-This is pdfTeX, Version 3.14159265-2.6-1.40.15 (TeX Live 2015/dev/Debian) (preloaded format=pdflatex 2015.1.24) 11 JAN 2016 12:05
+This is pdfTeX, Version 3.1415926-2.4-1.40.13 (TeX Live 2012/Debian) (format=pdflatex 2013.9.3) 14 JAN 2016 11:04
entering extended mode
restricted \write18 enabled.
%&-line parsing enabled.
**articleeo.tex
(./articleeo.tex
-LaTeX2e <2014/05/01>
-Babel <3.9l> and hyphenation patterns for 61 languages loaded.
+LaTeX2e <2011/06/27>
+Babel <v3.8m> and hyphenation patterns for english, dumylang, nohyphenation, lo
+aded.
(./gENO2e.cls
Document Class: gENO2e 2013/04/29 v4.1 Engineering Optimization LaTeX2e documen
t class
Package: graphicx 1999/02/16 v1.0f Enhanced LaTeX Graphics (DPC,SPQR)
(/usr/share/texlive/texmf-dist/tex/latex/graphics/keyval.sty
-Package: keyval 2014/05/08 v1.15 key=value parser (DPC)
+Package: keyval 1999/03/16 v1.13 key=value parser (DPC)
\KV@toks@=\toks20
)
(/usr/share/texlive/texmf-dist/tex/latex/graphics/graphics.sty
Package: rotating 1997/09/26, v2.13 Rotation package
(/usr/share/texlive/texmf-dist/tex/latex/base/ifthen.sty
-Package: ifthen 2014/09/29 v1.1c Standard LaTeX ifthen package (DPC)
+Package: ifthen 2001/05/26 v1.1c Standard LaTeX ifthen package (DPC)
)
\c@r@tfl@t=\count118
\rot@float@box=\box30
Package: indentfirst 1995/11/23 v1.03 Indent first paragraph (DPC)
)
(/usr/share/texlive/texmf-dist/tex/latex/graphics/color.sty
-Package: color 2014/04/23 v1.1a Standard LaTeX Color (DPC)
+Package: color 2005/11/14 v1.0j Standard LaTeX Color (DPC)
(/usr/share/texlive/texmf-dist/tex/latex/latexconfig/color.cfg
File: color.cfg 2007/01/18 v1.5 color configuration of teTeX/TeXLive
)
-Package color Info: Driver file: pdftex.def on input line 137.
+Package color Info: Driver file: pdftex.def on input line 130.
)
(./algorithm2e.sty
Package: algorithm2e 2008/00/00 v3.10 algorithms environments
\c@AlgoLine=\count123
(/usr/share/texlive/texmf-dist/tex/latex/tools/xspace.sty
-Package: xspace 2014/10/28 v1.13 Space after command names (DPC,MH)
+Package: xspace 2009/10/20 v1.13 Space after command names (DPC,MH)
)
(/usr/share/texlive/texmf-dist/tex/latex/relsize/relsize.sty
-Package: relsize 2013/03/29 ver 4.1
-)
+Package: relsize 2011/09/21 ver 4.0
+
+Examine \normalsize starts \@setfontsize size may be \@xipt.
+Examine \small starts \@setfontsize size may be \@xpt.
+Examine \footnotesize starts \@setfontsize size may be \@viiipt.
+Examine \large starts \@setfontsize size may be \@xipt.
+Examine \Large starts \@setfontsize size may be \@xviipt.
+Examine \LARGE starts \@setfontsize size may be \@xviiipt.
+Examine \scriptsize starts \@setfontsize size may be \@viipt.
+Examine \tiny starts \@setfontsize size may be \@vipt.
+Examine \huge starts \@setfontsize size may be \@xxpt.
+Examine \Huge starts \@setfontsize size may be \@xxvpt. )
********************************************************
Package `algorithm2e' Release 4.01 -- december 14 2009 --
- algorithm2e-announce@lirmm.fr mailing list for announcement about releases
LaTeX Font Info: Try loading font information for OML+cmr on input line 20.
(/usr/share/texlive/texmf-dist/tex/latex/base/omlcmr.fd
-File: omlcmr.fd 2014/09/29 v2.5h Standard LaTeX font definitions
+File: omlcmr.fd 1999/05/25 v2.5h Standard LaTeX font definitions
)
LaTeX Font Info: Font shape `OML/cmr/m/it' in size <10> not available
(Font) Font shape `OML/cmm/m/it' tried instead on input line 20.
LaTeX Font Info: Try loading font information for OMS+cmr on input line 20.
(/usr/share/texlive/texmf-dist/tex/latex/base/omscmr.fd
-File: omscmr.fd 2014/09/29 v2.5h Standard LaTeX font definitions
+File: omscmr.fd 1999/05/25 v2.5h Standard LaTeX font definitions
)
LaTeX Font Info: Font shape `OMS/cmr/m/n' in size <10> not available
(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 20.
