Ali Mahani

Learn More
INTRODUCTION The present study aimed to generate a model that would provide a conceptual framework for linking disparate components of knowledge translation. A theoretical model of such would enable the organization and evaluation of attempts to analyze current conditions and to design interventions on the transfer and utilization of research knowledge. (More)
Recently Qian et al. [38] have proposed a new attack for RFID systems, called counting attack, where the attacker just aims to estimate the number of tagged objects instead of steal the tags' private information. They have stated that most of the existing RFID mutual authentication protocols are vulnerable to this attack. To defend against counting attack,(More)
The hardware implementation of adaptive filters is a challenging issue in real-time practical noise cancellation, echo cancellation, prediction and system identification applications. In general-purpose applications the hardware utilization and maximum frequency are two important designing criteria. This paper presents hardware implementing of adaptive(More)
The lifetime of wireless sensor networks (WSNs) is an important issue of much recent researches. A practical and widely used approach to prolong the lifetime of WSN is multi-mode protocols in which the sensor nodes are switched between active and sleep modes. But there is no work so far to study the multi-mode structures from reliability viewpoint. In this(More)
Recently Lo et al. have proposed an ownership transfer protocol for RFID objects using lightweight computing operators and claim their protocol provides stronger security robustness and higher performance efficiency in comparison with existing solutions. However, in this paper we show that their claim unfortunately does not hold. More precisely , we present(More)