1、 采用原始变量法,即以速度U、V及压力P作为直接求解的变量 2、 守恒型的差分格式,离散方程系对守恒型的控制方程通过对控制容积作积分而得出的,无论网格疏密程度如何,均满足在计算区域内守恒的条件; 3、 采用区域离散化方法B,即先定控制体界面、再定节点位置 4、 采用交叉网格,速度U、V与其他变量分别存储于三套网格系统中; 5、 不同的项在空间离散化过程中去不同的型线假设,源项采用局部线性化方法;扩散——对流项采用乘方格式(但很容易转化为中心差分、迎风差分或混合格式);街面上的扩散系数采用调和平均法,而密度与流速则用线性插值; 6、 不稳态问题采用全隐格式,以保证在任何时间步长下均可获得具有物理意义的解; 7、 边界条件采用附加源项法处理; 8、 耦合的流速与压力采用SIMPLE算法来求解; 9、 迭代式的求解方法,对非线性问题,整个求解过程具有迭代性质;对于代数方程也采用迭代法求解; 10、 采用交替方向先迭代法求解代数方程并补以块修正技术以促进收敛。
标签: 变量
上传时间: 2013-11-25
上传用户:wcl168881111111
1、 采用原始变量法,即以速度U、V及压力P作为直接求解的变量 2、 守恒型的差分格式,离散方程系对守恒型的控制方程通过对控制容积作积分而得出的,无论网格疏密程度如何,均满足在计算区域内守恒的条件; 3、 采用区域离散化方法B,即先定控制体界面、再定节点位置 4、 采用交叉网格,速度U、V与其他变量分别存储于三套网格系统中; 5、 不同的项在空间离散化过程中去不同的型线假设,源项采用局部线性化方法;扩散——对流项采用乘方格式(但很容易转化为中心差分、迎风差分或混合格式);街面上的扩散系数采用调和平均法,而密度与流速则用线性插值; 6、 不稳态问题采用全隐格式,以保证在任何时间步长下均可获得具有物理意义的解; 7、 边界条件采用附加源项法处理; 8、 耦合的流速与压力采用SIMPLE算法来求解; 9、 迭代式的求解方法,对非线性问题,整个求解过程具有迭代性质;对于代数方程也采用迭代法求解; 10、 采用交替方向先迭代法求解代数方程并补以块修正技术以促进收敛。
标签: 变量
上传时间: 2016-12-28
上传用户:heart520beat
1、 采用原始变量法,即以速度U、V及压力P作为直接求解的变量 2、 守恒型的差分格式,离散方程系对守恒型的控制方程通过对控制容积作积分而得出的,无论网格疏密程度如何,均满足在计算区域内守恒的条件; 3、 采用区域离散化方法B,即先定控制体界面、再定节点位置 4、 采用交叉网格,速度U、V与其他变量分别存储于三套网格系统中; 5、 不同的项在空间离散化过程中去不同的型线假设,源项采用局部线性化方法;扩散——对流项采用乘方格式(但很容易转化为中心差分、迎风差分或混合格式);街面上的扩散系数采用调和平均法,而密度与流速则用线性插值; 6、 不稳态问题采用全隐格式,以保证在任何时间步长下均可获得具有物理意义的解; 7、 边界条件采用附加源项法处理; 8、 耦合的流速与压力采用SIMPLE算法来求解; 9、 迭代式的求解方法,对非线性问题,整个求解过程具有迭代性质;对于代数方程也采用迭代法求解; 10、 采用交替方向先迭代法求解代数方程并补以块修正技术以促进收敛。
标签: 变量
上传时间: 2013-12-28
上传用户:Avoid98
uci data structure mapper can map uci config sections into custom c data structures automatically by callbacks
标签: data automatically structures uci
上传时间: 2013-11-30
上传用户:123456wh
一个基于GTK+的单词数值计算器,1、 按照规则计算单词的值,如果 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 26个字母(全部用大写)的值分别为 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26,如: WINJACK这个单词的值就为:W+I+N+J+A+C+K=23+9+14+1+3+11=71% HARDWORK=H+A+R+D+W+O+R+D=8+1+18+4+23+15+18+11=98% LOVE=L+O+V+E=12+15+22+5=54% LUCK=L+U+C+K=12+21+3+11=47% ATTITUDE= A+T+T+I+T+U+D+E=1+20+20+9+20+24+4+5=100% 2、对程序的界面布局参考如下图所示,在第一个单行文本框输入一个单词,点击“计算”按钮,按照以上算法计算出该单词的值。 3、如果在最下面的单行文本框输入一个文件路径,此文件每行记录一个单词,那么经过程序计算出各个单词的值,并把结果输出到当前目录下result.txt文件中。如果文件不存在,应该提示错误。
上传时间: 2014-01-11
上传用户:康郎
Create a Delaunay triangulation or Voronoi diagram by clicking points. Delaunay triangulations and Voronoi diagrams are among the most widely used data structures in the field of Computational Geometry. These are Java-oriented source codes.
标签: Delaunay triangulations triangulation clicking
上传时间: 2013-11-25
上传用户:zhaiye
FDMP the body of the kernel, the Information-Technology Promotion Agency (IPA) adopted by the unexplored themes of Creativity software is one of the "multi-processor system-level development environment for the development of the system" as part of the development Susumu Honda也氏Was responsible.
标签: the Information-Technology Promotion adopted
上传时间: 2013-12-25
上传用户:dengzb84
RFID is an area of automatic identifi cation that is gaining momentum and is considered by some to emerge as one of the most pervasive computing technologies in history. In its simplest form, RFID is a similar concept to bar coding. It is seen as a means of enhancing data processes and is comple- mentary to existing technologies. It is a proven technology that has been in use since the 1970s.
标签: considered automatic is momentum
上传时间: 2017-03-19
上传用户:woshini123456
We analyze, both analytically and numerically, the effectiveness of cloaking an infinite cylinder from observations by electromagnetic waves in three dimensions. We show that, as truncated approximations of the ideal permittivity and permeability tensors tend towards the singular ideal cloaking fields, so that the anisotropy ratio tends to infinity, the D and B fields blow up near the cloaking surface. Since the metamaterials used to implement cloaking are based on effective medium theory, the resulting large variation in D and B will pose a challenge to the suitability of the field averaged characterization of " and 碌. We also consider cloaking with and without the SHS (softand- hard surface) lining, shown in [6] to be theoretically necessary for cloaking in the cylindrical geometry. We demonstrate numerically that cloaking is significantly improved by the SHS lining, with both the far field of the scattered wave significantly reduced and the blow up of D and B prevented.
标签: effectiveness analytically numerically cloaking
上传时间: 2017-03-30
上传用户:zxc23456789
In computer vision, sets of data acquired by sampling the same scene or object at different times, or from different perspectives, will be in different coordinate systems. Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements. Image registration is the process of transforming the different sets of data into one coordinate system. To be precise it involves finding transformations that relate spatial information conveyed in one image to that in another or in physical space. Image registration is performed on a series of at least two images, where one of these images is the reference image to which all the others will be registered. The other images are referred to as target images.
标签: different computer acquired sampling
上传时间: 2013-12-28
上传用户:来茴