You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Brings Readers from the Threshold to the Frontier of Modern Research Many-Body Methods for Atoms and Molecules addresses two major classes of theories of electron correlation: the many-body perturbation theory and coupled cluster methods. It discusses the issues related to the formal development and consequent numerical implementation of the methods from the standpoint of a practicing theoretician. The book will enable readers to understand the future development of state-of-the-art multi-reference coupled cluster methods as well as their perturbative counterparts. The book begins with an introduction to the issues relevant to the development of correlated methods in general. It next gives a...
This book covers recent trends in the field of devices, wireless communication and networking. It gathers selected papers presented at the 6th International Conference on Communication, Devices and Networking (ICCDN 2022), which was organized by the Department of Electronics and Communication Engineering, Sikkim Manipal Institute of Technology, Sikkim, India, on December 16–17, 2022. Gathering cutting-edge research papers prepared by researchers, engineers and industry professionals, it helps young and experienced scientists and developers alike to explore new perspectives and offer them inspirations on how to address real-world problems in the areas of electronics, communication, devices and networking.
This book constitutes the refereed proceedings of the 52nd Annual Convention of the Computer Society of India, CSI 2017, held in Kolkata, India, in January 2018. The 59 revised papers presented were carefully reviewed and selected from 157 submissions. The theme of CSI 2017, Social Transformation – Digital Way, was selected to highlight the importance of technology for both central and state governments at their respective levels to achieve doorstep connectivity with its citizens. The papers are organized in the following topical sections: Signal processing, microwave and communication engineering; circuits and systems; data science and data analytics; bio computing; social computing; mobile, nano, quantum computing; data mining; security and forensics; digital image processing; and computational intelligence.
This book provides a valuable combination of relevant research works on developing smart city ecosystem from the artificial intelligence (AI) and Internet of things (IoT) perspective. The technical research works presented here are focused on a number of aspects of smart cities: smart mobility, smart living, smart environment, smart citizens, smart government, and smart waste management systems as well as related technologies and concepts. This edited book offers critical insight to the key underlying research themes within smart cities, highlighting the limitations of current developments and potential future directions.
None
The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017. The 90 revised full papers presented in the two volumes were carefully reviewed and selected from 276 submissions. The papers are organized in topical sections on data science and advanced data analytics; signal processing and communications; microelectronics, sensors, intelligent networks; computational forensics (privacy and security); computational intelligence in bio-computing; computational intelligence in mobile and quantum computing; intelligent data mining and data warehousing; computational intelligence.
This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security lessons learned. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.