\citation{li2013survey}
\citation{Misra}
\citation{yang2014novel}
-\citation{HeShibo}
-\citation{kim2013maximum}
+\citation{HeShibo,kim2013maximum}
\citation{Deng2012}
\citation{Huang:2003:CPW:941350.941367}
\@writefile{toc}{\contentsline {section}{\numberline {2}Related Literature}{2}}
\citation{cardei2005improving,zorbas2010solving,pujari2011high}
\citation{berman04,zorbas2010solving}
\citation{cardei2005energy,5714480,pujari2011high,Yang2014}
-\citation{castano2013column,rossi2012exact,deschinkel2012column}
+\citation{castano2013column,doi:10.1080/0305215X.2012.687732,deschinkel2012column}
\citation{Zhang05}
\citation{huang2005coverage}
\@writefile{toc}{\contentsline {section}{\numberline {3} The P{\scshape e}CO Protocol Description}{4}}
\newlabel{sec:The PeCO Protocol Description}{{3}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Assumptions and Models}{4}}
\newlabel{CI}{{3.1}{4}}
-\newlabel{pcm2sensors}{{1}{5}}
-\newlabel{expcm}{{2}{6}}
+\newlabel{figure1}{{1}{5}}
+\newlabel{figure2}{{2}{6}}
\newlabel{my-label}{{1}{6}}
-\newlabel{ex4pcm}{{3}{6}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}The Main Idea}{6}}
-\newlabel{fig2}{{4}{7}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}PeCO Protocol Algorithm}{7}}
-\@writefile{toc}{\contentsline {section}{\numberline {4}Perimeter-based Coverage Problem Formulation}{8}}
-\newlabel{cp}{{4}{8}}
+\newlabel{figure3}{{3}{6}}
+\newlabel{figure4}{{4}{7}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}The Main Idea}{7}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}PeCO Protocol Algorithm}{8}}
+\newlabel{alg:PeCO}{{{1}}{8}}
\citation{0031-9155-44-1-012}
+\@writefile{toc}{\contentsline {section}{\numberline {4}Perimeter-based Coverage Problem Formulation}{9}}
+\newlabel{cp}{{4}{9}}
\citation{Idrees2}
-\@writefile{toc}{\contentsline {section}{\numberline {5}Performance Evaluation and Analysis}{9}}
-\newlabel{sec:Simulation Results and Analysis}{{5}{9}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Simulation Settings}{9}}
-\newlabel{table3}{{2}{9}}
+\@writefile{toc}{\contentsline {section}{\numberline {5}Performance Evaluation and Analysis}{10}}
+\newlabel{sec:Simulation Results and Analysis}{{5}{10}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Simulation Settings}{10}}
+\newlabel{table3}{{2}{10}}
\citation{varga}
\citation{AMPL}
\citation{glpk}
\citation{Idrees2}
\citation{idrees2014coverage}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Simulation Results}{11}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1}\bf Coverage Ratio}{11}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.2}\bf Active Sensors Ratio}{11}}
-\newlabel{fig333}{{5}{12}}
-\newlabel{fig444}{{6}{12}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.3}\bf Energy Consumption}{12}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.4}\bf Network Lifetime}{12}}
-\newlabel{fig3EC}{{7}{13}}
-\@writefile{toc}{\contentsline {section}{\numberline {6}Conclusion and Future Works}{13}}
-\newlabel{sec:Conclusion and Future Works}{{6}{13}}
-\newlabel{fig3LT}{{8}{14}}
-\newlabel{figLTALL}{{9}{14}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.1}\bf Coverage Ratio}{12}}
+\newlabel{figure5}{{5}{12}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.2}\bf Active Sensors Ratio}{12}}
+\newlabel{figure6}{{6}{13}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.3}\bf Energy Consumption}{13}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {5.2.4}\bf Network Lifetime}{13}}
\bibstyle{gENO}
\bibdata{biblio}
\bibcite{akyildiz2002wireless}{{1}{2002}{{Akyildiz et~al.}}{{Akyildiz, Su, Sankarasubramaniam, and Cayirci}}}
+\newlabel{figure7}{{7}{14}}
+\@writefile{toc}{\contentsline {section}{\numberline {6}Conclusion and Future Works}{14}}
+\newlabel{sec:Conclusion and Future Works}{{6}{14}}
\bibcite{anastasi2009energy}{{2}{2009}{{Anastasi et~al.}}{{Anastasi, Conti, Di~Francesco, and Passarella}}}
\bibcite{berman04}{{3}{2004}{{Berman and Calinescu}}{{}}}
+\newlabel{figure8}{{8}{15}}
+\newlabel{figure9}{{9}{15}}
\bibcite{cardei2005improving}{{4}{2005}{{Cardei and Du}}{{}}}
\bibcite{cardei2005energy}{{5}{2005}{{Cardei et~al.}}{{Cardei, Thai, Li, and Wu}}}
\bibcite{castano2013column}{{6}{2013}{{Casta{\~n}o et~al.}}{{Casta{\~n}o, Rossi, Sevaux, and Velasco}}}
\bibcite{pujari2011high}{{24}{2011}{{Pujari}}{{}}}
\bibcite{qu2013distributed}{{25}{2013}{{Qu and Georgakopoulos}}{{}}}
\bibcite{rault2014energy}{{26}{2014}{{Rault, Bouabdallah, and Challal}}{{}}}
-\bibcite{rossi2012exact}{{27}{2012}{{Rossi, Singh, and Sevaux}}{{}}}
+\bibcite{doi:10.1080/0305215X.2012.687732}{{27}{2013}{{Singh, Rossi, and Sevaux}}{{}}}
\bibcite{Tian02}{{28}{2002}{{Tian and Georganas}}{{}}}
\bibcite{varga}{{29}{2003}{{Varga}}{{}}}
\bibcite{ChinhVu}{{30}{2006}{{Vu et~al.}}{{Vu, Gao, Deshmukh, and Li}}}
efficiency in wireless sensor networks: A top-down survey.'' \emph{Computer
Networks} 67: 104--122.
-\bibitem[Rossi, Singh, and Sevaux(2012)]{rossi2012exact}
-Rossi, Andr{\'e}, Alok Singh, and Marc Sevaux. 2012. ``An exact approach for
- maximizing the lifetime of sensor networks with adjustable sensing ranges.''
- \emph{Computers \& Operations Research} 39 (12): 3166--3176.
+\bibitem[Singh, Rossi, and Sevaux(2013)]{doi:10.1080/0305215X.2012.687732}
+Singh, Alok, André Rossi, and Marc Sevaux. 2013. ``Matheuristic approaches for
+ Q-coverage problem versions in wireless sensor networks.'' \emph{Engineering
+ Optimization} 45 (5): 609--626.
+ \eprint{http://dx.doi.org/10.1080/0305215X.2012.687732}.
+ \urlprefix\url{http://dx.doi.org/10.1080/0305215X.2012.687732}.
\bibitem[Tian and Georganas(2002)]{Tian02}
Tian, Di, and Nicolas~D. Georganas. 2002. ``A coverage-preserving node
Reallocated wiz_functions (elt_size=4) to 6000 items from 3000.
You've used 42 entries,
3679 wiz_defined-function locations,
- 971 strings with 13580 characters,
-and the built_in function-call counts, 29688 in all, are:
-= -- 2410
+ 975 strings with 13710 characters,
+and the built_in function-call counts, 29678 in all, are:
+= -- 2409
> -- 1554
< -- 4
-+ -- 763
++ -- 761
- -- 421
-* -- 2082
+* -- 2086
:= -- 4323
-add.period$ -- 96
+add.period$ -- 97
call.type$ -- 42
change.case$ -- 281
chr.to.int$ -- 49
cite$ -- 42
duplicate$ -- 2258
-empty$ -- 2213
+empty$ -- 2212
format.name$ -- 528
-if$ -- 6084
+if$ -- 6085
int.to.chr$ -- 4
int.to.str$ -- 1
missing$ -- 407
newline$ -- 137
num.names$ -- 168
-pop$ -- 1204
+pop$ -- 1201
preamble$ -- 1
purify$ -- 279
quote$ -- 0
skip$ -- 1044
stack$ -- 0
-substring$ -- 1169
-swap$ -- 1044
+substring$ -- 1157
+swap$ -- 1046
text.length$ -- 2
text.prefix$ -- 0
top$ -- 0
type$ -- 375
warning$ -- 0
-while$ -- 225
+while$ -- 224
width$ -- 0
-write$ -- 478
+write$ -- 480
-This is pdfTeX, Version 3.1415926-2.4-1.40.13 (TeX Live 2012/Debian) (format=pdflatex 2013.9.3) 20 FEB 2015 10:11
+This is pdfTeX, Version 3.1415926-2.4-1.40.13 (TeX Live 2012/Debian) (format=pdflatex 2013.9.3) 20 FEB 2015 14:20
entering extended mode
restricted \write18 enabled.
%&-line parsing enabled.
(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 20.
LaTeX Font Info: Font shape `OMS/cmr/m/n' in size <6> not available
(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 20.
-LaTeX Font Info: Calculating math sizes for size <11> on input line 44.
+LaTeX Font Info: Calculating math sizes for size <11> on input line 42.
LaTeX Font Warning: Font shape `OT1/cmr/m/n' in size <5.5> not available
-(Font) size <5> substituted on input line 44.
+(Font) size <5> substituted on input line 42.
LaTeX Font Info: Font shape `OML/cmr/m/it' in size <11> not available
-(Font) Font shape `OML/cmm/m/it' tried instead on input line 44.
+(Font) Font shape `OML/cmm/m/it' tried instead on input line 42.
LaTeX Font Info: Font shape `OML/cmr/m/it' in size <7.69997> not available
-(Font) Font shape `OML/cmm/m/it' tried instead on input line 44.
+(Font) Font shape `OML/cmm/m/it' tried instead on input line 42.
LaTeX Font Info: Font shape `OML/cmr/m/it' in size <5.5> not available
-(Font) Font shape `OML/cmm/m/it' tried instead on input line 44.
+(Font) Font shape `OML/cmm/m/it' tried instead on input line 42.
LaTeX Font Warning: Font shape `OML/cmm/m/it' in size <5.5> not available
-(Font) size <5> substituted on input line 44.
+(Font) size <5> substituted on input line 42.
LaTeX Font Info: Font shape `OMS/cmr/m/n' in size <11> not available
-(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 44.
+(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 42.
LaTeX Font Info: Font shape `OMS/cmr/m/n' in size <7.69997> not available
-(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 44.
+(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 42.
LaTeX Font Info: Font shape `OMS/cmr/m/n' in size <5.5> not available
-(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 44.
+(Font) Font shape `OMS/cmsy/m/n' tried instead on input line 42.
LaTeX Font Warning: Font shape `OMS/cmsy/m/n' in size <5.5> not available
-(Font) size <5> substituted on input line 44.
+(Font) size <5> substituted on input line 42.
-Overfull \vbox (2.87917pt too high) has occurred while \output is active []
+Underfull \hbox (badness 10000) in paragraph at lines 60--74
+
+ []
Underfull \vbox (badness 10000) has occurred while \output is active []
[3]
LaTeX Font Warning: Font shape `OT1/cmr/bx/sc' undefined
-(Font) using `OT1/cmr/bx/n' instead on input line 239.
+(Font) using `OT1/cmr/bx/n' instead on input line 199.
Package epstopdf Info: Source file: <figure1a.eps>
(epstopdf) date: 2015-02-20 10:11:12
(epstopdf) size: 358485 bytes
(epstopdf) Output file: <figure1a-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:43
+(epstopdf) size: 78307 bytes
(epstopdf) Command: <repstopdf --outfile=figure1a-eps-converted-to.
pdf figure1a.eps>
-(epstopdf) \includegraphics on input line 292.
-runsystem(repstopdf --outfile=figure1a-eps-converted-to.pdf figure1a.eps)...exe
-cuted safely (allowed).
-
-Package epstopdf Info: Result file: <figure1a-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:43
-(epstopdf) size: 78307 bytes.
+(epstopdf) \includegraphics on input line 249.
+Package epstopdf Info: Output file is already uptodate.
<figure1a-eps-converted-to.pdf, id=24, 418.56375pt x 396.48125pt>
File: figure1a-eps-converted-to.pdf Graphic file (type pdf)
<use figure1a-eps-converted-to.pdf>
-Package pdftex.def Info: figure1a-eps-converted-to.pdf used on input line 292.
+Package pdftex.def Info: figure1a-eps-converted-to.pdf used on input line 249.
(pdftex.def) Requested size: 213.39566pt x 202.1362pt.
Package epstopdf Info: Source file: <figure1b.eps>
(epstopdf) date: 2015-02-20 10:11:12
(epstopdf) size: 241675 bytes
(epstopdf) Output file: <figure1b-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:44
+(epstopdf) size: 57181 bytes
(epstopdf) Command: <repstopdf --outfile=figure1b-eps-converted-to.
pdf figure1b.eps>
-(epstopdf) \includegraphics on input line 293.
-runsystem(repstopdf --outfile=figure1b-eps-converted-to.pdf figure1b.eps)...exe
-cuted safely (allowed).
-
-Package epstopdf Info: Result file: <figure1b-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:44
-(epstopdf) size: 57181 bytes.
+(epstopdf) \includegraphics on input line 250.
+Package epstopdf Info: Output file is already uptodate.
<figure1b-eps-converted-to.pdf, id=25, 385.44pt x 269.005pt>
File: figure1b-eps-converted-to.pdf Graphic file (type pdf)
<use figure1b-eps-converted-to.pdf>
-Package pdftex.def Info: figure1b-eps-converted-to.pdf used on input line 293.
+Package pdftex.def Info: figure1b-eps-converted-to.pdf used on input line 250.
(pdftex.def) Requested size: 213.39566pt x 148.93011pt.
-Underfull \vbox (badness 1127) has occurred while \output is active []
-
-
Underfull \vbox (badness 10000) has occurred while \output is active []
(epstopdf) date: 2015-02-20 10:11:12
(epstopdf) size: 508784 bytes
(epstopdf) Output file: <figure2-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:44
+(epstopdf) size: 138861 bytes
(epstopdf) Command: <repstopdf --outfile=figure2-eps-converted-to.p
df figure2.eps>
-(epstopdf) \includegraphics on input line 338.
-runsystem(repstopdf --outfile=figure2-eps-converted-to.pdf figure2.eps)...execu
-ted safely (allowed).
-
-Package epstopdf Info: Result file: <figure2-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:44
-(epstopdf) size: 138861 bytes.
+(epstopdf) \includegraphics on input line 293.
+Package epstopdf Info: Output file is already uptodate.
<figure2-eps-converted-to.pdf, id=32, 518.93875pt x 260.975pt>
File: figure2-eps-converted-to.pdf Graphic file (type pdf)
<use figure2-eps-converted-to.pdf>
-Package pdftex.def Info: figure2-eps-converted-to.pdf used on input line 338.
+Package pdftex.def Info: figure2-eps-converted-to.pdf used on input line 293.
(pdftex.def) Requested size: 362.77263pt x 182.4463pt.
-Package epstopdf Info: Source file: <figure3.eps>
-(epstopdf) date: 2015-02-20 10:11:12
-(epstopdf) size: 196938 bytes
-(epstopdf) Output file: <figure3-eps-converted-to.pdf>
-(epstopdf) Command: <repstopdf --outfile=figure3-eps-converted-to.p
-df figure3.eps>
-(epstopdf) \includegraphics on input line 388.
-runsystem(repstopdf --outfile=figure3-eps-converted-to.pdf figure3.eps)...execu
-ted safely (allowed).
-
-Package epstopdf Info: Result file: <figure3-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:45
-(epstopdf) size: 48639 bytes.
-
-<figure3-eps-converted-to.pdf, id=33, 332.24126pt x 276.03125pt>
-File: figure3-eps-converted-to.pdf Graphic file (type pdf)
-
-<use figure3-eps-converted-to.pdf>
-Package pdftex.def Info: figure3-eps-converted-to.pdf used on input line 388.
-(pdftex.def) Requested size: 177.82971pt x 147.74475pt.
-
-
-LaTeX Warning: `!h' float specifier changed to `!ht'.
-
-
-Underfull \vbox (badness 1412) has occurred while \output is active []
-
Underfull \vbox (badness 10000) has occurred while \output is active []
Overfull \vbox (701.0pt too high) has occurred while \output is active []
[5 <./figure1a-eps-converted-to.pdf> <./figure1b-eps-converted-to.pdf>]
+Package epstopdf Info: Source file: <figure3.eps>
+(epstopdf) date: 2015-02-20 10:11:12
+(epstopdf) size: 196938 bytes
+(epstopdf) Output file: <figure3-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:45
+(epstopdf) size: 48639 bytes
+(epstopdf) Command: <repstopdf --outfile=figure3-eps-converted-to.p
+df figure3.eps>
+(epstopdf) \includegraphics on input line 343.
+Package epstopdf Info: Output file is already uptodate.
+
+<figure3-eps-converted-to.pdf, id=42, 332.24126pt x 276.03125pt>
+File: figure3-eps-converted-to.pdf Graphic file (type pdf)
+
+<use figure3-eps-converted-to.pdf>
+Package pdftex.def Info: figure3-eps-converted-to.pdf used on input line 343.
+(pdftex.def) Requested size: 177.82971pt x 147.74475pt.
+
+Underfull \vbox (badness 1648) has occurred while \output is active []
+
+
Underfull \vbox (badness 10000) has occurred while \output is active []
(epstopdf) date: 2015-02-20 10:11:12
(epstopdf) size: 428048 bytes
(epstopdf) Output file: <figure4-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:45
+(epstopdf) size: 76496 bytes
(epstopdf) Command: <repstopdf --outfile=figure4-eps-converted-to.p
df figure4.eps>
-(epstopdf) \includegraphics on input line 427.
-runsystem(repstopdf --outfile=figure4-eps-converted-to.pdf figure4.eps)...execu
-ted safely (allowed).
-
-Package epstopdf Info: Result file: <figure4-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:45
-(epstopdf) size: 76496 bytes.
+(epstopdf) \includegraphics on input line 376.
