<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<article xlink="http://www.w3.org/1999/xlink" dtd-version="1.0" article-type="technology" lang="en"><front><journal-meta><journal-id journal-id-type="publisher">IJCRR</journal-id><journal-id journal-id-type="nlm-ta">I Journ Cur Res Re</journal-id><journal-title-group><journal-title>International Journal of Current Research and Review</journal-title><abbrev-journal-title abbrev-type="pubmed">I Journ Cur Res Re</abbrev-journal-title></journal-title-group><issn pub-type="ppub">2231-2196</issn><issn pub-type="opub">0975-5241</issn><publisher><publisher-name>Radiance Research Academy</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">1776</article-id><article-id pub-id-type="doi">10.7324/IJCRR.2017.9146</article-id><article-id pub-id-type="doi-url"/><article-categories><subj-group subj-group-type="heading"><subject>Technology</subject></subj-group></article-categories><title-group><article-title>Soft Computing Techniques in Mobile Adhoc network : A Technical Overview&#13;
</article-title></title-group><contrib-group><contrib contrib-type="author"><name><surname>Preetha</surname><given-names>V.</given-names></name></contrib><contrib contrib-type="author"><name><surname>Chitra</surname><given-names>K.</given-names></name></contrib></contrib-group><pub-date pub-type="ppub"><day>28</day><month>07</month><year>2017</year></pub-date><volume>)</volume><issue/><fpage>23</fpage><lpage>25</lpage><permissions><copyright-statement>This article is copyright of Popeye Publishing, 2009</copyright-statement><copyright-year>2009</copyright-year><license license-type="open-access" href="http://creativecommons.org/licenses/by/4.0/"><license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0) Licence. You may share and adapt the material, but must give appropriate credit to the source, provide a link to the licence, and indicate if changes were made.</license-p></license></permissions><abstract><p>Mobile ad-hoc network is widely used in various communications due to its easier deployment and cost effectiveness. In recent technological advancement, Manet is used in all types of environment including pervasive computing, Internet of Things, military applications, Disaster recoveries, Vehicle tracking etc. In Manets, the research is going on in the field of Routing such as Hierarchical routing, Zone based routing, Distance based routing etc. Manets in case of sensitive networks has to face the challenge of security and in many cases the existing protocol is enhanced with security using cryptographic techniques. In recent researches, Soft computing techniques like Genetic Algorithm, Fuzzy logic, Neural Networks are employed in Manets in every area of research. We propose an attempt to survey the applications of soft computing techniques in Manet and in particular Artificial Neural Network learning technique. Since Soft computing techniques are efficient for solving complex problems, our focus is towards this survey approach in Manets.&#13;
</p></abstract><kwd-group><kwd>Soft computing techniques</kwd><kwd> Genetic algorithm</kwd><kwd> Fuzzy logic</kwd><kwd> Neural network</kwd><kwd> Mobile adhoc network</kwd></kwd-group></article-meta></front></article>
