Return to Article Details Authentication of Function Optimization in Mobile Ad-Hoc Networks Using Artificial Intelligence Download Download PDF