+Package epstopdf Info: Output file is already uptodate.
<figure4-eps-converted-to.pdf, id=52, 493.845pt x 362.35374pt>
File: figure4-eps-converted-to.pdf Graphic file (type pdf)
<use figure4-eps-converted-to.pdf>
-Package pdftex.def Info: figure4-eps-converted-to.pdf used on input line 427.
+Package pdftex.def Info: figure4-eps-converted-to.pdf used on input line 376.
(pdftex.def) Requested size: 227.62204pt x 167.01096pt.
-
-LaTeX Warning: Reference `alg:PeCO' on page 7 undefined on input line 459.
+Underfull \vbox (badness 1953) has occurred while \output is active []
Underfull \vbox (badness 10000) has occurred while \output is active []
Underfull \vbox (badness 10000) has occurred while \output is active []
+Overfull \vbox (36.0pt too high) has occurred while \output is active []
+
+
+Overfull \vbox (36.0pt too high) has occurred while \output is active []
+
+
+Overfull \vbox (650.43pt too high) has occurred while \output is active []
+
+
+Overfull \vbox (29.0pt too high) has occurred while \output is active []
+
+
+Overfull \vbox (701.0pt too high) has occurred while \output is active []
+
+ [8]
+Underfull \vbox (badness 10000) has occurred while \output is active []
+
+
+Underfull \vbox (badness 10000) has occurred while \output is active []
+
+
Underfull \vbox (badness 10000) has occurred while \output is active []
Overfull \vbox (701.0pt too high) has occurred while \output is active []
- [8]
+ [9]
Underfull \vbox (badness 10000) has occurred while \output is active []
Overfull \vbox (701.0pt too high) has occurred while \output is active []
- [9]
+ [10]
-LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 716.
+LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 632.
-LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 731.
+LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 647.
-LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 744.
+LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 660.
-LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 751.
+LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 667.
-LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 753.
+LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 669.
-LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 755.
+LaTeX Font Warning: Command \scriptsize invalid in math mode on input line 671.
Overfull \vbox (701.0pt too high) has occurred while \output is active []
- [10]
+ [11]
Package epstopdf Info: Source file: <figure5.eps>
(epstopdf) date: 2015-02-06 11:42:02
(epstopdf) size: 29526 bytes
(epstopdf) Output file: <figure5-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:46
+(epstopdf) size: 12638 bytes
(epstopdf) Command: <repstopdf --outfile=figure5-eps-converted-to.p
df figure5.eps>
-(epstopdf) \includegraphics on input line 812.
-runsystem(repstopdf --outfile=figure5-eps-converted-to.pdf figure5.eps)...execu
-ted safely (allowed).
-
-Package epstopdf Info: Result file: <figure5-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:46
-(epstopdf) size: 12638 bytes.
+(epstopdf) \includegraphics on input line 728.
+Package epstopdf Info: Output file is already uptodate.
-<figure5-eps-converted-to.pdf, id=74, 484.81125pt x 350.30875pt>
+<figure5-eps-converted-to.pdf, id=77, 484.81125pt x 350.30875pt>
File: figure5-eps-converted-to.pdf Graphic file (type pdf)
<use figure5-eps-converted-to.pdf>
-Package pdftex.def Info: figure5-eps-converted-to.pdf used on input line 812.
+Package pdftex.def Info: figure5-eps-converted-to.pdf used on input line 728.
(pdftex.def) Requested size: 242.40503pt x 175.15395pt.
-
-
-LaTeX Warning: `!h' float specifier changed to `!ht'.
-
Package epstopdf Info: Source file: <figure6.eps>
(epstopdf) date: 2015-02-06 11:42:02
(epstopdf) size: 29515 bytes
(epstopdf) Output file: <figure6-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:46
+(epstopdf) size: 12695 bytes
(epstopdf) Command: <repstopdf --outfile=figure6-eps-converted-to.p
df figure6.eps>
-(epstopdf) \includegraphics on input line 836.
-runsystem(repstopdf --outfile=figure6-eps-converted-to.pdf figure6.eps)...execu
-ted safely (allowed).
+(epstopdf) \includegraphics on input line 750.
+Package epstopdf Info: Output file is already uptodate.
-Package epstopdf Info: Result file: <figure6-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:46
-(epstopdf) size: 12695 bytes.
-<figure6-eps-converted-to.pdf, id=75, 484.81125pt x 350.30875pt>
+<figure6-eps-converted-to.pdf, id=78, 484.81125pt x 350.30875pt>
File: figure6-eps-converted-to.pdf Graphic file (type pdf)
<use figure6-eps-converted-to.pdf>
-Package pdftex.def Info: figure6-eps-converted-to.pdf used on input line 836.
+Package pdftex.def Info: figure6-eps-converted-to.pdf used on input line 750.
(pdftex.def) Requested size: 242.40503pt x 175.15395pt.
-
-LaTeX Warning: `!h' float specifier changed to `!ht'.
-
-
-Underfull \vbox (badness 10000) has occurred while \output is active []
-
-
Underfull \vbox (badness 10000) has occurred while \output is active []
Overfull \vbox (701.0pt too high) has occurred while \output is active []
- [11]
+ [12 <./figure5-eps-converted-to.pdf>]
Package epstopdf Info: Source file: <figure7a.eps>
(epstopdf) date: 2015-02-06 11:42:02
(epstopdf) size: 24136 bytes
(epstopdf) Output file: <figure7a-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:46
+(epstopdf) size: 8179 bytes
(epstopdf) Command: <repstopdf --outfile=figure7a-eps-converted-to.
pdf figure7a.eps>
-(epstopdf) \includegraphics on input line 859.
-runsystem(repstopdf --outfile=figure7a-eps-converted-to.pdf figure7a.eps)...exe
-cuted safely (allowed).
+(epstopdf) \includegraphics on input line 773.
+Package epstopdf Info: Output file is already uptodate.
-Package epstopdf Info: Result file: <figure7a-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:46
-(epstopdf) size: 8179 bytes.
-
-<figure7a-eps-converted-to.pdf, id=79, 493.845pt x 350.30875pt>
+<figure7a-eps-converted-to.pdf, id=87, 493.845pt x 350.30875pt>
File: figure7a-eps-converted-to.pdf Graphic file (type pdf)
<use figure7a-eps-converted-to.pdf>
-Package pdftex.def Info: figure7a-eps-converted-to.pdf used on input line 859.
+Package pdftex.def Info: figure7a-eps-converted-to.pdf used on input line 773.
(pdftex.def) Requested size: 234.5788pt x 166.39838pt.
Package epstopdf Info: Source file: <figure7b.eps>
(epstopdf) date: 2015-02-06 11:42:02
(epstopdf) size: 24138 bytes
(epstopdf) Output file: <figure7b-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:47
+(epstopdf) size: 8180 bytes
(epstopdf) Command: <repstopdf --outfile=figure7b-eps-converted-to.
pdf figure7b.eps>
-(epstopdf) \includegraphics on input line 860.
-runsystem(repstopdf --outfile=figure7b-eps-converted-to.pdf figure7b.eps)...exe
-cuted safely (allowed).
-
-Package epstopdf Info: Result file: <figure7b-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:47
-(epstopdf) size: 8180 bytes.
+(epstopdf) \includegraphics on input line 774.
+Package epstopdf Info: Output file is already uptodate.
-<figure7b-eps-converted-to.pdf, id=80, 493.845pt x 350.30875pt>
+<figure7b-eps-converted-to.pdf, id=88, 493.845pt x 350.30875pt>
File: figure7b-eps-converted-to.pdf Graphic file (type pdf)
<use figure7b-eps-converted-to.pdf>
-Package pdftex.def Info: figure7b-eps-converted-to.pdf used on input line 860.
+Package pdftex.def Info: figure7b-eps-converted-to.pdf used on input line 774.
(pdftex.def) Requested size: 234.5788pt x 166.39838pt.
LaTeX Warning: `!h' float specifier changed to `!ht'.
-
-Underfull \vbox (badness 10000) has occurred while \output is active []
-
-
-Underfull \vbox (badness 10000) has occurred while \output is active []
-
-
-Underfull \vbox (badness 10000) has occurred while \output is active []
-
-
-Overfull \vbox (36.0pt too high) has occurred while \output is active []
-
-
-Overfull \vbox (36.0pt too high) has occurred while \output is active []
-
-
-Overfull \vbox (650.43pt too high) has occurred while \output is active []
-
-
-Overfull \vbox (29.0pt too high) has occurred while \output is active []
-
-
-Overfull \vbox (701.0pt too high) has occurred while \output is active []
-
- [12 <./figure5-eps-converted-to.pdf> <./figure6-eps-converted-to.pdf>]
Package epstopdf Info: Source file: <figure8a.eps>
(epstopdf) date: 2015-02-06 11:42:03
(epstopdf) size: 24103 bytes
(epstopdf) Output file: <figure8a-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:47
+(epstopdf) size: 8351 bytes
(epstopdf) Command: <repstopdf --outfile=figure8a-eps-converted-to.
pdf figure8a.eps>
-(epstopdf) \includegraphics on input line 891.
-runsystem(repstopdf --outfile=figure8a-eps-converted-to.pdf figure8a.eps)...exe
-cuted safely (allowed).
-
-Package epstopdf Info: Result file: <figure8a-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:47
-(epstopdf) size: 8351 bytes.
-
-<figure8a-eps-converted-to.pdf, id=94, 493.845pt x 350.30875pt>
+(epstopdf) \includegraphics on input line 800.
+Package epstopdf Info: Output file is already uptodate.
+<figure8a-eps-converted-to.pdf, id=89, 493.845pt x 350.30875pt>
File: figure8a-eps-converted-to.pdf Graphic file (type pdf)
<use figure8a-eps-converted-to.pdf>
-Package pdftex.def Info: figure8a-eps-converted-to.pdf used on input line 891.
+Package pdftex.def Info: figure8a-eps-converted-to.pdf used on input line 800.
(pdftex.def) Requested size: 234.5788pt x 166.39838pt.
Package epstopdf Info: Source file: <figure8b.eps>
(epstopdf) date: 2015-02-06 11:42:03
(epstopdf) size: 24855 bytes
(epstopdf) Output file: <figure8b-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:47
+(epstopdf) size: 8466 bytes
(epstopdf) Command: <repstopdf --outfile=figure8b-eps-converted-to.
pdf figure8b.eps>
-(epstopdf) \includegraphics on input line 892.
-runsystem(repstopdf --outfile=figure8b-eps-converted-to.pdf figure8b.eps)...exe
-cuted safely (allowed).
-
-Package epstopdf Info: Result file: <figure8b-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:47
-(epstopdf) size: 8466 bytes.
+(epstopdf) \includegraphics on input line 801.
+Package epstopdf Info: Output file is already uptodate.
-<figure8b-eps-converted-to.pdf, id=95, 493.845pt x 350.30875pt>
+<figure8b-eps-converted-to.pdf, id=90, 493.845pt x 350.30875pt>
File: figure8b-eps-converted-to.pdf Graphic file (type pdf)
<use figure8b-eps-converted-to.pdf>
-Package pdftex.def Info: figure8b-eps-converted-to.pdf used on input line 892.
+Package pdftex.def Info: figure8b-eps-converted-to.pdf used on input line 801.
(pdftex.def) Requested size: 234.5788pt x 166.39838pt.
(epstopdf) date: 2015-02-06 11:42:03
(epstopdf) size: 27000 bytes
(epstopdf) Output file: <figure9-eps-converted-to.pdf>
+(epstopdf) date: 2015-02-20 10:12:48
+(epstopdf) size: 7927 bytes
(epstopdf) Command: <repstopdf --outfile=figure9-eps-converted-to.p
df figure9.eps>
-(epstopdf) \includegraphics on input line 914.
-runsystem(repstopdf --outfile=figure9-eps-converted-to.pdf figure9.eps)...execu
-ted safely (allowed).
-
-Package epstopdf Info: Result file: <figure9-eps-converted-to.pdf>
-(epstopdf) date: 2015-02-20 10:12:48
-(epstopdf) size: 7927 bytes.
-<figure9-eps-converted-to.pdf, id=96, 484.81125pt x 350.30875pt>
+(epstopdf) \includegraphics on input line 823.
+Package epstopdf Info: Output file is already uptodate.
+<figure9-eps-converted-to.pdf, id=91, 484.81125pt x 350.30875pt>
File: figure9-eps-converted-to.pdf Graphic file (type pdf)
<use figure9-eps-converted-to.pdf>
-Package pdftex.def Info: figure9-eps-converted-to.pdf used on input line 914.
+Package pdftex.def Info: figure9-eps-converted-to.pdf used on input line 823.
(pdftex.def) Requested size: 242.40503pt x 175.15395pt.
Overfull \vbox (701.0pt too high) has occurred while \output is active []
- [13 <./figure7a-eps-converted-to.pdf> <./figure7b-eps-converted-to.pdf>]
+ [13 <./figure6-eps-converted-to.pdf>] (./articleeo.bbl
+Underfull \vbox (badness 10000) has occurred while \output is active []
+
+
Underfull \vbox (badness 10000) has occurred while \output is active []
Overfull \vbox (701.0pt too high) has occurred while \output is active []
- [14 <./figure8a-eps-converted-to.pdf> <./figure8b-eps-converted-to.pdf> <./fig
-ure9-eps-converted-to.pdf>] (./articleeo.bbl
+ [14 <./figure7a-eps-converted-to.pdf> <./figure7b-eps-converted-to.pdf>]
Underfull \vbox (badness 10000) has occurred while \output is active []
Overfull \vbox (701.0pt too high) has occurred while \output is active []
- [15]
+ [15 <./figure8a-eps-converted-to.pdf> <./figure8b-eps-converted-to.pdf> <./fig
+ure9-eps-converted-to.pdf>]
Underfull \hbox (badness 4024) in paragraph at lines 121--123
[]\OT1/cmr/m/n/10 Makhorin, An-drew. 2012. ``The GLPK (GNU Lin-ear Pro-gram-min
g Kit).'' \OT1/cmr/m/it/10 Avail-able:
[]
-Underfull \hbox (badness 10000) in paragraph at lines 168--170
-[]\OT1/cmr/m/n/10 Varga, A. 2003. ``OM-NeT++ Dis-crete Event Sim-u-la-tion Sys-
-tem.'' \OT1/cmr/m/it/10 Avail-able:
- []
-
-
Underfull \vbox (badness 10000) has occurred while \output is active []
Overfull \vbox (701.0pt too high) has occurred while \output is active []
- [16])
+ [16]
+Missing character: There is no à in font cmr10!
+Missing character: There is no © in font cmr10!
+
+Underfull \hbox (badness 10000) in paragraph at lines 157--162
+[]\OT1/cmr/m/n/10 Singh, Alok, Andr Rossi, and Marc Se-vaux. 2013. ``Matheuris-
+tic ap-proaches for
+ []
+
+
+Underfull \hbox (badness 10000) in paragraph at lines 157--162
+\OT1/cmr/m/n/10 Q-coverage prob-lem ver-sions in wire-less sen-sor net-works.''
+ \OT1/cmr/m/it/10 En-gi-neer-ing Op-
+ []
+
+
+Underfull \hbox (badness 10000) in paragraph at lines 157--162
+\OT1/cmr/m/it/10 ti-miza-tion \OT1/cmr/m/n/10 45 (5): 609--626. http://dx.doi.o
+rg/10.1080/0305215X.2012.687732.
+ []
+
+
+Underfull \hbox (badness 10000) in paragraph at lines 170--172
+[]\OT1/cmr/m/n/10 Varga, A. 2003. ``OM-NeT++ Dis-crete Event Sim-u-la-tion Sys-
+tem.'' \OT1/cmr/m/it/10 Avail-able:
+ []
+
+)
Underfull \vbox (badness 10000) has occurred while \output is active []
LaTeX Font Warning: Some font shapes were not available, defaults substituted.
-
-LaTeX Warning: There were undefined references.
-
-
-LaTeX Warning: Label(s) may have changed. Rerun to get cross-references right.
-
)
Here is how much of TeX's memory you used:
3701 strings out of 495059
- 47796 string characters out of 3182031
- 117201 words of memory out of 3000000
+ 47855 string characters out of 3182031
+ 116213 words of memory out of 3000000
6813 multiletter control sequences out of 15000+200000
14560 words of font info for 56 fonts, out of 3000000 for 9000
14 hyphenation exceptions out of 8191
- 41i,14n,27p,1448b,357s stack positions out of 5000i,500n,10000p,200000b,50000s
+ 41i,14n,27p,419b,327s stack positions out of 5000i,500n,10000p,200000b,50000s
</usr/share/texlive/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx10.pfb></us
r/share/texlive/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx9.pfb></usr/share
/texlive/texmf-dist/fonts/type1/public/amsfonts/cm/cmbxti10.pfb></usr/share/tex
s/type1/public/amsfonts/cm/cmsy8.pfb></usr/share/texlive/texmf-dist/fonts/type1
/public/amsfonts/cm/cmti10.pfb></usr/share/texlive/texmf-dist/fonts/type1/publi
c/amsfonts/cm/cmti8.pfb>
-Output written on articleeo.pdf (17 pages, 732108 bytes).
+Output written on articleeo.pdf (17 pages, 734726 bytes).