LaTeX Font Info: Try loading font information for U+msa on input line 20.
(/usr/share/texlive/texmf-dist/tex/latex/amsfonts/umsa.fd
-File: umsa.fd 2013/01/14 v3.01 AMS symbols A
+File: umsa.fd 2009/06/22 v3.00 AMS symbols A
)
LaTeX Font Info: Try loading font information for U+msb on input line 20.
(/usr/share/texlive/texmf-dist/tex/latex/amsfonts/umsb.fd
-File: umsb.fd 2013/01/14 v3.01 AMS symbols B
+File: umsb.fd 2009/06/22 v3.00 AMS symbols B
)
LaTeX Font Info: Font shape `OML/cmr/m/it' in size <8> not available
(Font) Font shape `OML/cmm/m/it' tried instead on input line 20.
(Font) using `OT1/cmr/bx/n' instead on input line 216.
Package epstopdf Info: Source file: <figure1a.eps>
-(epstopdf) date: 2015-02-20 10:20:43
+(epstopdf) date: 2015-02-20 10:11:12
(epstopdf) size: 358485 bytes
(epstopdf) Output file: <figure1a-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-02-20 10:12:43
(epstopdf) size: 78307 bytes
(epstopdf) Command: <repstopdf --outfile=figure1a-eps-converted-to.
pdf figure1a.eps>
Package pdftex.def Info: figure1a-eps-converted-to.pdf used on input line 257.
(pdftex.def) Requested size: 213.39566pt x 202.1362pt.
Package epstopdf Info: Source file: <figure1b.eps>
-(epstopdf) date: 2015-02-20 10:20:43
+(epstopdf) date: 2015-02-20 10:11:12
(epstopdf) size: 241675 bytes
(epstopdf) Output file: <figure1b-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-02-20 10:12:44
(epstopdf) size: 57181 bytes
(epstopdf) Command: <repstopdf --outfile=figure1b-eps-converted-to.
pdf figure1b.eps>
[5 <./figure1a-eps-converted-to.pdf> <./figure1b-eps-converted-to.pdf>]
Package epstopdf Info: Source file: <figure2.eps>
-(epstopdf) date: 2015-02-20 10:20:43
+(epstopdf) date: 2015-02-20 10:11:12
(epstopdf) size: 508784 bytes
(epstopdf) Output file: <figure2-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-02-20 10:12:44
(epstopdf) size: 138861 bytes
(epstopdf) Command: <repstopdf --outfile=figure2-eps-converted-to.p
df figure2.eps>
Package pdftex.def Info: figure2-eps-converted-to.pdf used on input line 300.
(pdftex.def) Requested size: 398.99872pt x 200.66864pt.
Package epstopdf Info: Source file: <figure3.eps>
-(epstopdf) date: 2015-02-20 10:20:43
+(epstopdf) date: 2015-02-20 10:11:12
(epstopdf) size: 196938 bytes
(epstopdf) Output file: <figure3-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-02-20 10:12:45
(epstopdf) size: 48639 bytes
(epstopdf) Command: <repstopdf --outfile=figure3-eps-converted-to.p
df figure3.eps>
[6 <./figure2-eps-converted-to.pdf>]
Package epstopdf Info: Source file: <figure4.eps>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2016-01-07 09:53:56
(epstopdf) size: 236870 bytes
(epstopdf) Output file: <figure4-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2016-01-07 09:54:48
(epstopdf) size: 48385 bytes
(epstopdf) Command: <repstopdf --outfile=figure4-eps-converted-to.p
df figure4.eps>
[12]
Package epstopdf Info: Source file: <figure5.eps>
-(epstopdf) date: 2015-02-20 10:16:57
+(epstopdf) date: 2015-02-06 11:42:02
(epstopdf) size: 29526 bytes
(epstopdf) Output file: <figure5-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-02-20 10:12:46
(epstopdf) size: 12638 bytes
(epstopdf) Command: <repstopdf --outfile=figure5-eps-converted-to.p
df figure5.eps>
LaTeX Warning: `!h' float specifier changed to `!ht'.
Package epstopdf Info: Source file: <figure6.eps>
-(epstopdf) date: 2015-02-20 10:16:57
+(epstopdf) date: 2015-02-06 11:42:02
(epstopdf) size: 29515 bytes
(epstopdf) Output file: <figure6-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-02-20 10:12:46
(epstopdf) size: 12695 bytes
(epstopdf) Command: <repstopdf --outfile=figure6-eps-converted-to.p
df figure6.eps>
[13]
Package epstopdf Info: Source file: <figure7.eps>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-09-28 10:36:28
(epstopdf) size: 29552 bytes
(epstopdf) Output file: <figure7-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-09-29 14:32:04
(epstopdf) size: 12896 bytes
(epstopdf) Command: <repstopdf --outfile=figure7-eps-converted-to.p
df figure7.eps>
[14 <./figure5-eps-converted-to.pdf> <./figure6-eps-converted-to.pdf>]
Package epstopdf Info: Source file: <figure8a.eps>
-(epstopdf) date: 2016-01-05 17:10:12
+(epstopdf) date: 2015-02-06 11:42:02
(epstopdf) size: 24136 bytes
(epstopdf) Output file: <figure8a-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-09-29 14:50:26
(epstopdf) size: 8179 bytes
(epstopdf) Command: <repstopdf --outfile=figure8a-eps-converted-to.
pdf figure8a.eps>
Package pdftex.def Info: figure8a-eps-converted-to.pdf used on input line 837.
