Multidiscip Model Exp Des 2(4):233\u2013248.\u00a0https:\/\/doi.org\/10.1007\/s41939-019-00049-y","DOI":"10.1007\/s41939-019-00049-y"},{"key":"75_CR10","doi-asserted-by":"publisher","unstructured":"Pathan M, Patel N, Yagnik H, Shah M (2020) Artificial cognition for applications in smart agriculture: a comprehensive review. Artif Intell Agric 4:81\u201395.\u00a0https:\/\/doi.org\/10.1016\/j.aiia.2020.06.001","DOI":"10.1016\/j.aiia.2020.06.001"},{"key":"75_CR11","doi-asserted-by":"publisher","unstructured":"Pandya R, Nadiadwala S, Shah R, Shah M (2020) Buildout of methodology for meticulous diagnosis of K-complex in EEG for aiding the detection of Alzheimer's by artificial intelligence. Augment Hum Res 5(1):3.\u00a0https:\/\/doi.org\/10.1007\/s41133-019-0021-6","DOI":"10.1007\/s41133-019-0021-6"},{"issue":"3","key":"75_CR12","first-page":"1174","volume":"7","author":"A Dey","year":"2016","unstructured":"Dey A (2016) Machine learning algorithms: a review. Int J Comput Sci Inf Technol 7(3):1174\u20131179","journal-title":"Int J Comput Sci Inf Technol"},{"key":"75_CR13","doi-asserted-by":"publisher","unstructured":"Sukhadia A, Upadhyay K, Gundeti M, Shah S, Shah M (2020) Optimization of smart traffic governance system using artificial intelligence. Augment Hum Res 5(1):13.\u00a0https:\/\/doi.org\/10.1007\/s41133-020-00035-x","DOI":"10.1007\/s41133-020-00035-x"},{"key":"75_CR14","doi-asserted-by":"publisher","unstructured":"Musumeci F, Rottondi C, Nag A, Macaluso I, Zibar D, Ruffini M et al (2019) An overview on application of machine learning techniques in optical networks. IEEE Commun Surv Tutorials 21(2):1381\u20131408.\u00a0https:\/\/doi.org\/10.1109\/COMST.2018.2880039","DOI":"10.1109\/COMST.2018.2880039"},{"key":"75_CR15","doi-asserted-by":"publisher","unstructured":"Patel D, Shah Y, Thakkar N, Shah K, Shah M (2020) Implementation of artificial intelligence techniques for cancer detection. Augment Hum Res 5(1):6. https:\/\/doi.org\/10.1007\/s41133-019-0024-3","DOI":"10.1007\/s41133-019-0024-3"},{"issue":"1","key":"75_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s41133-019-0029-y","volume":"5","author":"K Kundalia","year":"2020","unstructured":"Kundalia K, Patel Y, Shah M (2020) Multi-label movie genre detection from a movie poster using knowledge transfer learning. Augment Hum Res 5(1):11. https:\/\/doi.org\/10.1007\/s41133-019-0029-y","journal-title":"Augment Hum Res"},{"key":"75_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1201\/b17476-1","volume-title":"Machine learning: an algorithmic perspective","author":"S Marsland","year":"2015","unstructured":"Marsland S (2015) Machine learning: an algorithmic perspective. CRC Press, Boca Raton, pp 1\u2013452. https:\/\/doi.org\/10.1201\/b17476-1"},{"issue":"1","key":"75_CR18","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s42488-019-00016-9","volume":"2","author":"K Jani","year":"2020","unstructured":"Jani K, Chaudhuri M, Patel H, Shah M (2020) Machine learning in films: an approach towards automation in film censoring. J Data Inf Manag 2(1):55\u201364. https:\/\/doi.org\/10.1007\/s42488-019-00016-9","journal-title":"J Data Inf Manag"},{"issue":"1","key":"75_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s41133-019-0023-4","volume":"5","author":"V Parekh","year":"2020","unstructured":"Parekh V, Shah D, Shah M (2020) Fatigue detection using artificial intelligence framework. Augment Hum Res 5(1):5 https:\/\/doi.org\/10.1007\/s41133-019-0023-4","journal-title":"Augment Hum Res"},{"issue":"1","key":"75_CR20","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/s41133-019-0030-5","volume":"5","author":"M Gandhi","year":"2020","unstructured":"Gandhi M, Kamdar J, Shah M (2020) Preprocessing of non-symmetrical images for edge detection. Augment Hum Res 5(1):10 https:\/\/doi.org\/10.1007\/s41133-019-0030-5","journal-title":"Augment Hum Res"},{"issue":"7","key":"75_CR21","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s42488-020-00030-2","volume":"2","author":"S