]> AND Private Git Repository - ThesisAli.git/blob - Thesis.toc
Logo AND Algorithmique Numérique Distribuée

Private GIT Repository
ok
[ThesisAli.git] / Thesis.toc
1 \select@language {english}
2 \contentsline {chapter}{Abstract}{1}{chapter*.1}
3 \contentsline {chapter}{R\IeC {\'e}sum\IeC {\'e}}{3}{chapter*.2}
4 \contentsline {chapter}{Table of Contents}{5}{chapter*.3}
5 \contentsline {chapter}{List of Figures}{7}{chapter*.4}
6 \contentsline {chapter}{List of Tables}{9}{chapter*.5}
7 \contentsline {chapter}{List of Algorithms}{11}{chapter*.6}
8 \contentsline {chapter}{List of Abbreviations}{13}{chapter*.7}
9 \contentsline {chapter}{Introduction }{17}{chapter*.8}
10 \contentsline {section}{1. General Introduction }{17}{section*.9}
11 \contentsline {section}{2. Motivation of the Dissertation }{18}{section*.10}
12 \contentsline {section}{3. Main Contributions of this Dissertation}{18}{section*.11}
13 \contentsline {section}{4. Dissertation Outline}{19}{section*.12}
14 \contentsline {part}{I\hspace {1em}Scientific Background}{21}{part.1}
15 \contentsline {chapter}{\numberline {1}Wireless Sensor Networks}{23}{chapter.1}
16 \contentsline {section}{\numberline {1.1}Introduction}{23}{section.1.1}
17 \contentsline {section}{\numberline {1.2}Architecture}{24}{section.1.2}
18 \contentsline {section}{\numberline {1.3}Types of Wireless Sensor Networks}{26}{section.1.3}
19 \contentsline {section}{\numberline {1.4}Applications}{28}{section.1.4}
20 \contentsline {section}{\numberline {1.5}The Main Challenges}{31}{section.1.5}
21 \contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms of a working WSN}{33}{section.1.6}
22 \contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing}{33}{subsection.1.6.1}
23 \contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy}{33}{subsubsection.1.6.1.1}
24 \contentsline {subsubsection}{\numberline {1.6.1.2}Multipath Routing}{33}{subsubsection.1.6.1.2}
25 \contentsline {subsection}{\numberline {1.6.2}Cluster Architecture}{34}{subsection.1.6.2}
26 \contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes}{34}{subsection.1.6.3}
27 \contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes}{34}{subsubsection.1.6.3.1}
28 \contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes}{37}{subsubsection.1.6.3.2}
29 \contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes}{37}{subsection.1.6.4}
30 \contentsline {subsubsection}{\numberline {1.6.4.1}Data Reduction Schemes}{38}{subsubsection.1.6.4.1}
31 \contentsline {subsubsection}{\numberline {1.6.4.2}Energy Efficient Data Acquisition Schemes}{38}{subsubsection.1.6.4.2}
32 \contentsline {subsection}{\numberline {1.6.5}Battery Repletion}{38}{subsection.1.6.5}
33 \contentsline {subsection}{\numberline {1.6.6}Radio Optimization}{38}{subsection.1.6.6}
34 \contentsline {subsection}{\numberline {1.6.7}Relay nodes and Sink Mobility}{39}{subsection.1.6.7}
35 \contentsline {subsubsection}{\numberline {1.6.7.1}Relay node placement}{39}{subsubsection.1.6.7.1}
36 \contentsline {subsubsection}{\numberline {1.6.7.2}Sink Mobility}{39}{subsubsection.1.6.7.2}
37 \contentsline {section}{\numberline {1.7}Network Lifetime}{39}{section.1.7}
38 \contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{40}{section.1.8}
39 \contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems}{42}{section.1.9}
40 \contentsline {section}{\numberline {1.10}Energy Consumption Model}{43}{section.1.10}
41 \contentsline {section}{\numberline {1.11}Conclusion}{44}{section.1.11}
42 \contentsline {chapter}{\numberline {2}Related Works on Coverage Problems}{45}{chapter.2}
43 \contentsline {section}{\numberline {2.1}Introduction}{45}{section.2.1}
44 \contentsline {section}{\numberline {2.2}Centralized Algorithms}{47}{section.2.2}
45 \contentsline {section}{\numberline {2.3}Distributed Algorithms}{49}{section.2.3}
46 \contentsline {subsection}{\numberline {2.3.1}Geographical Adaptive Fidelity (GAF)}{51}{subsection.2.3.1}
47 \contentsline {subsection}{\numberline {2.3.2}Distributed Energy-efficient Scheduling for K-coverage (DESK)}{53}{subsection.2.3.2}
48 \contentsline {section}{\numberline {2.4}Conclusion}{57}{section.2.4}
49 \contentsline {chapter}{\numberline {3}Evaluation Tools and Optimization Solvers}{59}{chapter.3}
50 \contentsline {section}{\numberline {3.1}Introduction}{59}{section.3.1}
51 \contentsline {section}{\numberline {3.2}Evaluation Tools}{59}{section.3.2}
52 \contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{60}{subsection.3.2.1}
