{"id":"https://openalex.org/W4415003309","doi":"https://doi.org/10.1109/acit65614.2025.11185634","title":"Crime Pattern Detection Utilizing Power BI Visualizations on the Microsoft Fabric Data Platform With the Public data.police.uk Dataset","display_name":"Crime Pattern Detection Utilizing Power BI Visualizations on the Microsoft Fabric Data Platform With the Public data.police.uk Dataset","publication_year":2025,"publication_date":"2025-09-17","ids":{"openalex":"https://openalex.org/W4415003309","doi":"https://doi.org/10.1109/acit65614.2025.11185634"},"language":"en","primary_location":{"id":"doi:10.1109/acit65614.2025.11185634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119924974","display_name":"Aleksandar Todosijevi\u0107","orcid":null},"institutions":[{"id":"https://openalex.org/I170253739","display_name":"Singidunum University","ror":"https://ror.org/017v7rz39","country_code":"RS","type":"education","lineage":["https://openalex.org/I170253739"]}],"countries":["RS"],"is_corresponding":true,"raw_author_name":"Aleksandar Todosijevi\u0107","raw_affiliation_strings":["Singidunum University,Faculty of Informatics and Computing,Belgrade,Serbia"],"affiliations":[{"raw_affiliation_string":"Singidunum University,Faculty of Informatics and Computing,Belgrade,Serbia","institution_ids":["https://openalex.org/I170253739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006050428","display_name":"Pavle Daki\u0107","orcid":"https://orcid.org/0000-0003-3538-6284"},"institutions":[{"id":"https://openalex.org/I170253739","display_name":"Singidunum University","ror":"https://ror.org/017v7rz39","country_code":"RS","type":"education","lineage":["https://openalex.org/I170253739"]}],"countries":["RS"],"is_corresponding":false,"raw_author_name":"Pavle Daki\u0107","raw_affiliation_strings":["Singidunum University,Faculty of Informatics and Computing,Belgrade,Serbia"],"affiliations":[{"raw_affiliation_string":"Singidunum University,Faculty of Informatics and Computing,Belgrade,Serbia","institution_ids":["https://openalex.org/I170253739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5118251248","display_name":"Tja\u0161a Heri\u010dko","orcid":null},"institutions":[{"id":"https://openalex.org/I37696226","display_name":"University of Maribor","ror":"https://ror.org/01d5jce07","country_code":"SI","type":"education","lineage":["https://openalex.org/I37696226"]}],"countries":["SI"],"is_corresponding":false,"raw_author_name":"Tja\u0161a Heri\u010dko","raw_affiliation_strings":["University of Maribor,Faculty of Electrical Engineering and Computer Science,Maribor,Slovenia"],"affiliations":[{"raw_affiliation_string":"University of Maribor,Faculty of Electrical Engineering and Computer Science,Maribor,Slovenia","institution_ids":["https://openalex.org/I37696226"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106576598","display_name":"\u017divana Kljaji\u0107","orcid":null},"institutions":[{"id":"https://openalex.org/I36128562","display_name":"Pan-European University","ror":"https://ror.org/016zyd315","country_code":"SK","type":"education","lineage":["https://openalex.org/I36128562"]}],"countries":["SK"],"is_corresponding":false,"raw_author_name":"\u017divana Kljaji\u0107","raw_affiliation_strings":["Pan-European University Apeiron,Faculty of Business Economics,Banja Luka,Bosnia &amp; Herzegovina"],"affiliations":[{"raw_affiliation_string":"Pan-European University Apeiron,Faculty of Business Economics,Banja Luka,Bosnia &amp; Herzegovina","institution_ids":["https://openalex.org/I36128562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066599495","display_name":"Vladimir Todorovi\u0107","orcid":"https://orcid.org/0000-0001-9794-9527"},"institutions":[{"id":"https://openalex.org/I4068193","display_name":"University of Belgrade","ror":"https://ror.org/02qsmb048","country_code":"RS","type":"education","lineage":["https://openalex.org/I4068193"]}],"countries":["RS"],"is_corresponding":false,"raw_author_name":"Vladimir Todorovi\u0107","raw_affiliation_strings":["MB University,Faculty of Business Studies and Law,Belgrade,Serbia"],"affiliations":[{"raw_affiliation_string":"MB University,Faculty of Business Studies and Law,Belgrade,Serbia","institution_ids":["https://openalex.org/I4068193"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5119924974"],"corresponding_institution_ids":["https://openalex.org/I170253739"],"apc_list":null,"apc_paid":null,"fwci":9.2896,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.97803319,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"593","last_page":"598"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.7893000245094299,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.7893000245094299,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12111","display_name":"Industrial Vision Systems and Defect Detection","score":0.713100016117096,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.7124999761581421},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.6007999777793884},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.5892000198364258},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5590999722480774},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.5378000140190125},{"id":"https://openalex.org/keywords/crime-analysis","display_name":"Crime analysis","score":0.5062999725341797},{"id":"https://openalex.org/keywords/data-visualization","display_name":"Data visualization","score":0.49869999289512634},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.47850000858306885},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4230000078678131},{"id":"https://openalex.org/keywords/data-analysis","display_name":"Data