]> AND Private Git Repository - ThesisAli.git/blobdiff - Thesis.toc
Logo AND Algorithmique Numérique Distribuée

Private GIT Repository
Update by ali
[ThesisAli.git] / Thesis.toc
index abbee1237230ec35d07692cda96b7ec867087b21..931e6fffcf73b96a1783884889bb06259fe4c118 100644 (file)
 \contentsline {chapter}{List of Tables}{7}{chapter*.3}
 \contentsline {chapter}{List of Algorithms}{9}{chapter*.4}
 \contentsline {chapter}{Introduction }{11}{chapter*.5}
-\contentsline {section}{\numberline {0.1}General Introduction}{11}{section.0.1}
-\contentsline {section}{\numberline {0.2}Motivation of the Dissertation}{12}{section.0.2}
-\contentsline {section}{\numberline {0.3}The Objective of this Dissertation}{12}{section.0.3}
-\contentsline {section}{\numberline {0.4}The main Contributions of this Dissertation}{13}{section.0.4}
-\contentsline {section}{\numberline {0.5}Dissertation Outline}{14}{section.0.5}
+\contentsline {section}{1. General Introduction }{11}{section*.6}
+\contentsline {section}{2. Motivation of the Dissertation }{12}{section*.7}
+\contentsline {section}{3. The Objective of this Dissertation}{12}{section*.8}
+\contentsline {section}{4. Main Contributions of this Dissertation}{12}{section*.9}
+\contentsline {section}{5. Dissertation Outline}{14}{section*.10}
 \contentsline {part}{I\hspace {1em}Scientific Background}{15}{part.1}
 \contentsline {chapter}{\numberline {1}Wireless Sensor Networks}{17}{chapter.1}
 \contentsline {section}{\numberline {1.1}Introduction}{17}{section.1.1}
-\contentsline {section}{\numberline {1.2}Wireless Sensor Network Architecture}{18}{section.1.2}
+\contentsline {section}{\numberline {1.2}Architecture}{18}{section.1.2}
 \contentsline {section}{\numberline {1.3}Types of Wireless Sensor Networks}{20}{section.1.3}
-\contentsline {section}{\numberline {1.4}Wireless Sensor Network Applications}{22}{section.1.4}
-\contentsline {section}{\numberline {1.5}The Main Challenges in Wireless Sensor Networks}{25}{section.1.5}
-\contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms in Wireless Sensor Networks}{27}{section.1.6}
-\contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing:}{27}{subsection.1.6.1}
-\contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy:}{28}{subsubsection.1.6.1.1}
-\contentsline {subsubsection}{\numberline {1.6.1.2}Multipath Routing:}{28}{subsubsection.1.6.1.2}
-\contentsline {subsection}{\numberline {1.6.2}Cluster Architectures:}{28}{subsection.1.6.2}
-\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes:}{29}{subsection.1.6.3}
-\contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes:}{29}{subsubsection.1.6.3.1}
-\contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes:}{31}{subsubsection.1.6.3.2}
-\contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes:}{32}{subsection.1.6.4}
+\contentsline {section}{\numberline {1.4}Applications}{22}{section.1.4}
+\contentsline {section}{\numberline {1.5}The Main Challenges}{25}{section.1.5}
+\contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms of a working WSN}{27}{section.1.6}
+\contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing}{27}{subsection.1.6.1}
+\contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy}{27}{subsubsection.1.6.1.1}
+\contentsline {subsubsection}{\numberline {1.6.1.2}Multipath Routing}{27}{subsubsection.1.6.1.2}
+\contentsline {subsection}{\numberline {1.6.2}Cluster Architecture}{28}{subsection.1.6.2}
+\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes}{28}{subsection.1.6.3}
+\contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes}{28}{subsubsection.1.6.3.1}
+\contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes}{31}{subsubsection.1.6.3.2}
+\contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes}{31}{subsection.1.6.4}
 \contentsline {subsubsection}{\numberline {1.6.4.1}Data Reduction Schemes}{32}{subsubsection.1.6.4.1}
 \contentsline {subsubsection}{\numberline {1.6.4.2}Energy Efficient Data Acquisition Schemes}{32}{subsubsection.1.6.4.2}
-\contentsline {subsection}{\numberline {1.6.5}Battery Repletion:}{33}{subsection.1.6.5}
-\contentsline {subsubsection}{\numberline {1.6.5.1}Energy Harvesting:}{33}{subsubsection.1.6.5.1}
-\contentsline {subsubsection}{\numberline {1.6.5.2}Wireless Charging:}{33}{subsubsection.1.6.5.2}
-\contentsline {subsection}{\numberline {1.6.6}Radio Optimization:}{33}{subsection.1.6.6}
-\contentsline {subsection}{\numberline {1.6.7}Relay nodes and Sink Mobility:}{33}{subsection.1.6.7}
-\contentsline {subsubsection}{\numberline {1.6.7.1}Relay node placement:}{33}{subsubsection.1.6.7.1}
-\contentsline {subsubsection}{\numberline {1.6.7.2}Sink Mobility:}{34}{subsubsection.1.6.7.2}
-\contentsline {section}{\numberline {1.7}Network Lifetime in Wireless Sensor Networks}{34}{section.1.7}
-\contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{35}{section.1.8}
-\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems:}{37}{section.1.9}
-\contentsline {section}{\numberline {1.10}Energy Consumption Modeling:}{38}{section.1.10}
-\contentsline {section}{\numberline {1.11}Conclusion}{39}{section.1.11}
-\contentsline {chapter}{\numberline {2}Related Literatures}{41}{chapter.2}
-\contentsline {section}{\numberline {2.1}Introduction}{41}{section.2.1}
-\contentsline {section}{\numberline {2.2}Coverage Algorithms}{42}{section.2.2}
