Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (226)

Search Parameters:
Keywords = multithreading

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 12003 KB  
Article
Low Latency and Multi-Target Camera-Based Safety System for Optical Wireless Power Transmission
by Chen Zuo and Tomoyuki Miyamoto
Photonics 2026, 13(2), 156; https://doi.org/10.3390/photonics13020156 - 6 Feb 2026
Viewed by 82
Abstract
Optical Wireless Power Transmission (OWPT) holds a significant position for enabling cable-free energy delivery in long-distance, high-energy, and mobile scenarios. However, ensuring human and equipment safety under high-power laser exposure remains a critical challenge. This study reports a vision-based OWPT safety system that [...] Read more.
Optical Wireless Power Transmission (OWPT) holds a significant position for enabling cable-free energy delivery in long-distance, high-energy, and mobile scenarios. However, ensuring human and equipment safety under high-power laser exposure remains a critical challenge. This study reports a vision-based OWPT safety system that implements the principle of automatic emission control (AEC)—dynamically modulating laser emission in real time to prevent hazardous exposure. While camera-based OWPT safety systems have been proposed in the concept, there are extremely limited working implementations to date. Moreover, existing systems struggle with response speed and single-object assumptions. To address these gaps, this research presents a low-latency safety architecture based on a customized deep learning-based object detection framework, a dedicated OWPT dataset, and a multi-threaded control stack. The research also introduces a real-time risk factor (RF) metric that evaluates proximity and velocity for each detected intrusion object (IO), enabling dynamic prioritization among multiple threats. The system achieves a minimum response latency of 14 ms (average 29 ms) and maintains reliable performance in complex multi-object scenarios. This work establishes a new benchmark for OWPT safety system and contributes a scalable reference for future development. Full article
Show Figures

Figure 1

33 pages, 4987 KB  
Article
Analysis of the Driving Mechanism of China’s Provincial Carbon Emission Spatial Correlation Network: Based on the Dual Perspectives of Dynamic Evolution and Static Formation
by Jie-Kun Song, Yang Ding, Hui-Sheng Xiao and Yi-Long Su
Systems 2026, 14(2), 163; https://doi.org/10.3390/systems14020163 - 3 Feb 2026
Viewed by 186
Abstract
Against the backdrop of China’s commitment to achieving carbon peaking by 2030 and carbon neutrality by 2060, inter-provincial carbon emissions form a complex interconnected spatial network—clarifying its operational mechanisms is crucial for optimizing regional carbon reduction strategies. Based on 2006–2021 data from 30 [...] Read more.
Against the backdrop of China’s commitment to achieving carbon peaking by 2030 and carbon neutrality by 2060, inter-provincial carbon emissions form a complex interconnected spatial network—clarifying its operational mechanisms is crucial for optimizing regional carbon reduction strategies. Based on 2006–2021 data from 30 Chinese provinces, this study constructs the China Provincial Carbon Emission Spatial Correlation Network (CPCESCN) using a modified gravity model. Social Network Analysis (SNA) explores its structural characteristics, while motif and QAP correlation analyses identify endogenous structural and attribute variables. Innovatively integrating Exponential Random Graph Models (ERGM) and Stochastic Actor-Oriented Models (SAOM), it investigates the network’s static formation mechanisms and dynamic evolution drivers. Results show CPCESCN has a stable multi-threaded structure without isolated nodes, with Jiangsu, Guangdong, Shandong, Zhejiang, Henan, and Sichuan as high-centrality core nodes with high centrality. GDP, green technology innovation, urbanization rate, industrialization rate, energy consumption intensity, and environmental regulations significantly influence network dynamics, with reciprocal relationships as key endogenous drivers. While geographic proximity still facilitates network formation, its impact has weakened notably, and functional complementarity has become the dominant evolutionary driver—based on the findings, policy suggestions are proposed, including deepening inter-provincial functional cooperation, implementing differentiated carbon reduction policies, and optimizing multi-dimensional low-carbon transformation systems. Full article
Show Figures

