Roger Achkar

Roger Achkar
American University of Science and Technology · Computer and Communications Engineering

Ph.D. in Energetic Systems and Information

About

69
Publications
176,460
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
314
Citations
Additional affiliations
September 2018 - October 2019
American University of Science and Technology
Position
  • Head of Faculty
May 2013 - present
American University of Science and Technology
Position
  • Chairperson
June 2005 - June 2008
Université de Technologie de Compiègne
Position
  • Ph.D. Automation and Control

Publications

Publications (69)
Article
Full-text available
The massive deployment of small cells in 5G networks represents an alternative to meet the ever increasing mobile data traffic and to provide very-high throughout by bringing the users closer to the Base Stations (BSs). This large increase in the number of network elements demands a significant increase in the energy consumption and carbon footprin...
Conference Paper
In recent years, the increasing influence of machine learning in different industries had inspired many traders to benefit from it in the world of finance, stock trading is one of the most important activities. Predicting the direction of stock prices is a widely studied subject in many fields including trading, finance, statistics and computer sci...
Conference Paper
Although technology has been evolving rapidly in this information age, deaf/mute people still use sign language as their only way of communication. Using sign language as a communication tool can be beneficial among those who are familiar with this language, but the problem remains when communicating with the wider community. Sign Language Translat...
Conference Paper
This paper includes a novel technique for "Ethnicity Detection System" via extracting geometric features from pictures, such as the nose width, lips width, forehead width and color. These aforementioned features can be easily extracted by means of the Viola Jones algorithm, followed by the execution of the artificial neural networking. This process...
Article
Full-text available
Modulation is a process through which a message has to pass in order to be effectively transmitted. However, there are some limitations to Pulse Code Modulation and Delta Modulation that can cause data redundancy, quantization error, slope overload distortion and granular noise which result in a bad communication process. Throughout the past few ye...
Chapter
In this paper, learning with a teacher artificial neural network to predict the results of football matches is presented. This type of networks requires training via examples, and when the training is complete, the network can be tested to check the results of new examples. In this application, the training examples are the results of previous matc...
Article
Full-text available
Routing over low power and lossy networks (RPL) is a standardized routing protocol for constrained Wireless Sensor Network (WSN) environments. The main node's constraints include processing capability, power, memory, and energy. RPL protocol describes how WSN nodes create a mesh topology, enabling them to route sensor data. Unfortunately, various a...
Conference Paper
Routing over Low Power and Lossy Networks (RPL) is a standardized routing protocol for constrained Wireless Sensor Network (WSN) environments. The main node’s constraints include processing capability, power, memory, and energy. RPL defines how the nodes in a WSN form a Mesh topology enabling them to route messages. Unfortunately, various attacks e...
Conference Paper
Object detection and classification in Artificial Neural Networks (ANN) can play an important part in finding solutions for various tasks that are considered critical or time consuming if executed by humans. Also, object detection can be used in several applications and domains. One of which is physical security, where many illegal items, that shou...
Article
Full-text available
License Plate Recognition (LPR) is a well-known image processing technology. The goal of this paper is to achieve the same or better accuracy than previous known algorithms while attaining a higher speed of processing and a modular yet simple approach. The engine is mainly designed to work on Lebanese license plates but can easily be trained for ot...
Article
Full-text available
Voice recognition systems are used to distinguish different sorts of voices. However, recognizing a voice is not always successful due to the presence of different parameters. Hence, there is a need to create a set of estimation criteria and a learning process using Artificial Neural Networks (ANNs). The learning process performed using ANNs allows...
Conference Paper
Voice recognition systems are used to distinguish different sorts of voices. However, recognizing a voice is not always successful due to the presence of different parameters. Hence, there is a need to create a set of estimation criteria and a learning process using Artificial Neural Network (ANN). The learning process performed using ANN allows th...
Conference Paper
Full-text available
In order for a message to be feasible for transmission, it has to pass through an essential process which is “modulation”. Through years, Pulse Code Modulation (PCM), Delta Modulation (DM) and Differential Pulse Code Modulation (DPCM), in digital communication systems, have proven their unlimited advantages over analog communication systems, in ter...
Conference Paper