Panchiwala","year":"2020","unstructured":"Panchiwala S, Shah M (2020) A comprehensive study on critical security issues and challenges of the IoT world. J Data Inf Manag 2(7):257\u2013278. https:\/\/doi.org\/10.1007\/s42488-020-00030-2","journal-title":"J Data Inf Manag"},{"issue":"1","key":"75_CR22","first-page":"22","volume":"1","author":"A Simon","year":"2016","unstructured":"Simon A, Deo MS, Venkatesan S, Babu DR (2016) An overview of machine learning and its applications. Int J Electr Sci Eng 1(1):22\u201324.","journal-title":"Int J Electr Sci Eng"},{"issue":"1","key":"75_CR23","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1186\/s42492-020-00057-7","volume":"3","author":"P Parekh","year":"2020","unstructured":"Parekh P, Patel S, Patel N, Shah M (2020) Systematic review and meta-analysis of augmented reality in medicine, retail, and games. Vis Comput Ind Biomed Art 3(1):21. https:\/\/doi.org\/10.1186\/s42492-020-00057-7","journal-title":"Vis Comput Ind Biomed Art"},{"issue":"1","key":"75_CR24","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s41133-020-00032-0","volume":"5","author":"K Shah","year":"2020","unstructured":"Shah K, Patel H, Sanghvi D, Shah M (2020) A comparative analysis of logistic regression, random forest and KNN models for the text classification. Augment Hum Res 5(1):12. https:\/\/doi.org\/10.1007\/s41133-020-00032-0","journal-title":"Augment Hum Res"},{"issue":"1","key":"75_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40745-019-00239-y","volume":"7","author":"D Patel","year":"2020","unstructured":"Patel D, Shah D, Shah M (2020) The intertwine of brain and body: a quantitative analysis on how big data influences the system of sports. Ann Data Sci 7(1):1\u201316. https:\/\/doi.org\/10.1007\/s40745-019-00239-y","journal-title":"Ann Data Sci"},{"issue":"3","key":"75_CR26","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/0885-064X(88)90019-2","volume":"4","author":"S Judd","year":"1988","unstructured":"Judd S (1988) On the complexity of loading shallow neural networks. J Complex 4(3):177\u2013192. https:\/\/doi.org\/10.1016\/0885-064X(88)90019-2","journal-title":"J Complex"},{"issue":"1","key":"75_CR27","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S0893-6080(05)80010-3","volume":"5","author":"AL Blum","year":"1992","unstructured":"Blum AL, Rivest RL (1992) Training a 3-node neural network is NP-complete. Neural Netw 5(1):117\u2013127. https:\/\/doi.org\/10.1016\/S0893-6080(05)80010-3","journal-title":"Neural Netw"},{"issue":"1","key":"75_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40854-020-00205-1","volume":"6","author":"A Gupta","year":"2020","unstructured":"Gupta A, Dengre V, Kheruwala HA, Shah M (2020) Comprehensive review of text-mining applications in finance. Financ Innov 6(1):1\u201325. https:\/\/doi.org\/10.1186\/s40854-020-00205-1","journal-title":"Financ Innov"},{"issue":"1","key":"75_CR29","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s41133-020-00038-8","volume":"5","author":"N Shah","year":"2020","unstructured":"Shah N, Engineer S, Bhagat N, Chauhan H, Shah M (2020) Research trends on the usage of machine learning and artificial intelligence in advertising. Augment Hum Res 5(1):19. https:\/\/doi.org\/10.1007\/s41133-020-00038-8","journal-title":"Augment Hum Res"},{"issue":"1","key":"75_CR30","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/s42492-020-00062-w","volume":"3","author":"B Naik","year":"2020","unstructured":"Naik B, Mehta A, Shah M (2020) Denouements of machine learning and multimodal diagnostic classification of Alzheimer's disease. Vis Comput Ind Biomed Art 3(1):26. https:\/\/doi.org\/10.1186\/s42492-020-00062-w","journal-title":"Vis Comput Ind Biomed Art"},{"key":"75_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2008.222","volume-title":"Paper presented at the 5th international conference on fuzzy systems and knowledge discovery","author":"P Chen","year":"2008","unstructured":"Chen