<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462023000300719</article-id>
<article-id pub-id-type="doi">10.13053/cys-27-3-4110</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Spatiotemporal Bandits Crime Prediction from Web News Archives Analysis]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ature]]></surname>
<given-names><![CDATA[Angbera]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
<xref ref-type="aff" rid="Aaf"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Huah Yong]]></surname>
<given-names><![CDATA[Chan]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universiti Sains Malaysia School of Computer Sciences ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Malaysia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Joseph Sarwuan Tarka University Department of Computer Science ]]></institution>
<addr-line><![CDATA[Makurdi ]]></addr-line>
<country>Nigeria</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2023</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2023</year>
</pub-date>
<volume>27</volume>
<numero>3</numero>
<fpage>719</fpage>
<lpage>731</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462023000300719&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462023000300719&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462023000300719&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: It is said that prevention is better than cure. Hence the idea of preventing crime from occurring is the best for public safety. This can only be achieved if the law enforcement agencies have a prior knowledge of where and when a crime will occur. A crime is an act that is criminal under the law. It is detrimental to society to comprehend crime in order to prevent criminal action. In order to prevent and solve crime, data-driven research is beneficial. Bandit crime has been on the rise in Nigeria, thereby causing public disorder. In this study, from the perspective of artificial intelligence, a novel hybrid deep learning model for crime prediction is proposed. Bandits crime datasets are obtained online through news archives which are less expensive. Spatial crime analysis was carried out on the novel bandit crime dataset obtained and prediction were made using the newly proposed DeCXGBoost model. A comparative analysis was performed with respect to precision, recall, f-measure, and accuracy with other crime predictions algorithms and the proposed model outperformed the other algorithms with accuracy of 99.9999%.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Crime prediction]]></kwd>
<kwd lng="en"><![CDATA[bandit crime]]></kwd>
<kwd lng="en"><![CDATA[machine learning]]></kwd>
<kwd lng="en"><![CDATA[deep learning]]></kwd>
<kwd lng="en"><![CDATA[spatiotemporal]]></kwd>
<kwd lng="en"><![CDATA[ensemble methods]]></kwd>
<kwd lng="en"><![CDATA[artificial intelligence]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agarwal]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Nagpal]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Sehgal]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime analysis using K-Means clustering]]></article-title>
<source><![CDATA[International Journal of Computer Applications]]></source>
<year>2013</year>
<volume>83</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-4</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Butt]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[S. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Shabbir]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Erum]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[GIS based surveillance of road traffic accidents (RTA) risk for Rawalpindi city: A geo-statistical approach]]></article-title>
<source><![CDATA[Kuwait Journal of Science]]></source>
<year>2017</year>
<volume>44</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>129-34</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Catlett]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Cesario]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Talia]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Vinci]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spatio-temporal crime predictions in smart cities: A data-driven approach and experiments]]></article-title>
<source><![CDATA[Pervasive and Mobile Computing]]></source>
<year>2019</year>
<volume>53</volume>
<page-range>62-74</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dhaktode]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Vernekar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Vyas]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime rate prediction using K-Means]]></article-title>
<source><![CDATA[IOSR Journal of Engineering]]></source>
<year>2017</year>
<page-range>25-9</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deep convolutional neural networks for spatiotemporal crime prediction]]></source>
<year>2017</year>
<conf-name><![CDATA[ International Conference on Information and Knowledge Engineering (IKE)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>61-7</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Esquivel]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Nicolis]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Peralta]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Mateu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spatio-temporal prediction of baltimore crime events using CLSTM neural networks]]></article-title>
<source><![CDATA[Journals &amp; Magazines, IEEE Access]]></source>
<year>2020</year>
<volume>8</volume>
<page-range>209101-12</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hassan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Abdel-Qader]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Performance analysis of majority vote combiner for multiple classifier systems]]></source>
<year>2015</year>
<conf-name><![CDATA[ 14th International Conference on Machine Learning and Applications, ICMLA´15]]></conf-name>
<conf-loc> </conf-loc>
<page-range>89-95</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hatcher]]></surname>
<given-names><![CDATA[W. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey of deep learning: platforms, applications and emerging research trends]]></article-title>
<source><![CDATA[Journals &amp; Magazines]]></source>
<year>2018</year>
<volume>6</volume>
<page-range>24411-32</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hossain]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Abtahee]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kashem]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoque]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarker]]></surname>