The enhanced performance of modern Artificial Intelligence algorithms has opened up limitless possibilities in the development of smart systems and devices. One of the most complex tasks for interactive devices is the analysis of human motion. However, using neural networks, movement can be classified and even understood. This paper proposes the us...
Conference Paper
Full-text available
In order for a message to be feasible for transmission, it has to pass through an essential process which is “modulation”. Through years, Pulse Code Modulation (PCM), Delta Modulation (DM) and Differential Pulse Code Modulation (DPCM), in digital communication systems, have proven their unlimited advantages over analog communication systems, in ter...
Conference Paper
Human-Computer Interfaces can be made more realistic when computers are able to recognize facial expressions. About 70% of the inter-personal communication is non-verbal; through body language, facial expressions, posture, voice tonality, etc. When machines interact with people, facial expressions that humans make are important in understanding the...
Conference Paper
This paper aims to develop a sensor based monitoring and analyzing system for Neuro-Degenerative Disorder patients (NDD); this may consist on SpO2 sensor, Electrophysiological sensors, NIBP, Motion Capture sensors and Eye Monitoring sensor, taking into consideration an acceptable cost for the whole system. Recorded data will be sent to an embedded...
Conference Paper
Full-text available
Communication technology innovations have shortened the distance between people by making information sharing faster and easier. However, the existing devices are lacking. The 3D Replica Conferencing System is a system that adds to the reality of communication systems by projecting a replica of a remote participant in 3D. This system provides, in a...
Conference Paper
Communication technology innovations have shortened the distance between people by making information sharing faster and easier. However, the existing devices are lacking. The 3D Replica Conferencing System is a system that adds to the reality of communication systems by projecting a replica of a remote participant in 3D. This system provides, in a...
Conference Paper
Perfect security for the multi-antenna wiretap channel is considered, at the physical layer, under a limited-energy constraint. The problem was originally considered in [1] for point-to-point channels, where the fundamental limits of secure communication have been established in the wideband regime. In this paper, the more general multi-antenna sce...
Conference Paper
Full-text available
Scientists and socialists have worked very hard to help the elderly and the disabled to adopt methods that can help them interact with society and smooth their mobility during everyday activities, rather than be dependent on others, or on using the traditional tools, mainly the wheelchair. However, this technology has basic drawbacks since the disa...
Conference Paper
Full-text available
Abstract— Scientists and socialists have worked very hard to help the elderly and the disabled to adopt methods that can help them interact with society and smooth their mobility during everyday activities, rather than be dependent on others, or on using the traditional tools, mainly the wheelchair. However, this technology has basic drawbacks sinc...
Conference Paper
Scientists and socialists have worked very hard to help the elderly and the disabled to adopt methods that can help them interact with society and smooth their mobility during everyday activities, rather than be dependent on others, or on using the traditional tools, mainly the wheelchair. However, this technology has basic drawbacks since the disa...
Conference Paper
According to the World Health Organization, more than a million people die every year because of transportation-related accidents. The death of many people in accidents without knowing the reasons; the conflict between the victim's family and the insurance companies; the investigations that lack the physical evidence are some of the problems that a...
Article
Antennas are becoming crucial in an increasingly growing number of vital applications, particularly with the emergence of the 3G and 4G generations of communications. Point-to-multipoint configuration is a major interest nowadays; therefore antennas are designed for this purpose where efficiency, size, and cost play a decisive role. The common prac...
Article
Nonlinear adaptive filtering has been extensively studied in the literature, using, for example, Volterra filters or neural networks. Recently, kernel methods have been offering an interesting alternative because they provide a simple extension of linear algorithms to the nonlinear case. The main drawback of online system identification with kernel...
Conference Paper
The goal of this work is to design and implement a new system that allows the user to apply his/her every day motor skills to simulate games. This system adds to the known gaming techniques the physical benefits as well as the real interaction between user and machine. Moreover, the gamers around the world can benefit from this project as well as t...
Conference Paper
Full-text available
The traditional technique of monitoring an electric generator was through regular checks on the generator’s variables: oil, temperature, voltage, and current on a daily basis. Therefore, keeping a normal cycle of performance requires hard work and is often imprecise. The paper presents the solution for the aforementioned issues and more. The idea i...
Conference Paper
Full-text available
