{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:32:21Z","timestamp":1772829141830,"version":"3.50.1"},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T00:00:00Z","timestamp":1772323200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1016\/j.eswa.2025.129818","type":"journal-article","created":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T04:38:19Z","timestamp":1758947899000},"page":"129818","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"PD","title":["Markov-based continuous learning with diversion of data distribution direction for streaming data in limited memory"],"prefix":"10.1016","volume":"298","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0009-0006-1327-1637","authenticated-orcid":false,"given":"Peemapat","family":"Wongsriphisant","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-0416-8316","authenticated-orcid":false,"given":"Kitiporn","family":"Plaimas","sequence":"additional","affiliation":[]},{"given":"Chidchanok","family":"Lursinsap","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.eswa.2025.129818_bib0001","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3847\/1538-4365\/ac4414","volume":"259","author":"Abdurro\u2019uf Accetta","year":"2022","journal-title":"The Astrophysical Journal Supplement Series"},{"key":"10.1016\/j.eswa.2025.129818_bib0002","series-title":"Proceedings of the 2017\u202fIEEE\/ACM international conference on advances in social networks analysis and mining 2017, ASONAM \u201917","first-page":"998","article-title":"Anomaly detection on big data in financial markets","author":"Ahmed","year":"2017"},{"key":"10.1016\/j.eswa.2025.129818_bib0003","unstructured":"Alpaydin, E., & Kaynak, C. (1998). Optical recognition of handwritten digits. UCI Machine Learning Repository. 10.24432\/C50P49."},{"key":"10.1016\/j.eswa.2025.129818_bib0004","series-title":"Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201909","first-page":"139","article-title":"New ensemble methods for evolving data streams","author":"Bifet","year":"2009"},{"key":"10.1016\/j.eswa.2025.129818_bib0005","doi-asserted-by":"crossref","first-page":"2283","DOI":"10.1109\/TKDE.2012.136","article-title":"Incremental learning of concept drift from streaming imbalanced data","volume":"25","author":"Ditzler","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10.1016\/j.eswa.2025.129818_bib0006","series-title":"Proceedings of the sixth ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201900","first-page":"71","article-title":"Mining high-speed data streams","author":"Domingos","year":"2000"},{"key":"10.1016\/j.eswa.2025.129818_bib0007","series-title":"Proceedings of the sixth ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201900","first-page":"71","article-title":"Mining high-speed data streams","author":"Domingos","year":"2000"},{"key":"10.1016\/j.eswa.2025.129818_bib0008","unstructured":"Dua, D., & Graff, C. (2017). UCI machine learning repository. https:\/\/linproxy.fan.workers.dev:443\/http\/archive.ics.uci.edu\/ml."},{"key":"10.1016\/j.eswa.2025.129818_bib0009","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/s10994-012-5320-9","article-title":"On evaluating stream learning algorithms","volume":"90","author":"Gama","year":"2012","journal-title":"Machine Learning"},{"key":"10.1016\/j.eswa.2025.129818_bib0010","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1007\/s10994-017-5642-8","article-title":"Adaptive random forests for evolving data stream classification","volume":"106","author":"Gomes","year":"2017","journal-title":"Machine Learning"},{"issue":"7825","key":"10.1016\/j.eswa.2025.129818_bib0011","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1038\/s41586-020-2649-2","article-title":"Array programming with numpy","volume":"585","author":"Harris","year":"2020","journal-title":"Nature"},{"key":"10.1016\/j.eswa.2025.129818_bib0012","unstructured":"Hopkins, M., Reeber, E., Forman, G., & Suermondt, J. (1999). Spambase. UCI machine learning repository. 10.24432\/C53G6X."