PDF statistics:
202 PDF objects out of 1000 (max. 8388607)
137 compressed objects within 2 object streams
use of its limited energy provision, so that it can fulfill its monitoring task\r
as long as possible. Among known available approaches that can be used to\r
improve power management, lifetime coverage optimization provides activity\r
-scheduling which ensures sensing coverage while minimizing the energy cost. In\r
-this paper, we propose such an approach called Perimeter-based Coverage Optimization\r
+scheduling which ensures sensing coverage while minimizing the energy cost. We propose such an approach called Perimeter-based Coverage Optimization\r
protocol (PeCO). It is a hybrid of centralized and distributed methods: the\r
region of interest is first subdivided into subregions and our protocol is then\r
distributed among sensor nodes in each subregion.\r
The novelty of our approach lies essentially in the formulation of a new\r
mathematical optimization model based on the perimeter coverage level to schedule\r
-sensors' activities. Extensive simulation experiments have been performed using\r
-OMNeT++, the discrete event simulator, to demonstrate that PeCO can\r
+sensors' activities. Extensive simulation experiments demonstrate that PeCO can\r
offer longer lifetime coverage for WSNs in comparison with some other protocols.\r
\r
-\begin{keywords}Wireless Sensor Networks, Area Coverage, Network Lifetime, Optimization, Scheduling.\r
+\begin{keywords}Wireless Sensor Networks, Area Coverage, Energy efficiency, Optimization, Scheduling.\r
\end{keywords}\r
\r
\end{abstract}\r
\noindent The continuous progress in Micro Electro-Mechanical Systems (MEMS) and\r
wireless communication hardware has given rise to the opportunity to use large\r
networks of tiny sensors, called Wireless Sensor Networks\r
-(WSN)~\cite{akyildiz2002wireless,puccinelli2005wireless}, to fulfill monitoring\r
+(WSN)~\citep{akyildiz2002wireless,puccinelli2005wireless}, to fulfill monitoring\r
tasks. A WSN consists of small low-powered sensors working together by\r
communicating with one another through multi-hop radio communications. Each node\r
can send the data it collects in its environment, thanks to its sensor, to the\r
user by means of sink nodes. The features of a WSN made it suitable for a wide\r
range of application in areas such as business, environment, health, industry,\r
-military, and so on~\cite{yick2008wireless}. Typically, a sensor node contains\r
-three main components~\cite{anastasi2009energy}: a sensing unit able to measure\r
+military, and so on~\citep{yick2008wireless}. Typically, a sensor node contains\r
+three main components~\citep{anastasi2009energy}: a sensing unit able to measure\r
physical, chemical, or biological phenomena observed in the environment; a\r
processing unit which will process and store the collected measurements; a radio\r
communication unit for data transmission and receiving.\r
be answered is: how to extend the lifetime coverage of a WSN as long as possible\r
while ensuring a high level of coverage? These past few years many\r
energy-efficient mechanisms have been suggested to retain energy and extend the\r
-lifetime of the WSNs~\cite{rault2014energy}.\r
-\r
+lifetime of the WSNs~\citep{rault2014energy}.\\\\\r
This paper makes the following contributions.\r
\begin{enumerate}\r
\item We have devised a framework to schedule nodes to be activated alternatively such\r
\item We have conducted extensive simulation experiments, using the discrete event\r
simulator OMNeT++, to demonstrate the efficiency of our protocol. We have compared\r
our PeCO protocol to two approaches found in the literature:\r
- DESK~\cite{ChinhVu} and GAF~\cite{xu2001geography}, and also to our previous\r
- work published in~\cite{Idrees2} which is based on another optimization model\r
+ DESK~\citep{ChinhVu} and GAF~\citep{xu2001geography}, and also to our previous\r
+ work published in~\citep{Idrees2} which is based on another optimization model\r
for sensor scheduling.\r
\end{enumerate}\r
\r
remarks are drawn and some suggestions are given for future works in\r
Section~\ref{sec:Conclusion and Future Works}.\r
\r
-% that show that our protocol outperforms others protocols.\r
\section{Related Literature}\r
\label{sec:Literature Review}\r
\r
the literature.\r
\r
The most discussed coverage problems in literature can be classified in three\r
-categories~\cite{li2013survey} according to their respective monitoring\r
-objective. Hence, area coverage \cite{Misra} means that every point inside a\r
-fixed area must be monitored, while target coverage~\cite{yang2014novel} refers\r
+categories~\citep{li2013survey} according to their respective monitoring\r
+objective. Hence, area coverage \citep{Misra} means that every point inside a\r
+fixed area must be monitored, while target coverage~\citep{yang2014novel} refers\r
to the objective of coverage for a finite number of discrete points called\r
-targets, and barrier coverage~\cite{HeShibo}\cite{kim2013maximum} focuses on\r
+targets, and barrier coverage~\citep{HeShibo,kim2013maximum} focuses on\r
preventing intruders from entering into the region of interest. In\r
-\cite{Deng2012} authors transform the area coverage problem into the target\r
+\citep{Deng2012} authors transform the area coverage problem into the target\r
coverage one taking into account the intersection points among disks of sensors\r
nodes or between disk of sensor nodes and boundaries. In\r
-\cite{Huang:2003:CPW:941350.941367} authors prove that if the perimeters of\r
+\citep{Huang:2003:CPW:941350.941367} authors prove that if the perimeters of\r
sensors are sufficiently covered it will be the case for the whole area. They\r
provide an algorithm in $O(nd~log~d)$ time to compute the perimeter-coverage of\r
each sensor, where $d$ denotes the maximum number of sensors that are\r
\r
The major approach to extend network lifetime while preserving coverage is to\r
divide/organize the sensors into a suitable number of set covers (disjoint or\r
-non-disjoint)\cite{wang2011coverage}, where each set completely covers a region of interest, and to\r
+non-disjoint)\citep{wang2011coverage}, where each set completely covers a region of interest, and to\r
activate these set covers successively. The network activity can be planned in\r
advance and scheduled for the entire network lifetime or organized in periods,\r
and the set of active sensor nodes is decided at the beginning of each period\r
-\cite{ling2009energy}. Active node selection is determined based on the problem\r
+\citep{ling2009energy}. Active node selection is determined based on the problem\r
requirements (e.g. area monitoring, connectivity, or power efficiency). For\r
-instance, Jaggi {\em et al.}~\cite{jaggi2006} address the problem of maximizing\r
+instance, \citet{jaggi2006} address the problem of maximizing\r
the lifetime by dividing sensors into the maximum number of disjoint subsets\r
such that each subset can ensure both coverage and connectivity. A greedy\r
algorithm is applied once to solve this problem and the computed sets are\r
-activated in succession to achieve the desired network lifetime. Vu\r
-\cite{chin2007}, \cite{yan2008design}, Padmatvathy {\em et al.}~\cite{pc10}, propose algorithms\r
+activated in succession to achieve the desired network lifetime. \r
+\citet{chin2007}, \citet{yan2008design}, \citet{pc10}, propose algorithms\r
working in a periodic fashion where a cover set is computed at the beginning of\r
each period. {\it Motivated by these works, PeCO protocol works in periods,\r
where each period contains a preliminary phase for information exchange and\r
sensing task.}\r
\r
Various centralized and distributed approaches, or even a mixing of these two\r
-concepts, have been proposed to extend the network lifetime \cite{zhou2009variable}. In distributed algorithms~\cite{Tian02,yangnovel,ChinhVu,qu2013distributed} each sensor decides of its\r
+concepts, have been proposed to extend the network lifetime \citep{zhou2009variable}. In distributed algorithms~\citep{Tian02,yangnovel,ChinhVu,qu2013distributed} each sensor decides of its\r
own activity scheduling after an information exchange with its neighbors. The\r
main interest of such an approach is to avoid long range communications and thus\r
to reduce the energy dedicated to the communications. Unfortunately, since each\r
node has only information on its immediate neighbors (usually the one-hop ones)\r
it may make a bad decision leading to a global suboptimal solution. Conversely,\r
centralized\r
-algorithms~\cite{cardei2005improving,zorbas2010solving,pujari2011high} always\r
+algorithms~\citep{cardei2005improving,zorbas2010solving,pujari2011high} always\r
provide nearly or close to optimal solution since the algorithm has a global\r
view of the whole network. The disadvantage of a centralized method is obviously\r
its high cost in communications needed to transmit to a single node, the base\r
heuristics. These heuristics involve the construction of a cover set by\r
including in priority the sensor nodes which cover critical targets, that is to\r
say targets that are covered by the smallest number of sensors\r
-\cite{berman04,zorbas2010solving}. Other approaches are based on mathematical\r
-programming formulations~\cite{cardei2005energy,5714480,pujari2011high,Yang2014}\r
+\citep{berman04,zorbas2010solving}. Other approaches are based on mathematical\r
+programming formulations~\citep{cardei2005energy,5714480,pujari2011high,Yang2014}\r
and dedicated techniques (solving with a branch-and-bound algorithm available in\r
optimization solver). The problem is formulated as an optimization problem\r
(maximization of the lifetime or number of cover sets) under target coverage and\r
energy constraints. Column generation techniques, well-known and widely\r
practiced techniques for solving linear programs with too many variables, have\r
also been\r
-used~\cite{castano2013column,rossi2012exact,deschinkel2012column}. {\it In the PeCO\r
+used~\citep{castano2013column,doi:10.1080/0305215X.2012.687732,deschinkel2012column}. {\it In the PeCO\r
protocol, each leader, in charge of a subregion, solves an integer program\r
which has a twofold objective: minimize the overcoverage and the undercoverage\r
of the perimeter of each sensor.}\r
\r
-%\noindent Recently, the coverage problem has been received a high attention, which concentrates on how the physical space could be well monitored after the deployment. Coverage is one of the Quality of Service (QoS) parameters in WSNs, which is highly concerned with power depletion~\cite{zhu2012survey}. Most of the works about the coverage protocols have been suggested in the literature focused on three types of the coverage in WSNs~\cite{mulligan2010coverage}: the first, area coverage means that each point in the area of interest within the sensing range of at least one sensor node; the second, target coverage in which a fixed set of targets need to be monitored; the third, barrier coverage refers to detect the intruders crossing a boundary of WSN. The work in this paper emphasized on the area coverage, so, some area coverage protocols have been reviewed in this section, and the shortcomings of reviewed approaches are being summarized.\r
-\r
-%The problem of k-coverage in WSNs was addressed~\cite{ammari2012centralized}. It mathematically formulated and the spacial sensor density for full k-coverage determined, where the relation between the communication range and the sensing range constructed by this work to retain the k-coverage and connectivity in WSN. After that, a four configuration protocols have proposed for treating the k-coverage in WSNs. \r
-\r
-%In~\cite{rebai2014branch}, the problem of full grid coverage is formulated using two integer linear programming models: the first, a model that takes into account only the overall coverage constraint; the second, both the connectivity and the full grid coverage constraints have taken into consideration. This work did not take into account the energy constraint.\r
-\r
-%Li et al.~\cite{li2011transforming} presented a framework to convert any complete coverage problem to a partial coverage one with any coverage ratio by means of executing a complete coverage algorithm to find a full coverage sets with virtual radii and transforming the coverage sets to a partial coverage sets by adjusting sensing radii. The properties of the original algorithms can be maintained by this framework and the transformation process has a low execution time.\r
-\r
-%The authors in~\cite{liu2014generalized} explained that in some applications of WSNs such as structural health monitoring (SHM) and volcano monitoring, the traditional coverage model which is a geographic area defined for individual sensors is not always valid. For this reason, they define a generalized coverage model, which is not need to have the coverage area of individual nodes, but only based on a function to determine whether a set of\r
-%sensor nodes is capable of satisfy the requested monitoring task for a certain area. They have proposed two approaches to divide the deployed nodes into suitable cover sets, which can be used to prolong the network lifetime. \r
- \r
-%The work in~\cite{wang2010preserving} addressed the target area coverage problem by proposing a geometric-based activity scheduling scheme, named GAS, to fully cover the target area in WSNs. The authors deals with small area (target area coverage), which can be monitored by a single sensor instead of area coverage, which focuses on a large area that should be monitored by many sensors cooperatively. They explained that GAS is capable to monitor the target area by using a few sensors as possible and it can produce as many cover sets as possible.\r
-\r
-%Cho et al.~\cite{cho2007distributed} proposed a distributed node scheduling protocol, which can retain sensing coverage needed by applications\r
-%and increase network lifetime via putting in sleep mode some redundant nodes. In this work, the effective sensing area (ESA) concept of a sensor node is used, which refers to the sensing area that is not overlapping with another sensor's sensing area. A sensor node and by compute it's ESA can be determine whether it will be active or sleep. The suggested work permits to sensor nodes to be in sleep mode opportunistically whilst fulfill the needed sensing coverage.\r
- \r
-%In~\cite{quang2008algorithm}, the authors defined a maximum sensing coverage region problem (MSCR) in WSNs and then proposed an algorithm to solve it. The\r
-%maximum observed area fully covered by a minimum active sensors. In this work, the major property is to getting rid from the redundant sensors in high-density WSNs and putting them in sleep mode, and choosing a smaller number of active sensors so as to be sure that the full area is k-covered, and all events appeared in that area can be precisely and timely detected. This algorithm minimized the total energy consumption and increased the lifetime.\r
-\r
-%A novel method to divide the sensors in the WSN, called node coverage grouping (NCG) suggested~\cite{lin2010partitioning}. The sensors in the connectivity group are within sensing range of each other, and the data collected by them in the same group are supposed to be similar. They are proved that dividing n sensors via NCG into connectivity groups is a NP-hard problem. So, a heuristic algorithm of NCG with time complexity of $O(n^3)$ is proposed.\r
-%For some applications, such as monitoring an ecosystem with extremely diversified environment, It might be premature assumption that sensors near to each other sense similar data.\r
-\r
-%In~\cite{zaidi2009minimum}, the problem of minimum cost coverage in which full coverage is performed by using the minimum number of sensors for an arbitrary geometric shape region is addressed. a geometric solution to the minimum cost coverage problem under a deterministic deployment is proposed. The probabilistic coverage solution which provides a relationship between the probability of coverage and the number of randomly deployed sensors in an arbitrarily-shaped region is suggested. The authors are clarified that with a random deployment about seven times more nodes are required to supply full coverage.\r
-\r
-%A graph theoretical framework for connectivity-based coverage with configurable coverage granularity was proposed~\cite{dong2012distributed}. A new coverage criterion and scheduling approach is proposed based on cycle partition. This method is capable of build a sparse coverage set in distributed way by means of only connectivity information. This work considers only the communication range of the sensor is smaller two times the sensing range of sensor.\r
-\r
-%Liu et al.~\cite{liu2010energy} formulated maximum disjoint sets problem for retaining coverage and connectivity in WSN. Two algorithms are proposed for solving this problem, heuristic algorithm and network flow algorithm. This work did not take into account the sensor node failure, which is an unpredictable event because the two solutions are full centralized algorithms.\r
\r
-%The work that presented in~\cite{aslanyan2013optimal} solved the coverage and connectivity problem in sensor networks in\r
-%an integrated way. The network lifetime is divided in a fixed number of rounds. A coverage bitmap of sensors of the domain has been generated in each round and based on this bitmap, it has been decided which sensors\r
-%stay active or turn it to sleep. They checked the connection of the graph via laplacian of adjancy graph of active sensors in each round. the generation of coverage bitmap by using Minkowski technique, the network is able to providing the desired ratio of coverage. They have been defined the connected coverage problem as an optimization problem and a centralized genetic algorithm is used to find the solution.\r
-\r
-%Several algorithms to retain the coverage and maximize the network lifetime were proposed in~\cite{cardei2006energy,wang2011coverage}. \r
-\r
-%\uppercase{\textbf{shortcomings}}. In spite of many energy-efficient protocols for maintaining the coverage and improving the network lifetime in WSNs were proposed, non of them ensure the coverage for the sensing field with optimal minimum number of active sensor nodes, and for a long time as possible. For example, in a full centralized algorithms, an optimal solutions can be given by using optimization approaches, but in the same time, a high energy is consumed for the execution time of the algorithm and the communications among the sensors in the sensing field, so, the full centralized approaches are not good candidate to use it especially in large WSNs. Whilst, a full distributed algorithms can not give optimal solutions because this algorithms use only local information of the neighboring sensors, but in the same time, the energy consumption during the communications and executing the algorithm is highly lower. Whatever the case, this would result in a shorter lifetime coverage in WSNs.\r
-\r
-%\uppercase{\textbf{Our Protocol}}. In this paper, a Lifetime Coverage Optimization Protocol, called (PeCO) in WSNs is suggested. The sensing field is divided into smaller subregions by means of divide-and-conquer method, and a PeCO protocol is distributed in each sensor in the subregion. The network lifetime in each subregion is divided into periods, each period includes 4 stages: Information Exchange, Leader election, decision based activity scheduling optimization, and sensing. The leaders are elected in an independent, asynchronous, and distributed way in all the subregions of the WSN. After that, energy-efficient activity scheduling mechanism based new optimization model is performed by each leader in the subregions. This optimization model is based on the perimeter coverage model in order to producing the optimal cover set of active sensors, which are taken the responsibility of sensing during the current period. PeCO protocol merges between two energy efficient mechanisms, which are used the main advantages of the centralized and distributed approaches and avoids the most of their disadvantages.\r
\r
\section{ The P{\scshape e}CO Protocol Description}\r
\label{sec:The PeCO Protocol Description}\r
background idea of our protocol, and third we give the outline of the algorithm\r
executed by each node.\r
\r
-% It is based on two efficient-energy mechanisms: the first, is partitioning the sensing field into smaller subregions, and one leader is elected for each subregion; the second, a sensor activity scheduling based new optimization model so as to produce the optimal cover set of active sensors for the sensing stage during the period. Obviously, these two mechanisms can be contribute in extend the network lifetime coverage efficiently. \r
-%Before proceeding in the presentation of the main ideas of the protocol, we will briefly describe the perimeter coverage model and give some necessary assumptions and definitions.\r
\r
\subsection{Assumptions and Models}\r
\label{CI}\r
sensor nodes have a constant sensing range $R_s$. Thus, all the space points\r
within a disk centered at a sensor with a radius equal to the sensing range are\r
said to be covered by this sensor. We also assume that the communication range\r
-$R_c$ satisfies $R_c \geq 2 \cdot R_s$. In fact, Zhang and Zhou~\cite{Zhang05}\r
+$R_c$ satisfies $R_c \geq 2 \cdot R_s$. In fact, \citet{Zhang05}\r
proved that if the transmission range fulfills the previous hypothesis, the\r
complete coverage of a convex area implies connectivity among active nodes.\r
\r
-The PeCO protocol uses the same perimeter-coverage model as Huang and\r
-Tseng in~\cite{huang2005coverage}. It can be expressed as follows: a sensor is\r
+The PeCO protocol uses the same perimeter-coverage model as \citet{huang2005coverage}. It can be expressed as follows: a sensor is\r
said to be perimeter covered if all the points on its perimeter are covered by\r
at least one sensor other than itself. They proved that a network area is\r
$k$-covered if and only if each sensor in the network is $k$-perimeter-covered (perimeter covered by at least $k$ sensors).\r
-%According to this model, we named the intersections among the sensor nodes in the sensing field as intersection points. Instead of working with the coverage area, we consider for each sensor a set of intersection points which are determined by using perimeter-coverage model. \r
-Figure~\ref{pcm2sensors}(a) shows the coverage of sensor node~$0$. On this\r
+ \r
+Figure~\ref{figure1}(a) shows the coverage of sensor node~$0$. On this\r
figure, we can see that sensor~$0$ has nine neighbors and we have reported on\r
its perimeter (the perimeter of the disk covered by the sensor) for each\r
neighbor the two points resulting from the intersection of the two sensing\r
\end{tabular}\r
\caption{(a) Perimeter coverage of sensor node 0 and (b) finding the arc of\r
$u$'s perimeter covered by $v$.}\r
- \label{pcm2sensors}\r
+ \label{figure1}\r
\end{figure} \r
\r
-Figure~\ref{pcm2sensors}(b) describes the geometric information used to find the\r
+Figure~\ref{figure1}(b) describes the geometric information used to find the\r
locations of the left and right points of an arc on the perimeter of a sensor\r
node~$u$ covered by a sensor node~$v$. Node~$v$ is supposed to be located on the\r
west side of sensor~$u$, with the following respective coordinates in the\r
\r
Every couple of intersection points is placed on the angular interval $[0,2\pi]$\r
in a counterclockwise manner, leading to a partitioning of the interval.\r
-Figure~\ref{pcm2sensors}(a) illustrates the arcs for the nine neighbors of\r
-sensor $0$ and Figure~\ref{expcm} gives the position of the corresponding arcs\r
+Figure~\ref{figure1}(a) illustrates the arcs for the nine neighbors of\r
+sensor $0$ and figure~\ref{figure2} gives the position of the corresponding arcs\r
in the interval $[0,2\pi]$. More precisely, we can see that the points are\r
ordered according to the measures of the angles defined by their respective\r
positions. The intersection points are then visited one after another, starting\r
maximum level of coverage is equal to the number of overlapping arcs. For\r
example, \r
between~$5L$ and~$6L$ the maximum level of coverage is equal to $3$\r
-(the value is highlighted in yellow at the bottom of Figure~\ref{expcm}), which\r
+(the value is highlighted in yellow at the bottom of figure~\ref{figure2}), which\r
means that at most 2~neighbors can cover the perimeter in addition to node $0$. \r
Table~\ref{my-label} summarizes for each coverage interval the maximum level of\r
coverage and the sensor nodes covering the perimeter. The example discussed\r
above is thus given by the sixth line of the table.\r
\r
-%The points reported on the line segment $[0,2\pi]$ separates it in intervals as shown in figure~\ref{expcm}. For example, for each neighboring sensor of sensor 0, place the points $\alpha^ 1_L$, $\alpha^ 1_R$, $\alpha^ 2_L$, $\alpha^ 2_R$, $\alpha^ 3_L$, $\alpha^ 3_R$, $\alpha^ 4_L$, $\alpha^ 4_R$, $\alpha^ 5_L$, $\alpha^ 5_R$, $\alpha^ 6_L$, $\alpha^ 6_R$, $\alpha^ 7_L$, $\alpha^ 7_R$, $\alpha^ 8_L$, $\alpha^ 8_R$, $\alpha^ 9_L$, and $\alpha^ 9_R$; on the line segment $[0,2\pi]$, and then sort all these points in an ascending order into a list. Traverse the line segment $[0,2\pi]$ by visiting each point in the sorted list from left to right and determine the coverage level of each interval of the sensor 0 (see figure \ref{expcm}). For each interval, we sum up the number of parts of segments, and we deduce a level of coverage for each interval. For instance, the interval delimited by the points $5L$ and $6L$ contains three parts of segments. That means that this part of the perimeter of the sensor $0$ may be covered by three sensors, sensor $0$ itself and sensors $2$ and $5$. The level of coverage of this interval may reach $3$ if all previously mentioned sensors are active. Let say that sensors $0$, $2$ and $5$ are involved in the coverage of this interval. Table~\ref{my-label} summarizes the level of coverage for each interval and the sensors involved in for sensor node 0 in figure~\ref{pcm2sensors}(a). \r
-% to determine the level of the perimeter coverage for each left and right point of a segment.\r
\r
\begin{figure*}[t!]\r
\centering\r
\includegraphics[width=127.5mm]{figure2.eps} \r
\caption{Maximum coverage levels for perimeter of sensor node $0$.}\r
-\label{expcm}\r
+\label{figure2}\r
\end{figure*} \r
\r
-%For example, consider the sensor node $0$ in figure~\ref{pcmfig}, which has 9 neighbors. Figure~\ref{expcm} shows the perimeter coverage level for all left and right points of a segment that covered by a neighboring sensor nodes. Based on the figure~\ref{expcm}, the set of sensors for each left and right point of the segments illustrated in figure~\ref{ex2pcm} for the sensor node 0.\r
\r
\r
\r
\end{table}\r
\r
\r
-%The optimization algorithm that used by PeCO protocol based on the perimeter coverage levels of the left and right points of the segments and worked to minimize the number of sensor nodes for each left or right point of the segments within each sensor node. The algorithm minimize the perimeter coverage level of the left and right points of the segments, while, it assures that every perimeter coverage level of the left and right points of the segments greater than or equal to 1.\r
+\r
\r
In the PeCO protocol, the scheduling of the sensor nodes' activities is formulated with an\r
integer program based on coverage intervals. The formulation of the coverage\r
optimization problem is detailed in~section~\ref{cp}. Note that when a sensor\r
node has a part of its sensing range outside the WSN sensing field, as in\r
-Figure~\ref{ex4pcm}, the maximum coverage level for this arc is set to $\infty$\r
+figure~\ref{figure3}, the maximum coverage level for this arc is set to $\infty$\r
and the corresponding interval will not be taken into account by the\r
optimization algorithm.\r
- \r
+\r
+ \newpage\r
\begin{figure}[h!]\r
\centering\r
\includegraphics[width=62.5mm]{figure3.eps} \r
\caption{Sensing range outside the WSN's area of interest.}\r
-\label{ex4pcm}\r
+\label{figure3}\r
\end{figure} \r
-%Figure~\ref{ex5pcm} gives an example to compute the perimeter coverage levels for the left and right points of the segments for a sensor node $0$, which has a part of its sensing range exceeding the border of the sensing field of WSN, and it has a six neighbors. In figure~\ref{ex5pcm}, the sensor node $0$ has two segments outside the border of the network sensing field, so the left and right points of the two segments called $-1L$, $-1R$, $-2L$, and $-2R$.\r
-%\begin{figure}[ht!]\r
-%\centering\r
-%\includegraphics[width=75mm]{ex5pcm.jpg} \r
-%\caption{Coverage intervals and contributing sensors for sensor node 0 having a part of its sensing range outside the border.}\r
-%\label{ex5pcm}\r
-%\end{figure} \r
+\r
\r
\subsection{The Main Idea}\r
\r
our protocol will be executed in a distributed way in each subregion\r
simultaneously to schedule nodes' activities for one sensing period.\r
\r
-As shown in Figure~\ref{fig2}, node activity scheduling is produced by our\r
+As shown in figure~\ref{figure4}, node activity scheduling is produced by our\r
protocol in a periodic manner. Each period is divided into 4 stages: Information\r
(INFO) Exchange, Leader Election, Decision (the result of an optimization\r
problem), and Sensing. For each period there is exactly one set cover\r
\centering\r
\includegraphics[width=80mm]{figure4.eps} \r
\caption{PeCO protocol.}\r
-\label{fig2}\r
+\label{figure4}\r
\end{figure} \r
\r
We define two types of packets to be used by PeCO protocol:\r
-%\begin{enumerate}[(a)]\r
+\r
\begin{itemize} \r
\item INFO packet: sent by each sensor node to all the nodes inside a same\r
subregion for information exchange.\r
to transmit to them their respective status (stay Active or go Sleep) during\r
sensing phase.\r
\end{itemize}\r
-%\end{enumerate}\r
+\r
\r
Five status are possible for a sensor node in the network:\r
-%\begin{enumerate}[(a)] \r
+\r
\begin{itemize} \r
\item LISTENING: waits for a decision (to be active or not);\r
\item COMPUTATION: executes the optimization algorithm as leader to\r
\item SLEEP: node is turned off;\r
\item COMMUNICATION: transmits or receives packets.\r
\end{itemize}\r
-%\end{enumerate}\r
-%Below, we describe each phase in more details.\r
+\r
\r
\subsection{PeCO Protocol Algorithm}\r
\r
protocol applied by a sensor node $s_k$ where $k$ is the node index in the WSN.\r
\r
\r
-\iffalse\r
+\r
\begin{algorithm} \r
% \KwIn{all the parameters related to information exchange}\r
% \KwOut{$winer-node$ (: the id of the winner sensor node, which is the leader of current round)}\r
- \BlankLine\r
+% \BlankLine\r
%\emph{Initialize the sensor node and determine it's position and subregion} \; \r
\r
- \If{ $RE_k \geq E_{th}$ }{\r
- \emph{$s_k.status$ = COMMUNICATION}\;\r
- \emph{Send $INFO()$ packet to other nodes in subregion}\;\r
- \emph{Wait $INFO()$ packet from other nodes in subregion}\; \r
- \emph{Update K.CurrentSize}\;\r
- \emph{LeaderID = Leader election}\;\r
- \If{$ s_k.ID = LeaderID $}{\r
- \emph{$s_k.status$ = COMPUTATION}\;\r
- \r
- \If{$ s_k.ID $ is Not previously selected as a Leader }{\r
- \emph{ Execute the perimeter coverage model}\;\r
- % \emph{ Determine the segment points using perimeter coverage model}\;\r
- }\r
- \r
- \If{$ (s_k.ID $ is the same Previous Leader) And (K.CurrentSize = K.PreviousSize)}{\r
- \r
- \emph{ Use the same previous cover set for current sensing stage}\;\r
- }\r
- \Else{\r
- \emph{Update $a^j_{ik}$; prepare data for IP~Algorithm}\;\r
- \emph{$\left\{\left(X_{1},\dots,X_{l},\dots,X_{K}\right)\right\}$ = Execute Integer Program Algorithm($K$)}\;\r
- \emph{K.PreviousSize = K.CurrentSize}\;\r
- }\r
- \r
- \emph{$s_k.status$ = COMMUNICATION}\;\r
- \emph{Send $ActiveSleep()$ to each node $l$ in subregion}\;\r
- \emph{Update $RE_k $}\;\r
- } \r
- \Else{\r
- \emph{$s_k.status$ = LISTENING}\;\r
- \emph{Wait $ActiveSleep()$ packet from the Leader}\;\r
- \emph{Update $RE_k $}\;\r
- } \r
- }\r
- \Else { Exclude $s_k$ from entering in the current sensing stage}\r
- }\r
-%\caption{PeCO($s_k$)}\r
+\noindent{\bf If} $RE_k \geq E_{th}$ {\bf then}\\\r
+\hspace*{0.6cm} \emph{$s_k.status$ = COMMUNICATION;}\\\r
+\hspace*{0.6cm} \emph{Send $INFO()$ packet to other nodes in subregion;}\\\r
+\hspace*{0.6cm} \emph{Wait $INFO()$ packet from other nodes in subregion;}\\\r
+\hspace*{0.6cm} \emph{Update K.CurrentSize;}\\\r
+\hspace*{0.6cm} \emph{LeaderID = Leader election;}\\\r
+\hspace*{0.6cm} {\bf If} $ s_k.ID = LeaderID $ {\bf then}\\\r
+\hspace*{1.2cm} \emph{$s_k.status$ = COMPUTATION;}\\\r
+\hspace*{1.2cm}{\bf If} \emph{$ s_k.ID $ is Not previously selected as a Leader} {\bf then}\\\r
+\hspace*{1.8cm} \emph{ Execute the perimeter coverage model;}\\\r
+\hspace*{1.2cm} {\bf end}\\\r
+\hspace*{1.2cm}{\bf If} \emph{($s_k.ID $ is the same Previous Leader)~And~(K.CurrentSize = K.PreviousSize)}\\\r
+\hspace*{1.8cm} \emph{ Use the same previous cover set for current sensing stage;}\\\r
+\hspace*{1.2cm} {\bf end}\\\r
+\hspace*{1.2cm} {\bf else}\\\r
+\hspace*{1.8cm}\emph{Update $a^j_{ik}$; prepare data for IP~Algorithm;}\\\r
+\hspace*{1.8cm} \emph{$\left\{\left(X_{1},\dots,X_{l},\dots,X_{K}\right)\right\}$ = Execute Integer Program Algorithm($K$);}\\\r
+\hspace*{1.8cm} \emph{K.PreviousSize = K.CurrentSize;}\\\r
+\hspace*{1.2cm} {\bf end}\\\r
+\hspace*{1.2cm}\emph{$s_k.status$ = COMMUNICATION;}\\\r
+\hspace*{1.2cm}\emph{Send $ActiveSleep()$ to each node $l$ in subregion;}\\\r
+\hspace*{1.2cm}\emph{Update $RE_k $;}\\\r
+\hspace*{0.6cm} {\bf end}\\\r
+\hspace*{0.6cm} {\bf else}\\\r
+\hspace*{1.2cm}\emph{$s_k.status$ = LISTENING;}\\\r
+\hspace*{1.2cm}\emph{Wait $ActiveSleep()$ packet from the Leader;}\\\r
+\hspace*{1.2cm}\emph{Update $RE_k $;}\\\r
+\hspace*{0.6cm} {\bf end}\\\r
+{\bf end}\\\r
+{\bf else}\\\r
+\hspace*{0.6cm} \emph{Exclude $s_k$ from entering in the current sensing stage;}\\\r
+{\bf end}\\\r
\label{alg:PeCO}\r
\end{algorithm}\r
-\fi\r
+\r
+\r
\r
In this algorithm, K.CurrentSize and K.PreviousSize respectively represent the\r
current number and the previous number of living nodes in the subnetwork of the\r
collects information to formulate and solve the integer program which allows to\r
construct the set of active sensors in the sensing stage.\r
\r
-%After the cooperation among the sensor nodes in the same subregion, the leader will be elected in distributed way, where each sensor node and based on it's information decide who is the leader. The selection criteria for the leader in order of priority are: larger number of neighbors, larger remaining energy, and then in case of equality, larger index. Thereafter, if the sensor node is leader, it will execute the perimeter-coverage model for each sensor in the subregion in order to determine the segment points which would be used in the next stage by the optimization algorithm of the PeCO protocol. Every sensor node is selected as a leader, it is executed the perimeter coverage model only one time during it's life in the network.\r
-\r
-% The leader has the responsibility of applying the integer program algorithm (see section~\ref{cp}), which provides a set of sensors planned to be active in the sensing stage. As leader, it will send an Active-Sleep packet to each sensor in the same subregion to inform it if it has to be active or not. On the contrary, if the sensor is not the leader, it will wait for the Active-Sleep packet to know its state for the sensing stage.\r
\r
\section{Perimeter-based Coverage Problem Formulation}\r
\label{cp}\r
& \mbox{coverage interval $i$ of sensor $j$}, \\\r
0 & \mbox{otherwise.}\\\r
\end{array} \right.\r
-%\label{eq12} \r
-%\notag\r
\end{equation}\r
Note that $a^k_{ik}=1$ by definition of the interval.\r
-%, where the objective is to find the maximum number of non-disjoint sets of sensor nodes such that each set cover can assure the coverage for the whole region so as to extend the network lifetime in WSN. Our model uses the PCL~\cite{huang2005coverage} in order to optimize the lifetime coverage in each subregion.\r
-%We defined some parameters, which are related to our optimization model. In our model, we consider binary variables $X_{k}$, which determine the activation of sensor $k$ in the sensing round $k$. .\r
+\r
Second, we define several binary and integer variables. Hence, each binary\r
variable $X_{k}$ determines the activation of sensor $k$ in the sensing phase\r
($X_k=1$ if the sensor $k$ is active or 0 otherwise). $M^j_i$ is an integer\r
desired coverage level, and if the desired level cannot be completely satisfied,\r
to reach a coverage level as close as possible to the desired one.\r
\r
-%A system of linear constraints is imposed to attempt to keep the coverage level in each coverage interval to within specified PCL. Since it is physically impossible to satisfy all constraints simultaneously, each constraint uses a variable to either record when the coverage level is achieved, or to record the deviation from the desired coverage level. These additional variables are embedded into an objective function to be minimized. \r
-\r
-%\noindent In this paper, let us define some parameters, which are used in our protocol.\r
-%the set of segment points is denoted by $I$, the set of all sensors in the network by $J$, and the set of alive sensors within $J$ by $K$.\r
-\r
\r
-%\noindent \begin{equation}\r
-%X_{k} = \left \{ \r
-%\begin{array}{l l}\r
- % 1& \mbox{if sensor $k$ is active,} \\\r
-% 0 & \mbox{otherwise.}\\\r
-%\end{array} \right.\r
-%\label{eq11} \r
-%\notag\r
-%\end{equation}\r
\r
-%\noindent $M^j_i (undercoverage): $ integer value $\in \mathbb{N}$ for segment point $i$ of sensor $j$.\r
-\r
-%\noindent $V^j_i (overcoverage): $ integer value $\in \mathbb{N}$ for segment point $i$ of sensor $j$.\r
\r
Our coverage optimization problem can then be mathematically expressed as follows: \r
-%Objective:\r
-\begin{equation} %\label{eq:ip2r}\r
+\r
+\begin{equation} \r
\left \{\r
\begin{array}{ll}\r
\min \sum_{j \in S} \sum_{i \in I_j} (\alpha^j_i ~ M^j_i + \beta^j_i ~ V^j_i )&\\\r
\textrm{subject to :}&\\\r
\sum_{k \in A} ( a^j_{ik} ~ X_{k}) + M^j_i \geq l \quad \forall i \in I_j, \forall j \in S\\\r
-%\label{c1} \r
\sum_{k \in A} ( a^j_{ik} ~ X_{k}) - V^j_i \leq l \quad \forall i \in I_j, \forall j \in S\\\r
-% \label{c2}\r
-% \Theta_{p}\in \mathbb{N}, &\forall p \in P\\\r
-% U_{p} \in \{0,1\}, &\forall p \in P\\\r
X_{k} \in \{0,1\}, \forall k \in A\r
\end{array}\r
\right.\r
-%\notag\r
\end{equation}\r
+\r
$\alpha^j_i$ and $\beta^j_i$ are nonnegative weights selected according to the\r
relative importance of satisfying the associated level of coverage. For example,\r
weights associated with coverage intervals of a specified part of a region may\r
be given by a relatively larger magnitude than weights associated with another\r
region. This kind of integer program is inspired from the model developed for\r
brachytherapy treatment planning for optimizing dose distribution\r
-\cite{0031-9155-44-1-012}. The integer program must be solved by the leader in\r
+\citep{0031-9155-44-1-012}. The integer program must be solved by the leader in\r
each subregion at the beginning of each sensing phase, whenever the environment\r
has changed (new leader, death of some sensors). Note that the number of\r
constraints in the model is constant (constraints of coverage expressed for all\r
\r
\section{Performance Evaluation and Analysis} \r
\label{sec:Simulation Results and Analysis}\r
-%\noindent \subsection{Simulation Framework}\r
+\r
\r
\subsection{Simulation Settings}\r
-%\label{sub1}\r
+\r
\r
The WSN area of interest is supposed to be divided into 16~regular subregions\r
-and we use the same energy consumption than in our previous work~\cite{Idrees2}.\r
+and we use the same energy consumption than in our previous work~\citep{Idrees2}.\r
Table~\ref{table3} gives the chosen parameters settings.\r
\r
\begin{table}[ht]\r
\tbl{Relevant parameters for network initialization \label{table3}}{\r
-% title of Table\r
+\r
\centering\r
-% used for centering table\r
+\r
\begin{tabular}{c|c}\r
-% centered columns (4 columns)\r
+\r
\hline\r
Parameter & Value \\ [0.5ex]\r
\r
Sensing field & $(50 \times 25)~m^2 $ \\\r
\r
WSN size & 100, 150, 200, 250, and 300~nodes \\\r
-%\hline\r
+\r
Initial energy & in range 500-700~Joules \\ \r
-%\hline\r
+\r
Sensing period & duration of 60 minutes \\\r
$E_{th}$ & 36~Joules\\\r
$R_s$ & 5~m \\ \r
-%\hline\r
+\r
$\alpha^j_i$ & 0.6 \\\r
-% [1ex] adds vertical space\r
-%\hline\r
+\r
$\beta^j_i$ & 0.4\r
-%inserts single line\r
+\r
\end{tabular}}\r
\r
-% is used to refer this table in the text\r
+\r
\end{table}\r
To obtain experimental results which are relevant, simulations with five\r
different node densities going from 100 to 300~nodes were performed considering\r
We introduce the following performance metrics to evaluate the efficiency of our\r
approach.\r
\r
-%\begin{enumerate}[i)]\r
+\r
\begin{itemize}\r
\item {\bf Network Lifetime}: the lifetime is defined as the time elapsed until\r
the coverage ratio falls below a fixed threshold. $Lifetime_{95}$ and\r
observe the area of interest. In our case, we discretized the sensor field as\r
a regular grid, which yields the following equation:\r
\r
-%\begin{equation*}\r
+\r
\[\r
\scriptsize\r
\mbox{CR}(\%) = \frac{\mbox{$n$}}{\mbox{$N$}} \times 100\r
\]\r
-% \end{equation*}\r
+\r
\r
where $n$ is the number of covered grid points by active sensors of every\r
subregions during the current sensing phase and $N$ is total number of grid\r
activate as few nodes as possible, in order to minimize the communication\r
overhead and maximize the WSN lifetime. The active sensors ratio is defined as\r
follows:\r
- %\begin{equation*}\r
+ \r
\[\r
\scriptsize\r
\mbox{ASR}(\%) = \frac{\sum\limits_{r=1}^R \mbox{$|A_r^p|$}}{\mbox{$|S|$}} \times 100\r
\]\r
- %\end{equation*}\r
+\r
where $|A_r^p|$ is the number of active sensors in the subregion $r$ in the\r
current sensing period~$p$, $|S|$ is the number of sensors in the network, and\r
$R$ is the number of subregions.\r
energy consumed by the sensors during $Lifetime_{95}$ or $Lifetime_{50}$,\r
divided by the number of periods. The value of EC is computed according to\r
this formula:\r
- %\begin{equation*}\r
+\r
\[ \r
\scriptsize\r
\mbox{EC} = \frac{\sum\limits_{p=1}^{P} \left( E^{\mbox{com}}_p+E^{\mbox{list}}_p+E^{\mbox{comp}}_p \r
+ E^{a}_p+E^{s}_p \right)}{P},\r
\]\r
- % \end{equation*}\r
+ \r
where $P$ corresponds to the number of periods. The total energy consumed by\r
the sensors comes through taking into consideration four main energy\r
factors. The first one, denoted $E^{\scriptsize \mbox{com}}_p$, represents the\r
program during a period. Finally, $E^a_{p}$ and $E^s_{p}$ indicate the energy\r
consumed by the WSN during the sensing phase (active and sleeping nodes).\r
\end{itemize}\r
-%\end{enumerate}\r
+\r
\r
\subsection{Simulation Results}\r
\r
In order to assess and analyze the performance of our protocol we have\r
-implemented PeCO protocol in OMNeT++~\cite{varga} simulator. Besides PeCO, two\r
+implemented PeCO protocol in OMNeT++~\citep{varga} simulator. Besides PeCO, two\r
other protocols, described in the next paragraph, will be evaluated for\r
comparison purposes. The simulations were run on a DELL laptop with an Intel\r
-Core~i3~2370~M (2.4~GHz) processor (2 cores) whose MIPS (Million Instructions\r
+Core~i3~2370~M (1.8~GHz) processor (2 cores) whose MIPS (Million Instructions\r
Per Second) rate is equal to 35330. To be consistent with the use of a sensor\r
node based on Atmels AVR ATmega103L microcontroller (6~MHz) having a MIPS rate\r
equal to 6, the original execution time on the laptop is multiplied by 2944.2\r
$\left(\frac{35330}{2} \times \frac{1}{6} \right)$. The modeling language for\r
-Mathematical Programming (AMPL)~\cite{AMPL} is employed to generate the integer\r
+Mathematical Programming (AMPL)~\citep{AMPL} is employed to generate the integer\r
program instance in a standard format, which is then read and solved by the\r
optimization solver GLPK (GNU linear Programming Kit available in the public\r
-domain) \cite{glpk} through a Branch-and-Bound method.\r
+domain) \citep{glpk} through a Branch-and-Bound method.\r
\r
As said previously, the PeCO is compared to three other approaches. The first\r
one, called DESK, is a fully distributed coverage algorithm proposed by\r
-\cite{ChinhVu}. The second one, called GAF~\cite{xu2001geography}, consists in\r
+\citep{ChinhVu}. The second one, called GAF~\citep{xu2001geography}, consists in\r
dividing the monitoring area into fixed squares. Then, during the decision\r
phase, in each square, one sensor is chosen to remain active during the sensing\r
-phase. The last one, the DiLCO protocol~\cite{Idrees2}, is an improved version\r
-of a research work we presented in~\cite{idrees2014coverage}. Let us notice that\r
+phase. The last one, the DiLCO protocol~\citep{Idrees2}, is an improved version\r
+of a research work we presented in~\citep{idrees2014coverage}. Let us notice that\r
PeCO and DiLCO protocols are based on the same framework. In particular, the\r
choice for the simulations of a partitioning in 16~subregions was made because\r
it corresponds to the configuration producing the best results for DiLCO. The\r
\r
\subsubsection{\bf Coverage Ratio}\r
\r
-Figure~\ref{fig333} shows the average coverage ratio for 200 deployed nodes\r
+Figure~\ref{figure5} shows the average coverage ratio for 200 deployed nodes\r
obtained with the four protocols. DESK, GAF, and DiLCO provide a slightly better\r
coverage ratio with respectively 99.99\%, 99.91\%, and 99.02\%, compared to the 98.76\%\r
produced by PeCO for the first periods. This is due to the fact that at the\r
\centering\r
\includegraphics[scale=0.5] {figure5.eps} \r
\caption{Coverage ratio for 200 deployed nodes.}\r
-\label{fig333}\r
+\label{figure5}\r
\end{figure} \r
\r
-%When the number of periods increases, coverage ratio produced by DESK and GAF protocols decreases. This is due to dead nodes. However, DiLCO protocol maintains almost a good coverage from the round 31 to the round 63 and it is close to PeCO protocol. The coverage ratio of PeCO protocol is better than other approaches from the period 64.\r
\r
-%because the optimization algorithm used by PeCO has been optimized the lifetime coverage based on the perimeter coverage model, so it provided acceptable coverage for a larger number of periods and prolonging the network lifetime based on the perimeter of the sensor nodes in each subregion of WSN. Although some nodes are dead, sensor activity scheduling based optimization of PeCO selected another nodes to ensure the coverage of the area of interest. i.e. DiLCO-16 showed a good coverage in the beginning then PeCO, when the number of periods increases, the coverage ratio decreases due to died sensor nodes. Meanwhile, thanks to sensor activity scheduling based new optimization model, which is used by PeCO protocol to ensure a longer lifetime coverage in comparison with other approaches. \r
\r
\r
\subsubsection{\bf Active Sensors Ratio}\r
\r
Having the less active sensor nodes in each period is essential to minimize the\r
-energy consumption and thus to maximize the network lifetime. Figure~\ref{fig444}\r
+energy consumption and thus to maximize the network lifetime. Figure~\ref{figure6}\r
shows the average active nodes ratio for 200 deployed nodes. We observe that\r
DESK and GAF have 30.36 \% and 34.96 \% active nodes for the first fourteen\r
rounds and DiLCO and PeCO protocols compete perfectly with only 17.92~\% and\r
20.16~\% active nodes during the same time interval. As the number of periods\r
increases, PeCO protocol has a lower number of active nodes in comparison with\r
the three other approaches, while keeping a greater coverage ratio as shown in\r
-Figure \ref{fig333}.\r
+figure \ref{figure5}.\r
\r
\begin{figure}[h!]\r
\centering\r
\includegraphics[scale=0.5]{figure6.eps} \r
\caption{Active sensors ratio for 200 deployed nodes.}\r
-\label{fig444}\r
+\label{figure6}\r
\end{figure} \r
\r
\subsubsection{\bf Energy Consumption}\r
\r
We studied the effect of the energy consumed by the WSN during the communication,\r
computation, listening, active, and sleep status for different network densities\r
-and compared it for the four approaches. Figures~\ref{fig3EC}(a) and (b)\r
+and compared it for the four approaches. Figures~\ref{figure7}(a) and (b)\r
illustrate the energy consumption for different network sizes and for\r
$Lifetime95$ and $Lifetime50$. The results show that our PeCO protocol is the\r
most competitive from the energy consumption point of view. As shown in both\r
\includegraphics[scale=0.475]{figure7b.eps} & \raisebox{2.75cm}{(b)}\r
\end{tabular}\r
\caption{Energy consumption per period for (a)~$Lifetime_{95}$ and (b)~$Lifetime_{50}$.}\r
- \label{fig3EC}\r
+ \label{figure7}\r
\end{figure} \r
\r
-%The optimization algorithm, which used by PeCO protocol, was improved the lifetime coverage efficiently based on the perimeter coverage model.\r
-\r
- %The other approaches have a high energy consumption due to activating a larger number of sensors. In fact, a distributed method on the subregions greatly reduces the number of communications and the time of listening so thanks to the partitioning of the initial network into several independent subnetworks. \r
\r
\r
-%\subsubsection{Execution Time}\r
-\r
\subsubsection{\bf Network Lifetime}\r
\r
We observe the superiority of PeCO and DiLCO protocols in comparison with the\r
two other approaches in prolonging the network lifetime. In\r
-Figures~\ref{fig3LT}(a) and (b), $Lifetime95$ and $Lifetime50$ are shown for\r
+Figures~\ref{figure8}(a) and (b), $Lifetime95$ and $Lifetime50$ are shown for\r
different network sizes. As highlighted by these figures, the lifetime\r
increases with the size of the network, and it is clearly largest for DiLCO\r
and PeCO protocols. For instance, for a network of 300~sensors and coverage\r
-ratio greater than 50\%, we can see on Figure~\ref{fig3LT}(b) that the lifetime\r
+ratio greater than 50\%, we can see on figure~\ref{figure8}(b) that the lifetime\r
is about twice longer with PeCO compared to DESK protocol. The performance\r
-difference is more obvious in Figure~\ref{fig3LT}(b) than in\r
-Figure~\ref{fig3LT}(a) because the gain induced by our protocols increases with\r
+difference is more obvious in figure~\ref{figure8}(b) than in\r
+figure~\ref{figure8}(a) because the gain induced by our protocols increases with\r
time, and the lifetime with a coverage of 50\% is far longer than with\r
95\%.\r
\r
\end{tabular}\r
\caption{Network Lifetime for (a)~$Lifetime_{95}$ \\\r
and (b)~$Lifetime_{50}$.}\r
- \label{fig3LT}\r
+ \label{figure8}\r
\end{figure} \r
\r
-%By choosing the best suited nodes, for each period, by optimizing the coverage and lifetime of the network to cover the area of interest and by letting the other ones sleep in order to be used later in next rounds, PeCO protocol efficiently prolonged the network lifetime especially for a coverage ratio greater than $50 \%$, whilst it stayed very near to DiLCO-16 protocol for $95 \%$.\r
\r
-Figure~\ref{figLTALL} compares the lifetime coverage of our protocols for\r
+\r
+Figure~\ref{figure9} compares the lifetime coverage of our protocols for\r
different coverage ratios. We denote by Protocol/50, Protocol/80, Protocol/85,\r
Protocol/90, and Protocol/95 the amount of time during which the network can\r
satisfy an area coverage greater than $50\%$, $80\%$, $85\%$, $90\%$, and $95\%$\r
\begin{figure}[h!]\r
\centering \includegraphics[scale=0.5]{figure9.eps}\r
\caption{Network lifetime for different coverage ratios.}\r
-\label{figLTALL}\r
+\label{figure9}\r
\end{figure} \r
\r
-%Comparison shows that PeCO protocol, which are used distributed optimization over the subregions, is the more relevance one for most coverage ratios and WSN sizes because it is robust to network disconnection during the network lifetime as well as it consume less energy in comparison with other approaches. PeCO protocol gave acceptable coverage ratio for a larger number of periods using new optimization algorithm that based on a perimeter coverage model. It also means that distributing the algorithm in each node and subdividing the sensing field into many subregions, which are managed independently and simultaneously, is the most relevant way to maximize the lifetime of a network.\r
+\r
\r
\r
\section{Conclusion and Future Works}\r
sensors based on their perimeter coverage level, instead of using a set of\r
targets/points to be covered.\r
\r
-%To cope with this problem, the area of interest is divided into a smaller subregions using divide-and-conquer method, and then a PeCO protocol for optimizing the lifetime coverage in each subregion. PeCO protocol combines two efficient techniques: network\r
-%leader election, which executes the perimeter coverage model (only one time), the optimization algorithm, and sending the schedule produced by the optimization algorithm to other nodes in the subregion ; the second, sensor activity scheduling based optimization in which a new lifetime coverage optimization model is proposed. The main challenges include how to select the most efficient leader in each subregion and the best schedule of sensor nodes that will optimize the network lifetime coverage\r
-%in the subregion. \r
-%The network lifetime coverage in each subregion is divided into\r
-%periods, each period consists of four stages: (i) Information Exchange,\r
-%(ii) Leader Election, (iii) a Decision based new optimization model in order to\r
-%select the nodes remaining active for the last stage, and (iv) Sensing.\r
+\r
We have carried out several simulations to evaluate the proposed protocol. The\r
simulation results show that PeCO is more energy-efficient than other\r
approaches, with respect to lifetime, coverage ratio, active sensors ratio, and\r
energy consumption.\r
-%Indeed, when dealing with large and dense WSNs, a distributed optimization approach on the subregions of WSN like the one we are proposed allows to reduce the difficulty of a single global optimization problem by partitioning it in many smaller problems, one per subregion, that can be solved more easily. We have identified different research directions that arise out of the work presented here.\r
+\r
We plan to extend our framework so that the schedules are planned for multiple\r
sensing periods.\r
-%in order to compute all active sensor schedules in only one step for many periods;\r
+\r
We also want to improve our integer program to take into account heterogeneous\r
sensors from both energy and node characteristics point of views.\r
-%the third, we are investigating new optimization model based on the sensing range so as to maximize the lifetime coverage in WSN;\r
+\r
Finally, it would be interesting to implement our protocol using a\r
sensor-testbed to evaluate it in real world applications.\r
\r
OMNeT++, the discrete event simulator, to demonstrate that PeCO can\r
offer longer lifetime coverage for WSNs in comparison with some other protocols.\r
\r
-\begin{keywords}Wireless Sensor Networks, Area Coverage, Network Lifetime, Optimization, Scheduling.\r
+\begin{keywords}Wireless Sensor Networks, Area Coverage, Energy efficiency, Optimization, Scheduling.\r
\end{keywords}\r
\r
\end{abstract}\r
\noindent The continuous progress in Micro Electro-Mechanical Systems (MEMS) and\r
wireless communication hardware has given rise to the opportunity to use large\r
networks of tiny sensors, called Wireless Sensor Networks\r
-(WSN)~\cite{akyildiz2002wireless,puccinelli2005wireless}, to fulfill monitoring\r
+(WSN)~\citep{akyildiz2002wireless,puccinelli2005wireless}, to fulfill monitoring\r
tasks. A WSN consists of small low-powered sensors working together by\r
communicating with one another through multi-hop radio communications. Each node\r
can send the data it collects in its environment, thanks to its sensor, to the\r
user by means of sink nodes. The features of a WSN made it suitable for a wide\r
range of application in areas such as business, environment, health, industry,\r
-military, and so on~\cite{yick2008wireless}. Typically, a sensor node contains\r
-three main components~\cite{anastasi2009energy}: a sensing unit able to measure\r
+military, and so on~\citep{yick2008wireless}. Typically, a sensor node contains\r
+three main components~\citep{anastasi2009energy}: a sensing unit able to measure\r
physical, chemical, or biological phenomena observed in the environment; a\r
processing unit which will process and store the collected measurements; a radio\r
communication unit for data transmission and receiving.\r
be answered is: how to extend the lifetime coverage of a WSN as long as possible\r
while ensuring a high level of coverage? These past few years many\r
energy-efficient mechanisms have been suggested to retain energy and extend the\r
-lifetime of the WSNs~\cite{rault2014energy}.\r
-\r
+lifetime of the WSNs~\citep{rault2014energy}.\\\\\r
This paper makes the following contributions.\r
\begin{enumerate}\r
\item We have devised a framework to schedule nodes to be activated alternatively such\r
\item We have conducted extensive simulation experiments, using the discrete event\r
simulator OMNeT++, to demonstrate the efficiency of our protocol. We have compared\r
our PeCO protocol to two approaches found in the literature:\r
- DESK~\cite{ChinhVu} and GAF~\cite{xu2001geography}, and also to our previous\r
- work published in~\cite{Idrees2} which is based on another optimization model\r
+ DESK~\citep{ChinhVu} and GAF~\citep{xu2001geography}, and also to our previous\r
+ work published in~\citep{Idrees2} which is based on another optimization model\r
for sensor scheduling.\r
\end{enumerate}\r
\r
remarks are drawn and some suggestions are given for future works in\r
Section~\ref{sec:Conclusion and Future Works}.\r
\r
-% that show that our protocol outperforms others protocols.\r
\section{Related Literature}\r
\label{sec:Literature Review}\r
\r
the literature.\r
\r
The most discussed coverage problems in literature can be classified in three\r
-categories~\cite{li2013survey} according to their respective monitoring\r
-objective. Hence, area coverage \cite{Misra} means that every point inside a\r
-fixed area must be monitored, while target coverage~\cite{yang2014novel} refers\r
+categories~\citep{li2013survey} according to their respective monitoring\r
+objective. Hence, area coverage \citep{Misra} means that every point inside a\r
+fixed area must be monitored, while target coverage~\citep{yang2014novel} refers\r
to the objective of coverage for a finite number of discrete points called\r
-targets, and barrier coverage~\cite{HeShibo}\cite{kim2013maximum} focuses on\r
+targets, and barrier coverage~\citep{HeShibo,kim2013maximum} focuses on\r
preventing intruders from entering into the region of interest. In\r
-\cite{Deng2012} authors transform the area coverage problem into the target\r
+\citep{Deng2012} authors transform the area coverage problem into the target\r
coverage one taking into account the intersection points among disks of sensors\r
nodes or between disk of sensor nodes and boundaries. In\r
-\cite{Huang:2003:CPW:941350.941367} authors prove that if the perimeters of\r
+\citep{Huang:2003:CPW:941350.941367} authors prove that if the perimeters of\r
sensors are sufficiently covered it will be the case for the whole area. They\r
provide an algorithm in $O(nd~log~d)$ time to compute the perimeter-coverage of\r
each sensor, where $d$ denotes the maximum number of sensors that are\r
\r
The major approach to extend network lifetime while preserving coverage is to\r
divide/organize the sensors into a suitable number of set covers (disjoint or\r
-non-disjoint)\cite{wang2011coverage}, where each set completely covers a region of interest, and to\r
+non-disjoint)\citep{wang2011coverage}, where each set completely covers a region of interest, and to\r
activate these set covers successively. The network activity can be planned in\r
advance and scheduled for the entire network lifetime or organized in periods,\r
and the set of active sensor nodes is decided at the beginning of each period\r
-\cite{ling2009energy}. Active node selection is determined based on the problem\r
+\citep{ling2009energy}. Active node selection is determined based on the problem\r
requirements (e.g. area monitoring, connectivity, or power efficiency). For\r
-instance, Jaggi {\em et al.}~\cite{jaggi2006} address the problem of maximizing\r
+instance, \citet{jaggi2006} address the problem of maximizing\r
the lifetime by dividing sensors into the maximum number of disjoint subsets\r
such that each subset can ensure both coverage and connectivity. A greedy\r
algorithm is applied once to solve this problem and the computed sets are\r
-activated in succession to achieve the desired network lifetime. Vu\r
-\cite{chin2007}, \cite{yan2008design}, Padmatvathy {\em et al.}~\cite{pc10}, propose algorithms\r
+activated in succession to achieve the desired network lifetime. \r
+\citet{chin2007}, \citet{yan2008design}, \citet{pc10}, propose algorithms\r
working in a periodic fashion where a cover set is computed at the beginning of\r
each period. {\it Motivated by these works, PeCO protocol works in periods,\r
where each period contains a preliminary phase for information exchange and\r
sensing task.}\r
\r
Various centralized and distributed approaches, or even a mixing of these two\r
-concepts, have been proposed to extend the network lifetime \cite{zhou2009variable}. In distributed algorithms~\cite{Tian02,yangnovel,ChinhVu,qu2013distributed} each sensor decides of its\r
+concepts, have been proposed to extend the network lifetime \citep{zhou2009variable}. In distributed algorithms~\citep{Tian02,yangnovel,ChinhVu,qu2013distributed} each sensor decides of its\r
own activity scheduling after an information exchange with its neighbors. The\r
main interest of such an approach is to avoid long range communications and thus\r
to reduce the energy dedicated to the communications. Unfortunately, since each\r
node has only information on its immediate neighbors (usually the one-hop ones)\r
it may make a bad decision leading to a global suboptimal solution. Conversely,\r
centralized\r
-algorithms~\cite{cardei2005improving,zorbas2010solving,pujari2011high} always\r
+algorithms~\citep{cardei2005improving,zorbas2010solving,pujari2011high} always\r
provide nearly or close to optimal solution since the algorithm has a global\r
view of the whole network. The disadvantage of a centralized method is obviously\r
its high cost in communications needed to transmit to a single node, the base\r
heuristics. These heuristics involve the construction of a cover set by\r
including in priority the sensor nodes which cover critical targets, that is to\r
say targets that are covered by the smallest number of sensors\r
-\cite{berman04,zorbas2010solving}. Other approaches are based on mathematical\r
-programming formulations~\cite{cardei2005energy,5714480,pujari2011high,Yang2014}\r
+\citep{berman04,zorbas2010solving}. Other approaches are based on mathematical\r
+programming formulations~\citep{cardei2005energy,5714480,pujari2011high,Yang2014}\r
and dedicated techniques (solving with a branch-and-bound algorithm available in\r
optimization solver). The problem is formulated as an optimization problem\r
(maximization of the lifetime or number of cover sets) under target coverage and\r
energy constraints. Column generation techniques, well-known and widely\r
practiced techniques for solving linear programs with too many variables, have\r
also been\r
-used~\cite{castano2013column,rossi2012exact,deschinkel2012column}. {\it In the PeCO\r
+used~\citep{castano2013column,doi:10.1080/0305215X.2012.687732,deschinkel2012column}. {\it In the PeCO\r
protocol, each leader, in charge of a subregion, solves an integer program\r
which has a twofold objective: minimize the overcoverage and the undercoverage\r
of the perimeter of each sensor.}\r
\r
-%\noindent Recently, the coverage problem has been received a high attention, which concentrates on how the physical space could be well monitored after the deployment. Coverage is one of the Quality of Service (QoS) parameters in WSNs, which is highly concerned with power depletion~\cite{zhu2012survey}. Most of the works about the coverage protocols have been suggested in the literature focused on three types of the coverage in WSNs~\cite{mulligan2010coverage}: the first, area coverage means that each point in the area of interest within the sensing range of at least one sensor node; the second, target coverage in which a fixed set of targets need to be monitored; the third, barrier coverage refers to detect the intruders crossing a boundary of WSN. The work in this paper emphasized on the area coverage, so, some area coverage protocols have been reviewed in this section, and the shortcomings of reviewed approaches are being summarized.\r
-\r
-%The problem of k-coverage in WSNs was addressed~\cite{ammari2012centralized}. It mathematically formulated and the spacial sensor density for full k-coverage determined, where the relation between the communication range and the sensing range constructed by this work to retain the k-coverage and connectivity in WSN. After that, a four configuration protocols have proposed for treating the k-coverage in WSNs. \r
-\r
-%In~\cite{rebai2014branch}, the problem of full grid coverage is formulated using two integer linear programming models: the first, a model that takes into account only the overall coverage constraint; the second, both the connectivity and the full grid coverage constraints have taken into consideration. This work did not take into account the energy constraint.\r
-\r
-%Li et al.~\cite{li2011transforming} presented a framework to convert any complete coverage problem to a partial coverage one with any coverage ratio by means of executing a complete coverage algorithm to find a full coverage sets with virtual radii and transforming the coverage sets to a partial coverage sets by adjusting sensing radii. The properties of the original algorithms can be maintained by this framework and the transformation process has a low execution time.\r
-\r
-%The authors in~\cite{liu2014generalized} explained that in some applications of WSNs such as structural health monitoring (SHM) and volcano monitoring, the traditional coverage model which is a geographic area defined for individual sensors is not always valid. For this reason, they define a generalized coverage model, which is not need to have the coverage area of individual nodes, but only based on a function to determine whether a set of\r
-%sensor nodes is capable of satisfy the requested monitoring task for a certain area. They have proposed two approaches to divide the deployed nodes into suitable cover sets, which can be used to prolong the network lifetime. \r
- \r
-%The work in~\cite{wang2010preserving} addressed the target area coverage problem by proposing a geometric-based activity scheduling scheme, named GAS, to fully cover the target area in WSNs. The authors deals with small area (target area coverage), which can be monitored by a single sensor instead of area coverage, which focuses on a large area that should be monitored by many sensors cooperatively. They explained that GAS is capable to monitor the target area by using a few sensors as possible and it can produce as many cover sets as possible.\r
-\r
-%Cho et al.~\cite{cho2007distributed} proposed a distributed node scheduling protocol, which can retain sensing coverage needed by applications\r
-%and increase network lifetime via putting in sleep mode some redundant nodes. In this work, the effective sensing area (ESA) concept of a sensor node is used, which refers to the sensing area that is not overlapping with another sensor's sensing area. A sensor node and by compute it's ESA can be determine whether it will be active or sleep. The suggested work permits to sensor nodes to be in sleep mode opportunistically whilst fulfill the needed sensing coverage.\r
- \r
-%In~\cite{quang2008algorithm}, the authors defined a maximum sensing coverage region problem (MSCR) in WSNs and then proposed an algorithm to solve it. The\r
-%maximum observed area fully covered by a minimum active sensors. In this work, the major property is to getting rid from the redundant sensors in high-density WSNs and putting them in sleep mode, and choosing a smaller number of active sensors so as to be sure that the full area is k-covered, and all events appeared in that area can be precisely and timely detected. This algorithm minimized the total energy consumption and increased the lifetime.\r
-\r
-%A novel method to divide the sensors in the WSN, called node coverage grouping (NCG) suggested~\cite{lin2010partitioning}. The sensors in the connectivity group are within sensing range of each other, and the data collected by them in the same group are supposed to be similar. They are proved that dividing n sensors via NCG into connectivity groups is a NP-hard problem. So, a heuristic algorithm of NCG with time complexity of $O(n^3)$ is proposed.\r
-%For some applications, such as monitoring an ecosystem with extremely diversified environment, It might be premature assumption that sensors near to each other sense similar data.\r
-\r
-%In~\cite{zaidi2009minimum}, the problem of minimum cost coverage in which full coverage is performed by using the minimum number of sensors for an arbitrary geometric shape region is addressed. a geometric solution to the minimum cost coverage problem under a deterministic deployment is proposed. The probabilistic coverage solution which provides a relationship between the probability of coverage and the number of randomly deployed sensors in an arbitrarily-shaped region is suggested. The authors are clarified that with a random deployment about seven times more nodes are required to supply full coverage.\r
-\r
-%A graph theoretical framework for connectivity-based coverage with configurable coverage granularity was proposed~\cite{dong2012distributed}. A new coverage criterion and scheduling approach is proposed based on cycle partition. This method is capable of build a sparse coverage set in distributed way by means of only connectivity information. This work considers only the communication range of the sensor is smaller two times the sensing range of sensor.\r
-\r
-%Liu et al.~\cite{liu2010energy} formulated maximum disjoint sets problem for retaining coverage and connectivity in WSN. Two algorithms are proposed for solving this problem, heuristic algorithm and network flow algorithm. This work did not take into account the sensor node failure, which is an unpredictable event because the two solutions are full centralized algorithms.\r
\r
-%The work that presented in~\cite{aslanyan2013optimal} solved the coverage and connectivity problem in sensor networks in\r
-%an integrated way. The network lifetime is divided in a fixed number of rounds. A coverage bitmap of sensors of the domain has been generated in each round and based on this bitmap, it has been decided which sensors\r
-%stay active or turn it to sleep. They checked the connection of the graph via laplacian of adjancy graph of active sensors in each round. the generation of coverage bitmap by using Minkowski technique, the network is able to providing the desired ratio of coverage. They have been defined the connected coverage problem as an optimization problem and a centralized genetic algorithm is used to find the solution.\r
-\r
-%Several algorithms to retain the coverage and maximize the network lifetime were proposed in~\cite{cardei2006energy,wang2011coverage}. \r
-\r
-%\uppercase{\textbf{shortcomings}}. In spite of many energy-efficient protocols for maintaining the coverage and improving the network lifetime in WSNs were proposed, non of them ensure the coverage for the sensing field with optimal minimum number of active sensor nodes, and for a long time as possible. For example, in a full centralized algorithms, an optimal solutions can be given by using optimization approaches, but in the same time, a high energy is consumed for the execution time of the algorithm and the communications among the sensors in the sensing field, so, the full centralized approaches are not good candidate to use it especially in large WSNs. Whilst, a full distributed algorithms can not give optimal solutions because this algorithms use only local information of the neighboring sensors, but in the same time, the energy consumption during the communications and executing the algorithm is highly lower. Whatever the case, this would result in a shorter lifetime coverage in WSNs.\r
-\r
-%\uppercase{\textbf{Our Protocol}}. In this paper, a Lifetime Coverage Optimization Protocol, called (PeCO) in WSNs is suggested. The sensing field is divided into smaller subregions by means of divide-and-conquer method, and a PeCO protocol is distributed in each sensor in the subregion. The network lifetime in each subregion is divided into periods, each period includes 4 stages: Information Exchange, Leader election, decision based activity scheduling optimization, and sensing. The leaders are elected in an independent, asynchronous, and distributed way in all the subregions of the WSN. After that, energy-efficient activity scheduling mechanism based new optimization model is performed by each leader in the subregions. This optimization model is based on the perimeter coverage model in order to producing the optimal cover set of active sensors, which are taken the responsibility of sensing during the current period. PeCO protocol merges between two energy efficient mechanisms, which are used the main advantages of the centralized and distributed approaches and avoids the most of their disadvantages.\r
