Fortran Finding 2D Mesh Solutions for User-Specified Needs

  • Thread starter Thread starter Milentije
  • Start date Start date
  • Tags Tags
    2d Mesh
AI Thread Summary
The discussion centers on the creation of a user-specified 2D mesh, specifically a grid in two dimensions where parameters can be set. The original poster expresses difficulty in compiling existing solutions found online. Clarification is sought regarding what constitutes a 2D mesh, leading to a brief exchange about the definition of dimensions. A sample code snippet is provided, demonstrating how to define a simple orthogonal 2D mesh using Fortran, including the allocation of arrays for grid points and setting grid spacing. The code outlines the initialization of parameters, the allocation of arrays for x and y coordinates, and the nested loops used to populate the mesh. The conversation concludes with the poster affirming the simplicity of their approach to creating the mesh.
Milentije
Messages
47
Reaction score
0
What I need is a 2d mesh,user specified.I have find some solutions on net but still have problems compiling.Anyone knows wheret o find more?
 
Technology news on Phys.org
What do you mean 2D mesh?
 
I mean 2dimensions grid,where I can set the parameters.
 
You mean 2D means 2 dimensions?? In all honesty, you're vagueness is epic.
Code:
integer :: ni,nj,i,j
real,dimension(:,:),allocatable :: x,y
real :: dx,dy,xc,yc

!--Set parameters
ni = 10  !--number of points in the x-direction
nj = 10  !--number of points in the y-direction
dx = 0.1 !--grid spacing in the x-direction
dy = 0.1 !--grid spacing in the y-direction
allocate( x(ni,nj),y(ni,nj) )

xc = 0.0
yc = 0.0
DO i=1,ni
  DO j=1,nj
    x(i,j) = xc
    y(i,j) = yc
    xc = xc + dx
  END DO
  yc = yc + dy
  xc = 0.0
END DO

deallocate(x,y)

That's my idea of a simple orthogonal 2D mesh.
 
  • Like
Likes mariem.makh
Thanks for the answer.
Oh,yes I am deliberately vague.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Back
Top