]> AND Private Git Repository - ThesisAli.git/blobdiff - Thesis.toc
Logo AND Algorithmique Numérique Distribuée

Private GIT Repository
Update by Ali
[ThesisAli.git] / Thesis.toc
old mode 100644 (file)
new mode 100755 (executable)
index a6e92ba..2cdb04d
 \select@language {english}
-\contentsline {chapter}{Table of Contents}{4}{chapter*.1}
-\contentsline {chapter}{List of Figures}{6}{chapter*.2}
-\contentsline {chapter}{List of Tables}{7}{chapter*.3}
-\contentsline {chapter}{List of Algorithms}{9}{chapter*.4}
-\contentsline {chapter}{Abstruct}{9}{chapter*.4}
-\contentsline {chapter}{Introduction }{13}{chapter*.5}
-\contentsline {section}{1. General Introduction }{13}{section*.6}
-\contentsline {section}{2. Motivation of the Dissertation }{14}{section*.7}
-\contentsline {section}{3. The Objective of this Dissertation}{14}{section*.8}
-\contentsline {section}{4. Main Contributions of this Dissertation}{14}{section*.9}
-\contentsline {section}{5. Dissertation Outline}{16}{section*.10}
-\contentsline {part}{I\hspace {1em}Scientific Background}{17}{part.1}
-\contentsline {chapter}{\numberline {1}Wireless Sensor Networks}{19}{chapter.1}
-\contentsline {section}{\numberline {1.1}Introduction}{19}{section.1.1}
-\contentsline {section}{\numberline {1.2}Architecture}{20}{section.1.2}
-\contentsline {section}{\numberline {1.3}Types of Wireless Sensor Networks}{22}{section.1.3}
-\contentsline {section}{\numberline {1.4}Applications}{24}{section.1.4}
-\contentsline {section}{\numberline {1.5}The Main Challenges}{27}{section.1.5}
-\contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms of a working WSN}{29}{section.1.6}
-\contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing}{29}{subsection.1.6.1}
-\contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy}{29}{subsubsection.1.6.1.1}
-\contentsline {subsubsection}{\numberline {1.6.1.2}Multipath Routing}{29}{subsubsection.1.6.1.2}
-\contentsline {subsection}{\numberline {1.6.2}Cluster Architecture}{30}{subsection.1.6.2}
-\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes}{30}{subsection.1.6.3}
-\contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes}{30}{subsubsection.1.6.3.1}
-\contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes}{33}{subsubsection.1.6.3.2}
-\contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes}{33}{subsection.1.6.4}
-\contentsline {subsubsection}{\numberline {1.6.4.1}Data Reduction Schemes}{34}{subsubsection.1.6.4.1}
-\contentsline {subsubsection}{\numberline {1.6.4.2}Energy Efficient Data Acquisition Schemes}{34}{subsubsection.1.6.4.2}
-\contentsline {subsection}{\numberline {1.6.5}Battery Repletion}{34}{subsection.1.6.5}
-\contentsline {subsection}{\numberline {1.6.6}Radio Optimization}{34}{subsection.1.6.6}
-\contentsline {subsection}{\numberline {1.6.7}Relay nodes and Sink Mobility}{35}{subsection.1.6.7}
-\contentsline {subsubsection}{\numberline {1.6.7.1}Relay node placement}{35}{subsubsection.1.6.7.1}
-\contentsline {subsubsection}{\numberline {1.6.7.2}Sink Mobility}{35}{subsubsection.1.6.7.2}
-\contentsline {section}{\numberline {1.7}Network Lifetime}{35}{section.1.7}
-\contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{36}{section.1.8}
-\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems}{38}{section.1.9}
-\contentsline {section}{\numberline {1.10}Energy Consumption Model}{39}{section.1.10}
-\contentsline {section}{\numberline {1.11}Conclusion}{40}{section.1.11}
-\contentsline {chapter}{\numberline {2}Related Works on Coverage Problems}{41}{chapter.2}
-\contentsline {section}{\numberline {2.1}Introduction}{41}{section.2.1}
-\contentsline {section}{\numberline {2.2}Centralized Algorithms}{43}{section.2.2}
-\contentsline {section}{\numberline {2.3}Distributed Algorithms}{46}{section.2.3}
-\contentsline {subsection}{\numberline {2.3.1}GAF}{48}{subsection.2.3.1}
-\contentsline {subsection}{\numberline {2.3.2}DESK}{50}{subsection.2.3.2}
-\contentsline {section}{\numberline {2.4}Conclusion}{52}{section.2.4}
-\contentsline {chapter}{\numberline {3}Evaluation Tools and Optimization Solvers}{55}{chapter.3}
-\contentsline {section}{\numberline {3.1}Introduction}{55}{section.3.1}
-\contentsline {section}{\numberline {3.2}Evaluation Tools}{55}{section.3.2}
