{"response":{"docs":[{"system_create_dtsi":"2020-05-19T16:17:06Z","system_modified_dtsi":"2020-10-13T20:25:13Z","has_model_ssim":["Image"],"id":"tb09j700z","accessControl_ssim":["ce7a8404-27da-4b0f-b2ab-08b5f25ae2f0"],"hasRelatedMediaFragment_ssim":["2b88qd65m"],"hasRelatedImage_ssim":["2b88qd65m"],"depositor_ssim":["simpsoncenter@uc.edu"],"depositor_tesim":["simpsoncenter@uc.edu"],"title_tesim":["062_DC_.tif"],"date_uploaded_dtsi":"2020-05-19T16:17:05Z","date_modified_ssi":"Tue Oct 13 16:25:13 2020","isPartOf_ssim":["admin_set/default"],"college_tesim":["Design, Architecture, Art and Planning"],"department_tesim":["Simpson Center for Urban Futures "],"creator_tesim":["Center, Simpson"],"subject_tesim":["Architecture, Planning, Future City "],"language_tesim":["English "],"description_tesim":["Sketch of fire escape building for victory city cafeteria F-Family Cart Eating Area. Two pieces of paper taped onto one larger piece of paper "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["1988/04/28"],"thumbnail_path_ss":"/downloads/2b88qd65m?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["2b88qd65m"],"file_set_ids_ssim":["2b88qd65m"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000000062_DC_TIF","human_readable_type_tesim":["Image"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["simpsoncenter@uc.edu"],"nesting_collection__pathnames_ssim":["tb09j700z"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697129641047752704,"timestamp":"2021-04-15T17:49:10.278Z","score":0.00049999997},{"system_create_dtsi":"2020-05-19T16:17:05Z","system_modified_dtsi":"2020-10-13T20:25:17Z","has_model_ssim":["Image"],"id":"jq085m26t","accessControl_ssim":["ab98e197-2203-47d3-b20d-3e9293f73cb4"],"hasRelatedMediaFragment_ssim":["7w62f9486"],"hasRelatedImage_ssim":["7w62f9486"],"depositor_ssim":["simpsoncenter@uc.edu"],"depositor_tesim":["simpsoncenter@uc.edu"],"title_tesim":["040_DC.tif"],"date_uploaded_dtsi":"2020-05-19T16:17:05Z","date_modified_ssi":"Tue Oct 13 16:25:17 2020","isPartOf_ssim":["admin_set/default"],"college_tesim":["Design, Architecture, Art and Planning"],"department_tesim":["Simpson Center for Urban Futures "],"creator_tesim":["Center, Simpson"],"subject_tesim":["Architecture, Planning, Future City "],"language_tesim":["English "],"description_tesim":["Illustration of ground view of cafeteria (loose sketch) "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"thumbnail_path_ss":"/downloads/7w62f9486?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["7w62f9486"],"file_set_ids_ssim":["7w62f9486"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000000040_DCTIF","human_readable_type_tesim":["Image"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["simpsoncenter@uc.edu"],"nesting_collection__pathnames_ssim":["jq085m26t"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697091639475961856,"timestamp":"2021-04-15T07:45:09.156Z","score":0.00049999997},{"system_create_dtsi":"2020-05-19T16:17:05Z","system_modified_dtsi":"2020-10-13T20:25:16Z","has_model_ssim":["Image"],"id":"zw12z664r","accessControl_ssim":["03f0e933-3570-482d-a466-66c7b7691512"],"hasRelatedMediaFragment_ssim":["79407z41h"],"hasRelatedImage_ssim":["79407z41h"],"depositor_ssim":["simpsoncenter@uc.edu"],"depositor_tesim":["simpsoncenter@uc.edu"],"title_tesim":["015_DC.tif"],"date_uploaded_dtsi":"2020-05-19T16:17:05Z","date_modified_ssi":"Tue Oct 13 16:25:15 2020","isPartOf_ssim":["admin_set/default"],"college_tesim":["Design, Architecture, Art and Planning"],"department_tesim":["Simpson Center for Urban Futures "],"creator_tesim":["Center, Simpson"],"subject_tesim":["Architecture, Planning, Future City "],"language_tesim":["English "],"description_tesim":["Cafeteria sketch on the back of apartment building statistics "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"thumbnail_path_ss":"/downloads/79407z41h?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["79407z41h"],"file_set_ids_ssim":["79407z41h"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000000015_DCTIF","human_readable_type_tesim":["Image"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["simpsoncenter@uc.edu"],"nesting_collection__pathnames_ssim":["zw12z664r"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697098444753076224,"timestamp":"2021-04-15T09:33:19.174Z","score":0.00049999997},{"system_create_dtsi":"2020-05-19T16:17:05Z","system_modified_dtsi":"2020-10-13T20:25:15Z","has_model_ssim":["Image"],"id":"z890rv703","accessControl_ssim":["097f6765-080b-4720-9ec3-690291edddac"],"hasRelatedMediaFragment_ssim":["bn999821s"],"hasRelatedImage_ssim":["bn999821s"],"depositor_ssim":["simpsoncenter@uc.edu"],"depositor_tesim":["simpsoncenter@uc.edu"],"title_tesim":["007_DC.tif"],"date_uploaded_dtsi":"2020-05-19T16:17:05Z","date_modified_ssi":"Tue Oct 13 16:25:14 2020","isPartOf_ssim":["admin_set/default"],"college_tesim":["Design, Architecture, Art and Planning"],"department_tesim":["Simpson Center for Urban Futures "],"creator_tesim":["Center, Simpson"],"subject_tesim":["Architecture, Planning, Future City "],"language_tesim":["English "],"description_tesim":["Cafeteria sketch on the back of democrat flyer "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"thumbnail_path_ss":"/downloads/bn999821s?