analysis","score":0.3693999946117401}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7225000262260437},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.7124999761581421},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.6007999777793884},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.5892000198364258},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5590999722480774},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5436999797821045},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.5378000140190125},{"id":"https://openalex.org/C2776876444","wikidata":"https://www.wikidata.org/wiki/Q2845200","display_name":"Crime analysis","level":2,"score":0.5062999725341797},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.49869999289512634},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.47850000858306885},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4230000078678131},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3799000084400177},{"id":"https://openalex.org/C175801342","wikidata":"https://www.wikidata.org/wiki/Q1988917","display_name":"Data analysis","level":2,"score":0.3693999946117401},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3652999997138977},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.36390000581741333},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.3531000018119812},{"id":"https://openalex.org/C33499554","wikidata":"https://www.wikidata.org/wiki/Q1417134","display_name":"Dashboard","level":2,"score":0.3504999876022339},{"id":"https://openalex.org/C59732488","wikidata":"https://www.wikidata.org/wiki/Q2528440","display_name":"Visual analytics","level":3,"score":0.3366999924182892},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3163999915122986},{"id":"https://openalex.org/C2776348852","wikidata":"https://www.wikidata.org/wiki/Q855848","display_name":"Crime prevention","level":2,"score":0.31360000371932983},{"id":"https://openalex.org/C135572916","wikidata":"https://www.wikidata.org/wiki/Q193351","display_name":"Data warehouse","level":2,"score":0.30309998989105225},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.30079999566078186},{"id":"https://openalex.org/C2982933515","wikidata":"https://www.wikidata.org/wiki/Q104381823","display_name":"Public access","level":2,"score":0.3001999855041504},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2985000014305115},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.2946999967098236},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.2847000062465668},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2648000121116638},{"id":"https://openalex.org/C171906077","wikidata":"https://www.wikidata.org/wiki/Q1360677","display_name":"Crime scene","level":2,"score":0.26269999146461487},{"id":"https://openalex.org/C110326360","wikidata":"https://www.wikidata.org/wiki/Q17149476","display_name":"Metadata modeling","level":4,"score":0.25760000944137573},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.2542000114917755},{"id":"https://openalex.org/C9770341","wikidata":"https://www.wikidata.org/wiki/Q1938983","display_name":"Geospatial analysis","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit65614.2025.11185634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335551","display_name":"Erasmus+","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2401350435","https://openalex.org/W2798687276","https://openalex.org/W2922522433","https://openalex.org/W3048274980","https://openalex.org/W3175442890","https://openalex.org/W4392013587","https://openalex.org/W4406461019","https://openalex.org/W4406471252","https://openalex.org/W4410042048"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,40],"big":[4],"data-driven":[5],"platform":[6,133],"for":[7,63,95],"crime":[8,48,67,100,118,157],"pattern":[9],"detection":[10],"using":[11],"Power":[12,87],"BI":[13,88],"visualizations":[14,94],"on":[15],"Microsoft":[16],"Fabric,":[17],"built":[18],"upon":[19],"the":[20,132],"public":[21,164],"data.police.uk":[22],"dataset.":[23],"Law":[24],"enforcement":[25],"agencies":[26],"require":[27],"scalable":[28],"analytics":[29,149],"to":[30,44,66,106,113,156],"extract":[31],"actionable":[32],"insights":[33],"from":[34,56],"large,":[35],"complex":[36],"datasets.":[37],"We":[38],"implemented":[39],"Data":[41],"Lakehouse":[42],"architecture":[43],"process":[45],"around":[46],"8,500":[47],"data":[49,85,142,158],"files":[50],"i":[51],"n":[52],"C":[53],"SV":[54],"format":[55],"multiple":[57],"regions,":[58],"with":[59],"Python-based":[60],"metadata":[61],"cataloging":[62],"structured":[64],"access":[65,155],"outcomes,":[68],"stop-and-search":[69],"records,":[70],"and":[71,75,82,92,98,116,150,163],"street-level":[72],"incidents.":[73],"Dataflows":[74],"Notebooks":[76],"in":[77],"Fabric":[78],"addressed":[79],"regional":[80,117],"inconsistencies":[81],"enabled":[83],"efficient":[84],"transformation.":[86],"reports":[89],"provided":[90],"intuitive":[91],"interactive":[93],"exploring":[96],"geographic":[97],"temporal":[99],"trends.":[101],"Performance":[102],"testing":[103],"demonstrated":[104],"up":[105],"40%":[107],"faster":[108],"query":[109],"response":[110],"times":[111],"compared":[112],"traditional":[114],"warehouses,":[115],"analysis":[119],"that":[120,131],"previously":[121],"took":[122],"days":[123],"was":[124],"completed":[125],"within":[126],"hours.":[127],"The":[128],"results":[129],"indicated":[130],"scaled":[134],"efficiently":[135],"while":[136],"maintaining":[137],"stable":[138],"performance":[139],"under":[140],"growing":[141],"volumes.":[143],"Our":[144],"approach":[145],"demonstrates":[146],"how":[147],"unified":[148],"visualization":[151],"environments":[152],"can":[153],"democratize":[154],"insights,":[159],"supporting":[160],"evidence-based":[161],"policing":[162],"safety":[165],"decision-making.":[166]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