P, Yuan HY, Shu XM (2008) Forecasting crime using the ARIMA model. In: Paper presented at the 5th international conference on fuzzy systems and knowledge discovery. IEEE, Ji'nan 18-20 October 2008. https:\/\/doi.org\/10.1109\/FSKD.2008.222"},{"issue":"3","key":"75_CR32","first-page":"4131","volume":"5","author":"A Rani","year":"2014","unstructured":"Rani A, Rajasree S (2014) Crime trend analysis and prediction using mahanolobis distance and dynamic time warping technique. Int J Comput Sci Inf Technol 5(3):4131\u20134135","journal-title":"Int J Comput Sci Inf Technol"},{"issue":"4","key":"75_CR33","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1016\/S0169-2070(03)00089-X","volume":"19","author":"W Gorr","year":"2003","unstructured":"Gorr W, Harries R (2003) Introduction to crime forecasting. Int J Forecast 19(4):551\u2013555. https:\/\/doi.org\/10.1016\/S0169-2070(03)00089-X","journal-title":"Int J Forecast"},{"key":"75_CR34","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.apgeog.2017.06.011","volume":"86","author":"A Rummens","year":"2017","unstructured":"Rummens A, Hardyns W, Pauwels L (2017) The use of predictive analysis in spatiotemporal crime forecasting: building and testing a model in an urban context. Appl Geogr 86:255\u2013261. https:\/\/doi.org\/10.1016\/j.apgeog.2017.06.011","journal-title":"Appl Geogr"},{"key":"75_CR35","volume-title":"Stingray: a new frontier in police surveillance. Cato Institute Policy Analysis, No. 809","author":"A Bates","year":"2017","unstructured":"Bates A (2017) Stingray: a new frontier in police surveillance. Cato Institute Policy Analysis, No. 809"},{"key":"75_CR36","doi-asserted-by":"publisher","first-page":"101","DOI":"10.2139\/ssrn.2924620","volume":"92","author":"EE Joh","year":"2017","unstructured":"Joh EE (2017) The undue influence of surveillance technology companies on policing. N Y Univ Law Rev 92:101\u2013130. https:\/\/doi.org\/10.2139\/ssrn.2924620","journal-title":"N Y Univ Law Rev"},{"issue":"7","key":"75_CR37","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1177\/0093854818771721","volume":"45","author":"A Vredeveldt","year":"2018","unstructured":"Vredeveldt A, Kesteloo L, Van Koppen PJ (2018) Writing alone or together: police officers' collaborative reports of an incident. Crim Justice Behav 45(7):1071\u20131092. https:\/\/doi.org\/10.1177\/0093854818771721","journal-title":"Crim Justice Behav"},{"key":"75_CR38","volume-title":"Brookings Institution: The Robots Are Coming: The Project On Civilian Robotics, November 2014, Pepperdine University Legal Studies Research Paper No. 2015\/3","author":"GS McNeal","year":"2014","unstructured":"McNeal GS (2014) Drones and aerial surveillance: considerations for legislators. In: Brookings Institution: The Robots Are Coming: The Project On Civilian Robotics, November 2014, Pepperdine University Legal Studies Research Paper No. 2015\/3"},{"issue":"10","key":"75_CR39","first-page":"286","volume":"11","author":"T Fatih","year":"2015","unstructured":"Fatih T, Bekir C (2015) Police use of technology to fight against crime. Eur Sci J 11(10):286\u2013296","journal-title":"Eur Sci J"},{"key":"75_CR40","first-page":"1","volume-title":"Evaluating the impact of officer worn body cameras in the Phoenix Police Department","author":"CM Katz","year":"2014","unstructured":"Katz CM, Choate DE, Ready JR, Nu\u0148o L (2014) Evaluating the impact of officer worn body cameras in the Phoenix Police Department. Center for Violence Prevention & Community Safety, Arizona State University, Phoenix, pp 1\u201343"},{"key":"75_CR41","unstructured":"Stanley J (2015) Police body-mounted cameras: with right policies in place, a win for all. https:\/\/www.aclu.org\/police-body-mounted-cameras-right-policies-place-win-all. Accessed 15 Aug 2015"},{"issue":"1","key":"75_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/mlaij.2015.2101","volume":"2","author":"L McClendon","year":"2015","unstructured":"McClendon L, Meghanathan