-\contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{56}{subsection.3.2.1}
-\contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{57}{subsection.3.2.2}
-\contentsline {section}{\numberline {3.3}Optimization Solvers}{62}{section.3.3}
-\contentsline {section}{\numberline {3.4}Conclusion}{65}{section.3.4}
-\contentsline {part}{II\hspace {1em}Contributions}{67}{part.2}
-\contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{69}{chapter.4}
-\contentsline {section}{\numberline {4.1}Introduction}{69}{section.4.1}
-\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{70}{section.4.2}
-\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{70}{subsection.4.2.1}
-\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{71}{subsection.4.2.2}
-\contentsline {subsection}{\numberline {4.2.3}Main Idea}{72}{subsection.4.2.3}
-\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{73}{subsubsection.4.2.3.1}
-\contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{73}{subsubsection.4.2.3.2}
-\contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{73}{subsubsection.4.2.3.3}
-\contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{73}{subsubsection.4.2.3.4}
-\contentsline {section}{\numberline {4.3}Primary Points based Coverage Problem Formulation}{74}{section.4.3}
-\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{76}{section.4.4}
-\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{76}{subsection.4.4.1}
-\contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{76}{subsection.4.4.2}
-\contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{76}{subsection.4.4.3}
-\contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{77}{subsection.4.4.4}
-\contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Subregions}{78}{subsection.4.4.5}
-\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Primary Point Models}{84}{subsection.4.4.6}
-\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{89}{subsection.4.4.7}
-\contentsline {section}{\numberline {4.5}Conclusion}{95}{section.4.5}
-\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{97}{chapter.5}
-\contentsline {section}{\numberline {5.1}Introduction}{97}{section.5.1}
-\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{98}{section.5.2}
-\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{98}{subsection.5.2.1}
-\contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{99}{section.5.3}
-\contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{101}{section.5.4}
-\contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{101}{subsection.5.4.1}
-\contentsline {subsection}{\numberline {5.4.2}Metrics}{102}{subsection.5.4.2}
-\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{103}{subsection.5.4.3}
-\contentsline {section}{\numberline {5.5}Conclusion}{108}{section.5.5}
-\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{111}{chapter.6}
-\contentsline {section}{\numberline {6.1}Introduction}{111}{section.6.1}
-\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{112}{section.6.2}
-\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{112}{subsection.6.2.1}
-\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{115}{subsection.6.2.2}
-\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{115}{subsection.6.2.3}
-\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{116}{section.6.3}
-\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{118}{section.6.4}
-\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{118}{subsection.6.4.1}
-\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{119}{subsection.6.4.2}
-\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{120}{subsubsection.6.4.2.1}
-\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{120}{subsubsection.6.4.2.2}
-\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{121}{subsubsection.6.4.2.3}
-\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{121}{subsubsection.6.4.2.4}
-\contentsline {section}{\numberline {6.5}Conclusion}{124}{section.6.5}
-\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{125}{part.3}
-\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{127}{chapter.7}
-\contentsline {section}{\numberline {7.1}Conclusion}{127}{section.7.1}
