Open Access Books » Physical Sciences, Engineering and Technology » Computer and Information Science

Our collection of 392 books.

  • Cognitive and Intermedial Semiotics
    Cognitive and Intermedial Semiotics
    Edited by Marta Silvera-Roig and Asunción López-Varela Azcárate
    ISBN 978-1-83880-553-1, Print ISBN 978-1-83880-552-4,
    Edited Volume
    178 pages, June, 2020
    Cognitive and Intermedial Semiotics offers a window into applied cognitive semiotics with different examples of meaning production studies. Thus, in its chapters we will find examples of different approaches, methods, and theories that cognitive semi ...
  • Wireless Mesh Networks - Security, Architectures and Protocols
    Wireless Mesh Networks - Security, Architectures and Protocols
    Edited by Mutamed Khatib and Samer Alsadi
    ISBN 978-1-78985-204-2, Print ISBN 978-1-78985-203-5,
    Edited Volume
    180 pages, May, 2020
    The book discusses a very promising and effective approach in wireless communications called Wireless Mesh Networks (WMN) and its related issues. Meshes with external access capability, i.e. connected to the Internet, will be discussed. A full overvi ...
  • Computer Methods and Programs in Biomedical Signal and Image Processing
    Computer Methods and Programs in Biomedical Signal and Image Processing
    Edited by Lulu Wang
    ISBN 978-1-83880-245-5, Print ISBN 978-1-83880-242-4,
    Edited Volume
    110 pages, March, 2020
    This book aims to provide a brief update to the current status of and advances in computational methods and programs used for the development of the theory and practice of biomedical signal and image communication. The book comprises a collection of ...
  • Computer Graphics and Imaging
    Computer Graphics and Imaging
    Edited by Branislav Sobota
    ISBN 978-1-83962-283-0, Print ISBN 978-1-83962-282-3,
    Edited Volume
    108 pages, October, 2019
    Computer graphics development is so quick that it has expanded from devices designed for military and top industrial applications to equipment for schools and households as common information media for education and entertainment. Computer graphics h ...
  • Quantum Cryptography in Advanced Networks
    Quantum Cryptography in Advanced Networks
    Edited by Oleg G. Morozov
    ISBN 978-1-83962-250-2, Print ISBN 978-1-83962-249-6,
    Edited Volume
    72 pages, October, 2019
    Proposed 35 years ago, quantum cryptography (QC) and its most prominent part quantum key distribution (QKD) attracts more and more attention. Significant progress has been made in both its theory and practice from many points of view. The present boo ...
  • Digital Image and Video Watermarking and Steganography
    Digital Image and Video Watermarking and Steganography
    Edited by Sudhakar Ramakrishnan
    ISBN 978-1-78984-168-8, Print ISBN 978-1-78984-167-1,
    Edited Volume
    86 pages, September, 2019
    Authenticating data such as image, video, and audio is an important task in digital communication. Another critical task is establishing ownership of the copyright. Digital watermarking is a technique used to provide authentication and ownership of t ...
  • Bio-Inspired Technology
    Bio-Inspired Technology
    Edited by Ruby Srivastava
    ISBN 978-1-83962-193-2, Print ISBN 978-1-83880-932-4,
    Edited Volume
    80 pages, September, 2019
    Biomimetic devices are designed and produced by materials, structures, and systems that are modelled on biological entities and processes. These devices are used to synthesize novel materials and their functions at the multiscale level for various ap ...
  • Pattern Recognition - Selected Methods and Applications
    Pattern Recognition - Selected Methods and Applications
    Edited by Andrzej Zak
    ISBN 978-1-78985-500-5, Print ISBN 978-1-78985-499-2,
    Edited Volume
    118 pages, July, 2019
    Pattern recognition, despite its relatively short history, has already found practical application in many areas of human activity. Systems of pattern recognition usually support people in performing tasks related to ensuring security, including acce ...