当前位置:网站首页>Step size of ode45 and reltol abstol
Step size of ode45 and reltol abstol
2022-07-01 18:04:00 【Feisy】
The stepsize of ode45 is not constant, but chosen such that the error tolerances you prescribe are met. Thus mean step size can only be controlled indirectly by strengthening (-> smaller stepsize) or weakening (-> larger stepsize) the error tolerances RelTol and AbsTol.
RelTol Is the relative accuracy tolerance , Used to control the correct number of digits in the calculated answer .AbsTol Is the absolute error tolerance , Used to control the difference between the calculated answer and the actual solution . In each step , Solution component i The error in e Will satisfy
|e(i)| ≤ max(RelTol*abs(y(i)),AbsTol(i))
Roughly speaking , This means that you want RelTol Correct the number of digits in all solution components ( But less than the threshold AbsTol(i) Except for the solution component of ). When the weight y(i) Very hour , Even if you are not interested in this weight , You must still specify a small enough AbsTol(i) value , In order to obtain y(i) Some correct digits in , So as to accurately calculate the components you are more interested in .
At each step, the solver estimates the local error e in the ith component of the solution. This error must be less than or equal to the acceptable error, which is a function of the specified relative tolerance, RelTol, and the specified absolute tolerance, AbsTol.
|e(i)| ≤ max(RelTol*abs(y(i)),AbsTol(i))
For relative accuracy, adjust RelTol. For the absolute error tolerance, the scaling of the solution components is important: if |y| is somewhat smaller than AbsTol, the solver is not constrained to obtain any correct digits in y. You might have to solve a problem more than once to discover the scale of solution components.
Roughly speaking, this means that you want RelTol correct digits in all solution components except those smaller than thresholds AbsTol(i). Even if you are not interested in a component y(i) when it is small, you may have to specify AbsTol(i) small enough to get some correct digits in y(i) so that you can accurately compute more interesting components.
边栏推荐
- Setting up a time server requires the client to automatically synchronize the time of the server at 9 a.m. every day
- Sword finger offer II 105 Maximum area of the island
- Easycvr accesses the equipment through the national standard gb28181 protocol. What is the reason for the automatic streaming of the equipment?
- Petrv2: a unified framework for 3D perception of multi camera images
- Yolov5 practice: teach object detection by hand
- New 95 community system whole station source code
- Fix the problem that easycvr device video cannot be played
- C language implementation of sum of two numbers [easy to understand]
- Kernel stray cat stray dog pet adoption platform H5 source code
- China acetonitrile market forecast and strategic consulting research report (2022 Edition)
猜你喜欢

Cloud picture says | distributed transaction management DTM: the little helper behind "buy buy buy"

Penetration practice vulnhub range Keyring

transform. Forward and vector3 Differences in the use of forward

How to use JMeter function and mockjs function in metersphere interface test

(17) DAC conversion experiment

2022 Heilongjiang latest fire protection facility operator simulation test question bank and answers

Wechat applet blind box - docking wechat payment

Intel's open source deep learning tool library openvino will increase cooperation with local software and hardware parties and continue to open

Cassette helicopter and alternating electric field magnetic manometer DPC

Heavy disclosure! Hundreds of important information systems have been invaded, and the host has become a key attack target
随机推荐
Easycvr accesses the equipment through the national standard gb28181 protocol. What is the reason for the automatic streaming of the equipment?
手机开户股票开户安全吗?那么开户需要带些什么?
EasyCVR设备录像出现无法播放现象的问题修复
Cassette helicopter and alternating electric field magnetic manometer DPC
Research Report on development monitoring and investment prospects of China's smart environmental protection industry (2022 Edition)
What are the legal risks of NFT brought by stars such as curry and O'Neill?
Reflective XSS vulnerability
The latest intelligent factory MES management system software solution
Research Report on development prediction and investment direction of nylon filament sewing thread in China (2022 Edition)
New 95 community system whole station source code
Replace UUID, nanoid is faster and safer!
Roewe rx5's "a little more" product strategy
Wechat applet blind box - docking wechat payment
Nielseniq found that 60% of the re launched products had poor returns
golang中的select详解
pyqt5中,在控件上画柱状图
Small exercise -- subnet division and summary
SQL injection vulnerability (MySQL and MSSQL features)
transform. Forward and vector3 Differences in the use of forward
Htt [ripro network disk link detection plug-in] currently supports four common network disks