Fortran Can You Implement Gauss-Seidel Iteration in Fortran 90/95?

  • Thread starter Thread starter Luke1986
  • Start date Start date
  • Tags Tags
    Fortran
AI Thread Summary
The discussion centers on programming simultaneous linear equations using Fortran 90/95, specifically through the Gauss-Seidel iteration method. The user has successfully solved 3x3 and 4x4 matrices using inverse matrices and is now seeking guidance on implementing the Gauss-Seidel method. They are particularly interested in establishing a tolerance level of 0.000001 for convergence between iterations. The response highlights that a common stopping criterion for this method is based on the residuals, expressed as |rk|/|r0|≤ε, where ε represents the desired precision and |rk| and |r0| are the norms of the residuals at each iteration. This approach provides a clear framework for assessing convergence in the iterative process.
Luke1986
Messages
2
Reaction score
0
Hi, I have to program using Fortran 90/95 simultaneous linear equations. My question is, is it possible to program this? First I did the inverse matrix to find the values of the solution of a 4X4 and 3X3 matrix. I set up [A][X] = [X]' and did the inverse matrix to find the values for [X]. So I got the solutions for x1 x2 x3 x4, ( numbers are subscripts ).

Now that I know that solutions exist, can I program this with the Gauss Seidel iteration method using F 90/95? May you please explain how to set up a tolerance (say 0.000001) between two iterations because I don't understand how to since I have so many variables, or what I'm looking for? I am not asking for the specific code, just a few words to clear up how to approach this program. Thanks for your help.
 
Technology news on Phys.org
About the code, sure you can.
About the tolerance, the most common stopping criteria is |rk|/|r0|≤ε where ε is the desired precision of the approximation and |rk|,|r0| the norms of the residual r=b-Ax on each iteration.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...

Similar threads

Replies
22
Views
5K
Replies
18
Views
17K
Replies
1
Views
3K
Replies
1
Views
2K
Replies
2
Views
3K
Replies
1
Views
3K
Replies
1
Views
8K
Back
Top