X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/ThesisAli.git/blobdiff_plain/75414a79b79e596919eb822c0b19b0f3ba3d6364..b526efd6a44846d1d89a70fedae4bf9bd2058885:/Thesis.toc diff --git a/Thesis.toc b/Thesis.toc index adad8b4..60e32f1 100644 --- a/Thesis.toc +++ b/Thesis.toc @@ -64,7 +64,7 @@ \contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{79}{subsubsection.4.2.3.2} \contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{80}{subsubsection.4.2.3.3} \contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{80}{subsubsection.4.2.3.4} -\contentsline {section}{\numberline {4.3}Primary Points based Coverage Problem Formulation}{80}{section.4.3} +\contentsline {section}{\numberline {4.3}Primary Points based Coverage Problem Formulation}{81}{section.4.3} \contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{82}{section.4.4} \contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{82}{subsection.4.4.1} \contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{83}{subsection.4.4.2} @@ -72,31 +72,30 @@ \contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{84}{subsection.4.4.4} \contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Number of Subregions}{85}{subsection.4.4.5} \contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Different Number of Primary Points}{90}{subsection.4.4.6} -\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{95}{subsection.4.4.7} -\contentsline {section}{\numberline {4.5}Conclusion}{101}{section.4.5} +\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{97}{subsection.4.4.7} +\contentsline {section}{\numberline {4.5}Conclusion}{102}{section.4.5} \contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{103}{chapter.5} \contentsline {section}{\numberline {5.1}Introduction}{103}{section.5.1} -\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{104}{section.5.2} +\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{103}{section.5.2} \contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{104}{subsection.5.2.1} \contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{105}{section.5.3} \contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{107}{section.5.4} \contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{107}{subsection.5.4.1} -\contentsline {subsection}{\numberline {5.4.2}Metrics}{108}{subsection.5.4.2} -\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{109}{subsection.5.4.3} -\contentsline {section}{\numberline {5.5}Conclusion}{114}{section.5.5} -\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{117}{chapter.6} +\contentsline {subsection}{\numberline {5.4.2}Metrics}{107}{subsection.5.4.2} +\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{108}{subsection.5.4.3} +\contentsline {section}{\numberline {5.5}Conclusion}{115}{section.5.5} +\contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{117}{chapter.6} \contentsline {section}{\numberline {6.1}Introduction}{117}{section.6.1} -\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{118}{section.6.2} -\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{118}{subsection.6.2.1} -\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{121}{subsection.6.2.2} -\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{121}{subsection.6.2.3} +\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{117}{section.6.2} +\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{117}{subsection.6.2.1} +\contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{120}{subsection.6.2.2} \contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{122}{section.6.3} -\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{124}{section.6.4} -\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{124}{subsection.6.4.1} -\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{125}{subsection.6.4.2} -\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{126}{subsubsection.6.4.2.1} -\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{126}{subsubsection.6.4.2.2} -\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{127}{subsubsection.6.4.2.3} +\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{123}{section.6.4} +\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{123}{subsection.6.4.1} +\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{124}{subsection.6.4.2} +\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{124}{subsubsection.6.4.2.1} +\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{124}{subsubsection.6.4.2.2} +\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{124}{subsubsection.6.4.2.3} \contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{127}{subsubsection.6.4.2.4} \contentsline {section}{\numberline {6.5}Conclusion}{130}{section.6.5} \contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{131}{part.3}