Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 311

Full-Text Articles in Systems Architecture

Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre Apr 2024

Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre

Whittier Scholars Program

The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.


Superminds At Work: The Promise Of Human-Ai Collaboration, Thomas W. Malone Mar 2024

Superminds At Work: The Promise Of Human-Ai Collaboration, Thomas W. Malone

Asian Management Insights

Massachusetts Institute of Technology (MIT) Center for Collective Intelligence Director Professor Thomas W. Malone’s scholarship offers deep insights into the promise afforded by the synergies between human intelligence and technology. According to Professor Malone, the boundaries between human intellect and technological prowess are becoming increasingly blurred, but this may not be a bad thing for humankind. In Asian Management Insights’ inaugural Pulse Point interview, we get to learn more about the concept of ‘collective intelligence’, which explores how a partnership between humans and Artificial Intelligence (AI) can be catalysed to make ground-breaking advancements in addressing the wicked problems of our …


Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike Dec 2023

Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike

Masters Theses & Specialist Projects

The Jing-Jin-Ji region of China is a highly industrialized and populated area of the country. Its periodic high pollution and smog includes particles smaller than 2.5 μm, known as PM2.5, linked to many respiratory and cardiovascular illnesses. PM2.5 concentration around Jing-Jin-Ji has exceeded China’s urban air quality safety threshold for over 20% of all days in 2017 through 2020.

The quantity of ground weather stations that measure the concentrations of these pollutants, and their valuable data, is unfortunately small. By employing many machine learning strategies, many researchers have focused on interpolating finer spatial grids of PM2.5, or hindcasting PM2.5. However, …


Multi-Scale Attention Networks For Pavement Defect Detection, Junde Chen, Yuxin Wen, Yaser Ahangari Nanehkaran, Defu Zhang, Adan Zeb Jul 2023

Multi-Scale Attention Networks For Pavement Defect Detection, Junde Chen, Yuxin Wen, Yaser Ahangari Nanehkaran, Defu Zhang, Adan Zeb

Engineering Faculty Articles and Research

Pavement defects such as cracks, net cracks, and pit slots can cause potential traffic safety problems. The timely detection and identification play a key role in reducing the harm of various pavement defects. Particularly, the recent development in deep learning-based CNNs has shown competitive performance in image detection and classification. To detect pavement defects automatically and improve effects, a multi-scale mobile attention-based network, which we termed MANet, is proposed to perform the detection of pavement defects. The architecture of the encoder-decoder is used in MANet, where the encoder adopts the MobileNet as the backbone network to extract pavement defect features. …


Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu May 2023

Source Code Plagiarism Detection Using Jplag & Stack Overflow Data, Sudheer Yetthapu

Masters Theses & Specialist Projects

Advancements in computer technology and internet services have led to the availability of vast amounts of information like videos, articles, research papers, and code samples. Free online information will increase the possibility of plagiarism and collusion among students. People can commit plagiarism in both text and code [1], as tools used to detect plagiarism between texts and between codes are distinct. Traditionally plagiarism in code is detected using manual inspection, which is a tedious process and misses to compare code from previous submissions and external sources. To overcome this issue, systems that can automatically detect plagiarism in code were developed …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Constructing A Shariah Document Screening Prototype Based On Serverless Architecture, Marhanum Che Mohd Salleh, Rizal Mohd Nor, Faizal Yusof, Md Amiruzzaman Mar 2023

Constructing A Shariah Document Screening Prototype Based On Serverless Architecture, Marhanum Che Mohd Salleh, Rizal Mohd Nor, Faizal Yusof, Md Amiruzzaman

Computer Science Faculty Publications

The aim of this research is to discuss the groundwork of building an Islamic Banking Document Screening Prototype based on a serverless architecture framework. This research first forms an algorithm for document matching based Vector Space Model (VCM) and adopts Levenshtein Distance for similarity setting. Product proposals will become a query, and policy documents by the central bank will be a corpus or database for document matching. Both the query and corpus went through preprocessing stage prior to similarity analysis. One set of queries with two sets of corpora is tested in this research to compare similarity values. Finally, a …


Codebase Relationship Visualizer: Visualizing Relationships Between Source Code Files, Jesse Hines Jan 2023

Codebase Relationship Visualizer: Visualizing Relationships Between Source Code Files, Jesse Hines

