Communications
1. On the Design of Coherent Zero-Forcing Receiver for the Flat Fading MIMO Multiple-Access Channels

M. Sheikh-Hosseini

Volume 7, Issue 2 , Summer and Autumn 2019, , Pages 195-204

Abstract
  Background and Objectives: Design of low-complexity receiver for space-time block coded (STBC) transmission over multiple-input multiple-output (MIMO) multiple-access channels has been subject of interest over the years. In this regard, zero-forcing receiver, as a low complexity receiver needing as many ...  Read More

Communications
2. Interference Alignment Using Difference of Convex-based Beamformer Design for MIMO Interference Channels

N. Danesh; M. Sheikhan; B. Mahboobi

Volume 7, Issue 2 , Summer and Autumn 2019, , Pages 231-240

Abstract
  Background and Objectives: To achieve significant throughput, interference alignment (IA) is an encouraging technique for wireless interference networks. In this study, we design an aligned beamformer based on the interference leakage minimization (ILM) method to reduce the interference power for a ...  Read More

Communications
3. Compact Low Pass Filter Using Sharp Roll-off Ultra-Wide Stopband T-shaped Resonator

F. Yousefi Moghadam; B. Afzali; F. Nadi; R. Zallbeygi

Volume 6, Issue 1 , Winter and Spring 2018, , Pages 25-32

Abstract
  Background and Objectives: In this paper, an ultra-wide stopband microstrip low pass filter (LPF) with sharp roll-off and compact size is designed and fabricated. Also, proposed filter is designed, simulated, optimized, fabricated and measured and we can see a good agreement between the simulations and ...  Read More

SECURITY
4. Cryptanalysis of R2AP an Ultralightweight Authentication Protocol for RFID

M. Safkhani

Volume 6, Issue 1 , Winter and Spring 2018, , Pages 111-118

Abstract
  Background and Objectives: To overcome the security flaw of RAPP authentication protocol, Zhuang et al. proposed a novel ultralightweight RFID mutual authentication protocol, called R2AP. In this paper, we first propose a new desynchronization attack against this protocol. Methods: To extract the secret ...  Read More