Figure 1

13 pages, 1014 KB  
Article
Loop-Block-Level Automatic Parallelization in Compilers
by Mengyao Chen, Qinglei Zhou, Kai Nie and Haoran Li
Appl. Sci. 2026, 16(3), 1533; https://doi.org/10.3390/app16031533 - 3 Feb 2026
Viewed by 97
Abstract
To address the issues of coarse-grained thread allocation and difficult load balancing in compiler automatic parallelization for processors, this paper proposes a loop-block-level automatic parallelization method for compilers based on an iterative compilation mode, using the SWGCC compiler on the Sunway platform. An [...] Read more.
To address the issues of coarse-grained thread allocation and difficult load balancing in compiler automatic parallelization for processors, this paper proposes a loop-block-level automatic parallelization method for compilers based on an iterative compilation mode, using the SWGCC compiler on the Sunway platform. An automatic parallelization method that independently sets the number of threads for each loop block is designed within the SWGCC, which allocates threads to each parallelizable loop block in the program at a finer granularity. Meanwhile, iterative compilation is combined with a genetic algorithm to iteratively optimize the optimal thread group. Through operations such as the chromosome encoding of thread allocation schemes, weighted mutation operations based on loop execution proportions, and fitness function-guided population evolution, the optimal thread combination is efficiently searched for the loop block thread allocation algorithm. Experiments are validated on the Sunway processor using the SPEC2006 test suite. The results reveal that the loop-block-level compiler automatic parallelization algorithm combined with the evolutionary algorithm achieves a maximum performance score improvement of 19% and an average performance score improvement of 4% compared to the baseline automatic parallelization algorithm in the tests. Full article
Show Figures

Figure 1

56 pages, 2923 KB  
Article
FileCipher: A Chaos-Enhanced CPRNG-Based Algorithm for Parallel File Encryption
by Yousef Sanjalawe, Ahmad Al-Daraiseh, Salam Al-E’mari and Sharif Naser Makhadmeh
Algorithms 2026, 19(2), 119; https://doi.org/10.3390/a19020119 - 2 Feb 2026
Viewed by 170
Abstract
The exponential growth of digital data and the escalating sophistication of cyber threats have intensified the demand for secure yet computationally efficient encryption methods. Conventional algorithms (e.g., AES-based schemes) are cryptographically strong and widely deployed; however, some implementations can face performance bottlenecks in [...] Read more.
The exponential growth of digital data and the escalating sophistication of cyber threats have intensified the demand for secure yet computationally efficient encryption methods. Conventional algorithms (e.g., AES-based schemes) are cryptographically strong and widely deployed; however, some implementations can face performance bottlenecks in large-scale or real-time workloads. While many modern systems seed from hardware entropy sources and employ standardized cryptographic PRNGs/DRBGs, security can still be degraded in practice by weak entropy initialization, misconfiguration, or the use of non-cryptographic deterministic generators in certain environments. To address these gaps, this study introduces FileCipher. This novel file-encryption framework integrates a chaos-enhanced Cryptographically Secure Pseudorandom Number Generator (CPRNG) based on the State-Based Tent Map (SBTM). The proposed design achieves a balanced trade-off between security and efficiency through dynamic key generation, adaptive block reshaping, and structured confusion–diffusion processes. The SBTM-driven CPRNG introduces adaptive seeding and multi-key feedback, ensuring high entropy and sensitivity to initial conditions. A multi-threaded Java implementation demonstrates approximately 60% reduction in encryption time compared with AES-CBC, validating FileCipher’s scalability in parallel execution environments. Statistical evaluations using NIST SP 800-22, SP 800-90B, Dieharder, and TestU01 confirm superior randomness with over 99% pass rates, while Avalanche Effect analysis indicates bit-change ratios near 50%, proving strong diffusion characteristics. The results highlight FileCipher’s novelty in combining nonlinear chaotic dynamics with lightweight parallel architecture, offering a robust, platform-independent solution for secure data storage and transmission. Ultimately, this paper contributes a reproducible, entropy-stable, and high-performance cryptographic mechanism that redefines the efficiency–security balance in modern encryption systems. Full article
26 pages, 663 KB  
Article
Energy–Performance Trade-Offs of LU Matrix Decomposition in Java Across Heterogeneous Hardware and Operating Systems
by Francisco J. Rosa, Juan Carlos de la Torre, José M. Aragón-Jurado, Alberto Valderas-González and Bernabé Dorronsoro
Appl. Sci. 2026, 16(2), 1002; https://doi.org/10.3390/app16021002 - 19 Jan 2026
Viewed by 139
Abstract
The increasing core counts and architectural heterogeneity of modern processors make performance optimization insufficient if energy consumption is not simultaneously considered. By providing a novel characterization of how the interaction between hybrid architectures and system software disrupts the traditional correlation between execution speed [...] Read more.
The increasing core counts and architectural heterogeneity of modern processors make performance optimization insufficient if energy consumption is not simultaneously considered. By providing a novel characterization of how the interaction between hybrid architectures and system software disrupts the traditional correlation between execution speed and energy efficiency, this research study analyzes the performance–energy trade-offs of parallel LU matrix decomposition algorithms implemented in Java, focusing on the Crout and Doolittle variants. This study is conducted on four different platforms, including ARM-based, Hybrid x86, and many-core accelerators. Execution time and speedup are evaluated for varying thread counts, while energy consumption is measured externally to capture whole-system energy usage. Experimental results show that the configuration yielding the maximum speedup does not necessarily minimize energy consumption. While x86 systems showed energy savings exceeding 80% under optimal parallel configurations, the ARM-based platform required distinct thread counts to minimize energy consumption compared with maximizing speed. These findings demonstrate that energy-efficient configurations represent a distinct optimization space that often contradicts traditional performance metrics. In the era of hybrid computing, green software optimization must transition from a simplistic “race-to-sleep” paradigm toward sophisticated, architecture-aware strategies that account for the specific power profiles of heterogeneous cores to achieve truly sustainable high-performance computing. Full article
Show Figures