-\contentsline {subsection}{\numberline {2.2.1}Centralized Algorithms}{43}{subsection.2.2.1}
-\contentsline {subsection}{\numberline {2.2.2}Distributed Algorithms}{45}{subsection.2.2.2}
-\contentsline {section}{\numberline {2.3}Conclusion}{48}{section.2.3}
-\contentsline {chapter}{\numberline {3}Evaluation Tools and Optimization Solvers}{51}{chapter.3}
-\contentsline {section}{\numberline {3.1}Introduction}{51}{section.3.1}
-\contentsline {section}{\numberline {3.2}Evaluation Tools}{51}{section.3.2}
-\contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{52}{subsection.3.2.1}
-\contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{53}{subsection.3.2.2}
-\contentsline {section}{\numberline {3.3}Optimization Solvers}{56}{section.3.3}
-\contentsline {section}{\numberline {3.4}Conclusion}{61}{section.3.4}
-\contentsline {part}{II\hspace {1em}Contributions}{63}{part.2}
-\contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{65}{chapter.4}
-\contentsline {section}{\numberline {4.1}Summary}{65}{section.4.1}
-\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{65}{section.4.2}
-\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{65}{subsection.4.2.1}
-\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{66}{subsection.4.2.2}
-\contentsline {subsection}{\numberline {4.2.3}Main Idea}{67}{subsection.4.2.3}
-\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{68}{subsubsection.4.2.3.1}
-\contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{69}{subsubsection.4.2.3.2}
-\contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{69}{subsubsection.4.2.3.3}
-\contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{69}{subsubsection.4.2.3.4}
-\contentsline {section}{\numberline {4.3}Primary Points based Coverage Problem Formulation}{69}{section.4.3}
-\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{71}{section.4.4}
-\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{71}{subsection.4.4.1}
-\contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{72}{subsection.4.4.2}
-\contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{72}{subsection.4.4.3}
-\contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{73}{subsection.4.4.4}
-\contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Subregions}{74}{subsection.4.4.5}
-\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Primary Point Models}{79}{subsection.4.4.6}
-\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{83}{subsection.4.4.7}
-\contentsline {section}{\numberline {4.5}Conclusion}{88}{section.4.5}
-\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{91}{chapter.5}
-\contentsline {section}{\numberline {5.1}Summary}{91}{section.5.1}
-\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{91}{section.5.2}
-\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{92}{subsection.5.2.1}
-\contentsline {subsection}{\numberline {5.2.2}Primary Points based Multiround Coverage Problem Formulation}{93}{subsection.5.2.2}
-\contentsline {section}{\numberline {5.3}Experimental Study and Analysis}{95}{section.5.3}
-\contentsline {subsection}{\numberline {5.3.1}Simulation Setup}{95}{subsection.5.3.1}
-\contentsline {subsection}{\numberline {5.3.2}Metrics}{96}{subsection.5.3.2}
-\contentsline {subsection}{\numberline {5.3.3}Results Analysis and Comparison }{97}{subsection.5.3.3}
-\contentsline {section}{\numberline {5.4}Conclusion}{100}{section.5.4}
-\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{103}{chapter.6}
-\contentsline {section}{\numberline {6.1}summary}{103}{section.6.1}
-\contentsline {section}{\numberline {6.2}THE PeCO PROTOCOL DESCRIPTION}{103}{section.6.2}
-\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{103}{subsection.6.2.1}
-\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{106}{subsection.6.2.2}
-\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{107}{subsection.6.2.3}
-\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{108}{section.6.3}
-\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{110}{section.6.4}
-\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{110}{subsection.6.4.1}
-\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{111}{subsection.6.4.2}
-\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{111}{subsubsection.6.4.2.1}
-\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{112}{subsubsection.6.4.2.2}
-\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{112}{subsubsection.6.4.2.3}
-\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{112}{subsubsection.6.4.2.4}
-\contentsline {section}{\numberline {6.5}Conclusion}{113}{section.6.5}
-\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{117}{part.3}
-\contentsline {part}{Bibliographie}{132}{chapter*.6}
+\contentsline {subsection}{\numberline {1.6.5}Battery Repletion}{32}{subsection.1.6.5}
+\contentsline {subsection}{\numberline {1.6.6}Radio Optimization}{32}{subsection.1.6.6}
+\contentsline {subsection}{\numberline {1.6.7}Relay nodes and Sink Mobility}{33}{subsection.1.6.7}
+\contentsline {subsubsection}{\numberline {1.6.7.1}Relay node placement}{33}{subsubsection.1.6.7.1}
+\contentsline {subsubsection}{\numberline {1.6.7.2}Sink Mobility}{33}{subsubsection.1.6.7.2}
+\contentsline {section}{\numberline {1.7}Network Lifetime}{33}{section.1.7}
+\contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{34}{section.1.8}