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["bn999821s"],"file_set_ids_ssim":["bn999821s"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000000007_DCTIF","human_readable_type_tesim":["Image"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["simpsoncenter@uc.edu"],"nesting_collection__pathnames_ssim":["z890rv703"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697106806545842176,"timestamp":"2021-04-15T11:46:13.601Z","score":0.00049999997},{"system_create_dtsi":"2020-05-19T13:41:48Z","system_modified_dtsi":"2020-05-19T13:43:54Z","has_model_ssim":["StudentWork"],"id":"xs55md14n","accessControl_ssim":["46cb1547-f411-44f3-a8f2-dbba3c0364dd"],"hasRelatedMediaFragment_ssim":["xd07gt94c"],"hasRelatedImage_ssim":["xd07gt94c"],"depositor_ssim":["ceas.library@uc.edu"],"depositor_tesim":["ceas.library@uc.edu"],"title_tesim":["2020 BUV (basic utility vehicle): steering and suspension"],"date_uploaded_dtsi":"2020-05-19T13:41:47Z","date_modified_dtsi":"2020-05-19T13:42:57Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/8ygf-hr22"],"advisor_tesim":["Cummings, Moise"],"degree_tesim":["BS"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["Mechanical Engineering Technology"],"genre_tesim":["Document"],"creator_tesim":["Lamascid, Gustavo"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Senior design capstone report"],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["sq87bw072","xd07gt94c"],"member_of_collections_ssim":["CEAS Mechanical Engineering Technology (MET) Senior Design Projects"],"member_of_collection_ids_ssim":["bc387z838"],"file_set_ids_ssim":["sq87bw072","xd07gt94c"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000002020 BUV BASIC UTILITY VEHICLE STEERING AND SUSPENSION","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ceas.library@uc.edu"],"nesting_collection__ancestors_ssim":["xg94hr243","xg94hr243/bc387z838"],"nesting_collection__parent_ids_ssim":["bc387z838"],"nesting_collection__pathnames_ssim":["xg94hr243/bc387z838/xs55md14n"],"nesting_collection__deepest_nested_depth_isi":3,"_version_":1697090647101538304,"timestamp":"2021-04-15T07:29:22.754Z","score":0.00049999997},{"system_create_dtsi":"2020-05-18T17:33:52Z","system_modified_dtsi":"2020-05-18T17:36:09Z","has_model_ssim":["StudentWork"],"id":"g445cf39n","accessControl_ssim":["1b354a2b-1781-4bc0-92bd-a082eec131ee"],"hasRelatedMediaFragment_ssim":["cn69m539w"],"hasRelatedImage_ssim":["cn69m539w"],"depositor_ssim":["ceas.library@uc.edu"],"depositor_tesim":["ceas.library@uc.edu"],"title_tesim":["46mm end cap: cost savings"],"date_uploaded_dtsi":"2020-05-18T17:33:51Z","date_modified_dtsi":"2020-05-18T17:34:49Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/zdzy-3k11"],"advisor_tesim":["Al-Ubaidi, Muthar"],"degree_tesim":["BS"],"college_tesim":["Engineering and Applied Science"],"department_tesim":["Mechanical Engineering Technology"],"genre_tesim":["Document"],"creator_tesim":["McCartney, Dan"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Senior design capstone report"],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"thumbnail_path_ss":"/downloads/cn69m539w?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["9g54xk04m","cn69m539w"],"member_of_collections_ssim":["CEAS Mechanical Engineering Technology (MET) Senior Design Projects"],"member_of_collection_ids_ssim":["bc387z838"],"file_set_ids_ssim":["9g54xk04m","cn69m539w"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"00000000000000000046MM END CAP COST SAVINGS","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["ceas.library@uc.edu"],"nesting_collection__ancestors_ssim":["xg94hr243","xg94hr243/bc387z838"],"nesting_collection__parent_ids_ssim":["bc387z838"],"nesting_collection__pathnames_ssim":["xg94hr243/bc387z838/g445cf39n"],"nesting_collection__deepest_nested_depth_isi":3,"_version_":1697090650650968064,"timestamp":"2021-04-15T07:29:26.139Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:11:49Z","system_modified_dtsi":"2020-05-15T23:11:57Z","has_model_ssim":["Article"],"id":"nc580n99m","accessControl_ssim":["f0088021-199e-4cbb-8ce7-fd6886b00978"],"hasRelatedMediaFragment_ssim":["8049g6245"],"hasRelatedImage_ssim":["8049g6245"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["IoT