N (2015) Using machine learning algorithms to analyze crime data. Mach Lear Appl Int J 2(1):1\u201312. https:\/\/doi.org\/10.5121\/mlaij.2015.2101","journal-title":"Mach Lear Appl Int J"},{"issue":"15","key":"75_CR43","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.1093\/bioinformatics\/bth261","volume":"20","author":"E Frank","year":"2004","unstructured":"Frank E, Hall M, Trigg L, Holmes G, Witten IH (2004) Data mining in bioinformatics using Weka. Bioinformatics 20(15):2479\u20132481.https:\/\/doi.org\/10.1093\/bioinformatics\/bth261","journal-title":"Bioinformatics"},{"key":"75_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2018.8614828","volume-title":"Paper presented at the IEEE 9th annual information technology, electronics and mobile communication conference","author":"S Kim","year":"2018","unstructured":"Kim S, Joshi P, Kalsi PS, Taheri P (2018) Crime analysis through machine learning. In: Paper presented at the IEEE 9th annual information technology, electronics and mobile communication conference. IEEE, Vancouver 1-3 November 2018. https:\/\/doi.org\/10.1109\/IEMCON.2018.8614828"},{"key":"75_CR45","volume-title":"University of Pennsylvania, CIS 520: machine learning","author":"C Tabedzki","year":"2018","unstructured":"Tabedzki C, Thirumalaiswamy A, van Vliet P (2018) Yo home to Bel-Air: predicting crime on the streets of Philadelphia. In: University of Pennsylvania, CIS 520: machine learning"},{"issue":"9","key":"75_CR46","first-page":"1037","volume":"5","author":"A Bharati","year":"2018","unstructured":"Bharati A, Sarvanaguru RAK (2018) Crime prediction and analysis using machine learning. Int Res J Eng Technol 5(9):1037\u20131042","journal-title":"Int Res J Eng Technol"},{"issue":"3","key":"75_CR47","first-page":"221","volume":"9","author":"S Prithi","year":"2020","unstructured":"Prithi S, Aravindan S, Anusuya E, Kumar AM (2020) GUI based prediction of crime rate using machine learning approach. Int J Comput Sci Mob Comput 9(3):221\u2013229","journal-title":"Int J Comput Sci Mob Comput"},{"issue":"4","key":"75_CR48","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0176244","volume":"12","author":"HW Kang","year":"2017","unstructured":"Kang HW, Kang HB (2017) Prediction of crime occurrence from multi-modal data using deep learning. PLoS One 12(4):e0176244. https:\/\/doi.org\/10.1371\/journal.pone.0176244","journal-title":"PLoS One"},{"key":"75_CR49","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.procs.2020.05.018","volume":"172","author":"SR Bandekar","year":"2020","unstructured":"Bandekar SR, Vijayalakshmi C (2020) Design and analysis of machine learning algorithms for the reduction of crime rates in India. Procedia Comput Sci 172:122\u2013127. https:\/\/doi.org\/10.1016\/j.procs.2020.05.018","journal-title":"Procedia Comput Sci"},{"key":"75_CR50","doi-asserted-by":"publisher","unstructured":"Hossain S, Abtahee A, Kashem I, Hoque M, Sarker IH (2020) Crime prediction using spatio-temporal data. arXiv preprint arXiv:2003.09322. https:\/\/doi.org\/10.1007\/978-981-15-6648-6_22","DOI":"10.1007\/978-981-15-6648-6_22"},{"key":"75_CR51","unstructured":"Stalidis P, Semertzidis T, Daras P (2018) Examining deep learning architectures for crime classification and prediction. arXiv preprint arXiv: 1812.00602. p. 1\u201313"},{"issue":"1","key":"75_CR52","first-page":"461","volume":"8","author":"P Jha","year":"2019","unstructured":"Jha P, Jha R, Sharma A (2019) Behavior analysis and crime prediction using big data and machine learning. Int J Recent Technol Eng 8(1):461\u2013468","journal-title":"Int J Recent Technol Eng"},{"issue":"2","key":"75_CR53","doi-asserted-by":"publisher","first-page":"67","DOI":"10.29121\/ijetmr.v5.i2.2018.615","volume":"5","author":"D Tyagi","year":"2018","unstructured":"Tyagi D, Sharma S (2018) An approach to crime data analysis: a systematic review. Int J Eng Technol Manag Res 5(2):67\u201374. https:\/\/doi.org\/10.29121\/ijetmr.v5.i2.2018.615","journal-title":"Int