International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

A PSPICE Fast Model for the Single Electron Transistor

Lobna Osman

Motivated by the merits of low power dissipation, ultra small size, and high speed of many nanoelectronic devices, They have been demonstrated to ensure future progress. Single electron devices became one of the most important nanoelectronic devices due to their interesting electrical characteristics and behavior. Many research efforts moved to describe their electrical characteristics to use them with conventional electronic devices. This paper deals with modeling and simulation of such new electronic devices. This paper presents a model for the Single Electron Transistor (SET) and its application in simulating hybrid SET/MOS ADC and DAC converters. This model uses the orthodox theory of single-electron tunneling and determines the average current through the transistor. The proposed model is more flexible that is valid for large range of drain to source voltage, valid for single or multi gate SET and symmetric or asymmetric SET. Finally, using this model with MOSFET transistors to realize a multi-bit Analog-to-Digital Converters (ADC) and Digital-to-Analog Converters (DAC). The hybrid n-bit DAC nano-circuits are simulated for (n=4 and 8) using Orcad Capture PSPICE. The performance of the SET/MOS hybrid n-bit ADC circuits were simulated (for n=3 and 8). The results show that the transient operation of hybrid SET/MOS circuit-based DAC could successfully operate at 1000K while ADC could operate at 144K. This performance can be compared with the pure SET circuits, the proposed converter circuits have been enhanced in the drive capability and the power dissipation. Compared with the oth`er SET/MOS hybrid circuit, the implemented converter circuits have low simulation time, high speed, high load drivability and low power dissipation.

Read More

Doi: https://doi.org/10.54216/IJWAC.000101

Vol. 0 Issue. 1 PP. 8-23, (2019)

Design Partition in a Spiking Neural Arrange of Hippocampus Vigorous to Imbalanced Excitation/Inhibition in Mesh Network

Shubha Mishra

Proficient design division in dentate gyrus plays an imperative part in putting away data within the hippocampus. Current information of the structure and work of the hippocampus, entorhinal cortex, and dentate gyrus, in design partition are joined in this work.  A three-layer feed-forward spiking neural network inspired by the rodent hippocampus an equipped with simplified synaptic and molecular mechanisms is developed. The aim of the study is to make a spiking neural network capable of pattern separation in imbalanced excitation/inhibition ratios caused by different levels of stimulations or network damage. This work presents a novel theory on the cellular mechanisms of robustness to damages to synapses and connectivity of neurons in dentate gyrus that results in imbalanced excitation-inhibition activity of neurons. This spiking neural network uses simplified molecular and cellular hypothetical mechanisms and demonstrates efficient storing of information in different levels of stimulation and can be implemented in cognitive robotics.

Read More

Doi: https://doi.org/10.54216/IJWAC.000102

Vol. 0 Issue. 1 PP. 24-30, (2019)

Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques

Uma Maheshwari , Suresh Babu , Mahendra khan , Kadiyam Rajshekar , Manideepika Manchikalapati

In an ad hoc network, the routing protocol takes into account a variety of activities, including maintaining network connection, transmission scheduling, channel evaluation, and preserving network connectivity. Additionally, it determines network architecture. In addition, a number of different elements determines the performance of a routing protocol. These include node mobility, which is responsible for multiple link failures, support for quality of service (QoS), network size, the amount of traffic, and the level of security. The performance may occasionally also be affected by the manner in which the network is behaving in addition to the kinds of apps that are running in that environment. Selecting an appropriate protocol that is based on security is highly crucial in order to set up an effective network. A significant amount of effort has been put into improving the safety mechanisms that are built into routing protocols, most prominently in WSNs, MANETs, VANETs, and WMNs. Only MANET will be the topic of discussion here. Mobile Ad-Hoc Network is a wireless network that does not need infrastructure and is composed of mobile nodes. Mobile ad-hoc network, also known as MANET, is one of the most promising forms of next-generation wireless networking technology. It has garnered a significant amount of interest because it is self-organized and can be deployed at a cheap cost. In comparison to a traditional network, a MANET presents a number of challenges that are especially difficult to overcome when it comes to the duty of routing. The many difficulties that are inherent with MANET have made it an excellent subject for academic investigation. This provides a concise overview of security in MANETs as well as the issues that relate to maintaining them. Understanding the different routing mechanisms and the potential attacks that might be mounted against them is the first step in designing a reliable security mechanism. Within the scope of this study effort, we have provided specifics on the detection and prevention of various routing attacks, with the primary emphasis being placed on the network layer assaults that are unique to MANET. When compared to other study fields, MANET presents the greatest challenge in terms of maintaining network security. In recent years, a significant amount of research has been carried out to investigate several forms of assault; nevertheless, most of the surveys have been carried out without any kind of performance analysis. There is a paucity of research that seeks to find an all-encompassing study of the impact of the many different attacks that bring the overall performance of the Adhoc network down. On the other hand, secure routing in the face of a black hole attack can be difficult because preferences are often incomplete. The in-degree centrality and importance degree measurement applied to the collected consensus-based trust from decision-makers solves the issue of incomplete preferences and improves the accuracy of trust at the same time. Utilizing Network Simulator, we examine how well the suggested approach works. Based on the findings of the simulations, it has been demonstrated that the detection accuracy and throughput of the proposed CREDIT are both significantly higher than those of existing work, making the proposed CREDIT scheme superior.

Read More

Doi: https://doi.org/10.54216/IJWAC.000103

Vol. 0 Issue. 1 PP. 31-44, (2019)

Improved Routing Protocol for Extending Wireless Sensor Networks Lifetime

Banumathi , Muthumari , Shahada Syed , Syed Basha Shaik

One of the most cutting-edge technological trends to emerge over the past ten years is the availability of ubiquitous networks and the rising demand for them. The objective remains to have access to several services, including voicemail, the web, emails, messages, and other ones, without being restricted by one's geographical location. As a result, there will be an increase in the need for wireless networks for communication. The wireless network industry has had remarkable growth over the last several decades, and they make new advancements in this field. An ad hoc network is a non-stationary infrastructure that allows for the establishment of a sort of wireless network in which one node may share information with several other nodes through multi-hop links and interconnections. This type of network is also known as a mesh network. An ad hoc system is one that does not have a centralized control unit and instead relies on a collection of wireless mobile nodes to construct a functional wireless network. Newline Instead of using stationary network communication, this kind of network uses a multi-hop point-to-point routing technique to create a network connection. Because mobile nodes have a limited range, a problem may occur when one node has to connect with another node that is located outside of its range but is still inside its coverage area. In such cases, a connection between the origin and the destination should be made by linking several nodes. The criteria used to determine which nodes should participate in the routing process depend on a variety of different factors. In spite of this, the primary objective is to construct a route from one end to the other in order to provide the nodes with a transmission medium so that they may connect with one another. The process of routing data in ad hoc networks has become very difficult ever since the debut of wireless networks. The inherent characteristics of an ad hoc network, in which the topologies of the network are always subject to change, are the primary cause of this kind of challenge. Because ad hoc networks are inherently dynamic, there will be various performance concerns with the routing and transmission of data. The proposed work provides to become aware of the various performance issues that may arise from the use of routing protocols in mobile ad hoc networks. To evaluate the routing protocols in terms of their effectiveness in the context of wireless mobile networks and wireless static networks. For the purpose of assessing the performance of this network scenario, both mobile and static nodes are utilized.

Read More

Doi: https://doi.org/10.54216/IJWAC.000104

Vol. 0 Issue. 1 PP. 45-61, (2019)