How can I insert a polylogarithm function to FORTRAN?

  • Thread starter Thread starter bulash
  • Start date Start date
  • Tags Tags
    Function
AI Thread Summary
To insert a polylogarithm function, specifically Li_2(z), into FORTRAN, it is necessary to write the function if it is not available in existing libraries. A helpful resource for understanding the polylogarithm function is the Wikipedia page on the topic. For those struggling with implementation, sharing existing code can facilitate assistance from others. A recommended algorithm for computing the polylogarithm is detailed in a PDF by RE Crandall, which discusses analytic continuation and branch cuts. Additionally, a user offers to share their FORTRAN codes for calculating dilogarithm and trilogarithm functions based on Crandall's algorithm, which have been verified against Mathematica for accuracy.
bulash
Messages
4
Reaction score
0
Hi everyone,

Anyone knows how can I insert a polylogarithm function to FORTRAN? I am trying to put Li_2(z) polylogarithm function to my equation.

Thank you in advance.

bulash.
 
Technology news on Phys.org
You'd have to write the function, if you do not have it in a library of functions.
If you need help with the definition of the function, check the following site:
http://en.wikipedia.org/wiki/Polylogarithm
If you have difficulties with writing the function, you can post what you've got, and we will then know how we can help.
 
OK. Thank you very much!
 
A good reference for a polylogarithm function algorithm is the following:
Note on fast polylogarithm computation
File Format: PDF/Adobe Acrobat - View as HTML
Abstract: The polylogarithm function Li ... assumed that −π < arg z ≤ π, whence the analytic continuation with proper branch cut ...
people.reed.edu/~crandall/papers/Polylog.pdf - Similar pages
by RE Crandall -

If you are interested please send me an email (rashore1@yahoo.com) and I will then send you copies of the FORTRAN codes I wrote to calculate the dilogarithm and trilogarithm functions of complex argument based on Crandall's algorithm. I've checked them using Mathematica and they work quite well.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...

Similar threads

Replies
2
Views
1K
Replies
20
Views
3K
Replies
8
Views
2K
Replies
3
Views
2K
Replies
17
Views
6K
Replies
4
Views
2K
Replies
9
Views
2K
Replies
17
Views
6K
Back
Top