SlideShare a Scribd company logo
Data Transmission
Mechanism for WMSN Using
Information Fusion
-Vrajesh Parikh
-141060753008
-Sem 2 WSN
DIFFERENCE
WSN
• Used for the passing scalar
data to the sink node
• Low processing needed on the
acquired data
• Hard constraint over memory,
power, processing and lifetime.
WMSN
• Used to pass multimedia data,
like images, videos and audio.
• Requires heavy processing of
data
• Lifetime of power is more as
compare to WSN
• It is an extension of WSN
DATA REFINEMENT AND FUSION
PROCESS
FLOWCHART FOR REDUCING THE DATA
TRANSMISSION IN WMSN
References
• ZHEN -JIANG ZHANG, CHIN-FENG LAI, AND HAN-CHIEH CHAO
"A green data transmission mechanism for wireless multimedia
sensor network using information fusion" 1536-1284 2014 IEEE
References
• ZHEN -JIANG ZHANG, CHIN-FENG LAI, AND HAN-CHIEH CHAO
"A green data transmission mechanism for wireless multimedia
sensor network using information fusion" 1536-1284 2014 IEEE

More Related Content

What's hot

Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
sourabhshivtiwari
 
Chapter
ChapterChapter
Chapter
Rajat Soni
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 
An overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication ppt
phbhagwat
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
ShubhamTakkar
 
Sensor networks
Sensor networksSensor networks
Sensor networks
Marc Pous
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
Nishant Bhardwaj
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
Kapil Dev
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
Zaahir Salam
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
Devdutta Chakrabarti
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Abhinay Kumar Suraj
 
wireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifiwireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifi
sunil raj kumar
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
juno susi
 
Sensor
SensorSensor
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
915086731
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Neha Kulkarni
 
wireless sensor network a survey
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a survey
Thesis Scientist Private Limited
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
Bala Lavanya
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
Tejas Wasule
 

What's hot (20)

Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
Chapter
ChapterChapter
Chapter
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
An overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication ppt
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
wireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifiwireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifi
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Sensor
SensorSensor
Sensor
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
wireless sensor network a survey
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a survey
 
Intrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networksIntrusion detection systems in wireless sensor networks
Intrusion detection systems in wireless sensor networks
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 

Similar to Wireless multimedia sensor network

Network Management and Flow Analysis in Today’s Dense IT Environments
Network Management and Flow Analysis in Today’s Dense IT EnvironmentsNetwork Management and Flow Analysis in Today’s Dense IT Environments
Network Management and Flow Analysis in Today’s Dense IT Environments
SolarWinds
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
SuganthiN2
 
Networking IEEE 2015 Projects
Networking IEEE 2015 ProjectsNetworking IEEE 2015 Projects
Networking IEEE 2015 Projects
Vijay Karan
 
Networking IEEE 2015 Projects
Networking IEEE 2015 ProjectsNetworking IEEE 2015 Projects
Networking IEEE 2015 Projects
Vijay Karan
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
Pawan Kumar Tiwari
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
Pawan Kumar Tiwari
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol
Smriti Agrawal
 
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Dr. Amarjeet Singh
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
Editor IJMTER
 
Mm
MmMm
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
IRJET Journal
 
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
Enabling Active Flow Manipulation In Silicon-based Network Forwarding EnginesEnabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
Tal Lavian Ph.D.
 
Transport SDN
Transport SDNTransport SDN
Transport SDN
Infinera
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET Journal
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
IRJET Journal
 
software defined network.pptx
software defined network.pptxsoftware defined network.pptx
software defined network.pptx
datapro2
 
lan
 lan lan
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
Tal Lavian Ph.D.
 