MS in Computer Science Project Reports

Understanding relationships between files and their directory structure is a fundamental part of the software development process. However, it can be hard to grasp these relationships without a convenient way to visualize how files are connected and how they fit into the directory structure of the codebase. In this paper we describe CodeBase Relationship Visualizer (CBRV), a Visual Studio Code extension that interactively visualizes the relationships between files. CBRV displays the relationships between files as arrows superimposed over a diagram of the codebase's directory structure. CBRV comes bundled with visualizations of the stack trace path, a dependency graph for Python …


An Ioe Blockchain-Based Network Knowledge Management Model For Resilient Disaster Frameworks, Amir Javadpour, Farinaz Sabz Ali Pour, Arun Kumar Sangaiah, Weizhe Zhang, Forough Ja'far, Ashish Singh Jan 2023

An Ioe Blockchain-Based Network Knowledge Management Model For Resilient Disaster Frameworks, Amir Javadpour, Farinaz Sabz Ali Pour, Arun Kumar Sangaiah, Weizhe Zhang, Forough Ja'far, Ashish Singh

Engineering Management & Systems Engineering Faculty Publications

The disaster area is a constantly changing environment, which can make it challenging to distribute supplies effectively. The lack of accurate information about the required goods and potential bottlenecks in the distribution process can be detrimental. The success of a response network is dependent on collaboration, coordination, sovereignty, and equal distribution of relief resources. To facilitate these interactions and improve knowledge of supply chain operations, a reliable and dynamic logistic system is essential. This study proposes the integration of blockchain technology, the Internet of Things (IoT), and the Internet of Everything (IoE) into the disaster management structure. The proposed disaster …


Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis Jan 2023

Efficient Gpu Implementation Of Automatic Differentiation For Computational Fluid Dynamics, Mohammad Zubair, Desh Ranjan, Aaron Walden, Gabriel Nastac, Eric Nielsen, Boris Diskin, Marc Paterno, Samuel Jung, Joshua Hoke Davis

Computer Science Faculty Publications

Many scientific and engineering applications require repeated calculations of derivatives of output functions with respect to input parameters. Automatic Differentiation (AD) is a method that automates derivative calculations and can significantly speed up code development. In Computational Fluid Dynamics (CFD), derivatives of flux functions with respect to state variables (Jacobian) are needed for efficient solutions of the nonlinear governing equations. AD of flux functions on graphics processing units (GPUs) is challenging as flux computations involve many intermediate variables that create high register pressure and require significant memory traffic because of the need to store the derivatives. This paper presents a …


Scalable Distributional Robustness In A Class Of Non Convex Optimization With Guarantees, Avinandan Bose, Arunesh Sinha, Tien Mai Dec 2022

Scalable Distributional Robustness In A Class Of Non Convex Optimization With Guarantees, Avinandan Bose, Arunesh Sinha, Tien Mai

Research Collection School Of Computing and Information Systems

Distributionally robust optimization (DRO) has shown lot of promise in providing robustness in learning as well as sample based optimization problems. We endeavor to provide DRO solutions for a class of sum of fractionals, non-convex optimization which is used for decision making in prominent areas such as facility location and security games. In contrast to previous work, we find it more tractable to optimize the equivalent variance regularized form of DRO rather than the minimax form. We transform the variance regularized form to a mixed-integer second order cone program (MISOCP), which, while guaranteeing near global optimality, does not scale enough …


Unoapi: Balancing Performance, Portability, And Productivity (P3) In Hpc Education, Konstantin Laufer, George K. Thiruvathukal Nov 2022

Unoapi: Balancing Performance, Portability, And Productivity (P3) In Hpc Education, Konstantin Laufer, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

oneAPI is a major initiative by Intel aimed at making it easier to program heterogeneous architectures used in high-performance computing using a unified application programming interface (API). While raising the abstraction level via a unified API represents a promising step for the current generation of students and practitioners to embrace high- performance computing, we argue that a curriculum of well- developed software engineering methods and well-crafted exem- plars will be necessary to ensure interest by this audience and those who teach them. We aim to bridge the gap by developing a curriculum—codenamed UnoAPI—that takes a more holistic approach by looking …


Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger Oct 2022

Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger

Electrical and Computer Engineering Publications

This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to represent an IoT application and distributed sensor data processing across multiple fog nodes. Furthermore, the virtual sensor deals with the heterogeneous nature of IoT devices and the various communication protocols using different adapters to communicate with the IoT devices and the underlying protocol. VSM uses the publish-subscribe design pattern …


