default search action
Abolfazl Falahati
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Fereshteh Salimian Rizi, Abolfazl Falahati:
The Generalized-Fisher composite fading model for the next generation of mobile communication systems. Digit. Commun. Networks 10(5): 1322-1331 (2024) - [j44]Fershteh Salimian Rizi, Abolfazl Falahati:
A novel statistics for the NWDP: An appropriate fading model for 5G/6G mmWave communications. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j43]Hamed Dabbaghzadeh, Abolfazl Falahati, Nader Sanandaji:
CBTC Security and Reliability Enhancements by a Key-Based Direct Sequence Spread Spectrum Technique. IEEE Trans. Intell. Transp. Syst. 25(1): 159-172 (2024) - [j42]Hediyeh Soltanizadeh, Abolfazl Falahati:
Uncoordinated Channel Tracking Algorithms and Their Stability in Practical Scenario for High-Rate IoT Devices With Massive MIMO. IEEE Trans. Veh. Technol. 73(6): 7962-7979 (2024) - 2023
- [j41]Hediyeh Soltanizadeh, Abolfazl Falahati:
Low complexity channel tracking algorithms for coordinated and uncoordinated pilot access over high-rate internet of things. Internet Things 24: 100946 (2023) - [j40]Hosein Ahmadinejad, Anahid Rafieifar, Abolfazl Falahati:
Joint online 3D trajectory optimisation and power allocation of UAVs as mobile access points in a downlink distributed multi-user MIMO system. Phys. Commun. 60: 102163 (2023) - [j39]Ali Rezaei, Abolfazl Falahati, Shayan Zargari:
Energy Efficient Multi-Way Massive Mimo AF Relaying with Imperfect CSI and Optimal Power Allocation. Wirel. Pers. Commun. 132(3): 1681-1702 (2023) - 2022
- [j38]Hediyeh Soltanizadeh, Abolfazl Falahati:
Joint active device detection and channel tracking of high-rate IoT devices in uncoordinated scenario with uncertain access probabilities over massive MIMO system. Digit. Signal Process. 127: 103557 (2022) - [j37]Abolfazl Falahati, Ebrahim Shafiee:
Improve Safety and Security of Intelligent Railway Transportation System Based on Balise Using Machine Learning Algorithm and Fuzzy System. Int. J. Intell. Transp. Syst. Res. 20(1): 117-131 (2022) - [j36]Hosein Ahmadinejad, Abolfazl Falahati:
Forming a Two-Tier Heterogeneous Air-Network via Combination of High and Low Altitude Platforms. IEEE Trans. Veh. Technol. 71(2): 1989-2001 (2022) - [j35]Fereshteh Salimian Rizi, Abolfazl Falahati:
Ergodic Capacity and Symbol Error Rate Analysis of a Wireless System with α-μ Composite Fading Channel. Wirel. Pers. Commun. 124(1): 103-118 (2022) - 2021
- [j34]Masoud Kaveh, Abolfazl Falahati:
An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication. Frontiers Inf. Technol. Electron. Eng. 22(7): 1010-1019 (2021) - [j33]Hosein Ahmadinejad, Abolfazl Falahati:
Spectral efficiency in non-terrestrial heterogeneous networks with spectrum underlay access. Phys. Commun. 46: 101313 (2021) - [j32]Hediyeh Soltanizadeh, Abolfazl Falahati:
On the channel tracking under uncertain state model for multiuser massive MIMO in high-rate Internet-of-Things. Phys. Commun. 48: 101434 (2021) - [j31]Mostafa Payami, Abolfazl Falahati:
Accurate Variable-Order Approximations to the Sum of α - μ Variates With Application to MIMO Systems. IEEE Trans. Wirel. Commun. 20(3): 1612-1623 (2021) - [i3]Sirvan Gharib, Abolfazl Falahati, Vahid Ahmadi:
Alternative Detectors for Spectrum Sensing by Exploiting Excess Bandwidth. CoRR abs/2102.06969 (2021) - 2020
- [j30]Seyyed Hossein Hosseini-Fakhr, Abolfazl Falahati:
Interference alignment in two-hop multiple-input multiple-output interference channel under various CSI and antenna correlation. IET Commun. 14(20): 3599-3606 (2020) - [j29]Kosar Ghorbani, Abolfazl Falahati:
Interference alignment and scheduling in clustered partially connected small cell networks. Int. J. Commun. Syst. 33(16) (2020) - [j28]Nader Sanandaji, Abolfazl Falahati:
