The formula is a little bit different. However, in modeling SOC, researchers try to use both? Why?

Similar questions and discussions