\r
\section{ The P{\scshape e}CO Protocol Description}\r
\label{sec:The PeCO Protocol Description}\r
background idea of our protocol, and third we give the outline of the algorithm\r
executed by each node.\r
\r
-% It is based on two efficient-energy mechanisms: the first, is partitioning the sensing field into smaller subregions, and one leader is elected for each subregion; the second, a sensor activity scheduling based new optimization model so as to produce the optimal cover set of active sensors for the sensing stage during the period. Obviously, these two mechanisms can be contribute in extend the network lifetime coverage efficiently. \r
-%Before proceeding in the presentation of the main ideas of the protocol, we will briefly describe the perimeter coverage model and give some necessary assumptions and definitions.\r
\r
\subsection{Assumptions and Models}\r
\label{CI}\r
sensor nodes have a constant sensing range $R_s$. Thus, all the space points\r
within a disk centered at a sensor with a radius equal to the sensing range are\r
said to be covered by this sensor. We also assume that the communication range\r
-$R_c$ satisfies $R_c \geq 2 \cdot R_s$. In fact, Zhang and Zhou~\cite{Zhang05}\r
+$R_c$ satisfies $R_c \geq 2 \cdot R_s$. In fact, \citet{Zhang05}\r
proved that if the transmission range fulfills the previous hypothesis, the\r
complete coverage of a convex area implies connectivity among active nodes.\r
\r
-The PeCO protocol uses the same perimeter-coverage model as Huang and\r
-Tseng in~\cite{huang2005coverage}. It can be expressed as follows: a sensor is\r
+The PeCO protocol uses the same perimeter-coverage model as \citet{huang2005coverage}. It can be expressed as follows: a sensor is\r
said to be perimeter covered if all the points on its perimeter are covered by\r
at least one sensor other than itself. They proved that a network area is\r
$k$-covered if and only if each sensor in the network is $k$-perimeter-covered (perimeter covered by at least $k$ sensors).\r
-%According to this model, we named the intersections among the sensor nodes in the sensing field as intersection points. Instead of working with the coverage area, we consider for each sensor a set of intersection points which are determined by using perimeter-coverage model. \r
-Figure~\ref{pcm2sensors}(a) shows the coverage of sensor node~$0$. On this\r
+ \r
+Figure~\ref{figure1}(a) shows the coverage of sensor node~$0$. On this\r
figure, we can see that sensor~$0$ has nine neighbors and we have reported on\r
its perimeter (the perimeter of the disk covered by the sensor) for each\r
neighbor the two points resulting from the intersection of the two sensing\r
\begin{figure}[ht!]\r
\centering\r
\begin{tabular}{@{}cr@{}}\r
- \includegraphics[width=75mm]{figure1a.tiff} & \raisebox{3.25cm}{(a)} \\\r
- \includegraphics[width=75mm]{figure1b.tiff} & \raisebox{2.75cm}{(b)}\r
+ \includegraphics[width=75mm]{figure1a.eps} & \raisebox{3.25cm}{(a)} \\\r
+ \includegraphics[width=75mm]{figure1b.eps} & \raisebox{2.75cm}{(b)}\r
\end{tabular}\r
\caption{(a) Perimeter coverage of sensor node 0 and (b) finding the arc of\r
$u$'s perimeter covered by $v$.}\r
- \label{pcm2sensors}\r
+ \label{figure1}\r
\end{figure} \r
\r
-Figure~\ref{pcm2sensors}(b) describes the geometric information used to find the\r
+Figure~\ref{figure1}(b) describes the geometric information used to find the\r
locations of the left and right points of an arc on the perimeter of a sensor\r
node~$u$ covered by a sensor node~$v$. Node~$v$ is supposed to be located on the\r
west side of sensor~$u$, with the following respective coordinates in the\r
\r
Every couple of intersection points is placed on the angular interval $[0,2\pi]$\r
in a counterclockwise manner, leading to a partitioning of the interval.\r
-Figure~\ref{pcm2sensors}(a) illustrates the arcs for the nine neighbors of\r
-sensor $0$ and Figure~\ref{expcm} gives the position of the corresponding arcs\r
+Figure~\ref{figure1}(a) illustrates the arcs for the nine neighbors of\r
+sensor $0$ and figure~\ref{figure2} gives the position of the corresponding arcs\r
in the interval $[0,2\pi]$. More precisely, we can see that the points are\r
ordered according to the measures of the angles defined by their respective\r
positions. The intersection points are then visited one after another, starting\r
maximum level of coverage is equal to the number of overlapping arcs. For\r
example, \r
between~$5L$ and~$6L$ the maximum level of coverage is equal to $3$\r
-(the value is highlighted in yellow at the bottom of Figure~\ref{expcm}), which\r
+(the value is highlighted in yellow at the bottom of figure~\ref{figure2}), which\r
means that at most 2~neighbors can cover the perimeter in addition to node $0$. \r
Table~\ref{my-label} summarizes for each coverage interval the maximum level of\r
coverage and the sensor nodes covering the perimeter. The example discussed\r
above is thus given by the sixth line of the table.\r
\r
-%The points reported on the line segment $[0,2\pi]$ separates it in intervals as shown in figure~\ref{expcm}. For example, for each neighboring sensor of sensor 0, place the points $\alpha^ 1_L$, $\alpha^ 1_R$, $\alpha^ 2_L$, $\alpha^ 2_R$, $\alpha^ 3_L$, $\alpha^ 3_R$, $\alpha^ 4_L$, $\alpha^ 4_R$, $\alpha^ 5_L$, $\alpha^ 5_R$, $\alpha^ 6_L$, $\alpha^ 6_R$, $\alpha^ 7_L$, $\alpha^ 7_R$, $\alpha^ 8_L$, $\alpha^ 8_R$, $\alpha^ 9_L$, and $\alpha^ 9_R$; on the line segment $[0,2\pi]$, and then sort all these points in an ascending order into a list. Traverse the line segment $[0,2\pi]$ by visiting each point in the sorted list from left to right and determine the coverage level of each interval of the sensor 0 (see figure \ref{expcm}). For each interval, we sum up the number of parts of segments, and we deduce a level of coverage for each interval. For instance, the interval delimited by the points $5L$ and $6L$ contains three parts of segments. That means that this part of the perimeter of the sensor $0$ may be covered by three sensors, sensor $0$ itself and sensors $2$ and $5$. The level of coverage of this interval may reach $3$ if all previously mentioned sensors are active. Let say that sensors $0$, $2$ and $5$ are involved in the coverage of this interval. Table~\ref{my-label} summarizes the level of coverage for each interval and the sensors involved in for sensor node 0 in figure~\ref{pcm2sensors}(a). \r
-% to determine the level of the perimeter coverage for each left and right point of a segment.\r
\r
\begin{figure*}[t!]\r
\centering\r
-\includegraphics[width=127.5mm]{figure2.tiff} \r
+\includegraphics[width=127.5mm]{figure2.eps} \r
\caption{Maximum coverage levels for perimeter of sensor node $0$.}\r
-\label{expcm}\r
+\label{figure2}\r
\end{figure*} \r
\r
-%For example, consider the sensor node $0$ in figure~\ref{pcmfig}, which has 9 neighbors. Figure~\ref{expcm} shows the perimeter coverage level for all left and right points of a segment that covered by a neighboring sensor nodes. Based on the figure~\ref{expcm}, the set of sensors for each left and right point of the segments illustrated in figure~\ref{ex2pcm} for the sensor node 0.\r
\r
\r
\r
\end{table}\r
\r
\r
-%The optimization algorithm that used by PeCO protocol based on the perimeter coverage levels of the left and right points of the segments and worked to minimize the number of sensor nodes for each left or right point of the segments within each sensor node. The algorithm minimize the perimeter coverage level of the left and right points of the segments, while, it assures that every perimeter coverage level of the left and right points of the segments greater than or equal to 1.\r
+\r
\r
In the PeCO protocol, the scheduling of the sensor nodes' activities is formulated with an\r
integer program based on coverage intervals. The formulation of the coverage\r
optimization problem is detailed in~section~\ref{cp}. Note that when a sensor\r
node has a part of its sensing range outside the WSN sensing field, as in\r
-Figure~\ref{ex4pcm}, the maximum coverage level for this arc is set to $\infty$\r
+figure~\ref{figure3}, the maximum coverage level for this arc is set to $\infty$\r
and the corresponding interval will not be taken into account by the\r
optimization algorithm.\r
- \r
+\r
+ \newpage\r
\begin{figure}[h!]\r
\centering\r
-\includegraphics[width=62.5mm]{figure3.tiff} \r
+\includegraphics[width=62.5mm]{figure3.eps} \r
\caption{Sensing range outside the WSN's area of interest.}\r
-\label{ex4pcm}\r
+\label{figure3}\r
\end{figure} \r
-%Figure~\ref{ex5pcm} gives an example to compute the perimeter coverage levels for the left and right points of the segments for a sensor node $0$, which has a part of its sensing range exceeding the border of the sensing field of WSN, and it has a six neighbors. In figure~\ref{ex5pcm}, the sensor node $0$ has two segments outside the border of the network sensing field, so the left and right points of the two segments called $-1L$, $-1R$, $-2L$, and $-2R$.\r
-%\begin{figure}[ht!]\r
-%\centering\r
-%\includegraphics[width=75mm]{ex5pcm.jpg} \r
-%\caption{Coverage intervals and contributing sensors for sensor node 0 having a part of its sensing range outside the border.}\r
-%\label{ex5pcm}\r
-%\end{figure} \r
+\r
\r
\subsection{The Main Idea}\r
\r
our protocol will be executed in a distributed way in each subregion\r
simultaneously to schedule nodes' activities for one sensing period.\r
\r
-As shown in Figure~\ref{fig2}, node activity scheduling is produced by our\r
+As shown in figure~\ref{figure4}, node activity scheduling is produced by our\r
protocol in a periodic manner. Each period is divided into 4 stages: Information\r
(INFO) Exchange, Leader Election, Decision (the result of an optimization\r
problem), and Sensing. For each period there is exactly one set cover\r
\r
\begin{figure}[t!]\r
\centering\r
-\includegraphics[width=80mm]{figure4.tiff} \r
+\includegraphics[width=80mm]{figure4.eps} \r
\caption{PeCO protocol.}\r
-\label{fig2}\r
+\label{figure4}\r
\end{figure} \r
\r
We define two types of packets to be used by PeCO protocol:\r
-%\begin{enumerate}[(a)]\r
+\r
\begin{itemize} \r
\item INFO packet: sent by each sensor node to all the nodes inside a same\r
subregion for information exchange.\r
to transmit to them their respective status (stay Active or go Sleep) during\r
sensing phase.\r
\end{itemize}\r
-%\end{enumerate}\r
+\r
\r
Five status are possible for a sensor node in the network:\r
-%\begin{enumerate}[(a)] \r
+\r
\begin{itemize} \r
\item LISTENING: waits for a decision (to be active or not);\r
\item COMPUTATION: executes the optimization algorithm as leader to\r
\item SLEEP: node is turned off;\r
\item COMMUNICATION: transmits or receives packets.\r
\end{itemize}\r
-%\end{enumerate}\r
-%Below, we describe each phase in more details.\r
+\r
\r
\subsection{PeCO Protocol Algorithm}\r
\r
protocol applied by a sensor node $s_k$ where $k$ is the node index in the WSN.\r
\r
\r
-\iffalse\r
+\r
\begin{algorithm} \r
% \KwIn{all the parameters related to information exchange}\r
% \KwOut{$winer-node$ (: the id of the winner sensor node, which is the leader of current round)}\r
- \BlankLine\r
+% \BlankLine\r
%\emph{Initialize the sensor node and determine it's position and subregion} \; \r
\r
- \If{ $RE_k \geq E_{th}$ }{\r
- \emph{$s_k.status$ = COMMUNICATION}\;\r
- \emph{Send $INFO()$ packet to other nodes in subregion}\;\r
- \emph{Wait $INFO()$ packet from other nodes in subregion}\; \r
- \emph{Update K.CurrentSize}\;\r
- \emph{LeaderID = Leader election}\;\r
- \If{$ s_k.ID = LeaderID $}{\r
- \emph{$s_k.status$ = COMPUTATION}\;\r
- \r
- \If{$ s_k.ID $ is Not previously selected as a Leader }{\r
- \emph{ Execute the perimeter coverage model}\;\r
- % \emph{ Determine the segment points using perimeter coverage model}\;\r
- }\r
- \r
- \If{$ (s_k.ID $ is the same Previous Leader) And (K.CurrentSize = K.PreviousSize)}{\r
- \r
- \emph{ Use the same previous cover set for current sensing stage}\;\r
- }\r
- \Else{\r
- \emph{Update $a^j_{ik}$; prepare data for IP~Algorithm}\;\r
- \emph{$\left\{\left(X_{1},\dots,X_{l},\dots,X_{K}\right)\right\}$ = Execute Integer Program Algorithm($K$)}\;\r
- \emph{K.PreviousSize = K.CurrentSize}\;\r
- }\r
- \r
- \emph{$s_k.status$ = COMMUNICATION}\;\r
- \emph{Send $ActiveSleep()$ to each node $l$ in subregion}\;\r
- \emph{Update $RE_k $}\;\r
- } \r
- \Else{\r
- \emph{$s_k.status$ = LISTENING}\;\r
- \emph{Wait $ActiveSleep()$ packet from the Leader}\;\r
- \emph{Update $RE_k $}\;\r
- } \r
- }\r
- \Else { Exclude $s_k$ from entering in the current sensing stage}\r
- }\r
-%\caption{PeCO($s_k$)}\r
+\noindent{\bf If} $RE_k \geq E_{th}$ {\bf then}\\\r
+\hspace*{0.6cm} \emph{$s_k.status$ = COMMUNICATION;}\\\r
+\hspace*{0.6cm} \emph{Send $INFO()$ packet to other nodes in subregion;}\\\r
+\hspace*{0.6cm} \emph{Wait $INFO()$ packet from other nodes in subregion;}\\\r
+\hspace*{0.6cm} \emph{Update K.CurrentSize;}\\\r
+\hspace*{0.6cm} \emph{LeaderID = Leader election;}\\\r
+\hspace*{0.6cm} {\bf If} $ s_k.ID = LeaderID $ {\bf then}\\\r
+\hspace*{1.2cm} \emph{$s_k.status$ = COMPUTATION;}\\\r
+\hspace*{1.2cm}{\bf If} \emph{$ s_k.ID $ is Not previously selected as a Leader} {\bf then}\\\r
+\hspace*{1.8cm} \emph{ Execute the perimeter coverage model;}\\\r
+\hspace*{1.2cm} {\bf end}\\\r
+\hspace*{1.2cm}{\bf If} \emph{($s_k.ID $ is the same Previous Leader)~And~(K.CurrentSize = K.PreviousSize)}\\\r
+\hspace*{1.8cm} \emph{ Use the same previous cover set for current sensing stage;}\\\r
+\hspace*{1.2cm} {\bf end}\\\r
+\hspace*{1.2cm} {\bf else}\\\r
+\hspace*{1.8cm}\emph{Update $a^j_{ik}$; prepare data for IP~Algorithm;}\\\r
+\hspace*{1.8cm} \emph{$\left\{\left(X_{1},\dots,X_{l},\dots,X_{K}\right)\right\}$ = Execute Integer Program Algorithm($K$);}\\\r
+\hspace*{1.8cm} \emph{K.PreviousSize = K.CurrentSize;}\\\r
+\hspace*{1.2cm} {\bf end}\\\r
+\hspace*{1.2cm}\emph{$s_k.status$ = COMMUNICATION;}\\\r
+\hspace*{1.2cm}\emph{Send $ActiveSleep()$ to each node $l$ in subregion;}\\\r
+\hspace*{1.2cm}\emph{Update $RE_k $;}\\\r
+\hspace*{0.6cm} {\bf end}\\\r
+\hspace*{0.6cm} {\bf else}\\\r
+\hspace*{1.2cm}\emph{$s_k.status$ = LISTENING;}\\\r
+\hspace*{1.2cm}\emph{Wait $ActiveSleep()$ packet from the Leader;}\\\r
+\hspace*{1.2cm}\emph{Update $RE_k $;}\\\r
+\hspace*{0.6cm} {\bf end}\\\r
+{\bf end}\\\r
+{\bf else}\\\r
+\hspace*{0.6cm} \emph{Exclude $s_k$ from entering in the current sensing stage;}\\\r
+{\bf end}\\\r
\label{alg:PeCO}\r
\end{algorithm}\r
-\fi\r
+\r
+\r
\r
In this algorithm, K.CurrentSize and K.PreviousSize respectively represent the\r
current number and the previous number of living nodes in the subnetwork of the\r
collects information to formulate and solve the integer program which allows to\r
construct the set of active sensors in the sensing stage.\r
\r
-%After the cooperation among the sensor nodes in the same subregion, the leader will be elected in distributed way, where each sensor node and based on it's information decide who is the leader. The selection criteria for the leader in order of priority are: larger number of neighbors, larger remaining energy, and then in case of equality, larger index. Thereafter, if the sensor node is leader, it will execute the perimeter-coverage model for each sensor in the subregion in order to determine the segment points which would be used in the next stage by the optimization algorithm of the PeCO protocol. Every sensor node is selected as a leader, it is executed the perimeter coverage model only one time during it's life in the network.\r
-\r
-% The leader has the responsibility of applying the integer program algorithm (see section~\ref{cp}), which provides a set of sensors planned to be active in the sensing stage. As leader, it will send an Active-Sleep packet to each sensor in the same subregion to inform it if it has to be active or not. On the contrary, if the sensor is not the leader, it will wait for the Active-Sleep packet to know its state for the sensing stage.\r
\r
\section{Perimeter-based Coverage Problem Formulation}\r
\label{cp}\r
& \mbox{coverage interval $i$ of sensor $j$}, \\\r
0 & \mbox{otherwise.}\\\r
\end{array} \right.\r
-%\label{eq12} \r
-%\notag\r
\end{equation}\r
Note that $a^k_{ik}=1$ by definition of the interval.\r
-%, where the objective is to find the maximum number of non-disjoint sets of sensor nodes such that each set cover can assure the coverage for the whole region so as to extend the network lifetime in WSN. Our model uses the PCL~\cite{huang2005coverage} in order to optimize the lifetime coverage in each subregion.\r
-%We defined some parameters, which are related to our optimization model. In our model, we consider binary variables $X_{k}$, which determine the activation of sensor $k$ in the sensing round $k$. .\r
+\r
Second, we define several binary and integer variables. Hence, each binary\r
variable $X_{k}$ determines the activation of sensor $k$ in the sensing phase\r
($X_k=1$ if the sensor $k$ is active or 0 otherwise). $M^j_i$ is an integer\r
desired coverage level, and if the desired level cannot be completely satisfied,\r
to reach a coverage level as close as possible to the desired one.\r
\r
-%A system of linear constraints is imposed to attempt to keep the coverage level in each coverage interval to within specified PCL. Since it is physically impossible to satisfy all constraints simultaneously, each constraint uses a variable to either record when the coverage level is achieved, or to record the deviation from the desired coverage level. These additional variables are embedded into an objective function to be minimized. \r
-\r
-%\noindent In this paper, let us define some parameters, which are used in our protocol.\r
-%the set of segment points is denoted by $I$, the set of all sensors in the network by $J$, and the set of alive sensors within $J$ by $K$.\r
-\r
\r
-%\noindent \begin{equation}\r
-%X_{k} = \left \{ \r
-%\begin{array}{l l}\r
- % 1& \mbox{if sensor $k$ is active,} \\\r