A Hidden OSTBC Scheme to Enhance Physical Layer Security by Employing a Pseudorandom Precoder. IEEE Trans. Commun. 68(1): 363-375 (2020) - [j27]Kosar Ghorbani, Abolfazl Falahati:
On Necessary and Sufficient Conditions of Interference Alignment Feasibility in a MIMO Interference Channel. Wirel. Pers. Commun. 111(2): 1219-1234 (2020)
2010 – 2019
- 2019
- [j26]Mohammad Hossein Alishahi, Abolfazl Falahati:
General precoder interference alignment design with achievable higher multiplexing gain and reduced channel extension cases. IET Commun. 13(17): 2876-2882 (2019) - [j25]Abolfazl Falahati, Elhamsadat Anarakifirooz:
Weighted Sum Rate Maximization Under the Given PAPR Constraints for a Multi-user OFDM System. Wirel. Pers. Commun. 109(1): 127-137 (2019) - 2018
- [j24]Hasti Rostami, Abolfazl Falahati:
Precoder design for decentralised estimation over MIMO-WSN based on stochastic models. IET Commun. 12(6): 736-742 (2018) - [j23]Taha ValizadehAslani, Abolfazl Falahati:
An analysis and improvement of error control performance of IS-LDPC codes with a large number of subsets. Phys. Commun. 31: 79-86 (2018) - [c13]Mostafa Payami, Abolfazl Falahati:
PDF of the Maximum of Two Correlated Random Variables with Applications to Fading Channels. IST 2018: 514-521 - 2016
- [j22]Abolfazl Falahati, Hoda Jannati:
Distance bounding-based RFID binding proof protocol to protect inpatient medication safety against relay attack. Int. J. Ad Hoc Ubiquitous Comput. 22(2): 71-83 (2016) - [j21]Abolfazl Falahati, Nader Sanandaji:
Nested and interleaved direct sequence spread spectrum to enhance CDMA security and bit error rate performance. Int. J. Commun. Syst. 29(12): 1907-1915 (2016) - [c12]Abolfazl Falahati, Hamid Azizi, Robert M. Edwards:
RFID light weight server-less search protocol based on NLFSRs. IST 2016: 741-745 - 2015
- [j20]Abolfazl Falahati, Hoda Jannati:
All-or-nothing approach to protect a distance bounding protocol against terrorist fraud attack for low-cost devices. Electron. Commer. Res. 15(1): 75-95 (2015) - [j19]Hoda Jannati, Abolfazl Falahati:
An efficient mutual distance bounding protocol over a binary symmetric noisy communication channel. Int. J. Ad Hoc Ubiquitous Comput. 20(1): 1-16 (2015) - [j18]Hoda Jannati, Abolfazl Falahati:
Analysis of false-reject probability in distance bounding protocols with mixed challenges over RFID noisy communication channel. Inf. Process. Lett. 115(6-8): 623-629 (2015) - [j17]Hoda Jannati, Abolfazl Falahati:
Achieving an appropriate security level for distance bounding protocols over a noisy channel. Telecommun. Syst. 58(3): 219-231 (2015) - [j16]Mohammad Akbari, Abolfazl Falahati:
Spatial-DoF Improvement of MIMO Cognitive Network Through Interference Fusion in Conjunction with Alignment. Wirel. Pers. Commun. 82(2): 833-847 (2015) - [j15]Hoda Jannati, Abolfazl Falahati:
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach. Wirel. Pers. Commun. 85(3): 711-726 (2015) - 2014
- [j14]Hoda Jannati, Abolfazl Falahati:
Mutual Distance Bounding Protocol with Its Implementability Over a Noisy Channel and Its Utilization for Key Agreement in Peer-to-Peer Wireless Networks. Wirel. Pers. Commun. 77(1): 127-149 (2014) - 2013
- [j13]Sayed Hossein Dokhanchi, Abolfazl Falahati:
Tracking Performance of an Adaptive MIMO-OFDM LS Estimator via MSE Criterion Over a Wireless Time Correlated Fading Channel. Wirel. Pers. Commun. 68(3): 517-533 (2013) - [j12]Yasser Attar Izi, Abolfazl Falahati:
Robust Relaying Schemes for Multiple-Antenna Multi-Relay Networks. Wirel. Pers. Commun. 68(4): 1611-1631 (2013) - [j11]Farzad H. Panahi, Abolfazl Falahati:
Joint IR-UWB Power Spectral Lines and Interference Suppression Based on Coded Auxiliary Independent Signaling in Presence of Pulse Attenuation and Timing Jitter. Wirel. Pers. Commun. 69(4): 1241-1260 (2013) - [j10]Elham Hosseini, Abolfazl Falahati:
Improving Water-Filling Algorithm to Power Control Cognitive Radio System Based Upon Traffic Parameters and QoS. Wirel. Pers. Commun. 70(4): 1747-1759 (2013) - [j9]Mojgan Moradi, Abolfazl Falahati:
Antenna Power Cutback Manipulation to Optimize Relay Power Allocation over MAMR Networks Employing Zero Forcing Scheme. Wirel. Pers. Commun. 73(3): 1215-1225 (2013) - 2012
- [j8]Yasser Attar Izi, Abolfazl Falahati:
Amplify-forward relaying for multiple antenna multiple relay networks under individual power constraint at each relay. EURASIP J. Wirel. Commun. Netw. 2012: 50 (2012) - [j7]Farzad H. Panahi, Abolfazl Falahati:
Spectral efficient impulse radio-ultra-wideband transmission model in presence of pulse attenuation and timing jitter. IET Commun. 6(11): 1544-1554 (2012) - [j6]Hoda Jannati, Abolfazl Falahati:
Security enhanced user authentication scheme for wireless sensor network. Int. J. Electron. Secur. Digit. Forensics 4(4): 215-228 (2012) - [i2]Hoda Jannati, Abolfazl Falahati:
Cryptanalysis and enhancement of two low cost rfid authentication protocols. CoRR abs/1202.1971 (2012) - 2011
- [j5]Mohsen Toorani, Abolfazl Falahati:
A secure cryptosystem based on affine transformation. Secur. Commun. Networks 4(2): 207-215 (2011) - [j4]Mohammad Akbari, Abolfazl Falahati:
A Fault-Tolerant Cooperative Spectrum Sensing Algorithm over Cognitive Radio Network Based on Wireless Sensor Network. Wirel. Sens. Netw. 3(3): 83-91 (2011) - [c11]Hoda Jannati, Abolfazl Falahati:
Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags. ICGS3/e-Democracy 2011: 186-193 - [c10]Azar Hosseini, Abolfazl Falahati:
Optimum Hardware-Architecture for Modular Divider in GF(2 m ) with Chaos as Arbitrary Source Based on ECC. ICGS3/e-Democracy 2011: 245-252 - 2010
- [c9]Abolfazl Falahati, Mahdi Azarafrooz:
Mitigation of Control Channel Jamming via Combinatorial Key Distribution. ICGS3 2010: 274-281 - [c8]Hoda Jannati, Abolfazl Falahati:
A Proxy Signature Scheme Based on Coding Theory. ICGS3 2010: 282-290 - [c7]Saeed Ebadi Tavallaei, Abolfazl Falahati:
Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes. ICGS3 2010: 291-299 - [c6]Sayed Hossein Dokhanchi, Abolfazl Falahati:
Adaptive MIMO LS estimation technique via MSE criterion over a Markov channel model. ISCC 2010: 151-154 - [c5]Z. Samadi, Abolfazl Falahati:
A transmit preprocessing technique in fixed relay networks for practical multiuser transmission. ISCC 2010: 437-442 - [i1]Mohsen Toorani, Abolfazl Falahati:
A Secure Variant of the Hill Cipher. CoRR abs/1002.3567 (2010)
2000 – 2009
- 2009
- [c4]Mohsen Toorani, Abolfazl Falahati:
A secure variant of the Hill Cipher. ISCC 2009: 313-316 - 2008
- [j3]Soroush Akhlaghi, Abolfazl Falahati, Amir K. Khandani:
New fast density evolution method for low density parity-check codes using higher-order statistic. IET Commun. 2(1): 144-150 (2008) - [j2]Hossein Khaleghi Bizaki, Abolfazl Falahati:
Tomlinson-Harashima precoding with imperfect channel state information. IET Commun. 2(1): 151-158 (2008) - 2007
- [j1]Mehdi Tafaroji, Abolfazl Falahati:
Improving code division multiple access security by applying encryption methods over the spreading codes. IET Commun. 1(3): 398-404 (2007) - [c3]Nadieh M. Moghaddam, Abolfazl Falahati:
An Improved ICI Reduction Method in OFDM Communication System in Presence of Phase Noise. PIMRC 2007: 1-5 - 2006
- [c2]Soroush Akhlaghi, Amir K. Khandani, Abolfazl Falahati:
Reducing The Effect of Channel Time Variations in MIMO Broadcast Systems. CISS 2006: 739-744 - [c1]Soroush Akhlaghi, Amir K. Khandani, Abolfazl Falahati:
A New Fast Density Evolution Method for LDPC Codes Using Higher Order Statistics. CISS 2006: 845-850
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint