Zheng Li, Zhanqi Cui, Jianbin Liu, Liwei Zheng, Xiulei Liu
The application of machine learning programs is becoming increasingly more widespread. Neural networks, which are among the most popular machine learning programs, play important roles in people's daily lives, such as by controlling cars in autonomous driving systems. However, neural networks still lack effective testing methods. To address this problem, this paper proposes a testing method for neural network classifiers based on metamorphic relations. Firstly, it designs metamorphic relations to transform the original data set into derivative data sets. Then, it uses the data before and after the transformation to train and test the neural network classifier, respectively. Finally, it checks whether the output conforms to the metamorphic relations. The neural network classifier is defective if conflicts are detected. Experiments are conducted on a neural network classifier from Stanford's cs231n course to verify the effectiveness of the method. The results show that the defect detection capability of the proposed method is accurate, and 87.5% of the mutants are successfully detected.
{"title":"Testing Neural Network Classifiers Based on Metamorphic Relations","authors":"Zheng Li, Zhanqi Cui, Jianbin Liu, Liwei Zheng, Xiulei Liu","doi":"10.1109/DSA.2019.00060","DOIUrl":"https://doi.org/10.1109/DSA.2019.00060","url":null,"abstract":"The application of machine learning programs is becoming increasingly more widespread. Neural networks, which are among the most popular machine learning programs, play important roles in people's daily lives, such as by controlling cars in autonomous driving systems. However, neural networks still lack effective testing methods. To address this problem, this paper proposes a testing method for neural network classifiers based on metamorphic relations. Firstly, it designs metamorphic relations to transform the original data set into derivative data sets. Then, it uses the data before and after the transformation to train and test the neural network classifier, respectively. Finally, it checks whether the output conforms to the metamorphic relations. The neural network classifier is defective if conflicts are detected. Experiments are conducted on a neural network classifier from Stanford's cs231n course to verify the effectiveness of the method. The results show that the defect detection capability of the proposed method is accurate, and 87.5% of the mutants are successfully detected.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131099300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem that the traditional social network user interest personalized recommendation model is affected by noise and human factors, which leads to poor recommendation effect, a social network user interest personalized recommendation model based on big data is designed. Analysis the social network users interested in constructing the theoretical basis of personalized recommendation model, analysis of the recommended model the interaction between the model and the surrounding, partitioning server network deployment module, network structure, operation model design through graphs model to recommend task allocation to the distributed computer c1uster, in order to build the user interest personalized recommendation model, using big data double association rules and data mining technology, obtain users interested in network data, through the recommendation results determine the degree of users interested in recommendations, improve recommendation effect, Through experimental comparison, it can be seen that the accuracy of personalized recommendation using this method can reach a maximum of 98%, and the practicability is strong (Abstract).
{"title":"Analyzing of Personalized Recommendation Model of Social Network Users Based on Big Data","authors":"Xiaoqing Li, Xiao-Qin Yan","doi":"10.1109/DSA.2019.00024","DOIUrl":"https://doi.org/10.1109/DSA.2019.00024","url":null,"abstract":"Aiming at the problem that the traditional social network user interest personalized recommendation model is affected by noise and human factors, which leads to poor recommendation effect, a social network user interest personalized recommendation model based on big data is designed. Analysis the social network users interested in constructing the theoretical basis of personalized recommendation model, analysis of the recommended model the interaction between the model and the surrounding, partitioning server network deployment module, network structure, operation model design through graphs model to recommend task allocation to the distributed computer c1uster, in order to build the user interest personalized recommendation model, using big data double association rules and data mining technology, obtain users interested in network data, through the recommendation results determine the degree of users interested in recommendations, improve recommendation effect, Through experimental comparison, it can be seen that the accuracy of personalized recommendation using this method can reach a maximum of 98%, and the practicability is strong (Abstract).","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116854003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In practice, many unknown errors have emerged in deep learning systems. One of the main reasons is that the behaviors of deep learning systems are unpredictable and difficult to test. Proper testing criteria are vitally important to evaluate the adequacy of testing deep learning systems. However, there is no testing criterion available for the deep forest, which is a deep learning model that has achieved good performance on small-scale data sets and low-computing-power platform projects. To address this problem, we propose a set of testing coverage criteria for deep forests in this paper. The set of testing coverage criteria is composed of multi-grained scanning node coverage (MGNC), multi-grained scanning leaf coverage (MGLC), cascade forest output coverage (CFOC) and cascade forest class coverage (CFCC).
