{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T18:46:59Z","timestamp":1757616419415,"version":"3.44.0"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T00:00:00Z","timestamp":1713571200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T00:00:00Z","timestamp":1713571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s41060-024-00535-8","type":"journal-article","created":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T06:01:55Z","timestamp":1713592915000},"page":"229-246","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Real-time anomaly detection in sky quality meter data using probabilistic exponential weighted moving average"],"prefix":"10.1007","volume":"20","author":[{"given":"Lala Septem","family":"Riza","sequence":"first","affiliation":[]},{"given":"Zulfikar Ali Yunara","family":"Putra","sequence":"additional","affiliation":[]},{"given":"Muhammad Iqbal","family":"Zain","sequence":"additional","affiliation":[]},{"given":"Fajar Zuliansyah","family":"Trihutama","sequence":"additional","affiliation":[]},{"given":"Judhistira Aria","family":"Utama","sequence":"additional","affiliation":[]},{"given":"Khyrina Airin Fariza Abu","family":"Samah","sequence":"additional","affiliation":[]},{"given":"Dhani","family":"Herdiwijaya","sequence":"additional","affiliation":[]},{"given":"Rinto Anugraha","family":"NQZ","sequence":"additional","affiliation":[]},{"given":"Emanuel Sungging","family":"Mumpuni","sequence":"additional","affiliation":[]},{"given":"Rhorom","family":"Priyatikanto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,20]]},"reference":[{"key":"535_CR1","doi-asserted-by":"crossref","unstructured":"Abe, N., Melville, P., Pendus, C., Reddy, C. K., Jensen, D. L., Thomas, V. P., Bennett, J. J., Anderson, G. F., Cooley, B. R., & Kowalczyk, M.: Optimizing debt collections using constrained reinforcement learning. 75\u201384 (2010)","DOI":"10.1145\/1835804.1835817"},{"issue":"1","key":"535_CR2","doi-asserted-by":"publisher","first-page":"012002","DOI":"10.1088\/1742-6596\/1523\/1\/012002","volume":"1523","author":"AG Admiranto","year":"2020","unstructured":"Admiranto, A.G., Haida, S., Priyatikanto, R., Maryam, S., Ellyyani, Suryana, N.: Mobile campaign of sky brightness measurement in Indonesia. J. Phys. Conf. Ser. 1523(1), 012002 (2020). https:\/\/doi.org\/10.1088\/1742-6596\/1523\/1\/012002","journal-title":"J. Phys. Conf. Ser."},{"key":"535_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6396-2","volume-title":"Outlier Analysis","author":"CC Aggarwal","year":"2013","unstructured":"Aggarwal, C.C.: Outlier Analysis. Springer (2013)"},{"key":"535_CR4","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.neucom.2017.04.070","volume":"262","author":"S Ahmad","year":"2017","unstructured":"Ahmad, S., Lavin, A., Purdy, S., Agha, Z.: Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262, 134\u2013147 (2017). https:\/\/doi.org\/10.1016\/j.neucom.2017.04.070","journal-title":"Neurocomputing"},{"key":"535_CR5","unstructured":"Ahmad, S., & Purdy, S.: Real-time anomaly detection for streaming analytics (arXiv:1607.02480). arXiv. http:\/\/arxiv.org\/abs\/1607.02480 (2016)"},{"key":"535_CR6","unstructured":"Akoglu, L., Tong, H., & Koutra, D.: Graph-based Anomaly Detection and Description: A Survey (2014) (arXiv:1404.4679; Issue arXiv:1404.4679). http:\/\/arxiv.org\/abs\/1404.4679"},{"issue":"1","key":"535_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.3847\/1538-3881\/abfdaa","volume":"162","author":"MR Alarcon","year":"2021","unstructured":"Alarcon, M.R., Serra-Ricart, M., Lemes-Perera, S., Mallorqu\u00edn, M.: Natural night sky brightness during solar minimum. Astron. J. 162(1), 25 (2021)","journal-title":"Astron. J."