]> AND Private Git Repository - ThesisAli.git/blobdiff - Thesis.toc
Logo AND Algorithmique Numérique Distribuée

Private GIT Repository
Update by Ali
[ThesisAli.git] / Thesis.toc
index 918abd5ca251415321b8ef473b7e6ccd1a9869ba..5e7efc9723ef889423c40f0d1fada3806ab0a69f 100644 (file)
 \contentsline {subsection}{\numberline {5.4.2}Metrics}{107}{subsection.5.4.2}
 \contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{108}{subsection.5.4.3}
 \contentsline {section}{\numberline {5.5}Conclusion}{113}{section.5.5}
 \contentsline {subsection}{\numberline {5.4.2}Metrics}{107}{subsection.5.4.2}
 \contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{108}{subsection.5.4.3}
 \contentsline {section}{\numberline {5.5}Conclusion}{113}{section.5.5}
-\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{115}{chapter.6}
+\contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{115}{chapter.6}
 \contentsline {section}{\numberline {6.1}Introduction}{115}{section.6.1}
 \contentsline {section}{\numberline {6.1}Introduction}{115}{section.6.1}
-\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{116}{section.6.2}
-\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{116}{subsection.6.2.1}
-\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{119}{subsection.6.2.2}
-\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{119}{subsection.6.2.3}
+\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{115}{section.6.2}
+\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{115}{subsection.6.2.1}
+\contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{118}{subsection.6.2.2}
 \contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{120}{section.6.3}
 \contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{120}{section.6.3}
-\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{122}{section.6.4}
-\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{122}{subsection.6.4.1}
-\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{123}{subsection.6.4.2}
-\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{124}{subsubsection.6.4.2.1}
-\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{124}{subsubsection.6.4.2.2}
-\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{125}{subsubsection.6.4.2.3}
+\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{121}{section.6.4}
+\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{121}{subsection.6.4.1}
+\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{122}{subsection.6.4.2}
+\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{122}{subsubsection.6.4.2.1}
+\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{122}{subsubsection.6.4.2.2}
+\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{122}{subsubsection.6.4.2.3}
 \contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{125}{subsubsection.6.4.2.4}
 \contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{125}{subsubsection.6.4.2.4}
-\contentsline {section}{\numberline {6.5}Conclusion}{128}{section.6.5}
+\contentsline {section}{\numberline {6.5}Conclusion}{125}{section.6.5}
 \contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{129}{part.3}
 \contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{131}{chapter.7}
 \contentsline {section}{\numberline {7.1}Conclusion}{131}{section.7.1}
 \contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{129}{part.3}
 \contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{131}{chapter.7}
 \contentsline {section}{\numberline {7.1}Conclusion}{131}{section.7.1}