{"title":"Testing Coverage Criteria for Deep Forests","authors":"Ruilin Xie, Zhanqi Cui, Minghua Jia, Yuan Wen, Baoshui Hao","doi":"10.1109/DSA.2019.00091","DOIUrl":"https://doi.org/10.1109/DSA.2019.00091","url":null,"abstract":"In practice, many unknown errors have emerged in deep learning systems. One of the main reasons is that the behaviors of deep learning systems are unpredictable and difficult to test. Proper testing criteria are vitally important to evaluate the adequacy of testing deep learning systems. However, there is no testing criterion available for the deep forest, which is a deep learning model that has achieved good performance on small-scale data sets and low-computing-power platform projects. To address this problem, we propose a set of testing coverage criteria for deep forests in this paper. The set of testing coverage criteria is composed of multi-grained scanning node coverage (MGNC), multi-grained scanning leaf coverage (MGLC), cascade forest output coverage (CFOC) and cascade forest class coverage (CFCC).","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":" 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120831603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present coisTable, a tabletop system that integrates a shared interactive surface with spatial-aware and identifiable tangible devices to support co-located collaborative work. We describe the underlying technical contributions: a hybrid interaction paradigm of graphical and tangible interfaces to foster the collaboration space; a workspace partition strategy to facilitate coordination; a natural identification to promote participation using tangible terminals. In addition, we detail the system prototype including the hardware implementation and the software architecture. Capabilities and interaction modalities are illustrated with the comparison of three conditions of a project management simulation. Finally, we report on the experimental results and the limitations of the tabletop system.
{"title":"coisTable: An Individual-and-Spatial-Aware Tabletop System for Co-located Collaboration","authors":"Zanzhen Huang, Yaxin Zhu, Xiaofei Mao, Tianxin Su, Xinyi Fu, Guangzheng Fei","doi":"10.1109/DSA.2019.00019","DOIUrl":"https://doi.org/10.1109/DSA.2019.00019","url":null,"abstract":"We present coisTable, a tabletop system that integrates a shared interactive surface with spatial-aware and identifiable tangible devices to support co-located collaborative work. We describe the underlying technical contributions: a hybrid interaction paradigm of graphical and tangible interfaces to foster the collaboration space; a workspace partition strategy to facilitate coordination; a natural identification to promote participation using tangible terminals. In addition, we detail the system prototype including the hardware implementation and the software architecture. Capabilities and interaction modalities are illustrated with the comparison of three conditions of a project management simulation. Finally, we report on the experimental results and the limitations of the tabletop system.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124760695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the classroom teaching, the original book education can not meet the needs of students for education, so in order to meet the higher requirements of teaching methods, the multimedia network teaching software is widely used, but the existing multimedia network software interface visual accuracy is insufficient, making the interaction is not high. In view of the above problems, this paper proposes a method to construct the interactive interface of multimedia network teaching software based on Mozilla platform. The construction method is divided into three parts: first, the structure and function of Mozilla software development platform are analyzed, and then the interactive interface of multimedia network teaching software is constructed on the platform, including demand analysis, eoneeptual model design, interaction and visual design, operation process design, interaction mode selection, interface implementation, test and evaluation, interface maintenance, etc. FinaUy, the existing and beneficial The visual accuraey was compared and analyzed with the interactive interface of multimedia network software designed by Mozilla platform. The results show that the visual accuracy of the interface of multimedia network software designed by Mozilla platform is better, and the average value is O.9336e, which solves the problem of low interaction.