-\contentsline {section}{\numberline {7.2}Perspectives}{128}{section.7.2}
-\contentsline {part}{Bibliographie}{144}{chapter*.11}
+\contentsline {chapter}{Abstract}{1}{chapter*.1}
+\contentsline {chapter}{R\IeC {\'e}sum\IeC {\'e}}{3}{chapter*.2}
+\contentsline {chapter}{Table of Contents}{8}{chapter*.3}
+\contentsline {chapter}{List of Figures}{10}{chapter*.4}
+\contentsline {chapter}{List of Tables}{11}{chapter*.5}
+\contentsline {chapter}{List of Algorithms}{13}{chapter*.6}
+\contentsline {chapter}{List of Abbreviations}{15}{chapter*.7}
+\contentsline {chapter}{Introduction }{19}{chapter*.8}
+\contentsline {section}{1. General Introduction }{19}{section*.9}
+\contentsline {section}{2. Motivation of the Dissertation }{20}{section*.10}
+\contentsline {section}{4. Main Contributions of this Dissertation}{20}{section*.11}
+\contentsline {section}{5. Dissertation Outline}{21}{section*.12}
+\contentsline {part}{I\hspace {1em}Scientific Background}{23}{part.1}
+\contentsline {chapter}{\numberline {1}Wireless Sensor Networks}{25}{chapter.1}
+\contentsline {section}{\numberline {1.1}Introduction}{25}{section.1.1}
+\contentsline {section}{\numberline {1.2}Architecture}{26}{section.1.2}
+\contentsline {section}{\numberline {1.3}Types of Wireless Sensor Networks}{28}{section.1.3}
+\contentsline {section}{\numberline {1.4}Applications}{30}{section.1.4}
+\contentsline {section}{\numberline {1.5}The Main Challenges}{33}{section.1.5}
+\contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms of a working WSN}{35}{section.1.6}
+\contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing}{35}{subsection.1.6.1}
+\contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy}{35}{subsubsection.1.6.1.1}
+\contentsline {subsubsection}{\numberline {1.6.1.2}Multipath Routing}{35}{subsubsection.1.6.1.2}
+\contentsline {subsection}{\numberline {1.6.2}Cluster Architecture}{36}{subsection.1.6.2}
+\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes}{36}{subsection.1.6.3}
+\contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes}{36}{subsubsection.1.6.3.1}
+\contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes}{39}{subsubsection.1.6.3.2}
+\contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes}{39}{subsection.1.6.4}
+\contentsline {subsubsection}{\numberline {1.6.4.1}Data Reduction Schemes}{40}{subsubsection.1.6.4.1}
+\contentsline {subsubsection}{\numberline {1.6.4.2}Energy Efficient Data Acquisition Schemes}{40}{subsubsection.1.6.4.2}
+\contentsline {subsection}{\numberline {1.6.5}Battery Repletion}{40}{subsection.1.6.5}
+\contentsline {subsection}{\numberline {1.6.6}Radio Optimization}{40}{subsection.1.6.6}
+\contentsline {subsection}{\numberline {1.6.7}Relay nodes and Sink Mobility}{41}{subsection.1.6.7}
+\contentsline {subsubsection}{\numberline {1.6.7.1}Relay node placement}{41}{subsubsection.1.6.7.1}
+\contentsline {subsubsection}{\numberline {1.6.7.2}Sink Mobility}{41}{subsubsection.1.6.7.2}
+\contentsline {section}{\numberline {1.7}Network Lifetime}{41}{section.1.7}
+\contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{42}{section.1.8}
+\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems}{44}{section.1.9}
+\contentsline {section}{\numberline {1.10}Energy Consumption Model}{45}{section.1.10}
+\contentsline {section}{\numberline {1.11}Conclusion}{46}{section.1.11}
+\contentsline {chapter}{\numberline {2}Related Works on Coverage Problems}{47}{chapter.2}
+\contentsline {section}{\numberline {2.1}Introduction}{47}{section.2.1}
+\contentsline {section}{\numberline {2.2}Centralized Algorithms}{49}{section.2.2}
+\contentsline {section}{\numberline {2.3}Distributed Algorithms}{51}{section.2.3}
+\contentsline {subsection}{\numberline {2.3.1}Geographical Adaptive Fidelity (GAF)}{53}{subsection.2.3.1}
+\contentsline {subsection}{\numberline {2.3.2}Distributed Energy-efficient Scheduling for K-coverage (DESK)}{55}{subsection.2.3.2}
+\contentsline {section}{\numberline {2.4}Conclusion}{59}{section.2.4}
+\contentsline {chapter}{\numberline {3}Evaluation Tools and Optimization Solvers}{61}{chapter.3}
+\contentsline {section}{\numberline {3.1}Introduction}{61}{section.3.1}
+\contentsline {section}{\numberline {3.2}Evaluation Tools}{61}{section.3.2}
