]> AND Private Git Repository - ThesisAli.git/blobdiff - Thesis.toc
Logo AND Algorithmique Numérique Distribuée

Private GIT Repository
New Update on figures of chapter 4
[ThesisAli.git] / Thesis.toc
index a915a0c415d08099a9793f8a5081dbf34a41be2a..45b23b1deda70032ba1ff6de7409637ddbdeae4c 100644 (file)
 \contentsline {section}{\numberline {3.1}Introduction}{61}{section.3.1}
 \contentsline {section}{\numberline {3.2}Evaluation Tools}{61}{section.3.2}
 \contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{62}{subsection.3.2.1}
 \contentsline {section}{\numberline {3.1}Introduction}{61}{section.3.1}
 \contentsline {section}{\numberline {3.2}Evaluation Tools}{61}{section.3.2}
 \contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{62}{subsection.3.2.1}
-\contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{63}{subsection.3.2.2}
-\contentsline {section}{\numberline {3.3}Optimization Solvers}{68}{section.3.3}
-\contentsline {section}{\numberline {3.4}Conclusion}{71}{section.3.4}
-\contentsline {part}{II\hspace {1em}Contributions}{73}{part.2}
-\contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol in WSNs}{75}{chapter.4}
-\contentsline {section}{\numberline {4.1}Introduction}{75}{section.4.1}
-\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{76}{section.4.2}
-\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{76}{subsection.4.2.1}
-\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{77}{subsection.4.2.2}
-\contentsline {subsection}{\numberline {4.2.3}Main Idea}{79}{subsection.4.2.3}
-\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{79}{subsubsection.4.2.3.1}
-\contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{79}{subsubsection.4.2.3.2}
-\contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{80}{subsubsection.4.2.3.3}
-\contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{80}{subsubsection.4.2.3.4}
-\contentsline {section}{\numberline {4.3}Primary Points based Coverage Problem Formulation}{80}{section.4.3}
-\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{82}{section.4.4}
-\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{82}{subsection.4.4.1}
-\contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{83}{subsection.4.4.2}
-\contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{83}{subsection.4.4.3}
-\contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{84}{subsection.4.4.4}
-\contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Subregions}{85}{subsection.4.4.5}
-\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Primary Point Models}{90}{subsection.4.4.6}
-\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{95}{subsection.4.4.7}
-\contentsline {section}{\numberline {4.5}Conclusion}{102}{section.4.5}
-\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{103}{chapter.5}
-\contentsline {section}{\numberline {5.1}Introduction}{103}{section.5.1}
-\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{104}{section.5.2}
-\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{104}{subsection.5.2.1}
-\contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{105}{section.5.3}
-\contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{107}{section.5.4}
-\contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{107}{subsection.5.4.1}
-\contentsline {subsection}{\numberline {5.4.2}Metrics}{108}{subsection.5.4.2}
-\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{109}{subsection.5.4.3}
-\contentsline {section}{\numberline {5.5}Conclusion}{114}{section.5.5}
-\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{117}{chapter.6}
-\contentsline {section}{\numberline {6.1}Introduction}{117}{section.6.1}
-\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{118}{section.6.2}
-\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{118}{subsection.6.2.1}
-\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{121}{subsection.6.2.2}
-\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{121}{subsection.6.2.3}
-\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{122}{section.6.3}
-\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{124}{section.6.4}
-\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{124}{subsection.6.4.1}
-\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{125}{subsection.6.4.2}
-\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{126}{subsubsection.6.4.2.1}
-\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{126}{subsubsection.6.4.2.2}
-\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{127}{subsubsection.6.4.2.3}
-\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{127}{subsubsection.6.4.2.4}
-\contentsline {section}{\numberline {6.5}Conclusion}{130}{section.6.5}
-\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{131}{part.3}
-\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{133}{chapter.7}
-\contentsline {section}{\numberline {7.1}Conclusion}{133}{section.7.1}
-\contentsline {section}{\numberline {7.2}Perspectives}{134}{section.7.2}
-\contentsline {part}{Bibliographie}{150}{chapter*.13}
+\contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{64}{subsection.3.2.2}
+\contentsline {section}{\numberline {3.3}Optimization Solvers}{66}{section.3.3}
+\contentsline {section}{\numberline {3.4}Conclusion}{70}{section.3.4}
+\contentsline {part}{II\hspace {1em}Contributions}{71}{part.2}
+\contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol}{73}{chapter.4}
+\contentsline {section}{\numberline {4.1}Introduction}{73}{section.4.1}
+\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{74}{section.4.2}
+\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{74}{subsection.4.2.1}
+\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{75}{subsection.4.2.2}
+\contentsline {subsection}{\numberline {4.2.3}Main Idea}{75}{subsection.4.2.3}
+\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{77}{subsubsection.4.2.3.1}
+\contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{77}{subsubsection.4.2.3.2}
+\contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{78}{subsubsection.4.2.3.3}
+\contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{78}{subsubsection.4.2.3.4}
+\contentsline {section}{\numberline {4.3}Coverage Problem Formulation}{79}{section.4.3}
+\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{80}{section.4.4}
+\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{80}{subsection.4.4.1}
+\contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{80}{subsection.4.4.2}
+\contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{81}{subsection.4.4.3}
+\contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{81}{subsection.4.4.4}
+\contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Number of Subregions}{83}{subsection.4.4.5}
+\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Different Number of Primary Points}{89}{subsection.4.4.6}
+\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{94}{subsection.4.4.7}
+\contentsline {section}{\numberline {4.5}Conclusion}{100}{section.4.5}
+\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{101}{chapter.5}
+\contentsline {section}{\numberline {5.1}Introduction}{101}{section.5.1}
+\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{101}{section.5.2}
+\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{102}{subsection.5.2.1}
+\contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{103}{section.5.3}
+\contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{105}{section.5.4}
+\contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{105}{subsection.5.4.1}
+\contentsline {subsection}{\numberline {5.4.2}Metrics}{105}{subsection.5.4.2}
+\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{106}{subsection.5.4.3}
+\contentsline {section}{\numberline {5.5}Conclusion}{113}{section.5.5}
+\contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{115}{chapter.6}
+\contentsline {section}{\numberline {6.1}Introduction}{115}{section.6.1}
+\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{115}{section.6.2}
+\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{115}{subsection.6.2.1}
+\contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{118}{subsection.6.2.2}
+\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{120}{section.6.3}
+\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{121}{section.6.4}
+\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{121}{subsection.6.4.1}
+\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{122}{subsection.6.4.2}
+\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{122}{subsubsection.6.4.2.1}
+\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{122}{subsubsection.6.4.2.2}
+\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{122}{subsubsection.6.4.2.3}
+\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{125}{subsubsection.6.4.2.4}
+\contentsline {section}{\numberline {6.5}Conclusion}{128}{section.6.5}
+\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{129}{part.3}
+\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{131}{chapter.7}
+\contentsline {section}{\numberline {7.1}Conclusion}{131}{section.7.1}
+\contentsline {section}{\numberline {7.2}Perspectives}{132}{section.7.2}
+\contentsline {part}{Bibliographie}{147}{chapter*.13}