+\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems}{36}{section.1.9}
+\contentsline {section}{\numberline {1.10}Energy Consumption Model}{37}{section.1.10}
+\contentsline {section}{\numberline {1.11}Conclusion}{38}{section.1.11}
+\contentsline {chapter}{\numberline {2}Related Works on Coverage Problems}{39}{chapter.2}
+\contentsline {section}{\numberline {2.1}Introduction}{39}{section.2.1}
+\contentsline {section}{\numberline {2.2}Centralized Algorithms}{41}{section.2.2}
+\contentsline {section}{\numberline {2.3}Distributed Algorithms}{44}{section.2.3}
+\contentsline {subsection}{\numberline {2.3.1}GAF}{46}{subsection.2.3.1}
+\contentsline {subsection}{\numberline {2.3.2}DESK}{48}{subsection.2.3.2}
+\contentsline {section}{\numberline {2.4}Conclusion}{50}{section.2.4}
+\contentsline {chapter}{\numberline {3}Evaluation Tools and Optimization Solvers}{53}{chapter.3}
+\contentsline {section}{\numberline {3.1}Introduction}{53}{section.3.1}
+\contentsline {section}{\numberline {3.2}Evaluation Tools}{53}{section.3.2}
+\contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{54}{subsection.3.2.1}
+\contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{55}{subsection.3.2.2}
+\contentsline {section}{\numberline {3.3}Optimization Solvers}{60}{section.3.3}
+\contentsline {section}{\numberline {3.4}Conclusion}{63}{section.3.4}
+\contentsline {part}{II\hspace {1em}Contributions}{65}{part.2}
+\contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{67}{chapter.4}
+\contentsline {section}{\numberline {4.1}Introduction}{67}{section.4.1}
+\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{68}{section.4.2}
+\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{68}{subsection.4.2.1}
+\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{69}{subsection.4.2.2}
+\contentsline {subsection}{\numberline {4.2.3}Main Idea}{70}{subsection.4.2.3}
+\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{71}{subsubsection.4.2.3.1}
+\contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{71}{subsubsection.4.2.3.2}
+\contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{71}{subsubsection.4.2.3.3}
+\contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{71}{subsubsection.4.2.3.4}
+\contentsline {section}{\numberline {4.3}Primary Points based Coverage Problem Formulation}{72}{section.4.3}
+\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{74}{section.4.4}
+\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{74}{subsection.4.4.1}
+\contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{74}{subsection.4.4.2}
+\contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{74}{subsection.4.4.3}
+\contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{75}{subsection.4.4.4}
+\contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Subregions}{76}{subsection.4.4.5}
+\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Primary Point Models}{82}{subsection.4.4.6}
+\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{87}{subsection.4.4.7}
+\contentsline {section}{\numberline {4.5}Conclusion}{93}{section.4.5}
+\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{95}{chapter.5}
+\contentsline {section}{\numberline {5.1}Introduction}{95}{section.5.1}
+\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{96}{section.5.2}
+\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{96}{subsection.5.2.1}
+\contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{97}{section.5.3}
+\contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{99}{section.5.4}
+\contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{99}{subsection.5.4.1}
+\contentsline {subsection}{\numberline {5.4.2}Metrics}{100}{subsection.5.4.2}
+\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{101}{subsection.5.4.3}
+\contentsline {section}{\numberline {5.5}Conclusion}{106}{section.5.5}
+\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{109}{chapter.6}
+\contentsline {section}{\numberline {6.1}Introduction}{109}{section.6.1}
+\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{110}{section.6.2}
+\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{110}{subsection.6.2.1}
+\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{113}{subsection.6.2.2}
+\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{113}{subsection.6.2.3}
+\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{114}{section.6.3}
+\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{116}{section.6.4}
+\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{116}{subsection.6.4.1}
+\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{117}{subsection.6.4.2}
+\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{118}{subsubsection.6.4.2.1}
+\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{118}{subsubsection.6.4.2.2}
+\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{119}{subsubsection.6.4.2.3}
+\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{119}{subsubsection.6.4.2.4}
+\contentsline {section}{\numberline {6.5}Conclusion}{122}{section.6.5}
+\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{123}{part.3}
+\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{125}{chapter.7}
+\contentsline {section}{\numberline {7.1}Conclusion}{125}{section.7.1}
+\contentsline {section}{\numberline {7.2}Perspectives}{126}{section.7.2}
+\contentsline {part}{Bibliographie}{142}{chapter*.11}