(pdftex.def) Requested size: 246.92189pt x 175.15395pt.
Package epstopdf Info: Source file: <figure8b.eps>
-(epstopdf) date: 2016-01-05 17:10:12
+(epstopdf) date: 2015-02-06 11:42:02
(epstopdf) size: 24138 bytes
(epstopdf) Output file: <figure8b-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-09-29 14:50:26
(epstopdf) size: 8180 bytes
(epstopdf) Command: <repstopdf --outfile=figure8b-eps-converted-to.
pdf figure8b.eps>
[15 <./figure7-eps-converted-to.pdf> <./figure8a-eps-converted-to.pdf> <./figu
re8b-eps-converted-to.pdf>]
Package epstopdf Info: Source file: <figure9a.eps>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-02-06 11:42:03
(epstopdf) size: 24103 bytes
(epstopdf) Output file: <figure9a-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-09-29 14:50:27
(epstopdf) size: 8351 bytes
(epstopdf) Command: <repstopdf --outfile=figure9a-eps-converted-to.
pdf figure9a.eps>
Package pdftex.def Info: figure9a-eps-converted-to.pdf used on input line 861.
(pdftex.def) Requested size: 246.92189pt x 175.15395pt.
Package epstopdf Info: Source file: <figure9b.eps>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-02-06 11:42:03
(epstopdf) size: 24855 bytes
(epstopdf) Output file: <figure9b-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2015-09-29 14:50:27
(epstopdf) size: 8466 bytes
(epstopdf) Command: <repstopdf --outfile=figure9b-eps-converted-to.
pdf figure9b.eps>
[16 <./figure9a-eps-converted-to.pdf> <./figure9b-eps-converted-to.pdf>]
Package epstopdf Info: Source file: <figure10.eps>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2016-01-07 09:54:01
(epstopdf) size: 32298 bytes
(epstopdf) Output file: <figure10-eps-converted-to.pdf>
-(epstopdf) date: 2016-01-07 17:12:01
+(epstopdf) date: 2016-01-07 09:54:48
(epstopdf) size: 26487 bytes
(epstopdf) Command: <repstopdf --outfile=figure10-eps-converted-to.
pdf figure10.eps>
[]
+Underfull \vbox (badness 1430) has occurred while \output is active []
+
+
Underfull \vbox (badness 10000) has occurred while \output is active []
g Kit).'' \OT1/cmr/m/it/10 Avail-able:
[]
+Missing character: There is no à in font cmr10!
+Missing character: There is no © in font cmr10!
Underfull \vbox (badness 10000) has occurred while \output is active []
Overfull \vbox (701.0pt too high) has occurred while \output is active []
[19]
-Missing character: There is no à in font cmr10!
-Missing character: There is no © in font cmr10!
-
Underfull \hbox (badness 10000) in paragraph at lines 174--176
[]\OT1/cmr/m/n/10 Varga, A. 2003. ``OM-NeT++ Dis-crete Event Sim-u-la-tion Sys-
tem.'' \OT1/cmr/m/it/10 Avail-able:
)
Here is how much of TeX's memory you used:
- 4878 strings out of 493221
- 63704 string characters out of 6141266
- 155107 words of memory out of 5000000
- 8222 multiletter control sequences out of 15000+600000
- 14560 words of font info for 56 fonts, out of 8000000 for 9000
- 1119 hyphenation exceptions out of 8191
- 41i,19n,27p,419b,385s stack positions out of 5000i,500n,10000p,200000b,80000s
+ 4871 strings out of 495059
+ 63632 string characters out of 3182031
+ 150030 words of memory out of 3000000
+ 7964 multiletter control sequences out of 15000+200000
+ 14560 words of font info for 56 fonts, out of 3000000 for 9000
+ 14 hyphenation exceptions out of 8191
+ 41i,19n,27p,419b,385s stack positions out of 5000i,500n,10000p,200000b,50000s
</usr/share/texlive/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></us
r/share/texlive/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx9.pfb></usr/share
/texlive/texmf-dist/fonts/type1/public/amsfonts/cm/cmbxti10.pfb></usr/share/tex
/public/amsfonts/cm/cmti10.pfb></usr/share/texlive/texmf-dist/fonts/type1/publi
c/amsfonts/cm/cmti8.pfb></usr/share/texlive/texmf-dist/fonts/type1/public/amsfo
nts/symbols/msbm10.pfb>
-Output written on articleeo.pdf (20 pages, 752382 bytes).
+Output written on articleeo.pdf (20 pages, 752374 bytes).
PDF statistics:
222 PDF objects out of 1000 (max. 8388607)
151 compressed objects within 2 object streams
use of its limited energy provision, so that it can fulfill its monitoring task
as long as possible. Among known available approaches that can be used to
improve power management, lifetime coverage optimization provides activity
-scheduling which ensures sensing coverage while minimizing the energy cost. An approach called Perimeter-based Coverage Optimization protocol
-(PeCO) is proposed. It is a hybrid of centralized and distributed methods: the region of
-interest is first subdivided into subregions and the protocol is then
+scheduling which ensures sensing coverage while minimizing the energy cost. In
+this paper an approach called Perimeter-based Coverage Optimization protocol
+(PeCO) is proposed. It is a hybrid of centralized and distributed methods: the
+region of interest is first subdivided into subregions and the protocol is then
distributed among sensor nodes in each subregion. The novelty of the approach
lies essentially in the formulation of a new mathematical optimization model
based on the perimeter coverage level to schedule sensors' activities.
architecture.
\item A new mathematical optimization model is proposed. Instead of trying to
cover a set of specified points/targets as in most of the methods proposed in
- the literature, a mixed-integer program based on the perimeter
- coverage of each sensor is formulated. The model involves integer variables to capture the
- deviations between the actual level of coverage and the required level.
+ the literature, a mixed-integer program based on the perimeter coverage of
+ each sensor is formulated. The model involves integer variables to capture
+ the deviations between the actual level of coverage and the required level.
Hence, an optimal schedule will be obtained by minimizing a weighted sum of
these deviations.
\item Extensive simulation experiments are conducted using the discrete event
- simulator OMNeT++, to demonstrate the efficiency of the PeCO protocol. The PeCO protocol has been compared to two approaches found in the literature:
- DESK~\citep{ChinhVu} and GAF~\citep{xu2001geography}, and also to the
- protocol DiLCO published in~\citep{Idrees2}. DiLCO uses the same framework as
- PeCO but is based on another optimization model for sensor scheduling.
+ simulator OMNeT++, to demonstrate the efficiency of the PeCO protocol. The
+ PeCO protocol has been compared to two approaches found in the literature:
+ DESK~\citep{ChinhVu} and GAF~\citep{xu2001geography}, and also to the protocol
+ DiLCO published in~\citep{Idrees2}. DiLCO uses the same framework as PeCO but
+ is based on another optimization model for sensor scheduling.
\end{enumerate}
The rest of the paper is organized as follows. In the next section some related
sensing. The simulations show that DiLCO is able to increase the WSN lifetime
and provides improved coverage performance. {\it In the PeCO protocol, a new
mathematical optimization model is proposed. Instead of trying to cover a set
- of specified points/targets as in the DiLCO protocol, an integer
- program based on the perimeter coverage of each sensor is formulated. The model involves
+ of specified points/targets as in the DiLCO protocol, an integer program based
+ on the perimeter coverage of each sensor is formulated. The model involves
integer variables to capture the deviations between the actual level of
coverage and the required level. The idea is that an optimal scheduling will
be obtained by minimizing a weighted sum of these deviations.}
\section{ The P{\scshape e}CO Protocol Description}
\label{sec:The PeCO Protocol Description}
-
\subsection{Assumptions and Models}
\label{CI}
(perimeter covered by at least $k$ sensors).
Figure~\ref{figure1}(a) shows the coverage of sensor node~$0$. On this figure,
-sensor~$0$ has nine neighbors. For each neighbor the two points
-resulting from the intersection of the two sensing areas have been reported on its perimeter (the
-perimeter of the disk covered by the sensor~$0$). These points are
-denoted for neighbor~$i$ by $iL$ and $iR$, respectively for left and right from
-a neighboring point of view. The resulting couples of intersection points
+sensor~$0$ has nine neighbors. For each neighbor the two points resulting from
+the intersection of the two sensing areas have been reported on its perimeter
+(the perimeter of the disk covered by the sensor~$0$). These points are denoted
+for neighbor~$i$ by $iL$ and $iR$, respectively for left and right from a
+neighboring point of view. The resulting couples of intersection points
subdivide the perimeter of sensor~$0$ into portions called arcs.
\begin{figure}[ht!]
coverage is determined for each interval defined by two successive points. The
maximum level of coverage is equal to the number of overlapping arcs. For
example, between~$5L$ and~$6L$ the maximum level of coverage is equal to $3$
-(the value is highlighted in yellow at the bottom of Figure~\ref{figure2}), which
+(the value is given at the bottom of Figure~\ref{figure2}), which
means that at most 2~neighbors can cover the perimeter in addition to node $0$.
Table~\ref{my-label} summarizes for each coverage interval the maximum level of
coverage and the sensor nodes covering the perimeter. The example discussed
precisely, Algorithm~\ref{alg:PeCO} gives a brief description of the protocol
applied by a sensor node $s_k$ where $k$ is the node index in the WSN.
