98%
921
2 minutes
20
The accurate and efficient classification of network traffic, including malicious traffic, is essential for effective network management, cybersecurity, and resource optimization. However, traffic classification methods in modern, complex, and dynamic networks face significant challenges, particularly at the network edge, where resources are limited and issues such as privacy concerns and concept drift arise. Condensation techniques offer a solution by reducing the data size, simplifying complex models, and transferring knowledge from traffic data. This paper explores data and knowledge condensation methods-such as coreset selection, data compression, knowledge distillation, and dataset distillation-within the context of traffic classification tasks. It clarifies the relationship between these techniques and network traffic classification, introducing each method and its typical applications. This paper also outlines potential scenarios for applying each condensation technique, highlighting the associated challenges and open research issues. To the best of our knowledge, this is the first comprehensive summary of condensation techniques specifically tailored for network traffic classification tasks.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC12030602 | PMC |
http://dx.doi.org/10.3390/s25082368 | DOI Listing |
Int J Surg Case Rep
September 2025
Institute of Orthopedics and Traumatology, Military Hospital 175, Ho Chi Minh City, 70000, Viet Nam. Electronic address:
Introduction: Proximal humeral fracture-dislocations (PHF-D) are complex injuries, often requiring urgent intervention. However, management protocols remain unclear when anatomical reduction of the glenohumeral joint is achieved, but significant displacement of the greater tuberosity persists. The lack of consensus on whether to reclassify such injuries after reduction creates uncertainty in rehabilitation strategies.
View Article and Find Full Text PDFTraffic Inj Prev
September 2025
Department of Civil Engineering, Sardar Vallabhbhai National Institute of Technology, Surat, India.
Objective: This study aimed to identify dynamic spatiotemporal traffic factors influencing conflict risk levels on National Highways under heterogeneous traffic conditions in India. The research addresses gaps by capturing vehicle interactions using high-resolution UAV-based trajectory data and proposes a novel two-stage methodology for real-time conflict risk evaluation, moving beyond traditional binary risk classifications to a four-level framework (High, Moderate, Low, No-Risk).
Methods: Over 40,000 conflict risk sequences were classified into four severity levels using the Modified Time-to-Collision (MTTC) surrogate safety measure.
Injury
August 2025
University of Seoul, Department of Transportation, College of Urban Sciences, Seoul, South Korea. Electronic address:
Pedestrian crashes are a global safety issue impacting all age groups, and despite extensive research, understanding the severity of crashes among different age groups has remained incomplete. Older and young pedestrians represent two distinct demographics with unique vulnerabilities. This paper examines the factors that impact the severity of pedestrian crashes resulting in Killed or Serious Injuries in South Australia over ten years (2012-2020) for two age groups, namely young pedestrians (age < 18) and older pedestrians (age > 65).
View Article and Find Full Text PDFCogn Neurodyn
December 2025
Department of Electrical and Electronic Engineering, Pabna University of Science and Technology, Pabna, 6600 Bangladesh.
Driver fatigue is a major contributor to traffic accidents, leading to increased fatality rates and severe damage compared to incidents involving alert drivers. Electroencephalography (EEG) has emerged as a widely used method for detecting driver fatigue due to its ability to capture brain activity patterns. This survey provides a thorough analysis of devices that detect driver fatigue using EEG, analyzing existing methodologies, challenges, and future research directions.
View Article and Find Full Text PDFSci Rep
September 2025
Higher Education Department, Kabul, Afghanistan.
Machine learning plays a pivotal role in addressing real-world challenges across domains such as cybersecurity, where AI-driven methods, especially in Software-Defined Networking, enhance traffic monitoring and anomaly detection. Contemporary networks often employ models like Random Forests, Neural Networks, and Support Vector Machines to identify threats early and reinforce security. Ensemble learning further improves predictive accuracy and stability, yet many frameworks falter when confronted with noisy or contaminated data.
View Article and Find Full Text PDF