{"title":"The Construction Method of Interactive Interface of Multimedia Network Teaching Software Based on Mozilla Platform","authors":"Jiajuan Fang","doi":"10.1109/DSA.2019.00037","DOIUrl":"https://doi.org/10.1109/DSA.2019.00037","url":null,"abstract":"In the classroom teaching, the original book education can not meet the needs of students for education, so in order to meet the higher requirements of teaching methods, the multimedia network teaching software is widely used, but the existing multimedia network software interface visual accuracy is insufficient, making the interaction is not high. In view of the above problems, this paper proposes a method to construct the interactive interface of multimedia network teaching software based on Mozilla platform. The construction method is divided into three parts: first, the structure and function of Mozilla software development platform are analyzed, and then the interactive interface of multimedia network teaching software is constructed on the platform, including demand analysis, eoneeptual model design, interaction and visual design, operation process design, interaction mode selection, interface implementation, test and evaluation, interface maintenance, etc. FinaUy, the existing and beneficial The visual accuraey was compared and analyzed with the interactive interface of multimedia network software designed by Mozilla platform. The results show that the visual accuracy of the interface of multimedia network software designed by Mozilla platform is better, and the average value is O.9336e, which solves the problem of low interaction.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124511959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increasing demand for wireless services brings a colossal burden on spectrum resources. Many researchers are actively exploring dynamic spectrum access for efficient spectrum utilization. In this paper, an S domain communication system is proposed to solve this problem. The key idea of the proposed method is to adaptively generate waveforms in the S transform domain at both sides of the communication system for avoiding the occupied spectrum parts. Simulations show that the proposed method offers better bit error performance with non-stationary interference than other traditional anti-interference techniques that only process signals at the receiver side. Moreover, the proposed system can search the unoccupied frequency bins and generate orthogonal waveforms to adapt to the changing electromagnetic environment. It could be a potential candidate for cognitive radio in non-stationary interference environments.
{"title":"S Domain Communication System and Its Anti-Interference Performance Analysis","authors":"Cheng Chang, Xin Gu, Yue Gu, Zhijun Deng, Haihua Wu","doi":"10.1109/DSA.2019.00089","DOIUrl":"https://doi.org/10.1109/DSA.2019.00089","url":null,"abstract":"The increasing demand for wireless services brings a colossal burden on spectrum resources. Many researchers are actively exploring dynamic spectrum access for efficient spectrum utilization. In this paper, an S domain communication system is proposed to solve this problem. The key idea of the proposed method is to adaptively generate waveforms in the S transform domain at both sides of the communication system for avoiding the occupied spectrum parts. Simulations show that the proposed method offers better bit error performance with non-stationary interference than other traditional anti-interference techniques that only process signals at the receiver side. Moreover, the proposed system can search the unoccupied frequency bins and generate orthogonal waveforms to adapt to the changing electromagnetic environment. It could be a potential candidate for cognitive radio in non-stationary interference environments.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122147136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increasing scale and complexity of software systems, the defects of software are increasing every day. Software defect data is the foundation of research and application of software reliability. Currently, the lack of software defect data, its insufficient coverage, and the limits of the software types involved have become the bottleneck of software reliability research and application. Starting from GitHub, the open-source software hosting platform, this paper analyzes software defect data in open source projects and classifies the available software data. Based on the research of the GitHub and Git repository, we propose a defect data acquisition technology based on open-source software that uses pull requests as the breakthrough point of the method. Moreover, we advanced a software defect data preliminary treatment and built a software defect big datasets collecting system that contains fix-inducing change and contextual information of defects, which solves the class imbalance problem. According to this method, a software defect big data automatic acquisition platform based on GitHub was developed to realize the automatic collection of software defect data. Finally, the efficiency of data collection, correctness of data, and validity of the dataset application were verified by experiments. The results show that the proposed method is efficient and effective.