},{"key":"535_CR8","doi-asserted-by":"publisher","first-page":"012020","DOI":"10.1088\/1742-6596\/771\/1\/012020","volume":"771","author":"CP Asmoro","year":"2016","unstructured":"Asmoro, C.P., Wijaya, A.F.C., Ardi, N.D., Abdurrohman, A., Utama, J.A., Sutiadi, A., Hikmat, A., Ramalis, T.R., Suyardi, B.: The assembled solar eclipse package (asep) in Bangka Indonesia during the total solar eclipse on March 9, 2016. J. Phys. Conf. Ser. 771, 012020 (2016). https:\/\/doi.org\/10.1088\/1742-6596\/771\/1\/012020","journal-title":"J. Phys. Conf. Ser."},{"issue":"11","key":"535_CR9","doi-asserted-by":"publisher","first-page":"3070","DOI":"10.3390\/su11113070","volume":"11","author":"S Bar\u00e1","year":"2019","unstructured":"Bar\u00e1, S., Lima, R.C., Zamorano, J.: Monitoring long-term trends in the anthropogenic night sky brightness. Sustainability 11(11), 3070 (2019). https:\/\/doi.org\/10.3390\/su11113070","journal-title":"Sustainability"},{"issue":"5","key":"535_CR10","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3390\/jimaging5050056","volume":"5","author":"A Bertolo","year":"2019","unstructured":"Bertolo, A., Binotto, R., Ortolani, S., Sapienza, S.: Measurements of night sky brightness in the veneto region of italy: sky quality meter network results and differential photometry by digital single lens reflex. J. Imag. 5(5), 56 (2019)","journal-title":"J. Imag."},{"key":"535_CR11","unstructured":"Bolton, R. J., & Hand, D. J.: Unsupervised profiling methods for fraud detection. Credit Scoring and Credit Control VII, 235\u2013255 (2001)"},{"issue":"7751","key":"535_CR12","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1016\/S0140-6736(72)90454-0","volume":"299","author":"B Burne","year":"1972","unstructured":"Burne, B.: Pollution by light. Lancet 299(7751), 642 (1972)","journal-title":"Lancet"},{"key":"535_CR13","doi-asserted-by":"crossref","unstructured":"Castillo, C., Donato, D., Gionis, A., Murdock, V., Silvestri, F.: Know your neighbors: web spam detection using the web topology. 423\u2013430 (2007)","DOI":"10.1145\/1277741.1277814"},{"issue":"2","key":"535_CR14","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.1093\/mnras\/staa416","volume":"493","author":"S Cavazzani","year":"2020","unstructured":"Cavazzani, S., Ortolani, S., Bertolo, A., Binotto, R., Fiorentin, P., Carraro, G., Saviane, I., Zitelli, V.: Sky Quality Meter and satellite correlation for night cloud-cover analysis at astronomical sites. Mon. Not. R. Astron. Soc. 493(2), 2463\u20132471 (2020). https:\/\/doi.org\/10.1093\/mnras\/staa416","journal-title":"Mon. Not. R. Astron. Soc."},{"key":"535_CR15","unstructured":"Cinzano, P.: Night sky photometry with sky quality meter. ISTIL Int. Rep, 9(1) (2005)"},{"issue":"3","key":"535_CR16","doi-asserted-by":"publisher","first-page":"211","DOI":"10.3233\/IDA-2002-6302","volume":"6","author":"C Cortes","year":"2002","unstructured":"Cortes, C., Pregibon, D., Volinsky, C.: Communities of interest. Intell. Data Anal. 6(3), 211\u2013219 (2002)","journal-title":"Intell. Data Anal."},{"key":"535_CR17","doi-asserted-by":"crossref","unstructured":"Damnjanovic, U., Fernandez, V., Izquierdo, E., Martinez, J. M.: Event detection and clustering for surveillance video summarization. 63\u201366 (2008)","DOI":"10.1109\/WIAMIS.2008.53"},{"key":"535_CR18","doi-asserted-by":"crossref","unstructured":"Das, K., & Schneider, J.: Detecting anomalous records in categorical datasets. 220\u2013229 (2007)","DOI":"10.1145\/1281192.1281219"},{"key":"535_CR19","doi-asserted-by":"crossref","unstructured":"Ding, Q., Katenka, N., Barford, P., Kolaczyk, E., Crovella, M. Intrusion as (anti) social communication: Characterization and detection. 