-% 0 & \mbox{otherwise.}\\\r
-%\end{array} \right.\r
-%\label{eq11} \r
-%\notag\r
-%\end{equation}\r
\r
-%\noindent $M^j_i (undercoverage): $ integer value $\in \mathbb{N}$ for segment point $i$ of sensor $j$.\r
-\r
-%\noindent $V^j_i (overcoverage): $ integer value $\in \mathbb{N}$ for segment point $i$ of sensor $j$.\r
\r
Our coverage optimization problem can then be mathematically expressed as follows: \r
-%Objective:\r
-\begin{equation} %\label{eq:ip2r}\r
+\r
+\begin{equation} \r
\left \{\r
\begin{array}{ll}\r
\min \sum_{j \in S} \sum_{i \in I_j} (\alpha^j_i ~ M^j_i + \beta^j_i ~ V^j_i )&\\\r
\textrm{subject to :}&\\\r
\sum_{k \in A} ( a^j_{ik} ~ X_{k}) + M^j_i \geq l \quad \forall i \in I_j, \forall j \in S\\\r
-%\label{c1} \r
\sum_{k \in A} ( a^j_{ik} ~ X_{k}) - V^j_i \leq l \quad \forall i \in I_j, \forall j \in S\\\r
-% \label{c2}\r
-% \Theta_{p}\in \mathbb{N}, &\forall p \in P\\\r
-% U_{p} \in \{0,1\}, &\forall p \in P\\\r
X_{k} \in \{0,1\}, \forall k \in A\r
\end{array}\r
\right.\r
-%\notag\r
\end{equation}\r
+\r
$\alpha^j_i$ and $\beta^j_i$ are nonnegative weights selected according to the\r
relative importance of satisfying the associated level of coverage. For example,\r
weights associated with coverage intervals of a specified part of a region may\r
be given by a relatively larger magnitude than weights associated with another\r
region. This kind of integer program is inspired from the model developed for\r
brachytherapy treatment planning for optimizing dose distribution\r
-\cite{0031-9155-44-1-012}. The integer program must be solved by the leader in\r
+\citep{0031-9155-44-1-012}. The integer program must be solved by the leader in\r
each subregion at the beginning of each sensing phase, whenever the environment\r
has changed (new leader, death of some sensors). Note that the number of\r
constraints in the model is constant (constraints of coverage expressed for all\r
\r
\section{Performance Evaluation and Analysis} \r
\label{sec:Simulation Results and Analysis}\r
-%\noindent \subsection{Simulation Framework}\r
+\r
\r
\subsection{Simulation Settings}\r
-%\label{sub1}\r
+\r
\r
The WSN area of interest is supposed to be divided into 16~regular subregions\r
-and we use the same energy consumption than in our previous work~\cite{Idrees2}.\r
+and we use the same energy consumption than in our previous work~\citep{Idrees2}.\r
Table~\ref{table3} gives the chosen parameters settings.\r
\r
\begin{table}[ht]\r
\tbl{Relevant parameters for network initialization \label{table3}}{\r
-% title of Table\r
+\r
\centering\r
-% used for centering table\r
+\r
\begin{tabular}{c|c}\r
-% centered columns (4 columns)\r
+\r
\hline\r
Parameter & Value \\ [0.5ex]\r
\r
Sensing field & $(50 \times 25)~m^2 $ \\\r
\r
WSN size & 100, 150, 200, 250, and 300~nodes \\\r
-%\hline\r
+\r
Initial energy & in range 500-700~Joules \\ \r
-%\hline\r
+\r
Sensing period & duration of 60 minutes \\\r
$E_{th}$ & 36~Joules\\\r
$R_s$ & 5~m \\ \r
-%\hline\r
+\r
$\alpha^j_i$ & 0.6 \\\r
-% [1ex] adds vertical space\r
-%\hline\r
+\r
$\beta^j_i$ & 0.4\r
-%inserts single line\r
+\r
\end{tabular}}\r
\r
-% is used to refer this table in the text\r
+\r
\end{table}\r
To obtain experimental results which are relevant, simulations with five\r
different node densities going from 100 to 300~nodes were performed considering\r
We introduce the following performance metrics to evaluate the efficiency of our\r
approach.\r
\r
-%\begin{enumerate}[i)]\r
+\r
\begin{itemize}\r
\item {\bf Network Lifetime}: the lifetime is defined as the time elapsed until\r
the coverage ratio falls below a fixed threshold. $Lifetime_{95}$ and\r
observe the area of interest. In our case, we discretized the sensor field as\r
a regular grid, which yields the following equation:\r
\r
-%\begin{equation*}\r
+\r
\[\r
\scriptsize\r
\mbox{CR}(\%) = \frac{\mbox{$n$}}{\mbox{$N$}} \times 100\r
\]\r
-% \end{equation*}\r
+\r
\r
where $n$ is the number of covered grid points by active sensors of every\r
subregions during the current sensing phase and $N$ is total number of grid\r
activate as few nodes as possible, in order to minimize the communication\r
overhead and maximize the WSN lifetime. The active sensors ratio is defined as\r
follows:\r
- %\begin{equation*}\r
+ \r
\[\r
\scriptsize\r
\mbox{ASR}(\%) = \frac{\sum\limits_{r=1}^R \mbox{$|A_r^p|$}}{\mbox{$|S|$}} \times 100\r
\]\r
- %\end{equation*}\r
+\r
where $|A_r^p|$ is the number of active sensors in the subregion $r$ in the\r
current sensing period~$p$, $|S|$ is the number of sensors in the network, and\r
$R$ is the number of subregions.\r
energy consumed by the sensors during $Lifetime_{95}$ or $Lifetime_{50}$,\r
divided by the number of periods. The value of EC is computed according to\r
this formula:\r
- %\begin{equation*}\r
+\r
\[ \r
\scriptsize\r
\mbox{EC} = \frac{\sum\limits_{p=1}^{P} \left( E^{\mbox{com}}_p+E^{\mbox{list}}_p+E^{\mbox{comp}}_p \r
+ E^{a}_p+E^{s}_p \right)}{P},\r
\]\r
- % \end{equation*}\r
+ \r
where $P$ corresponds to the number of periods. The total energy consumed by\r
the sensors comes through taking into consideration four main energy\r
factors. The first one, denoted $E^{\scriptsize \mbox{com}}_p$, represents the\r
program during a period. Finally, $E^a_{p}$ and $E^s_{p}$ indicate the energy\r
consumed by the WSN during the sensing phase (active and sleeping nodes).\r
\end{itemize}\r
-%\end{enumerate}\r
+\r
\r
\subsection{Simulation Results}\r
\r
In order to assess and analyze the performance of our protocol we have\r
-implemented PeCO protocol in OMNeT++~\cite{varga} simulator. Besides PeCO, two\r
+implemented PeCO protocol in OMNeT++~\citep{varga} simulator. Besides PeCO, two\r
other protocols, described in the next paragraph, will be evaluated for\r
comparison purposes. The simulations were run on a DELL laptop with an Intel\r
-Core~i3~2370~M (2.4~GHz) processor (2 cores) whose MIPS (Million Instructions\r
+Core~i3~2370~M (1.8~GHz) processor (2 cores) whose MIPS (Million Instructions\r
Per Second) rate is equal to 35330. To be consistent with the use of a sensor\r
node based on Atmels AVR ATmega103L microcontroller (6~MHz) having a MIPS rate\r
equal to 6, the original execution time on the laptop is multiplied by 2944.2\r
$\left(\frac{35330}{2} \times \frac{1}{6} \right)$. The modeling language for\r
-Mathematical Programming (AMPL)~\cite{AMPL} is employed to generate the integer\r
+Mathematical Programming (AMPL)~\citep{AMPL} is employed to generate the integer\r
program instance in a standard format, which is then read and solved by the\r
optimization solver GLPK (GNU linear Programming Kit available in the public\r
-domain) \cite{glpk} through a Branch-and-Bound method.\r
+domain) \citep{glpk} through a Branch-and-Bound method.\r
\r
As said previously, the PeCO is compared to three other approaches. The first\r
one, called DESK, is a fully distributed coverage algorithm proposed by\r
-\cite{ChinhVu}. The second one, called GAF~\cite{xu2001geography}, consists in\r
+\citep{ChinhVu}. The second one, called GAF~\citep{xu2001geography}, consists in\r
dividing the monitoring area into fixed squares. Then, during the decision\r
phase, in each square, one sensor is chosen to remain active during the sensing\r
-phase. The last one, the DiLCO protocol~\cite{Idrees2}, is an improved version\r
-of a research work we presented in~\cite{idrees2014coverage}. Let us notice that\r
+phase. The last one, the DiLCO protocol~\citep{Idrees2}, is an improved version\r
+of a research work we presented in~\citep{idrees2014coverage}. Let us notice that\r
PeCO and DiLCO protocols are based on the same framework. In particular, the\r
choice for the simulations of a partitioning in 16~subregions was made because\r
it corresponds to the configuration producing the best results for DiLCO. The\r
\r
\subsubsection{\bf Coverage Ratio}\r
\r
-Figure~\ref{fig333} shows the average coverage ratio for 200 deployed nodes\r
+Figure~\ref{figure5} shows the average coverage ratio for 200 deployed nodes\r
obtained with the four protocols. DESK, GAF, and DiLCO provide a slightly better\r
coverage ratio with respectively 99.99\%, 99.91\%, and 99.02\%, compared to the 98.76\%\r
produced by PeCO for the first periods. This is due to the fact that at the\r
\centering\r
\includegraphics[scale=0.5] {figure5.eps} \r
\caption{Coverage ratio for 200 deployed nodes.}\r
-\label{fig333}\r
+\label{figure5}\r
\end{figure} \r
\r
-%When the number of periods increases, coverage ratio produced by DESK and GAF protocols decreases. This is due to dead nodes. However, DiLCO protocol maintains almost a good coverage from the round 31 to the round 63 and it is close to PeCO protocol. The coverage ratio of PeCO protocol is better than other approaches from the period 64.\r
\r
-%because the optimization algorithm used by PeCO has been optimized the lifetime coverage based on the perimeter coverage model, so it provided acceptable coverage for a larger number of periods and prolonging the network lifetime based on the perimeter of the sensor nodes in each subregion of WSN. Although some nodes are dead, sensor activity scheduling based optimization of PeCO selected another nodes to ensure the coverage of the area of interest. i.e. DiLCO-16 showed a good coverage in the beginning then PeCO, when the number of periods increases, the coverage ratio decreases due to died sensor nodes. Meanwhile, thanks to sensor activity scheduling based new optimization model, which is used by PeCO protocol to ensure a longer lifetime coverage in comparison with other approaches. \r
\r
\r
\subsubsection{\bf Active Sensors Ratio}\r
\r
Having the less active sensor nodes in each period is essential to minimize the\r
-energy consumption and thus to maximize the network lifetime. Figure~\ref{fig444}\r
+energy consumption and thus to maximize the network lifetime. Figure~\ref{figure6}\r
shows the average active nodes ratio for 200 deployed nodes. We observe that\r
DESK and GAF have 30.36 \% and 34.96 \% active nodes for the first fourteen\r
rounds and DiLCO and PeCO protocols compete perfectly with only 17.92~\% and\r
20.16~\% active nodes during the same time interval. As the number of periods\r
increases, PeCO protocol has a lower number of active nodes in comparison with\r
the three other approaches, while keeping a greater coverage ratio as shown in\r
-Figure \ref{fig333}.\r
+figure \ref{figure5}.\r
\r
\begin{figure}[h!]\r
\centering\r
\includegraphics[scale=0.5]{figure6.eps} \r
\caption{Active sensors ratio for 200 deployed nodes.}\r
-\label{fig444}\r
+\label{figure6}\r
\end{figure} \r
\r
\subsubsection{\bf Energy Consumption}\r
\r
We studied the effect of the energy consumed by the WSN during the communication,\r
computation, listening, active, and sleep status for different network densities\r
-and compared it for the four approaches. Figures~\ref{fig3EC}(a) and (b)\r
+and compared it for the four approaches. Figures~\ref{figure7}(a) and (b)\r
illustrate the energy consumption for different network sizes and for\r
$Lifetime95$ and $Lifetime50$. The results show that our PeCO protocol is the\r
most competitive from the energy consumption point of view. As shown in both\r
\includegraphics[scale=0.475]{figure7b.eps} & \raisebox{2.75cm}{(b)}\r
\end{tabular}\r
\caption{Energy consumption per period for (a)~$Lifetime_{95}$ and (b)~$Lifetime_{50}$.}\r
- \label{fig3EC}\r
+ \label{figure7}\r
\end{figure} \r
\r
-%The optimization algorithm, which used by PeCO protocol, was improved the lifetime coverage efficiently based on the perimeter coverage model.\r
-\r
- %The other approaches have a high energy consumption due to activating a larger number of sensors. In fact, a distributed method on the subregions greatly reduces the number of communications and the time of listening so thanks to the partitioning of the initial network into several independent subnetworks. \r
\r
\r
-%\subsubsection{Execution Time}\r
-\r
\subsubsection{\bf Network Lifetime}\r
\r
We observe the superiority of PeCO and DiLCO protocols in comparison with the\r
two other approaches in prolonging the network lifetime. In\r
-Figures~\ref{fig3LT}(a) and (b), $Lifetime95$ and $Lifetime50$ are shown for\r
+Figures~\ref{figure8}(a) and (b), $Lifetime95$ and $Lifetime50$ are shown for\r
different network sizes. As highlighted by these figures, the lifetime\r
increases with the size of the network, and it is clearly largest for DiLCO\r
and PeCO protocols. For instance, for a network of 300~sensors and coverage\r
-ratio greater than 50\%, we can see on Figure~\ref{fig3LT}(b) that the lifetime\r
+ratio greater than 50\%, we can see on figure~\ref{figure8}(b) that the lifetime\r
is about twice longer with PeCO compared to DESK protocol. The performance\r
-difference is more obvious in Figure~\ref{fig3LT}(b) than in\r
-Figure~\ref{fig3LT}(a) because the gain induced by our protocols increases with\r
+difference is more obvious in figure~\ref{figure8}(b) than in\r
+figure~\ref{figure8}(a) because the gain induced by our protocols increases with\r
time, and the lifetime with a coverage of 50\% is far longer than with\r
95\%.\r
\r
\end{tabular}\r
\caption{Network Lifetime for (a)~$Lifetime_{95}$ \\\r
and (b)~$Lifetime_{50}$.}\r
- \label{fig3LT}\r
+ \label{figure8}\r
\end{figure} \r
\r
-%By choosing the best suited nodes, for each period, by optimizing the coverage and lifetime of the network to cover the area of interest and by letting the other ones sleep in order to be used later in next rounds, PeCO protocol efficiently prolonged the network lifetime especially for a coverage ratio greater than $50 \%$, whilst it stayed very near to DiLCO-16 protocol for $95 \%$.\r
\r
-Figure~\ref{figLTALL} compares the lifetime coverage of our protocols for\r
+\r
+Figure~\ref{figure9} compares the lifetime coverage of our protocols for\r
different coverage ratios. We denote by Protocol/50, Protocol/80, Protocol/85,\r
Protocol/90, and Protocol/95 the amount of time during which the network can\r
satisfy an area coverage greater than $50\%$, $80\%$, $85\%$, $90\%$, and $95\%$\r
\begin{figure}[h!]\r
\centering \includegraphics[scale=0.5]{figure9.eps}\r
\caption{Network lifetime for different coverage ratios.}\r
-\label{figLTALL}\r
+\label{figure9}\r
\end{figure} \r
\r
-%Comparison shows that PeCO protocol, which are used distributed optimization over the subregions, is the more relevance one for most coverage ratios and WSN sizes because it is robust to network disconnection during the network lifetime as well as it consume less energy in comparison with other approaches. PeCO protocol gave acceptable coverage ratio for a larger number of periods using new optimization algorithm that based on a perimeter coverage model. It also means that distributing the algorithm in each node and subdividing the sensing field into many subregions, which are managed independently and simultaneously, is the most relevant way to maximize the lifetime of a network.\r
+\r
\r
\r
\section{Conclusion and Future Works}\r
sensors based on their perimeter coverage level, instead of using a set of\r
targets/points to be covered.\r
\r
-%To cope with this problem, the area of interest is divided into a smaller subregions using divide-and-conquer method, and then a PeCO protocol for optimizing the lifetime coverage in each subregion. PeCO protocol combines two efficient techniques: network\r
-%leader election, which executes the perimeter coverage model (only one time), the optimization algorithm, and sending the schedule produced by the optimization algorithm to other nodes in the subregion ; the second, sensor activity scheduling based optimization in which a new lifetime coverage optimization model is proposed. The main challenges include how to select the most efficient leader in each subregion and the best schedule of sensor nodes that will optimize the network lifetime coverage\r
-%in the subregion. \r
-%The network lifetime coverage in each subregion is divided into\r
-%periods, each period consists of four stages: (i) Information Exchange,\r
-%(ii) Leader Election, (iii) a Decision based new optimization model in order to\r
-%select the nodes remaining active for the last stage, and (iv) Sensing.\r
+\r
We have carried out several simulations to evaluate the proposed protocol. The\r
simulation results show that PeCO is more energy-efficient than other\r
approaches, with respect to lifetime, coverage ratio, active sensors ratio, and\r
energy consumption.\r
-%Indeed, when dealing with large and dense WSNs, a distributed optimization approach on the subregions of WSN like the one we are proposed allows to reduce the difficulty of a single global optimization problem by partitioning it in many smaller problems, one per subregion, that can be solved more easily. We have identified different research directions that arise out of the work presented here.\r
+\r
We plan to extend our framework so that the schedules are planned for multiple\r
sensing periods.\r
-%in order to compute all active sensor schedules in only one step for many periods;\r
+\r
We also want to improve our integer program to take into account heterogeneous\r
sensors from both energy and node characteristics point of views.\r
-%the third, we are investigating new optimization model based on the sensing range so as to maximize the lifetime coverage in WSN;\r
+\r
Finally, it would be interesting to implement our protocol using a\r
sensor-testbed to evaluate it in real world applications.\r
\r
year={2014}
}
-@article{rossi2012exact,
- title={An exact approach for maximizing the lifetime of sensor networks with adjustable sensing ranges},
- author={Rossi, Andr{\'e} and Singh, Alok and Sevaux, Marc},
- journal={Computers \& Operations Research},
- volume={39},
- number={12},
- pages={3166--3176},
- year={2012},
- publisher={Elsevier}
-}
+
@ARTICLE{glpk,
author = {Andrew Makhorin},
pages={242--253},
year={2012}
}
+
+@article{doi:10.1080/0305215X.2012.687732,
+author = {Singh, Alok and Rossi, André and Sevaux, Marc},
+title = {Matheuristic approaches for Q-coverage problem versions in wireless sensor networks},
+journal = {Engineering Optimization},
+volume = {45},
+number = {5},
+pages = {609-626},
+year = {2013},
+doi = {10.1080/0305215X.2012.687732},
+
+URL = {
+ http://dx.doi.org/10.1080/0305215X.2012.687732
+
+},
+eprint = {
+ http://dx.doi.org/10.1080/0305215X.2012.687732
+
+}
+
+}