Malrey Lee
YOU?
Author Swipe
View article: A framework to estimate generating capacities of PV systems using satellite imagery segmentation
A framework to estimate generating capacities of PV systems using satellite imagery segmentation Open
The growing interest in global warming has led to various efforts to rely on new renewable energy such as solar power. More accurate energy generation calculation is on-demand with the rise of publicly accessible residential photovoltaic (…
View article: Photovoltaics Plant Fault Detection Using Deep Learning Techniques
Photovoltaics Plant Fault Detection Using Deep Learning Techniques Open
Solar energy is the fastest-growing clean and sustainable energy source, outperforming other forms of energy generation. Usually, solar panels are low maintenance and do not require permanent service. However, plenty of problems can result…
View article: A Contribution to Enhance the Panoramic Image Security via Cryptography and Shuffled Methods
A Contribution to Enhance the Panoramic Image Security via Cryptography and Shuffled Methods Open
Major changes have been accounted in the field’s of information technology(IT), the information that may in the form of audio, video and text, can be transferred anytime, from source to destination or vice versa that may located in anywher…
View article: Classification Accuracy Improvement for Small-Size Citrus Pests and Diseases Using Bridge Connections in Deep Neural Networks
Classification Accuracy Improvement for Small-Size Citrus Pests and Diseases Using Bridge Connections in Deep Neural Networks Open
Due to the rich vitamin content in citrus fruit, citrus is an important crop around the world. However, the yield of these citrus crops is often reduced due to the damage of various pests and diseases. In order to mitigate these problems, …
View article: The clinical result of arterialized venous free flaps for the treatment of soft tissue defect of the fingers
The clinical result of arterialized venous free flaps for the treatment of soft tissue defect of the fingers Open
The purpose of this study is to report the clinical results of the arterialized venous free flaps in reconstructing soft tissue defects of the finger and to extend the indications for the use of the flaps based on clinical experiences of t…
View article: Trigger finger secondary to a neglected flexor tendon rupture
Trigger finger secondary to a neglected flexor tendon rupture Open
Secondary trigger finger caused by trauma to the hand, especially associated with partial flexor tendon rupture, is not a common condition. Thus, the clinical manifestations of these patients are not well-known. The aim of this study is to…
View article: Spontaneous rupture of flexor pollicis longus tendon by tendolipomatosis in proximal phalanx
Spontaneous rupture of flexor pollicis longus tendon by tendolipomatosis in proximal phalanx Open
Spontaneous rupture of the FPL tendon, attributed to degenerative changes caused by tendolipomatosis, is the first report of its kind, in the authors' opinion. Hence we recommend to perform the histopathological examination of the debrided…
View article: Anomalous course and stenosing tenosynovitis of the extensor pollicis longus tendon at the radial styloid process
Anomalous course and stenosing tenosynovitis of the extensor pollicis longus tendon at the radial styloid process Open
Anomalous course of the EPL tendon is rarely reported associated with similar symptoms of de Quervain's disease. However, the knowledge and understanding of this potential anomaly in the course of EPL tendon is very important for the treat…
View article: Treatment of infected Achilles tendinitis and overlying soft tissue defect using an anterolateral thigh free flap in an elderly patient
Treatment of infected Achilles tendinitis and overlying soft tissue defect using an anterolateral thigh free flap in an elderly patient Open
Introduction: Infected segmental loss of the Achilles tendon with overlying soft tissue and skin defect remains a more complex reconstructive challenge. Here, we present a functional reconstruction of infected Achilles tendinitis with comb…
View article: The clinical result of arthroscopic bone grafting and percutaneous K-wires fixation for management of scaphoid nonunions
The clinical result of arthroscopic bone grafting and percutaneous K-wires fixation for management of scaphoid nonunions Open
The purpose of this study is to analyze the clinical results of patients with scaphoid nonunion treated with arthroscopic bone grafting and K (Kirschner)-wires fixation.We retrospectively reviewed the records of 27 patients with scaphoid n…
View article: Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients
Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients Open
Telemonitoring is not a new term, in information technology (IT), which has been employed to remotely monitor the health of patients that are located not in common places, such hospitals or medical centers. For that, wearable medical senso…
View article: Centralized Connectivity for Multiwireless Edge Computing and Cellular Platform: A Smart Vehicle Parking System