J Eng Technol Manag Res"},{"issue":"8","key":"75_CR54","doi-asserted-by":"publisher","first-page":"298","DOI":"10.3390\/ijgi7080298","volume":"7","author":"YL Lin","year":"2018","unstructured":"Lin YL, Yen MF, Yu LC (2018) Grid-based crime prediction using geographical features. ISPRS Int J Geo-Inf 7(8):298. https:\/\/doi.org\/10.3390\/ijgi7080298","journal-title":"ISPRS Int J Geo-Inf"},{"issue":"3","key":"75_CR55","first-page":"188","volume":"6","author":"E Ahishakiye","year":"2017","unstructured":"Ahishakiye E, Taremwa D, Omulo EO, Niyonzima I (2017) Crime prediction using decision tree (J48) classification algorithm. Int J Comput Inf Technol 6(3):188\u2013195","journal-title":"Int J Comput Inf Technol"},{"issue":"8","key":"75_CR56","doi-asserted-by":"publisher","first-page":"321","DOI":"10.14400\/JDC.2014.12.8.321","volume":"12","author":"CC Sun","year":"2014","unstructured":"Sun CC, Yao CL, Li X, Lee K (2014) Detecting crime types using classification algorithms. J Digit Inf Manag 12(8):321\u2013327. https:\/\/doi.org\/10.14400\/JDC.2014.12.8.321","journal-title":"J Digit Inf Manag"},{"issue":"9","key":"75_CR57","first-page":"361","volume":"7","author":"S Shojaee","year":"2013","unstructured":"Shojaee S, Mustapha A, Sidi F, Jabar MA (2013) A study on classification learning algorithms to predict crime status. Int J Digital Content Technol Appl 7(9):361\u2013369","journal-title":"Int J Digital Content Technol Appl"},{"issue":"12","key":"75_CR58","doi-asserted-by":"publisher","first-page":"44","DOI":"10.14569\/IJARAI.2015.041207","volume":"4","author":"GN Obuandike","year":"2015","unstructured":"Obuandike GN, Isah A, Alhasan J (2015) Analytical study of some selected classification algorithms in WEKA using real crime data. Int J Adv Res Artif Intell 4(12):44\u201348. https:\/\/doi.org\/10.14569\/IJARAI.2015.041207","journal-title":"Int J Adv Res Artif Intell"},{"issue":"3","key":"75_CR59","doi-asserted-by":"publisher","first-page":"4219","DOI":"10.17485\/ijst\/2013\/v6i3.6","volume":"6","author":"R Iqbal","year":"2013","unstructured":"Iqbal R, Murad MAA, Mustapha A, Panahy PHS, Khanahmadliravi N (2013) An experimental study of classification algorithms for crime prediction. Indian J Sci Technol 6(3):4219\u20134225. https:\/\/doi.org\/10.17485\/ijst\/2013\/v6i3.6","journal-title":"Indian J Sci Technol"},{"issue":"6","key":"75_CR60","first-page":"134","volume":"8","author":"M Jangra","year":"2019","unstructured":"Jangra M, Kalsi S (2019) Crime analysis for multistate network using naive Bayes classifier. Int J Comput Sci Mob Comput 8(6):134\u2013143","journal-title":"Int J Comput Sci Mob Comput"},{"key":"75_CR61","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1450\/1\/012076","volume":"1450","author":"AH Wibowo","year":"2020","unstructured":"Wibowo AH, Oesman TI (2020) The comparative analysis on the accuracy of k-NN, naive Bayes, and decision tree algorithms in predicting crimes and criminal actions in Sleman regency. J Phys Conf Ser 1450:012076. https:\/\/doi.org\/10.1088\/1742-6596\/1450\/1\/012076","journal-title":"J Phys Conf Ser"},{"key":"75_CR62","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-319-59421-7_24","volume-title":"Proceedings of the 9th KES international conference on intelligent decision technologies 2017","author":"F Vanhoenshoven","year":"2017","unstructured":"Vanhoenshoven F, N\u00e1poles G, Bielen S, Vanhoof K (2017) Fuzzy cognitive maps employing ARIMA components for time series forecasting. In: Czarnowski I, Howlett RJ, Jain LC (eds) Proceedings of the 9th KES international conference on intelligent decision technologies 2017, vol 72. Springer, Heidelberg, pp 255\u2013264. https:\/\/doi.org\/10.1007\/978-3-319-59421-7_24"},{"key":"75_CR63","first-page":"743","volume":"2000","author":"W Gorr","year":"2000","unstructured":"Gorr W, Olligschlaeger AM, Thompson Y (2000) Assessment of crime forecasting accuracy for deployment of police. Int J Forecast 