Aligning The Transit Industry And Their Vendors In The Face Of Increasing Cyber Risk: Recommendations For Identifying And Addressing Cybersecurity Challenges, Scott Belcher, Terri Belcher, Kathryn Seckman, Brandon Thomas, Homayun Yaqub Jul 2022

Aligning The Transit Industry And Their Vendors In The Face Of Increasing Cyber Risk: Recommendations For Identifying And Addressing Cybersecurity Challenges, Scott Belcher, Terri Belcher, Kathryn Seckman, Brandon Thomas, Homayun Yaqub

Mineta Transportation Institute Publications

Public transit agencies in the United States depend on external vendors to help deliver and maintain many essential services and to provide critical technologies, from ticket purchases to scheduling to email management. While the integration of new, advanced technologies into the public transit industry brings important advancements to U.S. critical transportation infrastructure, the application of digital technologies also brings with it a new assortment of digital risks. Transit agencies of all sizes are finding themselves subject to cyber incidents—most notably ransomware attacks—like those experienced by larger, more prominent companies and critical infrastructure providers. The findings in this report focus on …


A Recommendation System Approach To Tune A Qubo Solver, Siong Thye Goh, Jianyuan Bo, Matthieu Parizy, Hoong Chuin Lau Jul 2022

A Recommendation System Approach To Tune A Qubo Solver, Siong Thye Goh, Jianyuan Bo, Matthieu Parizy, Hoong Chuin Lau

Research Collection School Of Computing and Information Systems

There are two major challenges to solving constrained optimization problems using a QuadraticUnconstrained Binary Optimization or QUBO solver (QS). First, we need to tune both the underlyingproblem parameters and the algorithm parameters. Second, the solution returned from a QSmight not be feasible. While it is common to use automated tuners such as SMAC and Hyperopt totune the algorithm parameters, the initial search ranges input for the auto tuner affect the performanceof the QS. In this paper, we propose a framework that resembles the Algorithm Selection(AS) framework to tune algorithm parameters for an annealing-based QS. To cope with constraints,we focus on …


Passing Time And Syncing Secrets: Demonstrating Covert Channel Vulnerabilities In Precision Time Protocol (Ptp), Aron J. Smith-Donovan Apr 2022

Passing Time And Syncing Secrets: Demonstrating Covert Channel Vulnerabilities In Precision Time Protocol (Ptp), Aron J. Smith-Donovan

Mathematics, Statistics, and Computer Science Honors Projects

Covert channels use steganographic approaches to transfer secret digital communications; when applied to network protocols, these strategies can facilitate undetectable data exfiltration and insertion attacks. Because covert channel techniques are protocol- and implementation-specific, individual case studies are necessary to assess for vulnerabilities under different conditions. While several investigations have been published evaluating covert channel potential in infrastructure- and manufacturing-based contexts, no existing research explores Precision Time Protocol (PTP), a time synchronization protocol commonly used in industrial control systems. This study aims to fill this gap by demonstrating the feasibility of a covert channel-based attack on a PTP-enabled network.


Faster Multidimensional Data Queries On Infrastructure Monitoring Systems, Yinghua Qin, Gheorghi Guzun Feb 2022

Faster Multidimensional Data Queries On Infrastructure Monitoring Systems, Yinghua Qin, Gheorghi Guzun

Faculty Research, Scholarly, and Creative Activity

The analytics in online performance monitoring systems have often been limited due to the query performance of large scale multidimensional data. In this paper, we introduce a faster query approach using the bit-sliced index (BSI). Our study covers multidimensional grouping and preference top-k queries with the BSI, algorithms design, time complexity evaluation, and the query time comparison on a real-time production performance monitoring system. Our research work extended the BSI algorithms to cover attributes filtering and multidimensional grouping. We evaluated the query time with the single attribute, multiple attributes, feature filtering, and multidimensional grouping. To compare with the existing prior …


A Just Energy Transition Requires Research At The Intersection Of Policy And Technology, Erin Baker Jan 2022

A Just Energy Transition Requires Research At The Intersection Of Policy And Technology, Erin Baker

Publications

The current energy system, in the US and around the world, is rife with inequities. The coming energy transition to a low carbon world has the potential to right some of these; but, without intention, it is more likely to perpetuate the current inequities. Enabling a just energy transition will require multiple categories of action, including fair policies and regulations; data and metrics; and knowledge generation. I focus on this last point, and particularly research at intersection of energy technology and social equity.