},{"key":"10.1016\/j.eswa.2025.129818_bib0013","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120994","article-title":"Anomaly detection in streaming data: A comparison and evaluation study","volume":"233","author":"Iglesias V\u00e1zquez","year":"2023","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2025.129818_bib0014","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/TNN.2009.2037148","article-title":"A very fast neural learning for classification using only new incoming datum","volume":"21","author":"Jaiyen","year":"2010","journal-title":"IEEE Transactions on Neural Networks"},{"key":"10.1016\/j.eswa.2025.129818_bib0015","doi-asserted-by":"crossref","first-page":"114643","DOI":"10.1109\/ACCESS.2020.3003531","article-title":"Neural learning with recoil behavior in hyperellipsoidal structure","volume":"8","author":"Jindadoungrut","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.129818_bib0016","unstructured":"Juan, C., Eduardo Nakamura, M. C. & Gordo, M. (2017). Anuran calls (MFCCs). UCI machine learning repository. 10.24432\/C5CC9H."},{"key":"10.1016\/j.eswa.2025.129818_bib0017","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.eswa.2016.07.002","article-title":"A fast learning method for streaming and randomly ordered multi-class data chunks by using one-pass-throw-away class-wise learning concept","volume":"63","author":"Junsawang","year":"2016","journal-title":"Expert Systems with Applications"},{"key":"10.1016\/j.eswa.2025.129818_bib0018","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0220624","article-title":"Streaming chunk incremental learning for class-wise data stream classification with fast learning speed and low structural complexity","volume":"14","author":"Junsawang","year":"2019","journal-title":"PLoS ONE"},{"key":"10.1016\/j.eswa.2025.129818_bib0019","doi-asserted-by":"crossref","first-page":"3521","DOI":"10.1073\/pnas.1611835114","article-title":"Overcoming catastrophic forgetting in neural networks","volume":"114","author":"Kirkpatrick","year":"2016","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"10.1016\/j.eswa.2025.129818_bib0020","doi-asserted-by":"crossref","unstructured":"Losing, V., Hammer, B., & Wersing, H. (2016). Knn classifier with self adjusting memory for heterogeneous concept drift. 2016 IEEE 16th international conference on data mining (ICDM), (pp. 291\u2013300).","DOI":"10.1109\/ICDM.2016.0040"},{"issue":"10","key":"10.1016\/j.eswa.2025.129818_bib0021","doi-asserted-by":"crossref","DOI":"10.3390\/app13106353","article-title":"Review of anomaly detection algorithms for data streams","volume":"13","author":"Lu","year":"2023","journal-title":"Appl. Sci."},{"key":"10.1016\/j.eswa.2025.129818_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2023.101979","article-title":"Swinn: Efficient nearest neighbor search in sliding windows using graphs","volume":"101","author":"Mastelini","year":"2024","journal-title":"Information Fusion"},{"key":"10.1016\/j.eswa.2025.129818_bib0023","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/S0079-7421(08)60536-8","article-title":"Catastrophic interference in connectionist networks: The sequential learning problem","volume":"24","author":"McCloskey","year":"1989","journal-title":"Psychology of Learning and Motivation"},{"key":"10.1016\/j.eswa.2025.129818_bib0024","doi-asserted-by":"crossref","DOI":"10.3389\/fpsyg.2013.00504","article-title":"The stability-plasticity dilemma: Investigating the continuum from catastrophic forgetting to age-limited learning effects","volume":"4","author":"Mermillod","year":"2013","journal-title":"Frontiers in Psychology"},{"issue":"110","key":"10.1016\/j.eswa.2025.129818_bib0025","first-page":"1","article-title":"River: Machine learning for streaming data in python","volume":"22","author":"Montiel","year":"2021","journal-title":"Journal of Machine Learning Research"},{"key":"10.1016\/j.eswa.2025.129818_bib0026","article-title":"Amf: Aggregated mondrian forests for online learning","volume":"83","author":"Mourtada","year":"2019","journal-title":"Journal of the Royal Statistical Society: Series B (Statistical Methodology)"},{"key":"10.1016\/j.eswa.2025.129818_bib0027","doi-asserted-by":"crossref","first-page":"2340","DOI":"10.1109\/ICSMC.2005.1571498","article-title":"Online bagging and boosting","volume":"3","author":"Oza","year":"2005","journal-title":"2005 IEEE International Conference on Systems, Man and Cybernetics"},{"key":"10.1016\/j.eswa.2025.129818_bib0028","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"10.1016\/j.eswa.2025.129818_bib0029","unstructured":"pandas development team, T. (2020). pandas-dev\/pandas: Pandas. 