胶水 发表于 2025-3-23 11:03:13
http://reply.papertrans.cn/28/2797/279697/279697_11.pngGastric 发表于 2025-3-23 15:13:48
https://doi.org/10.1007/978-3-030-37231-6In this chapter, all the discrete approximations required for simulation are established, that is, for first and second derivatives, both central and asymmetric forms, and for a range of numbers of points used.Accomplish 发表于 2025-3-23 19:08:10
Shuang Zhao,Xiaobo Ma,Wei Zou,Bo BaiIn this chapter, boundary conditions and how to handle them in simulations are described. Of necessity, some material here overlaps with that in other chapters, especially Chaps. 8 and 9; but this cannot be avoided.偏见 发表于 2025-3-24 00:33:09
https://doi.org/10.1007/978-3-030-37228-6Essentially, only two implicit methods will be described here, but with extensions that make them more useful. They are derived from the implicit methods described for . in Chap. 4, BI and the trapezium method. These have different names in the . context, as will be seen.不理会 发表于 2025-3-24 02:58:58
https://doi.org/10.1007/978-3-030-01701-9In this chapter, the performance of the various methods described is examined. This involves convergence and economy of computer time. Some of the more sensible simulation methods are compared.脱离 发表于 2025-3-24 10:12:25
http://reply.papertrans.cn/28/2797/279697/279697_16.pngCommon-Migraine 发表于 2025-3-24 13:11:25
Hong Liu,Hongmin Li,Eugene Y. VassermanAs described in Chap. 5, for the simulation of a first order homogeneous chemical reaction (.) coupled to diffusion such as the Reinert-Berg mechanism (5.11) we have the governing equationRustproof 发表于 2025-3-24 18:26:43
Approximations to Derivatives,In this chapter, all the discrete approximations required for simulation are established, that is, for first and second derivatives, both central and asymmetric forms, and for a range of numbers of points used.obstinate 发表于 2025-3-24 21:36:17
Boundary Conditions,In this chapter, boundary conditions and how to handle them in simulations are described. Of necessity, some material here overlaps with that in other chapters, especially Chaps. 8 and 9; but this cannot be avoided.harmony 发表于 2025-3-25 01:06:17
The Commonly Used Implicit Methods,Essentially, only two implicit methods will be described here, but with extensions that make them more useful. They are derived from the implicit methods described for . in Chap. 4, BI and the trapezium method. These have different names in the . context, as will be seen.