Fortran Fortran 90 - gfortran error - help

AI Thread Summary
The discussion revolves around a Fortran 90 program designed to compute the definite integral of a function using the trapezium method. The user encountered a compilation error related to an unclassifiable statement in their code. The error stemmed from incorrect syntax in the assignment of the variable ITRAP. The correct syntax involves using the multiplication operator (*) between terms, specifically changing ITRAP = (z/2)((G(a) + G(b)) + z*area) to ITRAP = (z/2)*((G(a) + G(b)) + z*area). This highlights the importance of proper syntax in programming and the value of careful code review. The user expressed gratitude for the clarification and acknowledged the oversight.
Bussell93
Messages
9
Reaction score
0
Hi, I have written a fortran 90 program that finds the definite integral of a function using the trapezium method.

Everything is fine, other than when I compile my program it produces the following error:

assignment_2_final.f90:127.2:

ITRAP = (z/2)((G(a) + G(b)) + z*area)
1
Error: Unclassifiable statement at (1)

My code looks like this...

PROGRAM assignment_2
IMPLICIT NONE

REAL(kind = 8) :: x, h, Error_F, Error_C, Error_D2, a, b, z, area, ITRAP
INTEGER :: i, N

area = 0.0

...

z = b - a

DO i=1,N-1
area = area + G(a+i*z)
END DO

ITRAP = (z/2)((G(a) + G(b)) + z*area)

WRITE(6,*)
WRITE(6,*)'The definite integral of g(x) using'
WRITE(6,*)'the trapezium rule = ',ITRAP
WRITE(6,*)

The user is asked to enter values for a, b and N.

I have changed the code and still cannot come up with the solution to my error, any help would be greatly appreciated :smile:
 
Technology news on Phys.org
Bussell93 said:
ITRAP = (z/2)((G(a) + G(b)) + z*area)

That should be
Code:
ITRAP = (z/2)*((G(a) + G(b)) + z*area)

(Please use
Code:
 tags when posting code.)
 
this made me feel very stupid! sometimes the answer is right in front of your face. Thanks a lot! Will do for next time.
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
Thread 'Project Documentation'
Trying to package up a small bank account manager project that I have been tempering on for a while. One that is certainly worth something to me. Although I have created methods to whip up quick documents with all fields and properties. I would like something better to reference in order to express the mechanical functions. It is unclear to me about any standardized format for code documentation that exists. I have tried object orientated diagrams with shapes to try and express the...

Similar threads

Replies
5
Views
2K
Replies
25
Views
3K
Replies
17
Views
6K
Replies
4
Views
2K
Replies
12
Views
2K
Replies
8
Views
2K
Back
Top