Emergency Detection Devices"],"date_uploaded_dtsi":"2020-05-15T23:11:48Z","date_modified_dtsi":"2020-05-15T23:11:48Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/nedb-ds91"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Tresenwriter, Isaac"],"publisher_tesim":["University of Cincinnati "],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["In a world where technology continues to vastly grow and improve, IoT devices have increasingly become more and more a part of people’s everyday lives. Although that is the case there is a need to understand how to better use these devices for threat detection. This paper presents early work to understand gaps in this regard using a review of previously used techniques to identify known threats to households. Through the use of smart home device clusters we seek to effectively reduce the amount of false alarms and create a more reliable resource for home residents."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/18"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/8049g6245?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["8049g6245"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["8049g6245"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"IOT EMERGENCY DETECTION DEVICES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/nc580n99m"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086687912394752,"timestamp":"2021-04-15T06:26:26.976Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:09:49Z","system_modified_dtsi":"2020-05-15T23:14:46Z","has_model_ssim":["Article"],"id":"m326m3092","accessControl_ssim":["49fa97c5-46f8-4606-a4c9-9b710c33221e"],"hasRelatedMediaFragment_ssim":["p2676w829"],"hasRelatedImage_ssim":["p2676w829"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Securing A Small Office Home Office Network: Integrating A Supervised Neural Network Algorithm"],"date_uploaded_dtsi":"2020-05-15T23:09:49Z","date_modified_dtsi":"2020-05-15T23:09:49Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/r3qd-fz22"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Azumah, Sylvia Worlali","Li, Chengcheng"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["Small office home office networks have become a target for many threat actors, hackers and cyber attackers and hence there is an urgent need to secure the network from such attackers. Most small office home office network users do not see the need to provide enough security to their networks because they assume no one is going to hack them forgetting that the biggest threat of our small home networks today comes from the outside. The challenge of misconfiguration of routers, firewalls and default configurations in our small home networks renders the network vulnerable to attacks such as DDos , phishing attacks , virus and other network attacks hence the need to implement a  detection algorithm to help identify flaws in the pattern of the small office network. It turns out that about 75% of existing approaches focused on intrusion detection in 802.11 wireless networks of a SOHO and not the entire network. These approaches do not efficiently secure the network entirely leaving the rest prone to attacks can occur with or without the internet. This paper proposes to add another layer of security to the other preventive measures in a  SOHO network by designing, implementing and testing a supervised neural network algorithm to identify attacks on the small home network and also to send a notification to users to keep them informed of the activities on their network. The supervised neural network algorithm will have a dataset representing both attacks and non-attacks which will be used in the training phase. The system should be able to detect and identify the various attacks and anomalies when they occur on the network and help keep the users informed.  \r\n"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/17"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/p2676w829?