53 \contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{62}{subsection.3.2.2}
54 \contentsline {section}{\numberline {3.3}Optimization Solvers}{64}{section.3.3}
55 \contentsline {section}{\numberline {3.4}Conclusion}{68}{section.3.4}
56 \contentsline {part}{II\hspace {1em}Contributions}{69}{part.2}
57 \contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol}{71}{chapter.4}
58 \contentsline {section}{\numberline {4.1}Introduction}{71}{section.4.1}
59 \contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{72}{section.4.2}
60 \contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{72}{subsection.4.2.1}
61 \contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{73}{subsection.4.2.2}
62 \contentsline {subsection}{\numberline {4.2.3}Main Idea}{73}{subsection.4.2.3}
63 \contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{75}{subsubsection.4.2.3.1}
64 \contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{75}{subsubsection.4.2.3.2}
65 \contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{76}{subsubsection.4.2.3.3}
66 \contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{76}{subsubsection.4.2.3.4}
67 \contentsline {section}{\numberline {4.3}Coverage Problem Formulation}{77}{section.4.3}
68 \contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{78}{section.4.4}
69 \contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{78}{subsection.4.4.1}
70 \contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{78}{subsection.4.4.2}
71 \contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{79}{subsection.4.4.3}
72 \contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{79}{subsection.4.4.4}
73 \contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Number of Subregions}{81}{subsection.4.4.5}
74 \contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Different Number of Primary Points}{87}{subsection.4.4.6}
75 \contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{91}{subsection.4.4.7}
76 \contentsline {section}{\numberline {4.5}Conclusion}{98}{section.4.5}
77 \contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol}{99}{chapter.5}
78 \contentsline {section}{\numberline {5.1}Introduction}{99}{section.5.1}
79 \contentsline {section}{\numberline {5.2}Description of the MuDiLCO Protocol }{99}{section.5.2}
80 \contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{101}{section.5.3}
81 \contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{102}{section.5.4}
82 \contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{102}{subsection.5.4.1}
83 \contentsline {subsection}{\numberline {5.4.2}Metrics}{102}{subsection.5.4.2}
84 \contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{103}{subsection.5.4.3}
85 \contentsline {section}{\numberline {5.5}Conclusion}{110}{section.5.5}
86 \contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in WSNs}{111}{chapter.6}
87 \contentsline {section}{\numberline {6.1}Introduction}{111}{section.6.1}
88 \contentsline {section}{\numberline {6.2}Description of the PeCO Protocol}{111}{section.6.2}
89 \contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{111}{subsection.6.2.1}
90 \contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{114}{subsection.6.2.2}
91 \contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{116}{section.6.3}
92 \contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{117}{section.6.4}
93 \contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{117}{subsection.6.4.1}
94 \contentsline {subsection}{\numberline {6.4.2}Simulation Results}{118}{subsection.6.4.2}
95 \contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{118}{subsubsection.6.4.2.1}
96 \contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{118}{subsubsection.6.4.2.2}
97 \contentsline {subsubsection}{\numberline {6.4.2.3}Energy Consumption}{119}{subsubsection.6.4.2.3}
98 \contentsline {subsubsection}{\numberline {6.4.2.4}Network Lifetime}{119}{subsubsection.6.4.2.4}
99 \contentsline {subsubsection}{\numberline {6.4.2.5}Impact of $\alpha $ and $\beta $ on PeCO's performance}{120}{subsubsection.6.4.2.5}
100 \contentsline {section}{\numberline {6.5}Conclusion}{124}{section.6.5}
101 \contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{125}{part.3}
102 \contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{127}{chapter.7}
103 \contentsline {section}{\numberline {7.1}Conclusion}{127}{section.7.1}
104 \contentsline {section}{\numberline {7.2}Perspectives}{128}{section.7.2}
105 \contentsline {part}{Publications}{131}{chapter*.13}
106 \contentsline {part}{Bibliographie}{133}{section*.16}