X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/ThesisAli.git/blobdiff_plain/ff6e3dd14e4aed4f39ce28f773c82d8589d36c8b..72071c0edb5719dd735986e8fa4147d224583e87:/Thesis.toc diff --git a/Thesis.toc b/Thesis.toc index 0213100..9f87d83 100755 --- a/Thesis.toc +++ b/Thesis.toc @@ -39,12 +39,11 @@ \contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems:}{36}{section.1.9} \contentsline {section}{\numberline {1.10}Energy Consumption Modeling:}{37}{section.1.10} \contentsline {section}{\numberline {1.11}Conclusion}{39}{section.1.11} -\contentsline {chapter}{\numberline {2}Related Literatures}{41}{chapter.2} +\contentsline {chapter}{\numberline {2}Related Works on Coverage Problems}{41}{chapter.2} \contentsline {section}{\numberline {2.1}Introduction}{41}{section.2.1} -\contentsline {section}{\numberline {2.2}Coverage Algorithms}{42}{section.2.2} -\contentsline {subsection}{\numberline {2.2.1}Centralized Algorithms}{43}{subsection.2.2.1} -\contentsline {subsection}{\numberline {2.2.2}Distributed Algorithms}{45}{subsection.2.2.2} -\contentsline {section}{\numberline {2.3}Conclusion}{48}{section.2.3} +\contentsline {subsection}{\numberline {2.1.1}Centralized Algorithms}{43}{subsection.2.1.1} +\contentsline {subsection}{\numberline {2.1.2}Distributed Algorithms}{45}{subsection.2.1.2} +\contentsline {section}{\numberline {2.2}Conclusion}{48}{section.2.2} \contentsline {chapter}{\numberline {3}Evaluation Tools and Optimization Solvers}{51}{chapter.3} \contentsline {section}{\numberline {3.1}Introduction}{51}{section.3.1} \contentsline {section}{\numberline {3.2}Evaluation Tools}{51}{section.3.2} @@ -87,17 +86,17 @@ \contentsline {section}{\numberline {6.1}Introduction}{107}{section.6.1} \contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{108}{section.6.2} \contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{108}{subsection.6.2.1} -\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{109}{subsection.6.2.2} +\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{111}{subsection.6.2.2} \contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{111}{subsection.6.2.3} \contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{112}{section.6.3} \contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{114}{section.6.4} \contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{114}{subsection.6.4.1} \contentsline {subsection}{\numberline {6.4.2}Simulation Results}{115}{subsection.6.4.2} -\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{115}{subsubsection.6.4.2.1} +\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{116}{subsubsection.6.4.2.1} \contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{116}{subsubsection.6.4.2.2} -\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{116}{subsubsection.6.4.2.3} +\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{117}{subsubsection.6.4.2.3} \contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{117}{subsubsection.6.4.2.4} -\contentsline {section}{\numberline {6.5}Conclusion}{118}{section.6.5} +\contentsline {section}{\numberline {6.5}Conclusion}{120}{section.6.5} \contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{121}{part.3} \contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{123}{chapter.7} \contentsline {section}{\numberline {7.1}Conclusion}{123}{section.7.1}