+\contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{62}{subsection.3.2.1}
+\contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{64}{subsection.3.2.2}
+\contentsline {section}{\numberline {3.3}Optimization Solvers}{66}{section.3.3}
+\contentsline {section}{\numberline {3.4}Conclusion}{70}{section.3.4}
+\contentsline {part}{II\hspace {1em}Contributions}{71}{part.2}
+\contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol}{73}{chapter.4}
+\contentsline {section}{\numberline {4.1}Introduction}{73}{section.4.1}
+\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{74}{section.4.2}
+\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{74}{subsection.4.2.1}
+\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{75}{subsection.4.2.2}
+\contentsline {subsection}{\numberline {4.2.3}Main Idea}{75}{subsection.4.2.3}
+\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{77}{subsubsection.4.2.3.1}
+\contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{77}{subsubsection.4.2.3.2}
+\contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{78}{subsubsection.4.2.3.3}
+\contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{78}{subsubsection.4.2.3.4}
+\contentsline {section}{\numberline {4.3}Coverage Problem Formulation}{79}{section.4.3}
+\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{80}{section.4.4}
+\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{80}{subsection.4.4.1}
+\contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{80}{subsection.4.4.2}
+\contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{81}{subsection.4.4.3}
+\contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{82}{subsection.4.4.4}
+\contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Number of Subregions}{83}{subsection.4.4.5}
+\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Different Number of Primary Points}{88}{subsection.4.4.6}
+\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{95}{subsection.4.4.7}
+\contentsline {section}{\numberline {4.5}Conclusion}{100}{section.4.5}
+\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{101}{chapter.5}
+\contentsline {section}{\numberline {5.1}Introduction}{101}{section.5.1}
+\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{101}{section.5.2}
+\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{102}{subsection.5.2.1}
+\contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{103}{section.5.3}
+\contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{105}{section.5.4}
+\contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{105}{subsection.5.4.1}
+\contentsline {subsection}{\numberline {5.4.2}Metrics}{105}{subsection.5.4.2}
+\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{106}{subsection.5.4.3}
+\contentsline {section}{\numberline {5.5}Conclusion}{113}{section.5.5}
+\contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{115}{chapter.6}
+\contentsline {section}{\numberline {6.1}Introduction}{115}{section.6.1}
+\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{115}{section.6.2}
+\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{115}{subsection.6.2.1}
+\contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{118}{subsection.6.2.2}
+\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{120}{section.6.3}
+\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{121}{section.6.4}
+\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{121}{subsection.6.4.1}
+\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{122}{subsection.6.4.2}
+\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{122}{subsubsection.6.4.2.1}
+\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{122}{subsubsection.6.4.2.2}
+\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{122}{subsubsection.6.4.2.3}
+\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{125}{subsubsection.6.4.2.4}
+\contentsline {section}{\numberline {6.5}Conclusion}{128}{section.6.5}
+\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{129}{part.3}
+\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{131}{chapter.7}
+\contentsline {section}{\numberline {7.1}Conclusion}{131}{section.7.1}
+\contentsline {section}{\numberline {7.2}Perspectives}{132}{section.7.2}
+\contentsline {part}{Bibliographie}{147}{chapter*.13}