Figure 1

15 pages, 2074 KB  
Article
Research on Encryption and Decryption Technology of Microservice Communication Based on Block Cipher
by Shijie Zhang, Xiaolan Xie, Ting Fan and Yu Wang
Electronics 2026, 15(2), 431; https://doi.org/10.3390/electronics15020431 - 19 Jan 2026
Viewed by 224
Abstract
The efficiency optimization of encryption and decryption algorithms in cloud environments is addressed in this study, where the processing speed of encryption and decryption is enhanced through the application of multi-threaded parallel technology. In view of the high-concurrency and distributed storage characteristics of [...] Read more.
The efficiency optimization of encryption and decryption algorithms in cloud environments is addressed in this study, where the processing speed of encryption and decryption is enhanced through the application of multi-threaded parallel technology. In view of the high-concurrency and distributed storage characteristics of cloud platforms, a multi-threaded concurrency mechanism is adopted for the direct processing of data streams. Compared with the traditional serial processing mode, four distinct encryption algorithms, namely AES, DES, SM4 and Ascon, are employed, and different data units are processed concurrently by means of multithreaded technology. Based on multi-dimensional performance evaluation indicators (including throughput, memory footprint and security level), comparative analyses are carried out to optimize the design scheme; accordingly, multi-threaded collaborative encryption is realized to improve the overall operation efficiency. Experimental results indicate that, in comparison with the traditional serial encryption method, the encryption and decryption latency of the algorithm is reduced by around 50%, which significantly lowers the time overhead associated with encryption and decryption processes. Simultaneously, the throughput of AES and DES algorithms is observed to be doubled, which leads to a remarkable improvement in communication efficiency. Moreover, under the premise that the original secure communication capability is guaranteed, system resource overhead is effectively reduced by SM4 and Ascon algorithms. On this basis, a quantitative reference basis is provided for cloud platforms to develop targeted encryption strategies tailored to diverse business demands. In conclusion, the proposed approach is of profound significance for advancing the synergistic optimization of security and performance in cloud-native data communication scenarios. Full article
(This article belongs to the Special Issue AI for Wireless Communications and Security)
Show Figures