886\u2013894 (2012)","DOI":"10.1145\/2339530.2339670"},{"key":"535_CR20","doi-asserted-by":"publisher","unstructured":"D\u2019silva, G. M., Khan, A., Gaurav, Bari, S.: Real-time processing of IoT events with historic data using Apache Kafka and Apache Spark with dashing framework. In: 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT), 1804\u20131809. (2017) https:\/\/doi.org\/10.1109\/RTEICT.2017.8256910","DOI":"10.1109\/RTEICT.2017.8256910"},{"key":"535_CR21","doi-asserted-by":"crossref","unstructured":"Eberle, W., Holder, L.: Discovering structural anomalies in graph-based data. 393\u2013398 (2007)","DOI":"10.1109\/ICDMW.2007.91"},{"key":"535_CR22","doi-asserted-by":"crossref","unstructured":"Eberle, W., Holder, L.: Graph-based approaches to insider threat detection. 1\u20134 (2009)","DOI":"10.1145\/1558607.1558658"},{"issue":"1","key":"535_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1177\/1477153513515508","volume":"46","author":"B Espey","year":"2014","unstructured":"Espey, B., McCauley, J.: Initial Irish light pollution measurements and a new sky quality meter-based data logger. Light. Res. Technol. 46(1), 67\u201377 (2014). https:\/\/doi.org\/10.1177\/1477153513515508","journal-title":"Light. Res. Technol."},{"key":"535_CR24","doi-asserted-by":"publisher","unstructured":"Faid, M. S., Husien, N., Shariff, N. N. M., Ali, M. O., Hamidi, Z. S., Zainol, N. H., Sabri, S. N. U.: Monitoring the level of light pollution and its impact on astronomical bodies naked-eye visibility range in selected areas in Malaysia using the sky quality meter. In: 2016 International conference on industrial engineering, management science and application (ICIMSA), 1\u20136 (2016). https:\/\/doi.org\/10.1109\/ICIMSA.2016.7504020","DOI":"10.1109\/ICIMSA.2016.7504020"},{"key":"535_CR25","doi-asserted-by":"crossref","unstructured":"Fawcett, T., & Provost, F.: Activity monitoring: Noticing interesting changes in behavior. 53\u201362 (1999)","DOI":"10.1145\/312129.312195"},{"key":"535_CR26","first-page":"8","volume":"96","author":"T Fawcett","year":"1996","unstructured":"Fawcett, T., Provost, F.J.: Combining data mining and machine learning for effective user profiling. KDD 96, 8\u201313 (1996)","journal-title":"KDD"},{"issue":"3","key":"535_CR27","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1111\/j.2517-6161.1972.tb00912.x","volume":"34","author":"AJ Fox","year":"1972","unstructured":"Fox, A.J.: Outliers in time series. J. R. Stat. Soc. Ser. B Stat Methodol. 34(3), 350\u2013363 (1972)","journal-title":"J. R. Stat. Soc. Ser. B Stat Methodol."},{"key":"535_CR28","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1613\/jair.3623","volume":"46","author":"N Goernitz","year":"2013","unstructured":"Goernitz, N., Kloft, M., Rieck, K., Brefeld, U.: Toward supervised anomaly detection. J. Artif. Intell. Res. 46, 235\u2013262 (2013). https:\/\/doi.org\/10.1613\/jair.3623","journal-title":"J. Artif. Intell. Res."},{"key":"535_CR29","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.jqsrt.2017.09.008","volume":"205","author":"A H\u00e4nel","year":"2018","unstructured":"H\u00e4nel, A., Posch, T., Ribas, S.J., Aub\u00e9, M., Duriscoe, D., Jechow, A., Kollath, Z., Lolkema, D.E., Moore, C., Schmidt, N., Spoelstra, H., Wuchterl, G., Kyba, C.C.M.: Measuring night sky brightness: methods and challenges. J. Quant. Spectrosc. Radiat. Transfer 205, 278\u2013290 (2018). https:\/\/doi.org\/10.1016\/j.jqsrt.2017.09.008","journal-title":"J. Quant. Spectrosc. Radiat. Transfer"},{"key":"535_CR30","doi-asserted-by":"crossref","unstructured":"Id\u00e9, T., & Kashima, H.: Eigenspace-based anomaly detection in computer systems. 440\u2013449 (2004)","DOI":"10.1145\/1014052.1014102"},{"key":"535_CR31","doi-asserted-by":"crossref","unstructured":"Invernizzi, L., Comparetti, P. M., Benvenuti, S., Kruegel, C., Cova, M., Vigna, G.:. Evilseed: a guided approach to finding malicious web pages (2012). 428\u2013442","DOI":"10.1109\/SP.2012.33"},{"issue":"1","key":"535_CR32","doi-asserted-by":"publisher","first-page":"6741","DOI":"10.1038\/s41598-017-06998-z","volume":"7","author":"A Jechow","year":"2017","unstructured":"Jechow, A., Koll\u00e1th, Z., Ribas, S.J., Spoelstra, H., H\u00f6lker, F., Kyba, C.C.: Imaging and mapping the impact of clouds on skyglow with all-sky photometry. Sci. Rep. 7(1), 6741 (2017)","journal-title":"Sci. Rep."