Elderly, blind or visually impaired people recur to a cane as a traditional ambulation aid. Although useful for maintaining balance, and for pivoting around obstacles, this tool limits the autonomy of individuals. In some extreme cases, using a cane leads to potential hazards, which can be detrimental to the health of the person relying on it. The...
Conference Paper
Full-text available
As many other species, honeybees are becoming extinct in the world; this phenomenon is called the Colony Collapse Disorder. Many reasons have been proven to be behind this environmental disaster like climate changes, pesticides, fungal pathogens and others; especially, since in recent years, wild life has been exposed to microwaves and radio freque...
Conference Paper
As the human technology moves forward, the risk of natural and man induced catastrophes increases exponentially. One of the most dangerous disasters is fires. In addition to its direct danger on human's lives, fire consumes forests, where trees that provide humans with oxygen are destroyed. The risk of fire has increased due to the problem of globa...
Conference Paper
Full-text available
The aim of this study is to restore some vision to the visually impaired, via non-invasive digital stimulation. Our approach is to transmit processed information to the vision cortex, via the trans-cranial magnetic stimulation (TMS) technique which is a non-invasive method to excite the elementary unit of the nervous system. The back-feed of the vi...
Conference Paper
Horn antennas are one of the most widely used antennas for long distance communication systems since they provide super high directivity required for point-to-point communication systems. Such antennas, in addition to their high directivity, are very practical due to their simple design which makes them competitive in the market from both financial...
Conference Paper
Full-text available
Gas detectors have come a long way since the first commercial detector; yet, some though safe and efficient, they are expensive or pose high maintenance cost, others are simple and cheap but lack safety, mobility and efficiency. Gas Ascertainment via Smartphone (GAS) is the recommended detector that is far more advanced, and offers safety, mobility...
Conference Paper
Full-text available
The smart assistive accident free wheel chair system is designed to give a chance for paralyzed patients to move freely within their surroundings. Like the case of any other automated wheelchair, the patient will not exert any effort to move the chair. In the proposed design, the patient will control his chair by simple verbal commands being analyz...
Conference Paper
Gas detectors have come a long way since the first commercial detector; yet, some though safe and efficient, they are expensive or pose high maintenance cost, others are simple and cheap but lack safety, mobility and efficiency. Gas Ascertainment via Smartphone (GAS) is the recommended detector that is far more advanced, and offers safety, mobility...
Conference Paper
This article tackles the online identification problem for nonlinear and nonstationary systems using kernel methods. The order of the model is controlled by the coherence criterion considered as a sparsification technique which leads to select the most relevant kernel functions to form a dictionary. We explore the dictionary adaptation using a stoc...
Conference Paper
Full-text available
As many other species, honeybees are becoming extinct in the world; this phenomenon is called the Colony Collapse Disorder. Many reasons have been proven to be behind this environmental disaster like climate changes, pesticides, fungal pathogens and others, in addition to radiations generated by mobile phones, especially, since in recent years wild...
Article
Full-text available
Nonlinear system identification has always been a challenging problem. The use of kernel methods to solve such problems becomes more prevalent. However, the complexity of these methods increases with time which makes them unsuitable for online identification. This drawback can be solved with the introduction of the coherence criterion. Furthermore,...
Article
Digital communication techniques have proved their preference over analog communication techniques due to their higher reliability, flexibility and compatibility. However, the commonly used digital communication techniques such as PCM (pulse coded modulation) and LDM (linear delta modulation) cause quantization error, slope overload distortion, and...
Conference Paper
Full-text available
New technologies are invented and developed in order to simplify communication among people living over a wide area. These technologies rely on creating faster and easier ways of posting announcements. Current ways of announcement require more funds and time when proposed routinely. The “i- Display using Smart Phone Application” is a mobile technol...
Conference Paper
New technologies are invented and developed in order to simplify communication among people living over a wide area. These technologies rely on creating faster and easier ways of posting announcements. Current ways of announcement require more funds and time when proposed routinely. The "i-Display using Smart Phone Application" is a mobile technolo...
Article
Full-text available
Landmines, specifically anti-tank mines, cluster bombs, and unexploded ordnance form a serious problem in many countries. Several landmine sweeping techniques are used for minesweeping. This paper presents the design and the implementation of the vision system of an autonomous robot for landmines localization. The proposed work develops state-of-th...
Conference Paper