Figure 1

21 pages, 5182 KB  
Article
Quantitative Assessment of the Computing Performance for the Parallel Implementation of a Time-Domain Airborne SAR Raw Data Focusing Procedure
by Jorge Euillades, Paolo Berardino, Carmen Esposito, Antonio Natale, Riccardo Lanari and Stefano Perna
Remote Sens. 2026, 18(2), 221; https://doi.org/10.3390/rs18020221 - 9 Jan 2026
Viewed by 299
Abstract
In this work, different implementation strategies for a Time-Domain (TD) focusing procedure applied to airborne Synthetic Aperture Radar (SAR) raw data are presented, with the key objective of quantitatively assessing their computing time. In particular, two methodological approaches are proposed: a pixel-wise strategy, [...] Read more.
In this work, different implementation strategies for a Time-Domain (TD) focusing procedure applied to airborne Synthetic Aperture Radar (SAR) raw data are presented, with the key objective of quantitatively assessing their computing time. In particular, two methodological approaches are proposed: a pixel-wise strategy, which processes each image pixel independently, and a matrix-wise strategy, which handles data blocks collectively. Both strategies are further extended to parallel execution frameworks to exploit multi-threading and multi-node capabilities. The presented analysis is conducted within the context of the airborne SAR infrastructure developed at the Institute for Electromagnetic Sensing of the Environment (IREA) of the National Research Council (CNR) in Naples, Italy. This infrastructure integrates an airborne SAR sensor and a high-performance Information Technology (IT) platform well-tailored to the parallel processing of huge amounts of data. Experimental results indicate an advantage of the pixel-wise strategy over the matrix-wise counterpart in terms of computing time. Furthermore, the adoption of parallel processing techniques yields substantial speedups, highlighting its relevance for time-critical SAR applications. These findings are particularly relevant in operational scenarios that demand a rapid data turnaround, such as near-real-time airborne monitoring in emergency response contexts. Full article
Show Figures

Graphical abstract

22 pages, 840 KB  
Article
A Comparative Evaluation of Snort and Suricata for Detecting Data Exfiltration Tunnels in Cloud Environments
by Mahmoud H. Qutqut, Ali Ahmed, Mustafa K. Taqi, Jordan Abimanyu, Erika Thea Ajes and Fatima Alhaj
J. Cybersecur. Priv. 2026, 6(1), 17; https://doi.org/10.3390/jcp6010017 - 8 Jan 2026
Viewed by 697
Abstract
Data exfiltration poses a major cybersecurity challenge because it involves the unauthorized transfer of sensitive information. Intrusion Detection Systems (IDSs) are vital security controls in identifying such attacks; however, their effectiveness in cloud computing environments remains limited, particularly against covert channels such as [...] Read more.
Data exfiltration poses a major cybersecurity challenge because it involves the unauthorized transfer of sensitive information. Intrusion Detection Systems (IDSs) are vital security controls in identifying such attacks; however, their effectiveness in cloud computing environments remains limited, particularly against covert channels such as Internet Control Message Protocol (ICMP) and Domain Name System (DNS) tunneling. This study compares two widely used IDSs, Snort and Suricata, in a controlled cloud computing environment. The assessment focuses on their ability to detect data exfiltration techniques implemented via ICMP and DNS tunneling, using DNSCat2 and Iodine. We evaluate detection performance using standard classification metrics, including Recall, Precision, Accuracy, and F1-Score. Our experiments were conducted on Amazon Web Services (AWS) Elastic Compute Cloud (EC2) instances, where IDS instances monitored simulated exfiltration traffic generated by DNSCat2, Iodine, and Metasploit. Network traffic was mirrored via AWS Virtual Private Cloud (VPC) Traffic Mirroring, with the ELK Stack integrated for centralized logging and visual analysis. The findings indicate that Suricata outperformed Snort in detecting DNS-based exfiltration, underscoring the advantages of multi-threaded architectures for managing high-volume cloud traffic. For DNS tunneling, Suricata achieved 100% detection (recall) for both DNSCat2 and Iodine, whereas Snort achieved 85.7% and 66.7%, respectively. Neither IDS detected ICMP tunneling using Metasploit, with both recording 0% recall. It is worth noting that both IDSs failed to detect ICMP tunneling under default configurations, highlighting the limitations of signature-based detection in isolation. These results emphasize the need to combine signature-based and behavior-based analytics, supported by centralized logging frameworks, to strengthen cloud-based intrusion detection and enhance forensic visibility. Full article
(This article belongs to the Special Issue Cloud Security and Privacy)
Show Figures