},{"issue":"15","key":"535_CR33","doi-asserted-by":"publisher","first-page":"3013","DOI":"10.1364\/AO.46.003013","volume":"46","author":"M Kocifaj","year":"2007","unstructured":"Kocifaj, M.: Light-pollution model for cloudy and cloudless night skies with ground-based light sources. Appl. Opt. 46(15), 3013 (2007). https:\/\/doi.org\/10.1364\/AO.46.003013","journal-title":"Appl. Opt."},{"key":"535_CR34","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s11042-009-0367-8","volume":"50","author":"B Krausz","year":"2010","unstructured":"Krausz, B., Herpers, R.: MetroSurv: detecting events in subway stations. Multimed. Tools Appl. 50, 123\u2013147 (2010)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"535_CR35","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MSP.2010.88","volume":"8","author":"N Kshetri","year":"2010","unstructured":"Kshetri, N.: The economics of click fraud. IEEE Secur. Priv. 8(3), 45\u201353 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"535_CR36","doi-asserted-by":"crossref","unstructured":"Kumar, M., Ghani, R., Mei, Z.-S.:. Data mining to predict and prevent errors in health insurance claims processing. 65\u201374 (2010)","DOI":"10.1145\/1835804.1835816"},{"issue":"6","key":"535_CR37","doi-asserted-by":"publisher","first-page":"1806","DOI":"10.1039\/C4EE00566J","volume":"7","author":"CC Kyba","year":"2014","unstructured":"Kyba, C.C., H\u00e4nel, A., H\u00f6lker, F.: Redefining efficiency for outdoor lighting. Energy Environ. Sci. 7(6), 1806\u20131809 (2014)","journal-title":"Energy Environ. Sci."},{"key":"535_CR38","doi-asserted-by":"publisher","unstructured":"Le Noach, P., Costan, A., Bouge, L.: A performance evaluation of Apache Kafka in support of big data streaming applications. In: 2017 IEEE International Conference on Big Data (Big Data), 4803\u20134806 (2017). https:\/\/doi.org\/10.1109\/BigData.2017.8258548","DOI":"10.1109\/BigData.2017.8258548"},{"key":"535_CR39","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: Social honeypots+ machine learning (2010) 435\u2013442","DOI":"10.1145\/1835449.1835522"},{"key":"535_CR40","doi-asserted-by":"crossref","unstructured":"Li, L., Liang, C.-J. M., Liu, J., Nath, S., Terzis, A., Faloutsos, C.: Thermocast: A cyber-physical forecasting model for datacenters. (2011) 1370\u20131378.","DOI":"10.1145\/2020408.2020611"},{"key":"535_CR41","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L. K., Savage, S., Voelker, G. M.: Beyond blacklists: Learning to detect malicious web sites from suspicious URLs (2009) 1245\u20131254.","DOI":"10.1145\/1557019.1557153"},{"key":"535_CR42","doi-asserted-by":"crossref","unstructured":"McGlohon, M., Bay, S., Anderle, M. G., Steier, D. M., Faloutsos, C.: Snare: A link analytic system for graph labeling and risk detection (2009) 1265\u20131274.","DOI":"10.1145\/1557019.1557155"},{"key":"535_CR43","unstructured":"Narkhede, N., Shapira, G., Palino, T.: Kafka: The definitive guide: real-time data and stream processing at scale (First edition). O\u2019Reilly Media (2017)"},{"key":"535_CR44","doi-asserted-by":"crossref","unstructured":"Neville, J., \u015eim\u015fek, \u00d6., Jensen, D., Komoroske, J., Palmer, K., Goldberg, H.: Using relational knowledge discovery to prevent securities fraud (2005) 449\u2013458.","DOI":"10.1145\/1081870.1081922"},{"key":"535_CR45","doi-asserted-by":"publisher","unstructured":"Odoh, K.: Real-time Anomaly detection for multivariate data streams. (2022) https:\/\/doi.org\/10.48550\/ARXIV.2209.12398","DOI":"10.48550\/ARXIV.2209.12398"},{"key":"535_CR46","doi-asserted-by":"crossref","unstructured":"Ott, M., Cardie, C., Hancock, J.: Estimating the prevalence of deception in online review communities. 