Data-Driven Decarbonization Of Residential Heating Systems: An Equity Perspective., John Wamburu, Emma Grazier, David Irwin, Christine Crago, Prashant Shenoy Jan 2022

Data-Driven Decarbonization Of Residential Heating Systems: An Equity Perspective., John Wamburu, Emma Grazier, David Irwin, Christine Crago, Prashant Shenoy

Publications

Since heating buildings using natural gas, propane and oil makes up a significant proportion of the aggregate carbon emissions every year, there is a strong interest in decarbonizing residential heating systems using new technologies such as electric heat pumps. In this poster, we conduct a data-driven optimization study to analyze the potential of replacing gas heating with electric heat pumps to reduce carbon emissions in a city-wide distribution grid. We seek to not only reduce the carbon footprint of residential heating, but also show how to do so equitably. Our results show that lower income homes have an energy usage …


Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza Jan 2022

Sustainable Computing - Without The Hot Air, Noman Bashir, David Irwin, Prashant Shenoy, Abel Souza

Publications

The demand for computing is continuing to grow exponentially. This growth will translate to exponential growth in computing's energy consumption unless improvements in its energy-efficiency can outpace increases in its demand. Yet, after decades of research, further improving energy-efficiency is becoming increasingly challenging, as it is already highly optimized. As a result, at some point, increases in computing demand are likely to outpace increases in its energy-efficiency, potentially by a wide margin. Such exponential growth, if left unchecked, will position computing as a substantial contributor to global carbon emissions. While prominent technology companies have recognized the problem and sought to …


Algorithm-Based Fault Tolerance At Scale, Joshua Dennis Booth Jan 2022

Algorithm-Based Fault Tolerance At Scale, Joshua Dennis Booth

Summer Community of Scholars (RCEU and HCR) Project Proposals

No abstract provided.


Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang Jan 2022

Ready Raider One: Exploring The Misuse Of Cloud Gaming Services, Guannan Liu, Daiping Liu, Shuai Hao, Xing Gao, Kun Sun, Haining Wang

Computer Science Faculty Publications

Cloud gaming has become an emerging computing paradigm in recent years, allowing computer games to offload complex graphics and logic computation to the cloud. To deliver a smooth and high-quality gaming experience, cloud gaming services have invested abundant computing resources in the cloud, including adequate CPUs, top-tier GPUs, and high-bandwidth Internet connections. Unfortunately, the abundant computing resources offered by cloud gaming are vulnerable to misuse and exploitation for malicious purposes. In this paper, we present an in-depth study on security vulnerabilities in cloud gaming services. Specifically, we reveal that adversaries can purposely inject malicious programs/URLs into the cloud gaming services …


Evaluation Of Continuous Power-Down Schemes, James Andro-Vasko, Wolfgang Bein Jan 2022

Evaluation Of Continuous Power-Down Schemes, James Andro-Vasko, Wolfgang Bein

Computer Science Faculty Research

We consider a power-down system with two states—“on” and “off”—and a continuous set of power states. The system has to respond to requests for service in the “on” state and, after service, the system can power off or switch to any of the intermediate power-saving states. The choice of states determines the cost to power on for subsequent requests. The protocol for requests is “online”, which means that the decision as to which intermediate state (or the off-state) the system will switch has to be made without knowledge of future requests. We model a linear and a non-linear system, and …


Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour Jan 2022

Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour

Engineering Management & Systems Engineering Faculty Publications

In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …


Automated Discovery Of Network Cameras In Heterogeneous Web Pages, Ryan Dailey, Aniesh Chawla, Andrew Liu, Sripath Mishra, Ling Zhang, Josh Majors, Yung-Hisang Lu, George K. Thiruvathukal Oct 2021

Automated Discovery Of Network Cameras In Heterogeneous Web Pages, Ryan Dailey, Aniesh Chawla, Andrew Liu, Sripath Mishra, Ling Zhang, Josh Majors, Yung-Hisang Lu, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

Reduction in the cost of Network Cameras along with a rise in connectivity enables entities all around the world to deploy vast arrays of camera networks. Network cameras offer real-time visual data that can be used for studying traffic patterns, emergency response, security, and other applications. Although many sources of Network Camera data are available, collecting the data remains difficult due to variations in programming interface and website structures. Previous solutions rely on manually parsing the target website, taking many hours to complete. We create a general and automated solution for aggregating Network Camera data spread across thousands of uniquely …