2000:743\u2013754","journal-title":"Int J Forecast"},{"key":"75_CR64","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.56","volume-title":"Paper presented at the 2011 IEEE 11th international conference on data mining workshops","author":"CH Yu","year":"2011","unstructured":"Yu CH, Ward MW, Morabito M, Ding W (2011) Crime forecasting using data mining techniques. In: Paper presented at the 2011 IEEE 11th international conference on data mining workshops. IEEE, Vancouver 11-11 December 2011. https:\/\/doi.org\/10.1109\/ICDMW.2011.56"},{"key":"75_CR65","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1016\/j.physa.2018.03.084","volume":"505","author":"LGA Alves","year":"2018","unstructured":"Alves LGA, Ribeiro HV, Rodrigues FA (2018) Crime prediction through urban metrics and statistical learning. Phys A Stat Mech Appl 505:435\u2013443. https:\/\/doi.org\/10.1016\/j.physa.2018.03.084","journal-title":"Phys A Stat Mech Appl"},{"issue":"2","key":"75_CR66","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1108\/PIJPSM-11-2016-0158","volume":"41","author":"H Idrees","year":"2018","unstructured":"Idrees H, Shah M, Surette R (2018) Enhancing camera surveillance using computer vision: a research note. Polic Int J 41(2):292\u2013307. https:\/\/doi.org\/10.1108\/PIJPSM-11-2016-0158","journal-title":"Polic Int J"},{"key":"75_CR67","doi-asserted-by":"publisher","DOI":"10.1145\/957013.957126","volume-title":"Paper presented at the 11th ACM international conference on multimedia","author":"G Wu","year":"2003","unstructured":"Wu G, Wu Y, Jiao L, Wang YF, Chang EY (2003) Multi-camera spatio-temporal fusion and biased sequence-data learning for security surveillance. In: Paper presented at the 11th ACM international conference on multimedia. ACM, Berkeley 2-8 November 2003. https:\/\/doi.org\/10.1145\/957013.957126"},{"key":"75_CR68","doi-asserted-by":"publisher","DOI":"10.1145\/1099396.1099412","volume-title":"Paper presented at the 3rd ACM international workshop on video surveillance & sensor networks","author":"YF Wang","year":"2005","unstructured":"Wang YF, Chang EY, Cheng KP (2005) A video analysis framework for soft biometry security surveillance. In: Paper presented at the 3rd ACM international workshop on video surveillance & sensor networks. ACM, Hilton 11 November 2005. https:\/\/doi.org\/10.1145\/1099396.1099412"},{"issue":"1","key":"75_CR69","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MMUL.2007.3","volume":"14","author":"M Shah","year":"2007","unstructured":"Shah M, Javed O, Shafique K (2007) Automated visual surveillance in realistic scenarios. IEEE MultiMed 14(1):30\u201339. https:\/\/doi.org\/10.1109\/MMUL.2007.3","journal-title":"IEEE MultiMed"},{"issue":"3","key":"75_CR70","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1111\/1467-9280.00144","volume":"10","author":"AM Burton","year":"1999","unstructured":"Burton AM, Wilson S, Cowan M, Bruce V (1999) Face recognition in poor-quality video: evidence from security surveillance. Psychol Sci 10(3):243\u2013248. https:\/\/doi.org\/10.1111\/1467-9280.00144","journal-title":"Psychol Sci"},{"issue":"4","key":"75_CR71","doi-asserted-by":"publisher","first-page":"34","DOI":"10.9790\/0661-1804033440","volume":"18","author":"A Goyal","year":"2016","unstructured":"Goyal A, Bhatia R (2016) Automated car number plate detection system to detect far number plates. IOSR J Comput Eng 18(4):34\u201340. https:\/\/doi.org\/10.9790\/0661-1804033440","journal-title":"IOSR J Comput Eng"},{"issue":"6","key":"75_CR72","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/s11401-019-0168-y","volume":"40","author":"B Wang","year":"2019","unstructured":"Wang B, Yin PH, Bertozzi AL, Brantingham PJ, Osher SJ, Xin J (2019) Deep learning for real-time crime forecasting and its ternarization. Chin Ann Math Ser B 40(6):949\u2013966. https:\/\/doi.org\/10.1007\/s11401-019-0168-y","journal-title":"Chin Ann Math Ser B"},{"key":"75_CR73","unstructured":"Stec A, Klabjan D (2018) Forecasting