-
\begin{algorithm2e}
\label{alg:PeCO}
\caption{PeCO pseudocode}
subregion using an embedded GPS or a location discovery algorithm. After that,
all the sensors collect position coordinates, remaining energy, sensor node ID,
and the number of their one-hop live neighbors during the information exchange.
-Both INFO packet and ActiveSleep packet contain two parts: header and data payload. The sensor ID is included in the header, where the header size is 8 bits. The data part includes position coordinates (64 bits), remaining energy (32 bits), and the number of one-hop live neighbors (8 bits). Therefore the size of the INFO packet is 112 bits. The ActiveSleep packet is 16 bits size, 8 bits for the header and 8 bits for data part that includes only sensor status (0 or 1).
-The sensors inside a same region cooperate to elect a leader. The selection
-criteria for the leader are (in order of priority):
+Both INFO packet and ActiveSleep packet contain two parts: header and data
+payload. The sensor ID is included in the header, where the header size is 8
+bits. The data part includes position coordinates (64 bits), remaining energy
+(32 bits), and the number of one-hop live neighbors (8 bits). Therefore the size
+of the INFO packet is 112 bits. The ActiveSleep packet is 16 bits size, 8 bits
+for the header and 8 bits for data part that includes only sensor status (0 or
+1). The sensors inside a same region cooperate to elect a leader. The
+selection criteria for the leader are (in order of priority):
\begin{enumerate}
\item larger number of neighbors;
\item larger remaining energy;
\item and then, in case of equality, larger indexes.
\end{enumerate}
Once chosen, the leader collects information to formulate and solve the integer
-program which allows to build the set of active sensors in the sensing
-stage.
+program which allows to build the set of active sensors in the sensing stage.
\section{Perimeter-based Coverage Problem Formulation}
\label{cp}
obtained by multiplying the energy consumed in the active state (9.72 mW) with
the time in seconds for one period (3600 seconds), and adding the energy for the
pre-sensing phases. According to the interval of initial energy, a sensor may
-be active during at most 20 periods. the information exchange to update the coverage
-is executed every hour, but the length of the sensing period could be reduced
-and adapted dynamically. On the one hand a small sensing period would allow the network to
-be more reliable but would have resulted in higher communication costs. On the
-other hand the choice of a long duration may cause problems in case of nodes
-failure during the sensing period.
+be active during at most 20 periods. the information exchange to update the
+coverage is executed every hour, but the length of the sensing period could be
+reduced and adapted dynamically. On the one hand a small sensing period would
+allow the network to be more reliable but would have resulted in higher
+communication costs. On the other hand the choice of a long duration may cause
+problems in case of nodes failure during the sensing period.
The values of $\alpha^j_i$ and $\beta^j_i$ have been chosen to ensure a good
network coverage and a longer WSN lifetime. Higher priority is given to the
subregions during the current sensing phase and $N$ is total number of grid
points in the sensing field. A layout of $N~=~51~\times~26~=~1326$~grid points
is considered in the simulations.
-\item {\bf Active Sensors Ratio (ASR)}: a major objective of the proposed protocol is to
- activate as few nodes as possible, in order to minimize the communication
- overhead and maximize the WSN lifetime. The active sensors ratio is defined as
- follows:
+\item {\bf Active Sensors Ratio (ASR)}: a major objective of the proposed
+ protocol is to activate as few nodes as possible, in order to minimize the
+ communication overhead and maximize the WSN lifetime. The active sensors ratio
+ is defined as follows:
\begin{equation*}
\scriptsize
- \mbox{ASR}(\%) = \frac{\sum\limits_{r=1}^R \mbox{$|A_r^p|$}}{\mbox{$|J|$}} \times 100
+ \mbox{ASR}(\%) = \frac{\sum\limits_{r=1}^R \mbox{$|A_r^p|$}}{\mbox{$|S|$}} \times 100
\end{equation*}
where $|A_r^p|$ is the number of active sensors in the subregion $r$ in the
sensing period~$p$, $R$ is the number of subregions, and $|J|$ is the number
of sensors in the network.
-\item {\bf Energy Saving Ratio (ESR)}:this metric, which shows the ability of a protocol to save energy, is defined by:
+\item {\bf Energy Saving Ratio (ESR)}: this metric, which shows the ability of a
+ protocol to save energy, is defined by:
\begin{equation*}
\scriptsize
\mbox{ESR}(\%) = \frac{\mbox{Number of alive sensors during this round}}
\subsection{Simulation Results}
-
-The PeCO protocol has been implemented in OMNeT++~\citep{varga} simulator in order to assess and analyze its performance.