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["p2676w829"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["p2676w829"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SECURING A SMALL OFFICE HOME OFFICE NETWORK INTEGRATING A SUPERVISED NEURAL NETWORK ALGORITHM","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/m326m3092"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086680363696128,"timestamp":"2021-04-15T06:26:19.778Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:08:12Z","system_modified_dtsi":"2020-05-15T23:15:13Z","has_model_ssim":["Article"],"id":"hq37vp88t","accessControl_ssim":["3ebee09e-1b06-4376-b2b7-07f36fd09562"],"hasRelatedMediaFragment_ssim":["5425kc00j"],"hasRelatedImage_ssim":["5425kc00j"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Implementation of a hybrid machine learning technique for network intrusion detection"],"date_uploaded_dtsi":"2020-05-15T23:08:11Z","date_modified_dtsi":"2020-05-15T23:08:11Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/0nqd-j038"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Eichie, Maxwell"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["The current rapid growth in the computer and internet development has ushered in numerous cybersecurity challenges which are constantly evolving with time. The current cybersecurity solutions are no longer optimal in tackling these emerging cyber threats and attacks. This paper proposes the creation of a cybersecurity dataset to be used for a hybrid machine learning (ML) approach of supervised and unsupervised learning for an effective intrusion detection system. The proposed model entails a five-stage process which starts at the setup of a simulated network environment of network attacks to generate a dataset which feeds into the data normalization stage and then to data dimension reduction stage using the principal component analysis as a feature extraction method after which the data of reduced dimension is clustered using the k-Means method to bring about a new data set with fewer features. This new dataset is afterward classified using the enhanced support vector machine (ESVM). The proposed model is expected to provide a high-quality dataset and an efficient intrusion detection system in terms of intrusion detection accuracy of 99.5%, short train time of 3seconds and a low false-positive rate of 0.4%. "],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/16"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/5425kc00j?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["5425kc00j"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["5425kc00j"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"IMPLEMENTATION OF A HYBRID MACHINE LEARNING TECHNIQUE FOR NETWORK INTRUSION DETECTION","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/hq37vp88t"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086681729990656,"timestamp":"2021-04-15T06:26:21.081Z","score":0.00049999997},{"system_create_dtsi":"2020-05-15T23:06:29Z","system_modified_dtsi":"2020-05-15T23:15:31Z","has_model_ssim":["Article"],"id":"f1881n26p","accessControl_ssim":["ca9b438e-5e61-4d3f-9d85-8b51bfa48298"],"hasRelatedMediaFragment_ssim":["1v53jz342"],"hasRelatedImage_ssim":["1v53jz342"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Crime Hot Spots: Proposing a new model for appropriate identification of crime hot spots"],"date_uploaded_dtsi":"2020-05-15T23:06:28Z","date_modified_dtsi":"2020-05-15T23:06:28Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/x6f0-b209"],"journal_title_tesim":["IT Research Symposium’20"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["- School of Information Technology"],"creator_tesim":["Hussein, Abdul Aziz","Ozer, Murat"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Technology"],"language_tesim":["English"],"description_tesim":["This research focuses on two fundamental aspects of hot spot policing that have been widely neglected by previous scholarly research. These aspects include the adequate concentration of crime at a smaller geographical unit to be considered a crime hot spot, and the cost-benefit implication of focusing limited police resources on such a smaller place in an effort to prevent criminal activities. Substantial limitations in call-t- service data from police departments raise concern on the purported concentration of crime at places that warrant such strategy in the first place. We will examine data from the Cincinnati Police Department and propose guidelines on adopting a threshold when designating places as crime hot spots, using time and cost-benefit analysis as key determinants."],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2020-04-14"],"related_url_tesim":["https://itexpo20.live/research/15"],"source_tesim":["IT Research Symposium’20"],"thumbnail_path_ss":"/downloads/1v53jz342?