201\u2013210 (2012)","DOI":"10.1145\/2187836.2187864"},{"key":"535_CR47","doi-asserted-by":"crossref","unstructured":"Pandit, S., Chau, D. H., Wang, S., Faloutsos, C.: Netprobe: A fast and scalable system for fraud detection in online auction networks (2007). 201\u2013210","DOI":"10.1145\/1242572.1242600"},{"issue":"1","key":"535_CR48","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1007730.1007738","volume":"6","author":"C Phua","year":"2004","unstructured":"Phua, C., Alahakoon, D., Lee, V.: Minority report in fraud detection: classification of skewed data. ACM SIGKDD Explor. Newsl. 6(1), 50\u201359 (2004)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"535_CR49","doi-asserted-by":"publisher","unstructured":"Podor, A., Huszar, G.: Detecting light pollution with UAV, a Hungarian case study. 2022 IEEE 22nd international symposium on computational intelligence and informatics and 8th ieee international conference on recent achievements in mechatronics, automation, computer science and robotics (CINTI-MACRo), 000197\u2013000202 (2022). https:\/\/doi.org\/10.1109\/CINTI-MACRo57952.2022.10029545","DOI":"10.1109\/CINTI-MACRo57952.2022.10029545"},{"key":"535_CR50","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.jqsrt.2018.03.010","volume":"211","author":"T Posch","year":"2018","unstructured":"Posch, T., Binder, F., Puschnig, J.: Systematic measurements of the night sky brightness at 26 locations in Eastern Austria. J. Quant. Spectrosc. Radiat. Transfer 211, 144\u2013165 (2018)","journal-title":"J. Quant. Spectrosc. Radiat. Transfer"},{"key":"535_CR51","doi-asserted-by":"publisher","DOI":"10.1093\/mnras\/stac3349","author":"R Priyatikanto","year":"2022","unstructured":"Priyatikanto, R., Mumpuni, E.S., Hidayat, T., Saputra, M.B., Murti, M.D., Rachman, A., Yatini, C.Y.: Characterization of timau national observatory using limited in situ measurements. Month. Notices R. Astron. Soc. (2022). https:\/\/doi.org\/10.1093\/mnras\/stac3349","journal-title":"Month. Notices R. Astron. Soc."},{"key":"535_CR52","first-page":"4","volume":"7","author":"N Provos","year":"2007","unstructured":"Provos, N., McNamee, D., Mavrommatis, P., Wang, K., Modadugu, N.: The ghost in the browser: analysis of web-based malware. HotBots 7, 4\u20134 (2007)","journal-title":"HotBots"},{"issue":"4080","key":"535_CR53","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1126\/science.179.4080.1285","volume":"179","author":"KW Riegel","year":"1973","unstructured":"Riegel, K.W.: Light pollution: outdoor lighting is a growing threat to astronomy. Science 179(4080), 1285\u20131291 (1973). https:\/\/doi.org\/10.1126\/science.179.4080.1285","journal-title":"Science"},{"key":"535_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.newar.2022.101663","author":"LS Riza","year":"2022","unstructured":"Riza, L.S., Izzuddin, A., Utama, J.A., Samah, K.A.F.A., Herdiwijaya, D., Hidayat, T., Anugraha, R., Mumpuni, E.S.: Data analysis techniques in light pollution: a survey and taxonomy. New Astron. Rev. (2022). https:\/\/doi.org\/10.1016\/j.newar.2022.101663","journal-title":"New Astron. Rev."},{"issue":"1","key":"535_CR55","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s10344-011-0555-5","volume":"58","author":"P Rodrigues","year":"2012","unstructured":"Rodrigues, P., Aubrecht, C., Gil, A., Longcore, T., Elvidge, C.: Remote sensing to map influence of light pollution on Cory\u2019s shearwater in S\u00e3o Miguel Island, Azores Archipelago. Eur. J. Wildl. Res. 58(1), 147\u2013155 (2012). https:\/\/doi.org\/10.1007\/s10344-011-0555-5","journal-title":"Eur. J. Wildl. Res."