Figure 1

23 pages, 2363 KB  
Article
Crowdsourcing Framework for Security Testing and Verification of Industrial Cyber-Physical Systems
by Zhenyu Li, Yong Ding, Ruwen Zhao, Shuo Wang and Jun Li
Sensors 2026, 26(1), 79; https://doi.org/10.3390/s26010079 - 22 Dec 2025
Viewed by 507
Abstract
With the widespread deployment of Industrial Cyber-Physical Systems (ICPS), their inherent vulnerabilities have increasingly exposed them to sophisticated cybersecurity threats. Although existing protective mechanisms can block attacks at runtime, the risk of defense failure remains. To proactively evaluate and harden ICPS security, we [...] Read more.
With the widespread deployment of Industrial Cyber-Physical Systems (ICPS), their inherent vulnerabilities have increasingly exposed them to sophisticated cybersecurity threats. Although existing protective mechanisms can block attacks at runtime, the risk of defense failure remains. To proactively evaluate and harden ICPS security, we design a distributed crowdsourced testing platform tailored to the four-layer cloud ICPS architecture—spanning the workshop, factory, enterprise, and external network layers. Building on this architecture, we develop a Distributed Input–Output Testing and Verification Framework (DIOTVF) that models ICPS as systems with spatially separated injection and observation points, and supports controllable communication delays and multithreaded parallel execution. The framework incorporates a dynamic test–task management model, an asynchronous concurrent testing mechanism, and an optional LLM-assisted thread controller, enabling efficient scheduling of large testing workloads under asynchronous network conditions. We implement the proposed framework in a prototype platform and deploy it on a virtualized ICPS testbed with configurable delay characteristics. Through a series of experimental validations, we demonstrate that the proposed framework can improve testing and verification speed by approximately 2.6 times compared to Apache JMeter. Full article
Show Figures

Figure 1

7 pages, 703 KB  
Proceeding Paper
Design of a Modular and Scalable Measurement System for Battery and Electronics Testing
by Istvan Kecskemeti and Gabor Szakallas
Eng. Proc. 2025, 113(1), 47; https://doi.org/10.3390/engproc2025113047 - 10 Nov 2025
Viewed by 366
Abstract
The increasing need for precise testing in battery and electronic component development has driven the demand for modular and scalable laboratory systems. This paper presents the design and initial implementation of a LabVIEW-based measurement system tailored for ISO/IEC 17025-compliant testing environments. The system’s [...] Read more.
The increasing need for precise testing in battery and electronic component development has driven the demand for modular and scalable laboratory systems. This paper presents the design and initial implementation of a LabVIEW-based measurement system tailored for ISO/IEC 17025-compliant testing environments. The system’s software architecture is modular and built around a Hardware Abstraction Layer, enabling the integration of various remotely controlled instruments, such as programmable power supplies, electronic loads, and climate chambers. LabVIEW’s object-oriented programming and multi-threaded execution environment allows synchronized control and real-time data acquisition. Test procedures are defined using a JSON-based sequence structure, supporting repeatable testing. A graphical editor provides an intuitive interface for configuring test steps, ensuring ease of use. The system is designed to support future expansion, including high-speed measurement modules and parallel test execution. This solution lays the foundation for a reliable and extensible automated testing platform that aligns with modern industrial and regulatory standards. Full article
(This article belongs to the Proceedings of The Sustainable Mobility and Transportation Symposium 2025)
Show Figures

Figure 1

10 pages, 532 KB  
Article
3D Non-Uniform Fast Fourier Transform Program Optimization
by Kai Nie, Haoran Li, Lin Han, Yapeng Li and Jinlong Xu
Appl. Sci. 2025, 15(19), 10563; https://doi.org/10.3390/app151910563 - 30 Sep 2025
Viewed by 755
Abstract
MRI (magnetic resonance imaging) technology aims to map the internal structure image of organisms. It is an important application scenario of Non-Uniform Fast Fourier Transform (NUFFT), which can help doctors quickly locate the lesion site of patients. However, in practical application, it has [...] Read more.
MRI (magnetic resonance imaging) technology aims to map the internal structure image of organisms. It is an important application scenario of Non-Uniform Fast Fourier Transform (NUFFT), which can help doctors quickly locate the lesion site of patients. However, in practical application, it has disadvantages such as large computation and difficulty in parallel. Under the architecture of multi-core shared memory, using block pretreatment, color block scheduling NUFFT convolution interpolation offers a parallel solution, and then using a static linked list solves the problem of large memory requirements after the parallel solution on the basis of multithreading to cycle through more source code versions. Then, manual vectorization, such as processing, using short vector components, further accelerates the process. Through a series of optimizations, the final Random, Radial, and Spiral dataset obtained an acceleration effect of 273.8×, 291.8× and 251.7×, respectively. Full article
Show Figures