During the last few years, kernel methods have been very useful to solve nonlinear identification problems. The main drawback of these methods resides in the fact that the number of elements of the kernel development, i.e., the size of the dictionary, increases with the number of input data, making the solution not suitable for online problems espe...
Conference Paper
Full-text available
Digital communication techniques make the process of modulating a message feasible for transmission. However, a common problem with commonly used techniques, such as Pulse Coded Modulation (PCM) and Linear Delta Modulation (LDM), is that they negatively affect the communication process by causing quantization error, slope overload distortion, and g...
Conference Paper
Full-text available
Through years, Digital Communication systems, Pulse Coded Modulation (PCM), Linear Delta Modulation (LDM), Differential Pulse Coded Modulation (DPCM), and Adaptive Delta Modulation (ADM), have proven their unlimited advantages over analog communication systems, in term of error minimization, and distances of transmission enhancement. However two of...
Conference Paper
Full-text available
The aim of this study is to restore some vision to the visually impaired individual via non-invasive digital stimulation. The objective is attained by transmitting processed information to the vision cortex, via non-invasive Trans-cranial Magnetic Stimulation (TMS) technique so as to excite the elementary unit of the nervous system. The feeding of...
Conference Paper
Full-text available
This paper expounds on the design and the implementation of the intelligence (vision and brain) of an autonomous robot for landmines localization, specifically anti-tank mines, cluster bombs, or unexploded ordnance. The landmine sweeping technique under study utilizes state-of-the-art techniques in digital image processing for pre-processing captur...
Conference Paper
The active magnetic bearing AMB presents a solution for all technical problems since it ensures the total levitation of a body in space eliminating any mechanical contact between the rotor and the stator. The goal of our work is to show that the control of the AMB by Multilayer perceptrons MLP involves an improvement of the response compared to the...
Conference Paper
Full-text available
The active magnetic bearing (AMB) presents a solution for all the technical problems of the classical bearing since it ensures the total levitation of a body in space eliminating any mechanical contact between the rotor and the stator. The goal of our work is to show the control efficiency of a magnetic sustention, characterized by its nonlinear mo...
Article
The active magnetic bearing AMB presents a solution for all technical problems since it ensures the total levitation of a body in space eliminating any mechanical contact between the rotor and the stator. The goal of our work is to show that the control of the AMB by Multilayer perceptrons MLP involves an improvement of the response compared to the...
Article
Full-text available
Problem statement: The synthesis of a command by the neural network has an excellent advantage over the classical one such as PID. This study presented a fast and accurate Wavelet Neural Network (WNN) approach for efficient controlling of an Active Magnetic Bearing (AMB) system. Approach: The proposed approach combined neural network with the wavel...
Conference Paper
The active magnetic bearing AMB presents a solution for all the technical problems since it ensures the total levitation of a body in space eliminating any mechanical contact between the rotor and the stator. The goal of our work is to show that the control of the AMB by multilayer perceptrons. MLP involves an improvement of the response compared t...
Conference Paper
A nonlinear model of an inertial wheel supported by active magnetic bearings is presented. The goal of our work is to show that the control of the AMB by MLP involves an improvement of the response compared to the ordering of the AMB by classical controllers. A controller of an artificial neural network MLP was developed to control the system, in w...

Questions

Questions (10)
Question
Some Friendship Quotes:
"Friendship... is not something you learn in school. But if you haven't learned the meaning of friendship, you really haven't learned anything". Muhammad Ali
"Friendship is always a sweet responsibility, never an opportunity". Gibran Khalil Gibran
"Friends are born, not made". Henry Adams
"In the sweetness of friendship let there be laughter, and sharing of pleasures. For in the dew of little things the heart finds its morning and is refreshed". Gibran Khalil Gibran
"The only way to have a friend is to be one". Ralph Waldo Emerson
Question
This question is asked mainly to discus the newly applied methods in artificial intelligence for vision applications.
Can we count on these artificial intelligent systems (such as neural networks) to replace the vision neuron functions of the brain in order to help blind people to restore their vision?
Question
The success of any University can be measured by the number of students able to find a job in their field of expertise after they graduate.
Are we in academic sectors preparing our students?
Do we know what the market needs?

Network

Cited By

Projects

Projects (6)
Project
The main goals of this IDS include: 1) The ability to detect multiple types of RPL attacks using unsupervised learning, 2) Enhancing power consumption by notifying the network administrator at an early stage about a certain attack, 3) Ensuring network availability due to the immediate notice of a security breach.