10.5281\/zenodo.3509134."},{"key":"10.1016\/j.eswa.2025.129818_bib0030","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/323533a0","article-title":"Learning representations by back-propagating errors","volume":"323","author":"Rumelhart","year":"1986","journal-title":"Nature"},{"key":"10.1016\/j.eswa.2025.129818_bib0031","doi-asserted-by":"crossref","first-page":"106993","DOI":"10.1109\/ACCESS.2020.2997944","article-title":"Scalable hyper-ellipsoidal function with projection ratio for local distributed streaming data classification","volume":"8","author":"Rungcharassang","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.eswa.2025.129818_bib0032","unstructured":"Sahoo, D., Pham, Q., Lu, J., & Hoi, S. C. H. (2017). Online deep learning: Learning deep neural networks on the fly. ArXiv:abs\/1711.03705. https:\/\/linproxy.fan.workers.dev:443\/https\/api.semanticscholar.org\/CorpusID:28301202."},{"key":"10.1016\/j.eswa.2025.129818_bib0033","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1093\/bib\/bbv118","article-title":"Translational bioinformatics in the era of real-time biomedical, health care and wellness data streams","volume":"18","author":"Shameer","year":"2017","journal-title":"Briefings in Bioinformatics"},{"key":"10.1016\/j.eswa.2025.129818_bib0034","unstructured":"Slate, D. (1991). Letter recognition. UCI machine learning repository. 10.24432\/C5ZP40."},{"key":"10.1016\/j.eswa.2025.129818_bib0035","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1007\/s10618-020-00698-5","article-title":"Challenges in benchmarking stream learning algorithms with real-world data","volume":"34","author":"Souza","year":"2020","journal-title":"Data Mining and Knowledge Discovery"},{"key":"10.1016\/j.eswa.2025.129818_bib0036","article-title":"One-pass-throw-away learning for cybersecurity in streaming non-stationary environments by dynamic stratum network","volume":"13(9)","author":"Thakong","year":"2018","journal-title":"PLoS ONE"},{"key":"10.1016\/j.eswa.2025.129818_bib0037","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1038\/s41592-019-0686-2","article-title":"Scipy 1.0: Fundamental algorithms for scientific computing in python","volume":"17","author":"Virtanen","year":"2020","journal-title":"Nature Methods"},{"key":"10.1016\/j.eswa.2025.129818_bib0038","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.datak.2018.07.002","article-title":"Bestream: Batch capturing with elliptic function for one-pass data stream clustering","volume":"117","author":"Wattanakitrungroj","year":"2018","journal-title":"Data and Knowledge Engineering"},{"key":"10.1016\/j.eswa.2025.129818_bib0039","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1023\/B:DAMI.0000023676.72185.7c","article-title":"On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms","volume":"8","author":"Yamanishi","year":"2000","journal-title":"Data Mining and Knowledge Discovery"},{"issue":"11","key":"10.1016\/j.eswa.2025.129818_bib0040","doi-asserted-by":"crossref","first-page":"9520","DOI":"10.1109\/TNNLS.2022.3149991","article-title":"Knnens: A k-nearest neighbor ensemble-based method for incremental learning under data stream with emerging new classes","volume":"34","author":"Zhang","year":"2023","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0957417425034335?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0957417425034335?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T12:15:44Z","timestamp":1764850544000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417425034335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3]]},"references-count":40,"alternative-id":["S0957417425034335"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.eswa.2025.129818","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2026,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Markov-based continuous learning with diversion of data distribution direction for streaming data in limited memory","name":"articletitle","label":"Article Title"},{"value":"Expert Systems with Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.eswa.2025.129818","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"129818"}}