X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/ThesisAli.git/blobdiff_plain/5c431ecbeda4acd97fad6b1e170d502ea11a2b3d..dc6cf8e426e52e11890b51d8cfbe8193285bea12:/Thesis.toc diff --git a/Thesis.toc b/Thesis.toc index 918abd5..5e7efc9 100644 --- a/Thesis.toc +++ b/Thesis.toc @@ -84,21 +84,20 @@ \contentsline {subsection}{\numberline {5.4.2}Metrics}{107}{subsection.5.4.2} \contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{108}{subsection.5.4.3} \contentsline {section}{\numberline {5.5}Conclusion}{113}{section.5.5} -\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{115}{chapter.6} +\contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{115}{chapter.6} \contentsline {section}{\numberline {6.1}Introduction}{115}{section.6.1} -\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{116}{section.6.2} -\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{116}{subsection.6.2.1} -\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{119}{subsection.6.2.2} -\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{119}{subsection.6.2.3} +\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{115}{section.6.2} +\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{115}{subsection.6.2.1} +\contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{118}{subsection.6.2.2} \contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{120}{section.6.3} -\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{122}{section.6.4} -\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{122}{subsection.6.4.1} -\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{123}{subsection.6.4.2} -\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{124}{subsubsection.6.4.2.1} -\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{124}{subsubsection.6.4.2.2} -\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{125}{subsubsection.6.4.2.3} +\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{121}{section.6.4} +\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{121}{subsection.6.4.1} +\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{122}{subsection.6.4.2} +\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{122}{subsubsection.6.4.2.1} +\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{122}{subsubsection.6.4.2.2} +\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{122}{subsubsection.6.4.2.3} \contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{125}{subsubsection.6.4.2.4} -\contentsline {section}{\numberline {6.5}Conclusion}{128}{section.6.5} +\contentsline {section}{\numberline {6.5}Conclusion}{125}{section.6.5} \contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{129}{part.3} \contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{131}{chapter.7} \contentsline {section}{\numberline {7.1}Conclusion}{131}{section.7.1}