Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Olga Joy L. Gerasta"'
Publikováno v:
2022 IEEE 14th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management (HNICEM).
Publikováno v:
2020 IEEE 12th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management (HNICEM).
This research paper presented a design that will address the challenges brought by remanence in ground-fault current interrupter devices (gfci). Remanence or residual magnetism is the magnetization left behind in a ferromagnetic material (such as iro
Autor:
Olga Joy L. Gerasta, Daryl P. Pongcol, Vrian Jay V. Ylaya, Ryan Rhay P. Vicerra, Najie M. Pandian, Jesrey Martin S. Macasero
Publikováno v:
2020 IEEE 12th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management (HNICEM).
The study is to develop a Linear Frequency Modulated Continuous Wave LFM-CW short-range radar for detecting subsurface water content with deep learning. Implementation of signal transmission/reception, signal processing, and graphical user interface
Publikováno v:
IFAC-PapersOnLine. 51:657-660
This work presents the design and method of measuring the impedance in a fluidic unit containing a metal solution using a concave capacitive sensor. The prototype of the design is tested with metal solutions over a range of frequency onto a specific
Publikováno v:
IFAC-PapersOnLine. 51:661-665
This manuscript presents remote Time Domain Reflectory (TDR) system to measure soil moisture through electromagnetic wave signal aboard in Unmanned Aerial Vehicle (UAV) platform. The UAV-based remote TDR design is significant in obtaining spatial res
Publikováno v:
2019 IEEE 11th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management ( HNICEM ).
There are two prominent ways of implementing signal processing of FMCW radar in SDRs, namely i) the Beat Frequency Extraction Algorithm and ii) Cross Correlation Algorithm. The former is done by numerical mixing of the reference signal and the receiv
Autor:
Aileen B. Caberos, Olga Joy L. Gerasta, Daryl P. Pongcol, Vrian Jay V. Ylaya, Najie M. Pandian, Jesrey Martin S. Macasero
Publikováno v:
2019 IEEE 11th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management ( HNICEM ).
This research is about the implementation of a dual continuous wave (CW) ground penetrating radar for the Ettus USRP B210 software defined radio device. Two high- powered and low-frequency continuous waves were transmitted on the ground and reflected
Publikováno v:
2019 IEEE 11th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management ( HNICEM ).
Wireless technology has its inherent need for battery to power-up a system. One way to overcome this challenge is to extract power from ambient sources. Ambient energy harvesting is a way to utilize the energy from the surroundings as this energy is
Autor:
Xyrex A. Calang, Olga Joy L. Gerasta, Al John S. Timogan, Najie M. Pandian, Vrian Jay V. Ylaya
Publikováno v:
2019 IEEE 11th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management ( HNICEM ).
This paper presents the development of a low costpassive high frequency tag antenna that is utilized for an inventory management radio frequency identification (rfid) system. The main material used in the study is the Magnetic Copper Wire. There are
Autor:
Blesshe Mae B. Beron, Re-Ann Cristine O. Calimpusan, Kister Genesis Jimenez, Varrie T. Duhaylungsod, Jefferson A. Hora, Olga Joy L. Gerasta
Publikováno v:
2019 IEEE 11th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management ( HNICEM ).
Cost of data breach is frightfully alarming and software-based solutions for addressing information security may not just be enough. The need for hardware-level cryptography gave rise to the conception of this research aiming at the ASIC implementati