{"title":"A GitHub-Based Data Collection Method for Software Defect Prediction","authors":"Jiaxi Xu, Liang Yan, Fei Wang, J. Ai","doi":"10.1109/DSA.2019.00020","DOIUrl":"https://doi.org/10.1109/DSA.2019.00020","url":null,"abstract":"With the increasing scale and complexity of software systems, the defects of software are increasing every day. Software defect data is the foundation of research and application of software reliability. Currently, the lack of software defect data, its insufficient coverage, and the limits of the software types involved have become the bottleneck of software reliability research and application. Starting from GitHub, the open-source software hosting platform, this paper analyzes software defect data in open source projects and classifies the available software data. Based on the research of the GitHub and Git repository, we propose a defect data acquisition technology based on open-source software that uses pull requests as the breakthrough point of the method. Moreover, we advanced a software defect data preliminary treatment and built a software defect big datasets collecting system that contains fix-inducing change and contextual information of defects, which solves the class imbalance problem. According to this method, a software defect big data automatic acquisition platform based on GitHub was developed to realize the automatic collection of software defect data. Finally, the efficiency of data collection, correctness of data, and validity of the dataset application were verified by experiments. The results show that the proposed method is efficient and effective.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132484436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Wang, Shuang Deng, Junjie Kang, Gang Hou, Kuanjiu Zhou, Chi Lin
The rapid increase in the scale and complexity of the circuit system has led to serious problems in safety and reliability. Therefore, fault tolerance was proposed. Fault location as part of fault tolerance is indispensable. However, fault location methods are mostly limited to small data volume and high system complexity. How to achieve the fault location of the circuit system has always been a focus question. This paper proposes a Hierarchical Multi-module Fault Location Mechanism (HMFLM). Cartesian Genetic Programming (CGP) is exploited to generate circuits and random injects faults into it. The model matching library is used to store the training model of the layering module circuit and detect circuit faults in real time. The recovery priority of the fault circuits utilize Fault Analysis Tree (FAT) to determine, therefore, we can effectively facilitate fault recovery. The results show HMFLM can effectively locate multiple faults and improves the real-time and reliability of fault diagnosis.
{"title":"A Real-Time Fault Location Mechanism Combining CGP Code and Deep Learning","authors":"Jie Wang, Shuang Deng, Junjie Kang, Gang Hou, Kuanjiu Zhou, Chi Lin","doi":"10.1109/DSA.2019.00047","DOIUrl":"https://doi.org/10.1109/DSA.2019.00047","url":null,"abstract":"The rapid increase in the scale and complexity of the circuit system has led to serious problems in safety and reliability. Therefore, fault tolerance was proposed. Fault location as part of fault tolerance is indispensable. However, fault location methods are mostly limited to small data volume and high system complexity. How to achieve the fault location of the circuit system has always been a focus question. This paper proposes a Hierarchical Multi-module Fault Location Mechanism (HMFLM). Cartesian Genetic Programming (CGP) is exploited to generate circuits and random injects faults into it. The model matching library is used to store the training model of the layering module circuit and detect circuit faults in real time. The recovery priority of the fault circuits utilize Fault Analysis Tree (FAT) to determine, therefore, we can effectively facilitate fault recovery. The results show HMFLM can effectively locate multiple faults and improves the real-time and reliability of fault diagnosis.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129290385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to solve the problems of traditional localization methods, such as large localization error and low localization accuracy, a new localization method based on weighted least square estimation is proposed. In this method, firstly, a distributed wireless propagation model is established according to the structural characteristics of the nodes in the distributed wireless sensor network. Then, the weighted least square estimation algorithm is used to determine the weight of the nodes. Through the weight analysis of the nodes to be determined, the accurate location of the nodes in the network is calculated. Compared with the traditional localization methods, the results show that the localization error of the method based on weighted least square estimation is obviously smaller than that of the traditional method, and it has higher localization accuracy, which has good practicability (Abstract).
