Abstract: Driven by the urgent need to displace fossil fuels for carbon emission reduction and climate change mitigation, offshore wind energy has emerged as a highly promising renewable energy source ...
Abstract: Remote sensing object detection (RSOD) using convolutional neural networks (CNNs) continues to pose challenges in achieving high detection accuracy due to the inherent complexity of remote ...
Abstract: Autonomous underwater vehicles (AUVs) equipped with the intelligent underwater object detection technique is of great significance for underwater navigation. Advanced underwater object ...
Abstract: Model predictive control (MPC) has established itself as the primary methodology for constrained control, enabling general-purpose robot autonomy in diverse real-world scenarios. However, ...
Abstract: The Prompt Gamma Timing (PGT) method provides the assessment of particle range by measuring the time of flight between the primary particle and PG detection. This non-invasive and real-time ...
Abstract: Particle therapy verification using induced prompt gamma radiation is a field of active research. We employ an iterative reconstruction algorithm to reconstruct the spatiotemporal emission ...
Abstract: Low signal-to-background ratio and subsequent image degradation limits the performance of Compton cameras and hinder their application for range verification in hadron therapy. While several ...
Abstract: The enhanced sensitivity of total-body PET/CT scanners substantially decreases noise, however the full potential for spatio-temporal resolution is still hampered by artefacts and ...
Abstract: In positron emission tomography (PET), radiolabelling of antibodies with Zirconium-89 ($\mathrm{t}_{1 / 2}=78.4$ hours) has opened the door to studying a variety of diseases, aka. immuno- ...
Abstract: In PET, patient radiation exposure is mainly determined by the administered amount of radiotracer and its metabolism. By lowering the activity, the radiation dose is minimized at the cost of ...
Abstract: With the expansion of social robots’ working environments, developing strategies to mitigate their mistakes has become crucial, especially given the difficulty of entirely avoiding errors.
Abstract: In the recent past, there has been a significant surge in MAC layer Wi-Fi attacks, leaving Wireless Local Area Networks (WLANs) vulnerable to different types of network intrusion. The ...