]> AND Private Git Repository - ThesisAli.git/blobdiff - Thesis.toc
Logo AND Algorithmique Numérique Distribuée

Private GIT Repository
Update
[ThesisAli.git] / Thesis.toc
index 45b23b1deda70032ba1ff6de7409637ddbdeae4c..cf3c3eac7358b0a1b41d7348e2dd47f569250298 100644 (file)
 \contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{81}{subsection.4.4.4}
 \contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Number of Subregions}{83}{subsection.4.4.5}
 \contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Different Number of Primary Points}{89}{subsection.4.4.6}
-\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{94}{subsection.4.4.7}
+\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{93}{subsection.4.4.7}
 \contentsline {section}{\numberline {4.5}Conclusion}{100}{section.4.5}
-\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{101}{chapter.5}
+\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol}{101}{chapter.5}
 \contentsline {section}{\numberline {5.1}Introduction}{101}{section.5.1}
-\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{101}{section.5.2}
-\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{102}{subsection.5.2.1}
+\contentsline {section}{\numberline {5.2}Description of the MuDiLCO Protocol }{101}{section.5.2}
 \contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{103}{section.5.3}
 \contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{105}{section.5.4}
 \contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{105}{subsection.5.4.1}
 \contentsline {subsection}{\numberline {5.4.2}Metrics}{105}{subsection.5.4.2}
 \contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{106}{subsection.5.4.3}
-\contentsline {section}{\numberline {5.5}Conclusion}{113}{section.5.5}
-\contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{115}{chapter.6}
-\contentsline {section}{\numberline {6.1}Introduction}{115}{section.6.1}
-\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{115}{section.6.2}
-\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{115}{subsection.6.2.1}
-\contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{118}{subsection.6.2.2}
-\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{120}{section.6.3}
-\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{121}{section.6.4}
-\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{121}{subsection.6.4.1}
-\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{122}{subsection.6.4.2}
-\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{122}{subsubsection.6.4.2.1}
-\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{122}{subsubsection.6.4.2.2}
-\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{122}{subsubsection.6.4.2.3}
-\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{125}{subsubsection.6.4.2.4}
-\contentsline {section}{\numberline {6.5}Conclusion}{128}{section.6.5}
-\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{129}{part.3}
-\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{131}{chapter.7}
-\contentsline {section}{\numberline {7.1}Conclusion}{131}{section.7.1}
-\contentsline {section}{\numberline {7.2}Perspectives}{132}{section.7.2}
-\contentsline {part}{Bibliographie}{147}{chapter*.13}
+\contentsline {section}{\numberline {5.5}Conclusion}{112}{section.5.5}
+\contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{113}{chapter.6}
+\contentsline {section}{\numberline {6.1}Introduction}{113}{section.6.1}
+\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{113}{section.6.2}
+\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{113}{subsection.6.2.1}
+\contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{116}{subsection.6.2.2}
+\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{118}{section.6.3}
+\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{119}{section.6.4}
+\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{119}{subsection.6.4.1}
+\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{120}{subsection.6.4.2}
+\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{120}{subsubsection.6.4.2.1}
+\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{120}{subsubsection.6.4.2.2}
+\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{120}{subsubsection.6.4.2.3}
+\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{123}{subsubsection.6.4.2.4}
+\contentsline {section}{\numberline {6.5}Conclusion}{126}{section.6.5}
+\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{127}{part.3}
+\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{129}{chapter.7}
+\contentsline {section}{\numberline {7.1}Conclusion}{129}{section.7.1}
+\contentsline {section}{\numberline {7.2}Perspectives}{130}{section.7.2}
+\contentsline {part}{Publications}{133}{chapter*.13}
+\contentsline {part}{Bibliographie}{147}{chapter*.17}