},{"key":"535_CR56","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1703.05921","author":"T Schlegl","year":"2017","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. Int. Conf. Inf. Process. Med. Imaging (2017). https:\/\/doi.org\/10.48550\/ARXIV.1703.05921","journal-title":"Int. Conf. Inf. Process. Med. Imaging"},{"key":"535_CR57","doi-asserted-by":"publisher","unstructured":"Schmidt, W., & Spoelstra, H.: Darkness monitoring in the Netherlands 2009-2019 (2020). https:\/\/doi.org\/10.5281\/zenodo.4293366","DOI":"10.5281\/zenodo.4293366"},{"issue":"2","key":"535_CR58","doi-asserted-by":"publisher","first-page":"121","DOI":"10.21580\/al-hilal.2021.3.2.8477","volume":"3","author":"H Setyanto","year":"2021","unstructured":"Setyanto, H., Prastyo, H.A., Basthoni, M., Fuscha, F.A., Al Saab, S.M.: Zodiac light detection based on sky quality meter (SQM) Data: preliminary study. Al-Hilal J. Islam. Astron. 3(2), 121\u2013134 (2021). https:\/\/doi.org\/10.21580\/al-hilal.2021.3.2.8477","journal-title":"Al-Hilal J. Islam. Astron."},{"key":"535_CR59","first-page":"40","volume":"22","author":"C Small","year":"2013","unstructured":"Small, C., Elvidge, C.D.: Night on earth: mapping decadal changes of anthropogenic night light in Asia. Int. J. Appl. Earth Obs. Geoinf. 22, 40\u201352 (2013)","journal-title":"Int. J. Appl. Earth Obs. Geoinf."},{"issue":"1","key":"535_CR60","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1002\/sam.102","volume":"1","author":"J Sun","year":"2008","unstructured":"Sun, J., Xie, Y., Zhang, H., Faloutsos, C.: Less is more: Sparse graph mining with compact matrix decomposition. Stat Anal. Data Min. ASA Data Sci. J. 1(1), 6\u201322 (2008)","journal-title":"Stat Anal. Data Min. ASA Data Sci. J."},{"key":"535_CR61","first-page":"1241","volume":"2","author":"M Taniguchi","year":"1998","unstructured":"Taniguchi, M., Haft, M., Hollm\u00e9n, J., Tresp, V.: Fraud detection in communication networks using neural and probabilistic methods. Int. Conf. Acoust. Speech Signal Process. 2, 1241\u20131244 (1998)","journal-title":"Int. Conf. Acoust. Speech Signal Process."},{"issue":"10","key":"535_CR62","doi-asserted-by":"publisher","first-page":"8769","DOI":"10.1016\/j.eswa.2012.01.204","volume":"39","author":"R-S Wu","year":"2012","unstructured":"Wu, R.-S., Ou, C.-S., Lin, H., Chang, S.-I., Yen, D.C.: Using data mining technique to enhance tax evasion detection performance. Expert Syst. Appl. 39(10), 8769\u20138777 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"535_CR63","first-page":"38","volume":"2","author":"A Yilmaz","year":"2021","unstructured":"Yilmaz, A., \u00d6zdemir, T.: Measurement and determination of light pollution: case study of Malatya city. Turk. J. Astron. Astrophys. 2(1), 38\u201343 (2021)","journal-title":"Turk. J. Astron. Astrophys."},{"key":"535_CR64","first-page":"780","volume":"8","author":"J Zamorano","year":"2017","unstructured":"Zamorano, J., Garc\u0131a, C., Gonz\u00e1lez, R., Tapia, C., de Miguel, A.S., Pascual, S., Gonz\u00e1lez, E., Gallego, J., Picazo, P., Izquierdo, J., et al.: STARS4ALL, a light pollution awareness project. Highlights Spanish Astrophys. 8, 780\u2013783 (2017)","journal-title":"Highlights Spanish Astrophys."}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-024-00535-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41060-024-00535-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-024-00535-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T18:56:48Z","timestamp":1757098608000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41060-024-00535-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,20]]},"references-count":64,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["535"],"URL":"https:\/\/doi.org\/10.1007\/s41060-024-00535-8","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"type":"print","value":"2364-415X"},{"type":"electronic","value":"2364-4168"}],"subject":[],"published":{"date-parts":[[2024,4,20]]},"assertion":[{"value":"3 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}