Figure 1

42 pages, 564 KB  
Article
Black-Box Bug Amplification for Multithreaded Software
by Yeshayahu Weiss, Gal Amram, Achiya Elyasaf, Eitan Farchi, Oded Margalit and Gera Weiss
Mathematics 2025, 13(18), 2921; https://doi.org/10.3390/math13182921 - 9 Sep 2025
Viewed by 1403
Abstract
Bugs, especially those in concurrent systems, are often hard to reproduce because they manifest only under rare conditions. Testers frequently encounter failures that occur only under specific inputs, often at low probability. We propose an approach to systematically amplify the occurrence of such [...] Read more.
Bugs, especially those in concurrent systems, are often hard to reproduce because they manifest only under rare conditions. Testers frequently encounter failures that occur only under specific inputs, often at low probability. We propose an approach to systematically amplify the occurrence of such elusive bugs. We treat the system under test as a black-box system and use repeated trial executions to train a predictive model that estimates the probability of a given input configuration triggering a bug. We evaluate this approach on a dataset of 17 representative concurrency bugs spanning diverse categories. Several model-based search techniques are compared against a brute-force random sampling baseline. Our results show that an ensemble stacking classifier can significantly increase bug occurrence rates across nearly all scenarios, often achieving an order-of-magnitude improvement over random sampling. The contributions of this work include the following: (i) a novel formulation of bug amplification as a rare-event classification problem; (ii) an empirical evaluation of multiple techniques for amplifying bug occurrence, demonstrating the effectiveness of model-guided search; and (iii) a practical, non-invasive testing framework that helps practitioners to expose hidden concurrency faults without altering the internal system architecture. Full article
Show Figures

Figure 1

19 pages, 469 KB  
Article
Performance Evaluation of Separate Chaining for Concurrent Hash Maps
by Ana Castro, Miguel Areias and Ricardo Rocha
Mathematics 2025, 13(17), 2820; https://doi.org/10.3390/math13172820 - 2 Sep 2025
Viewed by 1483
Abstract
Hash maps are a widely used and efficient data structure for storing and accessing data organized as key-value pairs. Multithreading with hash maps refers to the ability to concurrently execute multiple lookup, insert, and delete operations, such that each operation runs independently while [...] Read more.
Hash maps are a widely used and efficient data structure for storing and accessing data organized as key-value pairs. Multithreading with hash maps refers to the ability to concurrently execute multiple lookup, insert, and delete operations, such that each operation runs independently while sharing the underlying data structure. One of the main challenges in hash map implementation is the management of collisions. Arguably, separate chaining is among the most well-known strategies for collision resolution. In this paper, we present a comprehensive study comparing two common approaches to implementing separate chaining—linked lists and dynamic arrays—in a multithreaded environment using a lock-based concurrent hash map design. Our study includes a performance evaluation covering parameters such as cache behavior, energy consumption, contention under concurrent access, and resizing overhead. Experimental results show that dynamic arrays maintain more predictable memory access and lower energy consumption in multithreaded environments. Full article
(This article belongs to the Special Issue Advances in High-Speed Computing and Parallel Algorithm)
Show Figures