-The simulations were run on a DELL laptop with an Intel Core~i3~2370~M (1.8~GHz)
-processor (2 cores) whose MIPS (Million Instructions Per Second) rate is equal
-to 35330. To be consistent with the use of a sensor node based on Atmels AVR
-ATmega103L microcontroller (6~MHz) having a MIPS rate equal to 6, the original
-execution time on the laptop is multiplied by 2944.2 $\left(\frac{35330}{2}
-\times \frac{1}{6} \right)$. Energy consumption is calculated according to the
-power consumption values, in milliWatt per second, given in Table~\ref{tab:EC},
-based on the energy model proposed in \citep{ChinhVu}.
+The PeCO protocol has been implemented in OMNeT++~\citep{varga} simulator in
+order to assess and analyze its performance. The simulations were run on a DELL
+laptop with an Intel Core~i3~2370~M (1.8~GHz) processor (2 cores) whose MIPS
+(Million Instructions Per Second) rate is equal to 35330. To be consistent with
+the use of a sensor node based on Atmels AVR ATmega103L microcontroller (6~MHz)
+having a MIPS rate equal to 6, the original execution time on the laptop is
+multiplied by 2944.2 $\left(\frac{35330}{2} \times \frac{1}{6} \right)$. Energy
+consumption is calculated according to the power consumption values, in
+milliWatt per second, given in Table~\ref{tab:EC}, based on the energy model
+proposed in \citep{ChinhVu}.
\begin{table}[h]
\centering
The modeling language for Mathematical Programming (AMPL)~\citep{AMPL} is used
to generate the integer program instance in a standard format, which is then
-read and solved by the optimization solver GLPK (GNU linear Programming Kit
+read and solved by the optimization solver GLPK (GNU Linear Programming Kit
available in the public domain) \citep{glpk} through a Branch-and-Bound method.
In practice, executing GLPK on a sensor node is obviously intractable due to the
-huge memory use. Fortunately, to solve the optimization problem, the use of
+huge memory use. Fortunately, to solve the optimization problem, the use of
commercial solvers like CPLEX \citep{iamigo:cplex} which are less memory
-consuming and more efficient is possible, or a lightweight heuristic may be implemented. For example,
-for a WSN of 200 sensor nodes, a leader node has to deal with constraints
-induced by about 12 sensor nodes. In that case, to solve the optimization
-problem a memory consumption of more than 1~MB can be observed with GLPK,
-whereas less than 300~KB would be needed with CPLEX.
+consuming and more efficient is possible, or a lightweight heuristic may be
+implemented. For example, for a WSN of 200 sensor nodes, a leader node has to
+deal with constraints induced by about 12 sensor nodes. In that case, to solve
+the optimization problem a memory consumption of more than 1~MB can be observed
+with GLPK, whereas less than 300~KB would be needed with CPLEX.
Besides PeCO, three other protocols will be evaluated for comparison
purposes. The first one, called DESK, is a fully distributed coverage algorithm
\subsubsection{Active Sensors Ratio}
-Minimizing the number of active sensor nodes in each period is essential to minimize the
-energy consumption and thus to maximize the network lifetime.
+Minimizing the number of active sensor nodes in each period is essential to
+minimize the energy consumption and thus to maximize the network lifetime.
Figure~\ref{figure6} shows the average active nodes ratio for 200 deployed
-nodes. DESK and GAF have 30.36~\% and 34.96~\% active nodes for
-the first fourteen rounds, and the DiLCO and PeCO protocols compete perfectly with
-only 17.92~\% and 20.16~\% active nodes during the same time interval. As the
-number of periods increases, the PeCO protocol has a lower number of active nodes in
+nodes. DESK and GAF have 30.36~\% and 34.96~\% active nodes for the first
+fourteen rounds, and the DiLCO and PeCO protocols compete perfectly with only
+17.92~\% and 20.16~\% active nodes during the same time interval. As the number
+of periods increases, the PeCO protocol has a lower number of active nodes in
comparison with the three other approaches and exhibits a slow decrease, while
keeping a greater coverage ratio as shown in Figure \ref{figure5}.
\subsubsection{Energy Saving Ratio}
-
-The simulation results show that the protocol PeCO saves
- efficiently energy by turning off some sensors during the sensing phase. As
- shown in Figure~\ref{figure7}, GAF provides better energy saving than PeCO for
- the first fifty rounds. Indeed GAF balances the energy consumption among
- sensor nodes inside each small fixed grid and thus permits to extend the life
- of sensors in each grid fairly. However, at the same time it turns on a large
- number of sensors and that leads later to quickly deplete sensor's batteries.
- DESK algorithm shows less energy saving compared with other approaches. In
- comparison with PeCO, DiLCO protocol usually provides lower energy saving
- ratios. Moreover, it can be noticed that after round fifty, PeCO protocol
- exhibits the slowest decrease among all the considered protocols.