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["1v53jz342"],"member_of_collections_ssim":["2020 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["ws859g993"],"file_set_ids_ssim":["1v53jz342"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CRIME HOT SPOTS PROPOSING A NEW MODEL FOR APPROPRIATE IDENTIFICATION OF CRIME HOT SPOTS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["ws859g993"],"nesting_collection__parent_ids_ssim":["ws859g993"],"nesting_collection__pathnames_ssim":["ws859g993/f1881n26p"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697086682252181504,"timestamp":"2021-04-15T06:26:21.579Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Image","hits":4793,"label":"Image"},{"value":"Dataset","hits":3723,"label":"Dataset"},{"value":"Etd","hits":994,"label":"Etd"},{"value":"Document","hits":978,"label":"Document"},{"value":"Article","hits":963,"label":"Article"},{"value":"Student Work","hits":755,"label":"Student Work"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Snider, Jerry A. (senior collector)","hits":3484,"label":"Snider, Jerry A. (senior collector)"},{"value":"Tepe, Eric (record/image)","hits":3484,"label":"Tepe, Eric (record/image)"},{"value":"Huston, Ron","hits":2344,"label":"Huston, Ron"},{"value":"He, Si (co-collector)","hits":1093,"label":"He, Si (co-collector)"},{"value":"Meyer, David L.","hits":631,"label":"Meyer, David L."},{"value":"Davis, Jack","hits":611,"label":"Davis, Jack"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Kingdom: Plantae","hits":3453,"label":"Kingdom: Plantae"},{"value":"Phylum: Bryophyta","hits":3146,"label":"Phylum: Bryophyta"},{"value":"Class: Bryopsida","hits":2902,"label":"Class: Bryopsida"},{"value":"Biology","hits":2361,"label":"Biology"},{"value":"Order: Hypnales","hits":1190,"label":"Order: Hypnales"},{"value":"Order: Dicranales","hits":369,"label":"Order: Dicranales"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":6145,"label":"Arts and Sciences"},{"value":"Engineering and Applied Science","hits":2769,"label":"Engineering and Applied Science"},{"value":"Design, Architecture, Art and Planning","hits":1235,"label":"Design, Architecture, Art and Planning"},{"value":"Other","hits":1070,"label":"Other"},{"value":"Libraries","hits":663,"label":"Libraries"},{"value":"Education, Criminal Justice, and Human Services","hits":540,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Biological Sciences","hits":3503,"label":"Biological Sciences"},{"value":"Mechanical and Materials Engineering","hits":2264,"label":"Mechanical and Materials Engineering"},{"value":"Other","hits":992,"label":"Other"},{"value":"Simpson Center for Urban Futures ","hits":784,"label":"Simpson Center for Urban Futures "},{"value":"Classics","hits":769,"label":"Classics"},{"value":"Romance \u0026 Arabic Languages \u0026 Literat","hits":644,"label":"Romance \u0026 Arabic Languages \u0026 Literat"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1950,"label":"English"},{"value":"en_US","hits":224,"label":"en_US"},{"value":"English ","hits":145,"label":"English "},{"value":"Russian","hits":34,"label":"Russian"},{"value":"Spanish","hits":24,"label":"Spanish"},{"value":"German","hits":19,"label":"German"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)","hits":3484,"label":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)"},{"value":"University of Cincinnati","hits":3005,"label":"University of Cincinnati"},{"value":"University of Cincinnati: Romance and Arabic Languages and Literatures","hits":603,"label":"University of Cincinnati: Romance and Arabic Languages and Literatures"},{"value":"University of Cincinnati ","hits":100,"label":"University of Cincinnati "},{"value":"viDEO sAVant","hits":92,"label":"viDEO sAVant"},{"value":"Benjamin Britton","hits":60,"label":"Benjamin Britton"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2017","hits":2305,"label":"2017"},{"value":"","hits":211,"label":""},{"value":"2001-03-31","hits":181,"label":"2001-03-31"},{"value":"2017-10-31","hits":163,"label":"2017-10-31"},{"value":"2001-03-30","hits":156,"label":"2001-03-30"},{"value":"2001-03-29","hits":127,"label":"2001-03-29"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"1r66j250c","hits":3484,"label":"1r66j250c"},{"value":"79407x47z","hits":2123,"label":"79407x47z"},{"value":"05741w32f","hits":341,"label":"05741w32f"},{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"x346d4806","hits":219,"label":"x346d4806"},{"value":"bc387z838","hits":189,"label":"bc387z838"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":12568,"label":"Work"},{"value":"Collection","hits":171,"label":"Collection"}],"label":"Generic Type Sim"}],"pages":{"current_page":262,"next_page":263,"prev_page":261,"total_pages":1274,"limit_value":10,"offset_value":2610,"total_count":12739,"first_page?":false,"last_page?":false}}}