<given-names><![CDATA[I. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chaubey]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Parikh]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Amin]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Crime prediction using spatio-temporal data]]></source>
<year>2020</year>
<volume>1235</volume>
<conf-name><![CDATA[ Computing Science, Communication and Security, COMS2 2020, Communications in Computer and Information Science]]></conf-name>
<conf-loc> </conf-loc>
<page-range>277-89</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jana]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modeling of hotspot detection using cluster outlier analysis and Getis-Ord Gi* statistic of educational development in upper-primary level. India]]></article-title>
<source><![CDATA[Modeling Earth Systems and Environment]]></source>
<year>2016</year>
<volume>2</volume>
<numero>60</numero>
<issue>60</issue>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Joshi]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Srivastava]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improving classification accuracy using ensemble learning technique (using different decision trees)]]></article-title>
<source><![CDATA[]]></source>
<year>2014</year>
<volume>3</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>727-32</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Malathi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Santhosh-Baboo]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An enhanced algorithm to predict a future crime using data mining]]></article-title>
<source><![CDATA[International Journal of Computer Applications]]></source>
<year>2011</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matijosaitiene]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Jaume]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gilkey]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prediction of hourly effect of land use on crime]]></article-title>
<source><![CDATA[ISPRS International Journal of Geo-Information]]></source>
<year>2019</year>
<volume>8</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Narassiguin]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bibimoune]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Elghazel]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Aussem]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An extensive empirical comparison of ensemble learning methods for binary classification]]></article-title>
<source><![CDATA[Pattern Analysis and Applications]]></source>
<year>2016</year>
<volume>19</volume>
<page-range>1093-128</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ngarambe]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Irakoze]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yun]]></surname>
<given-names><![CDATA[G. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparative performance of machine learning algorithms in the prediction of indoor daylight illuminances]]></article-title>
<source><![CDATA[Sustainability]]></source>
<year>2020</year>
<volume>12</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1-22</page-range><publisher-loc><![CDATA[Switzerland ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Padhi]]></surname>
<given-names><![CDATA[D. K]]></given-names>
</name>
<name>
<surname><![CDATA[Padhy]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Mishra]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Intraday stock prices forecasting using an autoressive model]]></source>
<year>2020</year>
<conf-name><![CDATA[ Engineering and Applications (ICCSEA)]]></conf-name>
<conf-loc>Gunupur, India </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pflueger]]></surname>
<given-names><![CDATA[M. O.]]></given-names>
</name>
<name>
<surname><![CDATA[Franke]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Graf]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hachtel]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predicting general criminal recidivism in mentally disordered offenders using a random forest approach]]></article-title>
<source><![CDATA[BMC Psychiatry]]></source>
<year>2015</year>
<volume>15</volume>
<numero>62</numero>
<issue>62</issue>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Raghavendhar]]></surname>
<given-names><![CDATA[T. V]]></given-names>
</name>
<name>
<surname><![CDATA[Joshy]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mahaalakshmi]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ashutosh]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime prediction and analysis using clustering approaches and regression methods]]></article-title>
<source><![CDATA[IJCAT International Journal of Computing and Technology]]></source>
<year>2018</year>
<volume>5</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>61-6</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramírez-Alcocer]]></surname>
<given-names><![CDATA[U. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Tello-Leal]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Mata-Torres]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Predicting incidents of crime through LSTM neural networks in smart city domain]]></source>
<year>2019</year>
<conf-name><![CDATA[ The Eighth International Conference on Smart Cities, Systems, Devices and Technologies]]></conf-name>
<conf-loc> </conf-loc>
<page-range>32-7</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ristea]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Al Boni]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Resch]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Gerber]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Leitner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spatial crime distribution and prediction for sporting events using social media]]></article-title>
<source><![CDATA[International Journal of Geographical Information Science]]></source>
<year>2020</year>
<volume>34</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1708-39</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rojarath]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Songpan]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Pong-Inwong]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Improved ensemble learning for classification techniques based on majority voting]]></source>
<year>2016</year>