+The simulation results show that the protocol PeCO saves efficiently energy by
+turning off some sensors during the sensing phase. As shown in
+Figure~\ref{figure7}, GAF provides better energy saving than PeCO for the first
+fifty rounds. Indeed GAF balances the energy consumption among sensor nodes
+inside each small fixed grid and thus permits to extend the life of sensors in
+each grid fairly. However, at the same time it turns on a large number of
+sensors and that leads later to quickly deplete sensor's batteries. DESK
+algorithm shows less energy saving compared with other approaches. In
+comparison with PeCO, DiLCO protocol usually provides lower energy saving
+ratios. Moreover, it can be noticed that after round fifty, PeCO protocol
+exhibits the slowest decrease among all the considered protocols.
\begin{figure}[h!]
%\centering
computation, listening, active, and sleep status is studied for different
network densities and the four approaches compared. Figures~\ref{figure8}(a)
and (b) illustrate the energy consumption for different network sizes and for
-$Lifetime_{95}$ and $Lifetime_{50}$. The results show that the PeCO protocol is the most
-competitive from the energy consumption point of view. As shown by both figures,
-PeCO consumes much less energy than the other methods. One might think that the
-resolution of the integer program is too costly in energy, but the results show
-that it is very beneficial to lose a bit of time in the selection of sensors to
-activate. Indeed the optimization program allows to reduce significantly the
-number of active sensors and also the energy consumption while keeping a good
-coverage level. The energy overhead when increasing network
-size is the lowest with PeCO.
+$Lifetime_{95}$ and $Lifetime_{50}$. The results show that the PeCO protocol is
+the most competitive from the energy consumption point of view. As shown by both
+figures, PeCO consumes much less energy than the other methods. One might think
+that the resolution of the integer program is too costly in energy, but the
+results show that it is very beneficial to lose a bit of time in the selection
+of sensors to activate. Indeed the optimization program allows to reduce
+significantly the number of active sensors and also the energy consumption while
+keeping a good coverage level. The energy overhead when increasing network size
+is the lowest with PeCO.
\begin{figure}[h!]
\centering
\subsubsection{Network Lifetime}
-In comparison with the two other approaches, PeCO and DiLCO protocols are better for prolonging the network lifetime. In
-Figures~\ref{figure9}(a) and (b), $Lifetime_{95}$ and $Lifetime_{50}$ are shown for
-different network sizes. As can be seen in these figures, the lifetime
-increases with the size of the network, and it is clearly larger for the DiLCO and
-PeCO protocols. For instance, for a network of 300~sensors and coverage ratio
-greater than 50\%, it can be observed on Figure~\ref{figure9}(b) that the lifetime is
-about twice longer with PeCO compared to the DESK protocol. The performance
-difference is more obvious in Figure~\ref{figure9}(b) than in
-Figure~\ref{figure9}(a) because the gain induced by protocols (PeCO and DiLCO) increases with
-time, and the lifetime with a coverage over 50\% is far longer than with 95\%.
+In comparison with the two other approaches, PeCO and DiLCO protocols are better
+for prolonging the network lifetime. In Figures~\ref{figure9}(a) and (b),
+$Lifetime_{95}$ and $Lifetime_{50}$ are shown for different network sizes. As
+can be seen in these figures, the lifetime increases with the size of the
+network, and it is clearly larger for the DiLCO and PeCO protocols. For
+instance, for a network of 300~sensors and coverage ratio greater than 50\%, it
+can be observed on Figure~\ref{figure9}(b) that the lifetime is about twice
+longer with PeCO compared to the DESK protocol. The performance difference is
+more obvious in Figure~\ref{figure9}(b) than in Figure~\ref{figure9}(a) because
+the gain induced by protocols (PeCO and DiLCO) increases with time, and the
+lifetime with a coverage over 50\% is far longer than with 95\%.
\begin{figure}[h!]
\centering
\label{figure9}
\end{figure}
-Figure~\ref{figure10} compares the lifetime coverage of the DiLCO and PeCO protocols
-for different coverage ratios. Protocol/70, Protocol/80,
-Protocol/85, Protocol/90, and Protocol/95 correspond to the amount of time during which the
+Figure~\ref{figure10} compares the lifetime coverage of the DiLCO and PeCO
+protocols for different coverage ratios. Protocol/70, Protocol/80, Protocol/85,
+Protocol/90, and Protocol/95 correspond to the amount of time during which the
network can satisfy an area coverage greater than $70\%$, $80\%$, $85\%$,
$90\%$, and $95\%$ respectively, where the term Protocol refers to DiLCO or
-PeCO. Indeed there are applications that do not require a 100\% coverage of the
-area to be monitored. For example, forest
-fire application might require complete coverage
-in summer seasons while only require 80$\%$ of the area to be covered in rainy seasons~\citep{li2011transforming}. As another example, birds habit study requires only 70$\%$-coverage at nighttime when the birds are sleeping while requires 100$\%$-coverage at daytime when the birds are active~\citep{1279193}.
- PeCO always outperforms DiLCO for the three lower coverage ratios, moreover the
-improvements grow with the network size. DiLCO outperforms PeCO when the coverage ratio is required to be $>90\%$, but PeCO extends the network lifetime significantly when coverage ratio can be relaxed.