Centralized Connectivity for Multiwireless Edge Computing and Cellular Platform: A Smart Vehicle Parking System Open
This study takes an intuitive step to develop the user‐convenient smart vehicle parking system (SVPS), a smart system able to manage the massive crowd of vehicles during parking searching and do the better jobs of parking reservation and m…
View article: The Intelligent Healthcare Data Management System Using Nanosensors
The Intelligent Healthcare Data Management System Using Nanosensors Open
We developed a design of Intelligent Healthcare Data Management System using nanosensors (IHDMS) and composed an application for mobile device. The proposed IHDMS will coordinate the healthcare data of the patients from nanosensors and tra…
View article: A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols
A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols Open
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various…
View article: A Cellular Access and Monitoring System for Industrial Information Model and Design
A Cellular Access and Monitoring System for Industrial Information Model and Design Open
Nowadays, a dramatic change has accounted in life of humans due to the revolution of Information technology (IT). As the demands are increasing, the corresponding enhancements are also made to fulfill these requirements, in sectors like ed…
View article: A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks
A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks Open
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems inter…
View article: Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Design and Development of Layered Security: Future Enhancements and Directions in Transmission Open
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end secur…
View article: A Study of Security Vulnerabilities in Mobile environment
A Study of Security Vulnerabilities in Mobile environment Open
Now day's application had focus more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that become important for security. RFID devices are going to be ubiquitous applications that are used …
View article: A Study of 4G Network for Security System
A Study of 4G Network for Security System Open
In this paper there is an overview of some standards and security models which are implemented in such an IP-based and heterogeneous networks and we also present some security models in an open environment and finally we obtain that as a r…
View article: New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions
New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions Open
Modern technology enhancements have been used worldwide to fulfill the requirements of the industrial sector, especially in supervisory control and data acquisition (SCADA) systems as a part of industrial control systems (ICS). SCADA syste…
View article: Arthroscopic Resection of a Tenosynovial Giant Cell Tumor in the Wrist
Arthroscopic Resection of a Tenosynovial Giant Cell Tumor in the Wrist Open
The treatment for giant cell tumors of the tendon sheath is surgical therapy, but surgical recurrence rates were reported to be as high as 50% in some cases. Therefore, complete radical excision of the lesion is the treatment of choice. If…
View article: Flexor Tendon Entrapment at the Malunited Base Fracture of the Proximal Phalanx of the Finger in Child
Flexor Tendon Entrapment at the Malunited Base Fracture of the Proximal Phalanx of the Finger in Child Open
The proximal phalangeal base is the most commonly fractured hand bone in children. Such fractures are rarely reported as irreducible due to flexor tendon entrapment. Here, we describe a patient who sustained a malunited fracture on the rig…
View article: An Adaptive Genetic Algorithm for Improving Dynamic Performance of PD Control Systems
An Adaptive Genetic Algorithm for Improving Dynamic Performance of PD Control Systems Open
The appropriate choice of crossover and mutation rates is critical to the success of genetic algorithms.Earlier researches focused on finding optimal non-dynamic crossover or mutation rates, which vary for different problems, and different…
View article: Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information
Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information Open
Information technology (IT) security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has …
View article: Small Finger Snapping due to Retinacular Ligament Injury at the Level of Proximal Interphalangeal Joint
Small Finger Snapping due to Retinacular Ligament Injury at the Level of Proximal Interphalangeal Joint Open
Pathological snapping secondary to posttraumatic subluxation of the extensor tendon at proximal interphalangeal joint (PIPJ) of the finger is rare. Here, we want to describe a patient with snapping of the left small finger at PIPJ due to r…
View article: The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission
The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission Open
This study examined the security of SCADA system and its protocols, more specifically, SCADA/DNP3 protocol security. To achieve the study goals, a SCADA simulation environment is designed for water pumping process through connectivity of i…