Data communication
Data communicationData communication
Data communication
Md Javedul Ferdous
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
IRJET Journal
 

Similar to Wireless multimedia sensor network (20)

Network Management and Flow Analysis in Today’s Dense IT Environments
Network Management and Flow Analysis in Today’s Dense IT EnvironmentsNetwork Management and Flow Analysis in Today’s Dense IT Environments
Network Management and Flow Analysis in Today’s Dense IT Environments
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Networking IEEE 2015 Projects
Networking IEEE 2015 ProjectsNetworking IEEE 2015 Projects
Networking IEEE 2015 Projects
 
Networking IEEE 2015 Projects
Networking IEEE 2015 ProjectsNetworking IEEE 2015 Projects
Networking IEEE 2015 Projects
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol
 
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
Structural Health Monitoring by Payload Compression in Wireless Sensors Netwo...
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
 
Mm
MmMm
Mm
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
Enabling Active Flow Manipulation In Silicon-based Network Forwarding EnginesEnabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
 
Transport SDN
Transport SDNTransport SDN
Transport SDN
 
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
 
software defined network.pptx
software defined network.pptxsoftware defined network.pptx
software defined network.pptx
 
lan
 lan lan
lan
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
Data communication
Data communicationData communication
Data communication
 
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor NetworkEnergetic Slot Allotment for Improving Interchange in Wireless Sensor Network
Energetic Slot Allotment for Improving Interchange in Wireless Sensor Network
 

More from ITM Universe - Vadodara

141060753008 vrajesh parikh_slides
141060753008 vrajesh parikh_slides141060753008 vrajesh parikh_slides
141060753008 vrajesh parikh_slides
ITM Universe - Vadodara
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
 
Customized software testing and Regression testing
Customized software testing and Regression testingCustomized software testing and Regression testing
Customized software testing and Regression testing
ITM Universe - Vadodara
 
Preventing JellyFish Attack
Preventing JellyFish AttackPreventing JellyFish Attack
Preventing JellyFish Attack
ITM Universe - Vadodara
 
NFC and Android applications
NFC and Android applicationsNFC and Android applications
NFC and Android applications
ITM Universe - Vadodara
 
141060753008 3715302
141060753008 3715302141060753008 3715302
141060753008 3715302
ITM Universe - Vadodara
 
141060753008 3715301
141060753008 3715301141060753008 3715301
141060753008 3715301
ITM Universe - Vadodara
 
141060753008 3715306
141060753008 3715306141060753008 3715306
141060753008 3715306
ITM Universe - Vadodara
 
Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1
ITM Universe - Vadodara
 
Handoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet servicesHandoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet services
ITM Universe - Vadodara
 

More from ITM Universe - Vadodara (10)

141060753008 vrajesh parikh_slides
141060753008 vrajesh parikh_slides141060753008 vrajesh parikh_slides
141060753008 vrajesh parikh_slides
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Customized software testing and Regression testing
Customized software testing and Regression testingCustomized software testing and Regression testing
Customized software testing and Regression testing
 
Preventing JellyFish Attack
Preventing JellyFish AttackPreventing JellyFish Attack
Preventing JellyFish Attack
 
NFC and Android applications
NFC and Android applicationsNFC and Android applications
NFC and Android applications
 
141060753008 3715302
141060753008 3715302141060753008 3715302
141060753008 3715302
 
141060753008 3715301
141060753008 3715301141060753008 3715301
141060753008 3715301
 
141060753008 3715306
141060753008 3715306141060753008 3715306
141060753008 3715306
 
Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1
 
Handoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet servicesHandoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet services
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Wireless multimedia sensor network

  • 1. Data Transmission Mechanism for WMSN Using Information Fusion -Vrajesh Parikh -141060753008 -Sem 2 WSN
  • 2. DIFFERENCE WSN • Used for the passing scalar data to the sink node • Low processing needed on the acquired data • Hard constraint over memory, power, processing and lifetime. WMSN • Used to pass multimedia data, like images, videos and audio. • Requires heavy processing of data • Lifetime of power is more as compare to WSN • It is an extension of WSN
  • 3. DATA REFINEMENT AND FUSION PROCESS
  • 4. FLOWCHART FOR REDUCING THE DATA TRANSMISSION IN WMSN
  • 5. References • ZHEN -JIANG ZHANG, CHIN-FENG LAI, AND HAN-CHIEH CHAO "A green data transmission mechanism for wireless multimedia sensor network using information fusion" 1536-1284 2014 IEEE
  • 6. References • ZHEN -JIANG ZHANG, CHIN-FENG LAI, AND HAN-CHIEH CHAO "A green data transmission mechanism for wireless multimedia sensor network using information fusion" 1536-1284 2014 IEEE