{"title":"Node Location In Distributed Wireless Sensor Networks Based on Weighted Least Square Estimation","authors":"Chengzhao Chen, Zheng Chen","doi":"10.1109/DSA.2019.00029","DOIUrl":"https://doi.org/10.1109/DSA.2019.00029","url":null,"abstract":"In order to solve the problems of traditional localization methods, such as large localization error and low localization accuracy, a new localization method based on weighted least square estimation is proposed. In this method, firstly, a distributed wireless propagation model is established according to the structural characteristics of the nodes in the distributed wireless sensor network. Then, the weighted least square estimation algorithm is used to determine the weight of the nodes. Through the weight analysis of the nodes to be determined, the accurate location of the nodes in the network is calculated. Compared with the traditional localization methods, the results show that the localization error of the method based on weighted least square estimation is obviously smaller than that of the traditional method, and it has higher localization accuracy, which has good practicability (Abstract).","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faiza Khan, Md Zakirul Alam Bhuiyan, Md. Monirul Islam, Tian Wang, Aliuz Zaman, Hai Tao
In this survey paper, we present various proposals of Wi-Fi applications which can benefit society, namely through detection of vital signs and detection of suspicious objects. Based on the previous research conducted in this field, we analyze how heart rate detection using Wi-Fi dependent technologies compare to older, sensor-based methods and the necessity of modern implementations especially in the medical field. People can have heart problems such as tachycardia and bradycardia at any instance, thus systems which do not require contact are most practical in detection of vital sign irregularities. Sensorbased systems may depend on Wi-Fi technologies only for the communication between different components in the system, such as in the Message Queuing Telemetry Transport System. However, the presence of a sensor in these systems can be replaced by Wi-Fi technologies to detect the presence of people and monitor their corresponding heart rates in a contactless manner. Additionally, Wi-Fi dependent systems such as Vital Radio and Wi-Sleep can monitor the heart rates of multiple people at once. Therefore contactless, Wi-Fi based systems are most efficient and practical for daily use. Moreover, although contactless systems demonstrate the benefits of technological advancements, these systems can still be further improved since they tend to produce higher accuracy rates from shorter distances, as demonstrated by the UWB radar system and the Fresnel model. Contactless systems can be enhanced to detect multiple users at once at extended distances. After providing details of contact requiring and contactless systems for heart rate detection, we also provide other useful applications of Wi-Fi technology, such as in the field of metal detection, human fall detection, etc.
{"title":"Wi-Fi Signal Analysis for Heartbeat and Metal Detection: A Comparative Study of Reliable Contactless Systems","authors":"Faiza Khan, Md Zakirul Alam Bhuiyan, Md. Monirul Islam, Tian Wang, Aliuz Zaman, Hai Tao","doi":"10.1109/DSA.2019.00018","DOIUrl":"https://doi.org/10.1109/DSA.2019.00018","url":null,"abstract":"In this survey paper, we present various proposals of Wi-Fi applications which can benefit society, namely through detection of vital signs and detection of suspicious objects. Based on the previous research conducted in this field, we analyze how heart rate detection using Wi-Fi dependent technologies compare to older, sensor-based methods and the necessity of modern implementations especially in the medical field. People can have heart problems such as tachycardia and bradycardia at any instance, thus systems which do not require contact are most practical in detection of vital sign irregularities. Sensorbased systems may depend on Wi-Fi technologies only for the communication between different components in the system, such as in the Message Queuing Telemetry Transport System. However, the presence of a sensor in these systems can be replaced by Wi-Fi technologies to detect the presence of people and monitor their corresponding heart rates in a contactless manner. Additionally, Wi-Fi dependent systems such as Vital Radio and Wi-Sleep can monitor the heart rates of multiple people at once. Therefore contactless, Wi-Fi based systems are most efficient and practical for daily use. Moreover, although contactless systems demonstrate the benefits of technological advancements, these systems can still be further improved since they tend to produce higher accuracy rates from shorter distances, as demonstrated by the UWB radar system and the Fresnel model. Contactless systems can be enhanced to detect multiple users at once at extended distances. After providing details of contact requiring and contactless systems for heart rate detection, we also provide other useful applications of Wi-Fi technology, such as in the field of metal detection, human fall detection, etc.","PeriodicalId":342719,"journal":{"name":"2019 6th International Conference on Dependable Systems and Their Applications (DSA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115417394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}