-\contentsline {section}{\numberline {5.5}Conclusion}{113}{section.5.5}
-\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{115}{chapter.6}
-\contentsline {section}{\numberline {6.1}Introduction}{115}{section.6.1}
-\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{116}{section.6.2}
-\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{116}{subsection.6.2.1}
-\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{119}{subsection.6.2.2}
-\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{119}{subsection.6.2.3}
-\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{120}{section.6.3}
-\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{122}{section.6.4}
-\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{122}{subsection.6.4.1}
-\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{123}{subsection.6.4.2}
+\contentsline {section}{\numberline {5.5}Conclusion}{115}{section.5.5}
+\contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{117}{chapter.6}
+\contentsline {section}{\numberline {6.1}Introduction}{117}{section.6.1}
+\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{117}{section.6.2}
+\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{117}{subsection.6.2.1}
+\contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{120}{subsection.6.2.2}
+\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{122}{section.6.3}
+\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{123}{section.6.4}
+\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{123}{subsection.6.4.1}
+\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{124}{subsection.6.4.2}