Neural Architecture Search Of Spd Manifold Networks, R.S. Sukthanker, Zhiwu Huang, S. Kumar, E. G. Endsjo, Y. Wu, Gool L. Van Aug 2021

Neural Architecture Search Of Spd Manifold Networks, R.S. Sukthanker, Zhiwu Huang, S. Kumar, E. G. Endsjo, Y. Wu, Gool L. Van

Research Collection School Of Computing and Information Systems

In this paper, we propose a new neural architecture search (NAS) problem of Symmetric Positive Definite (SPD) manifold networks, aiming to automate the design of SPD neural architectures. To address this problem, we first introduce a geometrically rich and diverse SPD neural architecture search space for an efficient SPD cell design. Further, we model our new NAS problem with a one-shot training process of a single supernet. Based on the supernet modeling, we exploit a differentiable NAS algorithm on our relaxed continuous search space for SPD neural architecture search. Statistical evaluation of our method on drone, action, and emotion recognition …


Trust Models And Risk In The Internet Of Things, Jeffrey Hemmes Apr 2021

Trust Models And Risk In The Internet Of Things, Jeffrey Hemmes

Regis University Faculty Publications

The Internet of Things (IoT) is envisaged to be a large-scale, massively heterogeneous ecosystem of devices with varying purposes and capabilities. While architectures and frameworks have focused on functionality and performance, security is a critical aspect that must be integrated into system design. This work proposes a method of risk assessment of devices using both trust models and static capability profiles to determine the level of risk each device poses. By combining the concepts of trust and secure device fingerprinting, security mechanisms can be more efficiently allocated across networked IoT devices. Simultaneously, devices can be allowed a greater degree of …


Lecture 05: The Convergence Of Big Data And Extreme Computing, David Keyes Apr 2021

Lecture 05: The Convergence Of Big Data And Extreme Computing, David Keyes

Mathematical Sciences Spring Lecture Series

As simulation and analytics enter the exascale era, numerical algorithms, particularly implicit solvers that couple vast numbers of degrees of freedom, must span a widening gap between ambitious applications and austere architectures to support them. We present fifteen universals for researchers in scalable solvers: imperatives from computer architecture that scalable solvers must respect, strategies towards achieving them that are currently well established, and additional strategies currently being developed for an effective and efficient exascale software ecosystem. We consider recent generalizations of what it means to “solve” a computational problem, which suggest that we have often been “oversolving” them at the …


Lecture 12: Recent Advances In Time Integration Methods And How They Can Enable Exascale Simulations, Carol S. Woodward Apr 2021

Lecture 12: Recent Advances In Time Integration Methods And How They Can Enable Exascale Simulations, Carol S. Woodward

Mathematical Sciences Spring Lecture Series

To prepare for exascale systems, scientific simulations are growing in physical realism and thus complexity. This increase often results in additional and changing time scales. Time integration methods are critical to efficient solution of these multiphysics systems. Yet, many large-scale applications have not fully embraced modern time integration methods nor efficient software implementations. Hence, achieving temporal accuracy with new and complex simulations has proved challenging. We will overview recent advances in time integration methods, including additive IMEX methods, multirate methods, and parallel-in-time approaches, expected to help realize the potential of exascale systems on multiphysics simulations. Efficient execution of these methods …


Development Of A Real-Time Single-Lead Single-Beat Frequency-Independent Myocardial Infarction Detector, Harold Martin Mar 2021

Development Of A Real-Time Single-Lead Single-Beat Frequency-Independent Myocardial Infarction Detector, Harold Martin

FIU Electronic Theses and Dissertations

The central aim of this research is the development and deployment of a novel multilayer machine learning design with unique application for the diagnosis of myocardial infarctions (MIs) from individual heartbeats of single-lead electrocardiograms (EKGs) irrespective of their sampling frequencies over a given range. To the best of our knowledge, this design is the first to attempt inter-patient myocardial infarction detection from individual heartbeats of single-lead (lead II) electrocardiograms that achieves high accuracy and near real-time diagnosis. The processing time of 300 milliseconds to a diagnosis is just at the time range in between extremely fast heartbeats of around 300 …