]> AND Private Git Repository - ThesisAli.git/blobdiff - Thesis.toc
Logo AND Algorithmique Numérique Distribuée

Private GIT Repository
update ba Ali
[ThesisAli.git] / Thesis.toc
index 021310058c81d08c9dbb42f0ed572d17c61d2eed..9f87d83a193dac4ce511aa5b4397d342ce56bbc6 100755 (executable)
 \contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems:}{36}{section.1.9}
 \contentsline {section}{\numberline {1.10}Energy Consumption Modeling:}{37}{section.1.10}
 \contentsline {section}{\numberline {1.11}Conclusion}{39}{section.1.11}
-\contentsline {chapter}{\numberline {2}Related Literatures}{41}{chapter.2}
+\contentsline {chapter}{\numberline {2}Related Works on Coverage Problems}{41}{chapter.2}
 \contentsline {section}{\numberline {2.1}Introduction}{41}{section.2.1}
-\contentsline {section}{\numberline {2.2}Coverage Algorithms}{42}{section.2.2}
-\contentsline {subsection}{\numberline {2.2.1}Centralized Algorithms}{43}{subsection.2.2.1}
-\contentsline {subsection}{\numberline {2.2.2}Distributed Algorithms}{45}{subsection.2.2.2}
-\contentsline {section}{\numberline {2.3}Conclusion}{48}{section.2.3}
+\contentsline {subsection}{\numberline {2.1.1}Centralized Algorithms}{43}{subsection.2.1.1}
+\contentsline {subsection}{\numberline {2.1.2}Distributed Algorithms}{45}{subsection.2.1.2}
+\contentsline {section}{\numberline {2.2}Conclusion}{48}{section.2.2}
 \contentsline {chapter}{\numberline {3}Evaluation Tools and Optimization Solvers}{51}{chapter.3}
 \contentsline {section}{\numberline {3.1}Introduction}{51}{section.3.1}
 \contentsline {section}{\numberline {3.2}Evaluation Tools}{51}{section.3.2}
 \contentsline {section}{\numberline {6.1}Introduction}{107}{section.6.1}
 \contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{108}{section.6.2}
 \contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{108}{subsection.6.2.1}
-\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{109}{subsection.6.2.2}
+\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{111}{subsection.6.2.2}
 \contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{111}{subsection.6.2.3}
 \contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{112}{section.6.3}
 \contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{114}{section.6.4}
 \contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{114}{subsection.6.4.1}
 \contentsline {subsection}{\numberline {6.4.2}Simulation Results}{115}{subsection.6.4.2}
-\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{115}{subsubsection.6.4.2.1}
+\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{116}{subsubsection.6.4.2.1}
 \contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{116}{subsubsection.6.4.2.2}
-\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{116}{subsubsection.6.4.2.3}
+\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{117}{subsubsection.6.4.2.3}
 \contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{117}{subsubsection.6.4.2.4}
-\contentsline {section}{\numberline {6.5}Conclusion}{118}{section.6.5}
+\contentsline {section}{\numberline {6.5}Conclusion}{120}{section.6.5}
 \contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{121}{part.3}
 \contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{123}{chapter.7}
 \contentsline {section}{\numberline {7.1}Conclusion}{123}{section.7.1}