<conf-name><![CDATA[ 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>107-10</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Russnák]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ondrejka]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Herman]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Kubí&#269;ek]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Mertel]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Visualization and spatial analysis of police open data as a part of community policing in the city of Pardubice (Czech Republic)]]></article-title>
<source><![CDATA[Annals of GIS]]></source>
<year>2016</year>
<volume>22</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>187-201</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stec]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Klabjan]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Forecasting crime with deep learning]]></article-title>
<source><![CDATA[Machine learning]]></source>
<year>2018</year>
<page-range>1-20</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tabangin]]></surname>
<given-names><![CDATA[D. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Flores]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Emperador]]></surname>
<given-names><![CDATA[N. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Investigating crime hotspot places and their implication to urban environmental design: A geographic visualization and data mining approach]]></article-title>
<source><![CDATA[World Academy of Science, Engineering and Technology]]></source>
<year>2008</year>
<volume>2</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>210-8</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Toppireddy]]></surname>
<given-names><![CDATA[H. K. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Saini]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Mahajan]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime prediction &amp; monitoring framework based on spatial analysis]]></article-title>
<source><![CDATA[Procedia Computer Science]]></source>
<year>2018</year>
<volume>132</volume>
<page-range>696-705</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Umair]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarfraz]]></surname>
<given-names><![CDATA[M. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmad]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Habib]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Ullah]]></surname>
<given-names><![CDATA[M. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Mazzara]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spatiotemporal analysis of web news archives for crime prediction]]></article-title>
<source><![CDATA[Applied Sciences]]></source>
<year>2020</year>
<volume>10</volume>
<numero>22</numero>
<issue>22</issue>
<page-range>1-16</page-range><publisher-loc><![CDATA[Switzerland ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Verma]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mehta]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[A comparative study of ensemble learning methods for classification in bioinformatics]]></source>
<year>2017</year>
<conf-name><![CDATA[ 7th International Conference on Cloud Computing, Data Science Engineering Confluence]]></conf-name>
<conf-date>2017</conf-date>
<conf-loc> </conf-loc>
<page-range>155-8</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Comparison among methods of ensemble learning]]></source>
<year>2013</year>
<conf-name><![CDATA[ International Symposium on Biometrics and Security Technologies, ISBAST´13]]></conf-name>
<conf-date>2013</conf-date>
<conf-loc> </conf-loc>
<page-range>286-90</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Cao]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Jia]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<source><![CDATA[Advances in Intelligent Systems and Computing]]></source>
<year>2020</year>
<volume>905</volume>
<publisher-name><![CDATA[Springer International Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A spatio-temporal method for crime prediction using historical crime data and transitional zones identified from nightlight imagery]]></article-title>
<source><![CDATA[International Journal of Geographical Information Science]]></source>
<year>2020</year>
<volume>34</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1740-64</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Classifiers selection for ensemble learning based on accuracy and diversity]]></article-title>
<source><![CDATA[Procedia Engineering]]></source>
<year>2011</year>
<volume>15</volume>
<page-range>4266-70</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yuki]]></surname>
<given-names><![CDATA[J. Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Mahfil Quader Sakib]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zamal]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Habibullah]]></surname>
<given-names><![CDATA[K. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Predicting crime using time and location data]]></source>
<year>2019</year>
<conf-name><![CDATA[ International Conference Proceeding Series]]></conf-name>
<conf-loc> </conf-loc>
<page-range>124-8</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Za&#8217;in]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Pratama]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Lughofer]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Anavatti]]></surname>
<given-names><![CDATA[S. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evolving type-2 web news mining]]></article-title>
<source><![CDATA[Applied Soft Computing Journal]]></source>
<year>2017</year>
<volume>54</volume>
<page-range>200-20</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zakariah]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Classification of large datasets using random forest algorithm in various applications: Survey]]></article-title>
<source><![CDATA[International Journal of Engineering and Innovative Technology]]></source>
<year>2014</year>
<volume>4</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>189-98</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[D. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Chao]]></surname>
<given-names><![CDATA[L. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Constructing better classifier ensemble based on weighted accuracy and diversity measure]]></article-title>
<source><![CDATA[The Scientific World Journal]]></source>
<year>2014</year>
<volume>2014</volume>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
