X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/ThesisAli.git/blobdiff_plain/75414a79b79e596919eb822c0b19b0f3ba3d6364..dc6cf8e426e52e11890b51d8cfbe8193285bea12:/Thesis.toc?ds=inline diff --git a/Thesis.toc b/Thesis.toc index adad8b4..5e7efc9 100644 --- a/Thesis.toc +++ b/Thesis.toc @@ -76,31 +76,30 @@ \contentsline {section}{\numberline {4.5}Conclusion}{101}{section.4.5} \contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{103}{chapter.5} \contentsline {section}{\numberline {5.1}Introduction}{103}{section.5.1} -\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{104}{section.5.2} +\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{103}{section.5.2} \contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{104}{subsection.5.2.1} \contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{105}{section.5.3} \contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{107}{section.5.4} \contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{107}{subsection.5.4.1} -\contentsline {subsection}{\numberline {5.4.2}Metrics}{108}{subsection.5.4.2} -\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{109}{subsection.5.4.3} -\contentsline {section}{\numberline {5.5}Conclusion}{114}{section.5.5} -\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{117}{chapter.6} -\contentsline {section}{\numberline {6.1}Introduction}{117}{section.6.1} -\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{118}{section.6.2} -\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{118}{subsection.6.2.1} -\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{121}{subsection.6.2.2} -\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{121}{subsection.6.2.3} -\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{122}{section.6.3} -\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{124}{section.6.4} -\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{124}{subsection.6.4.1} -\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{125}{subsection.6.4.2} -\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{126}{subsubsection.6.4.2.1} -\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{126}{subsubsection.6.4.2.2} -\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{127}{subsubsection.6.4.2.3} -\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{127}{subsubsection.6.4.2.4} -\contentsline {section}{\numberline {6.5}Conclusion}{130}{section.6.5} -\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{131}{part.3} -\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{133}{chapter.7} -\contentsline {section}{\numberline {7.1}Conclusion}{133}{section.7.1} -\contentsline {section}{\numberline {7.2}Perspectives}{134}{section.7.2} -\contentsline {part}{Bibliographie}{150}{chapter*.13} +\contentsline {subsection}{\numberline {5.4.2}Metrics}{107}{subsection.5.4.2} +\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{108}{subsection.5.4.3} +\contentsline {section}{\numberline {5.5}Conclusion}{113}{section.5.5} +\contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{115}{chapter.6} +\contentsline {section}{\numberline {6.1}Introduction}{115}{section.6.1} +\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{115}{section.6.2} +\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{115}{subsection.6.2.1} +\contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{118}{subsection.6.2.2} +\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{120}{section.6.3} +\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{121}{section.6.4} +\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{121}{subsection.6.4.1} +\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{122}{subsection.6.4.2} +\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{122}{subsubsection.6.4.2.1} +\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{122}{subsubsection.6.4.2.2} +\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{122}{subsubsection.6.4.2.3} +\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{125}{subsubsection.6.4.2.4} +\contentsline {section}{\numberline {6.5}Conclusion}{125}{section.6.5} +\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{129}{part.3} +\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{131}{chapter.7} +\contentsline {section}{\numberline {7.1}Conclusion}{131}{section.7.1} +\contentsline {section}{\numberline {7.2}Perspectives}{132}{section.7.2} +\contentsline {part}{Bibliographie}{148}{chapter*.13}