+PeCO. Indeed there are applications that do not require a 100\% coverage of the
+area to be monitored. For example, forest fire application might require
+complete coverage in summer seasons while only require 80$\%$ of the area to be
+covered in rainy seasons~\citep{li2011transforming}. As another example, birds
+habit study requires only 70$\%$-coverage at nighttime when the birds are
+sleeping while requires 100$\%$-coverage at daytime when the birds are
+active~\citep{1279193}. PeCO always outperforms DiLCO for the three lower
+coverage ratios, moreover the improvements grow with the network size. DiLCO
+outperforms PeCO when the coverage ratio is required to be $>90\%$, but PeCO
+extends the network lifetime significantly when coverage ratio can be relaxed.
\begin{figure}[h!]
\centering \includegraphics[scale=0.55]{figure10.eps}
limits the activation of a large number of sensors, but as $\alpha$ is low, some
areas may be poorly covered. This explains the results obtained for
$Lifetime_{50}$ with $\beta \gg \alpha$: a large number of periods with low
-coverage ratio. On the other hand, when $\alpha \gg \beta$ is chosen,
-the coverage is favored even if some areas may be overcovered, so a high coverage ratio is
-reached, but a large number of sensors are activated to achieve this goal.
-Therefore the network lifetime is reduced. The choice $\alpha=0.6$ and
+coverage ratio. On the other hand, when $\alpha \gg \beta$ is chosen, the
+coverage is favored even if some areas may be overcovered, so a high coverage
+ratio is reached, but a large number of sensors are activated to achieve this
+goal. Therefore the network lifetime is reduced. The choice $\alpha=0.6$ and
$\beta=0.4$ seems to achieve the best compromise between lifetime and coverage
-ratio. That explains why this setting has been chosen for the experiments
+ratio. That explains why this setting has been chosen for the experiments
presented in the previous subsections.
-
-
\begin{table}[h]
\centering
\caption{The impact of $\alpha$ and $\beta$ on PeCO's performance}
\section{Conclusion and Future Works}
\label{sec:Conclusion and Future Works}
-In this paper the problem of perimeter coverage optimization in
-WSNs has been studied. A new protocol called Perimeter-based Coverage
-Optimization is designed. This protocol schedules nodes' activities (wake up and sleep stages) with
-the objective of maintaining a good coverage ratio while maximizing the network
-lifetime. This protocol is applied in a distributed way in regular subregions
-obtained after partitioning the area of interest in a preliminary step. It works
-in periods and is based on the resolution of an integer program to select the
-subset of sensors operating in active status for each period. This work is
-original in so far as it proposes for the first time an integer program
-scheduling the activation of sensors based on their perimeter coverage level,
-instead of using a set of targets/points to be covered. Several simulations have
-been carried out to evaluate the proposed protocol. The simulation results show
-that PeCO is more energy-efficient than other approaches, with respect to
-lifetime, coverage ratio, active sensors ratio, and energy consumption.
-
-This framework will be extented so that the schedules are planned for multiple
-sensing periods. The integer program would be improved to take into
-account heterogeneous sensors from both energy and node characteristics point of
-views. Finally, it would be interesting to implement the PeCO protocol using a
+In this paper the problem of perimeter coverage optimization in WSNs has been
+studied. A new protocol called Perimeter-based Coverage Optimization is
+designed. This protocol schedules nodes' activities (wake up and sleep stages)
+with the objective of maintaining a good coverage ratio while maximizing the
+network lifetime. This protocol is applied in a distributed way in regular
+subregions obtained after partitioning the area of interest in a preliminary
+step. It works in periods and is based on the resolution of an integer program
+to select the subset of sensors operating in active status for each period.
+This work is original in so far as it proposes for the first time an integer
+program scheduling the activation of sensors based on their perimeter coverage
+level, instead of using a set of targets/points to be covered. Several
+simulations have been carried out to evaluate the proposed protocol. The
+simulation results show that PeCO is more energy-efficient than other
+approaches, with respect to lifetime, coverage ratio, active sensors ratio, and
+energy consumption.
+
+This framework will be extented so that the schedules are planned for multiple
+sensing periods. The integer program would be improved to take into account
+heterogeneous sensors from both energy and node characteristics point of views.
+Finally, it would be interesting to implement the PeCO protocol using a
sensor-testbed to evaluate it in real world applications.
\subsection*{Acknowledgments}
-The authors are deeply grateful to the anonymous reviewers for their
-constructive advice, which improved the technical quality of the paper. As a
-Ph.D. student, Ali Kadhum Idrees would like to gratefully acknowledge the
-University of Babylon - Iraq for financial support and Campus France for the
-received support. This work is also partially funded by the Labex ACTION program
+Ali Kadhum Idrees is supported in part by University of Babylon (Iraq).
+This work is also partially funded by the Labex ACTION program
(contract ANR-11-LABX-01-01).
\bibliographystyle{gENO}
-\bibliography{biblio} %articleeo
+\bibliography{biblio}
\end{document}