crime with deep learning. arXiv preprint arXiv:1806.01486. p. 1\u201320"},{"issue":"5","key":"75_CR74","doi-asserted-by":"publisher","first-page":"2030","DOI":"10.1109\/TIE.2010.2055771","volume":"58","author":"YL Chen","year":"2011","unstructured":"Chen YL, Wu BF, Huang HY, Fan CJ (2011) A real-time vision system for nighttime vehicle detection and traffic surveillance. IEEE Trans Ind Electron 58(5):2030\u20132044. https:\/\/doi.org\/10.1109\/TIE.2010.2055771","journal-title":"IEEE Trans Ind Electron"},{"issue":"1\u20132","key":"75_CR75","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.cviu.2006.10.016","volume":"108","author":"R Poppe","year":"2007","unstructured":"Poppe R (2007) Vision-based human motion analysis: an overview. Comput Vision Image Underst 108(1\u20132):4\u201318. https:\/\/doi.org\/10.1016\/j.cviu.2006.10.016","journal-title":"Comput Vision Image Underst"},{"key":"75_CR76","unstructured":"Najjar A, Kaneko S, Miyanaga Y (2018) Crime mapping from satellite imagery via deep learning. arXiv preprint arXiv:1812.06764. p. 1\u20138"},{"key":"75_CR77","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.474","volume-title":"Paper presented at the of IEEE conference on computer vision and pattern recognition","author":"A Khosla","year":"2014","unstructured":"Khosla A, An B, Lim JJ, Torralba A (2014) Looking beyond the visible scene. In: Paper presented at the of IEEE conference on computer vision and pattern recognition. IEEE, Columbus 23-28 June 2014. https:\/\/doi.org\/10.1109\/CVPR.2014.474"},{"issue":"5\u20136","key":"75_CR78","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s00138-007-0077-z","volume":"19","author":"HM Dee","year":"2008","unstructured":"Dee HM, Velastin SA (2008) How close are we to solving the problem of automated visual surveillance? Mach Vis Appl 19(5\u20136):329\u2013343. https:\/\/doi.org\/10.1007\/s00138-007-0077-z","journal-title":"Mach Vis Appl"},{"issue":"1","key":"75_CR79","doi-asserted-by":"publisher","first-page":"21","DOI":"10.5121\/iju.2012.3103","volume":"3","author":"SS Rautaray","year":"2012","unstructured":"Rautaray SS (2012) Real time hand gesture recognition system for dynamic applications. Int J Ubi Comp 3(1):21\u201331. https:\/\/doi.org\/10.5121\/iju.2012.3103","journal-title":"Int J Ubi Comp"},{"key":"75_CR80","doi-asserted-by":"publisher","DOI":"10.1109\/ICBK.2017.3","volume-title":"Paper presented at the IEEE international conference on big knowledge","author":"Y Zhuang","year":"2017","unstructured":"Zhuang Y, Almeida M, Morabito M, Ding W (2017) Crime hot spot forecasting: a recurrent model with spatial and temporal information. In: Paper presented at the IEEE international conference on big knowledge. IEEE, Hefei 9-10 August 2017. https:\/\/doi.org\/10.1109\/ICBK.2017.3"},{"key":"75_CR81","unstructured":"Duan L, Hu T, Cheng E, Zhu JF, Gao C (2017) Deep convolutional neural networks for spatiotemporal crime prediction. In: Paper presented at the 16th international conference information and knowledge engineering. CSREA Press, Las Vegas 17-20 July 2017"}],"container-title":["Visual Computing for Industry, Biomedicine, and Art"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42492-021-00075-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42492-021-00075-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42492-021-00075-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T05:08:05Z","timestamp":1675228085000},"score":1,"resource":{"primary":{"URL":"https:\/\/vciba.springeropen.com\/articles\/10.1186\/s42492-021-00075-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,29]]},"references-count":81,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["75"],"URL":"https:\/\/doi.org\/10.1186\/s42492-021-00075-z","relation":{},"ISSN":["2524-4442"],"issn-type":[{"value":"2524-4442","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,29]]},"assertion":[{"value":"18 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"9"}}