Figure 1

14 pages, 4120 KB  
Article
Generalized Product-Form Solutions for Stationary and Non-Stationary Queuing Networks with Application to Maritime and Railway Transport
by Gurami Tsitsiashvili
Mathematics 2025, 13(17), 2810; https://doi.org/10.3390/math13172810 - 1 Sep 2025
Viewed by 599
Abstract
The paper advances the theory of queuing networks by presenting generalized product-form solutions that explicitly take into account the service intensity depending on the number of customers in the network nodes, including the presence of multiple service channels and multi-threaded nodes. This represents [...] Read more.
The paper advances the theory of queuing networks by presenting generalized product-form solutions that explicitly take into account the service intensity depending on the number of customers in the network nodes, including the presence of multiple service channels and multi-threaded nodes. This represents a significant extension of the classical results on the Jackson network by integrating graph-theoretic methods, including basic subgraphs with service rates depending on the number of requests. The originality of the article is in the combination of stationary and non-stationary approaches to modeling service networks within a single approach. In particular, acyclic networks with deterministic service time and non-stationary Poisson input flow are considered. Such systems present a significant difficulty, which is noted in well-known works. A stationary model of an open queuing network with service intensity depending on the number of customers in the network nodes is constructed. The stationary network model is related to the problem of marine linear navigation along a strictly defined route and schedule. A generalization of the product theorem with a new form of stationary distribution is developed for it. It is shown that even a small increase in the service intensity with a large number of requests in a queuing network node can significantly reduce its average value. A non-stationary model of an acyclic queuing network with deterministic service time in network nodes and a non-stationary Poisson input flow is constructed. The non-stationary model is associated with irregular (tramp) sea transportation. The intensities of non-stationary Poisson flows in acyclic networks are represented by product formulas using paths between the initial node and other network nodes. The parameters of Poisson distributions of the number of customers in network nodes are calculated. The simplest formulas for calculating such queuing networks are obtained for networks in the form of trees. Full article
Show Figures

Figure 1

28 pages, 15091 KB  
Article
GPSFlow/Hydrate: A New Numerical Simulator for Modeling Subsurface Multicomponent and Multiphase Flow Behavior of Hydrate-Bearing Geologic Systems
by Bingbo Xu and Keni Zhang
J. Mar. Sci. Eng. 2025, 13(9), 1622; https://doi.org/10.3390/jmse13091622 - 25 Aug 2025
Cited by 1 | Viewed by 1086
Abstract
Numerical simulation has played a crucial role in modeling the behavior of natural gas hydrate (NGH). However, the existing numerical simulators worldwide have exhibited limitations in functionality, convergence, and computational efficiency. In this study, we present a novel numerical simulator, GPSFlow/Hydrate, for modeling [...] Read more.
Numerical simulation has played a crucial role in modeling the behavior of natural gas hydrate (NGH). However, the existing numerical simulators worldwide have exhibited limitations in functionality, convergence, and computational efficiency. In this study, we present a novel numerical simulator, GPSFlow/Hydrate, for modeling the behavior of hydrate-bearing geologic systems and for addressing the limitations in the existing simulators. It is capable of simulating multiphase and multicomponent flow in hydrate-bearing subsurface reservoirs under ambient conditions. The simulator incorporates multiple mass components, various phases, as well as heat transfer, and sand is treated as an independent non-Newtonian flow and modeled as a Bingham fluid. The CH4 or binary/ternary gas hydrate dissociation or formation, phase changes, and corresponding thermal effects are fully accounted for, as well as various hydrate formation and dissociation mechanisms, such as depressurization, thermal stimulation, and sand flow behavior. In terms of computation, the simulator utilizes a domain decomposition technology to achieve hybrid parallel computing through the use of distributed memory and shared memory. The verification of the GPSFlow/Hydrate simulator are evaluated through two 1D simulation cases, a sand flow simulation case, and five 3D gas production cases. A comparison of the 1D cases with various numerical simulators demonstrated the reliability of GPSFlow/Hydrate, while its application in modeling the sand flow further highlighted its capability to address the challenges of gas hydrate exploitation and its potential for broader practical use. Several successful 3D gas hydrate reservoir simulation cases, based on parameters from the Shenhu region of the South China Sea, revealed the correlation of initial hydrate saturation and reservoir condition with hydrate decomposition and gas production performance. Furthermore, multithread parallel computing achieved a 2–4-fold increase in efficiency over single-thread approaches, ensuring accurate solutions for complex physical processes and large-scale grids. Overall, the development of GPSFlow/Hydrate constitutes a significant scientific contribution to understanding gas hydrate formation and decomposition mechanisms, as well as to advancing multicomponent flow migration modeling and gas hydrate resource development. Full article
(This article belongs to the Section Geological Oceanography)
Show Figures

Figure 1

Back to TopTop