From: ali Date: Sun, 22 Mar 2015 00:07:40 +0000 (+0100) Subject: Update by Ali X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/ThesisAli.git/commitdiff_plain/56a92c237ca9749d9ab033aa709590d7976d00ce?ds=inline Update by Ali --- diff --git a/CHAPITRE_06.tex b/CHAPITRE_06.tex index f530dfc..31e696c 100755 --- a/CHAPITRE_06.tex +++ b/CHAPITRE_06.tex @@ -40,7 +40,10 @@ networks of tiny sensors, called Wireless Sensor Networks (WSN)~\cite{ref1,ref22 range of application in areas such as business, environment, health, industry, military, and so on~\cite{ref4}. These large number of applications have led to different design, management, and operational challenges in WSNs. The challenges become harder with considering into account the main limited capabilities of the sensor nodes such memory, processing, battery life, bandwidth, and short radio ranges. One important feature that distinguish the WSN from the other types of wireless networks is the provision of the sensing capability for the sensor nodes \cite{ref224}. -The sensor node consumes some energy both in performing the sensing task and in transmitting the sensed data to the sink. Therefore, it is required to activate as less number as possible of sensor nodes that can monitor the whole area of interest so as to reduce the data volume and extend the network lifetime. The sensing coverage is the most important task of the WSNs since sensing unit of the sensor node is responsible for measuring physical, chemical, or biological phenomena in the sensing field. The main challenge of any sensing coverage problem is to discover the redundant sensor node and turn off those nodes in WSN \cite{ref225}. The redundant sensor node is a node whose sensing area is covered by its active neighbors. In previous works, several methods are used to find out the redundant node such as Voronoi diagram method, sponsored sector, crossing coverage, and perimeter coverage. +The sensor node consumes some energy both in performing the sensing task and in transmitting the sensed data to the sink. Therefore, it is required to activate as less number as possible of sensor nodes that can monitor the whole area of interest so as to reduce the data volume and extend the network lifetime. The sensing coverage is the most important task of the WSNs since sensing unit of the sensor node is responsible for measuring physical, chemical, or biological phenomena in the sensing field. The main challenge of any sensing coverage problem is to discover the redundant sensor node and turn off those nodes in WSN \cite{ref225}. The redundant sensor node is a node whose sensing area is covered by its active neighbors. In previous works, several approaches are used to find out the redundant node such as Voronoi diagram method, sponsored sector, crossing coverage, and perimeter coverage. + +In this chapter, we propose such an approach called Perimeter-based Coverage Optimization +protocol (PeCO). The PeCO protocol merges between two energy efficient mechanisms, which are used the main advantages of the centralized and distributed approaches and avoids the most of their disadvantages. An energy-efficient activity scheduling mechanism based new optimization model is performed by each leader in the subregions. This optimization model is based on the perimeter coverage model in order to producing the optimal cover set of active sensors, which are taken the responsibility of sensing during the current period. The rest of the chapter is organized as follows. The next section is devoted to the PeCO protocol description and section~\ref{ch6:sec:03} focuses on the diff --git a/Thesis.toc b/Thesis.toc index 0213100..576f604 100755 --- a/Thesis.toc +++ b/Thesis.toc @@ -87,17 +87,17 @@ \contentsline {section}{\numberline {6.1}Introduction}{107}{section.6.1} \contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{108}{section.6.2} \contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{108}{subsection.6.2.1} -\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{109}{subsection.6.2.2} +\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{111}{subsection.6.2.2} \contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{111}{subsection.6.2.3} \contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{112}{section.6.3} \contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{114}{section.6.4} \contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{114}{subsection.6.4.1} \contentsline {subsection}{\numberline {6.4.2}Simulation Results}{115}{subsection.6.4.2} -\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{115}{subsubsection.6.4.2.1} +\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{116}{subsubsection.6.4.2.1} \contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{116}{subsubsection.6.4.2.2} -\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{116}{subsubsection.6.4.2.3} +\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{117}{subsubsection.6.4.2.3} \contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{117}{subsubsection.6.4.2.4} -\contentsline {section}{\numberline {6.5}Conclusion}{118}{section.6.5} +\contentsline {section}{\numberline {6.5}Conclusion}{120}{section.6.5} \contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{121}{part.3} \contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{123}{chapter.7} \contentsline {section}{\numberline {7.1}Conclusion}{123}{section.7.1}