22.09.2013 Views

SSL II USER'S GUIDE - Lahey Computer Systems

SSL II USER'S GUIDE - Lahey Computer Systems

SSL II USER'S GUIDE - Lahey Computer Systems

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

HOW TO USE THIS MANUAL<br />

This section describes the logical organization of this<br />

manual, and the way in which the user can quickly and<br />

accurately get informations necessary to him from the<br />

manual.<br />

This manual consists of two parts. Part I describes an<br />

outline of <strong>SSL</strong> <strong>II</strong>. Part <strong>II</strong> describes usage of <strong>SSL</strong> <strong>II</strong><br />

subroutines.<br />

Part I consists of twelve chapters.<br />

Chapter 2 describes the general rules which apply to<br />

each <strong>SSL</strong> <strong>II</strong> subroutine. It is suggested that the user<br />

read this chapter first.<br />

Chapters 3 through 12 are concerned with certain<br />

fields of numerical computation, and were edited as<br />

independently as possible for easy reference. At the<br />

beginning of every chapter, the section “OUTLINE” is<br />

given, which describes the classification of available<br />

subroutines in the chapter, and how to select subroutines<br />

suitable for a certain purpose. The user should read the<br />

section at least once.<br />

As mentioned above, there is no confusing or difficult<br />

relation between the chapters: it is quite simple as shown<br />

in the following diagram.<br />

12<br />

Chapter 1<br />

Chapter 2<br />

Chapter 3<br />

Chapter 4<br />

Chapter 5<br />

Chapter 12<br />

Each chapter from chapter 3 on has several sections,<br />

the first of which is the section “OUTLINE” that, as<br />

noted previously, introduces the following sections.<br />

As the diagram shows, if the user wants to obtain<br />

eigenvalues, for example, of a certain matrix, he should<br />

first read Chapter 2, then jump to Chapter 4, where he<br />

can select subroutines suitable for his purposes.<br />

Part <strong>II</strong> describes how to use <strong>SSL</strong> <strong>II</strong> subroutines. The<br />

subroutines are listed in alphabetical order.<br />

When describing an individual subroutine, the<br />

following contents associated with the subroutine are<br />

shown:<br />

• Function<br />

• Parameters<br />

• Comments on use<br />

• Method<br />

and what we intend to describe under each title above<br />

are as follows:<br />

Function<br />

Describes explanation of the functions.<br />

Parameters<br />

Describes variables and arrays used for transmitting<br />

information into or from the subroutine. Generally,<br />

parameter names, which are commonly used in <strong>SSL</strong> <strong>II</strong>,<br />

are those habitually used so far in many libraries.<br />

Comments on use<br />

This consists of the following three parts.<br />

• Subprograms used<br />

If other <strong>SSL</strong> <strong>II</strong> subroutines are used internally by the<br />

subroutine, they are listed under “<strong>SSL</strong> <strong>II</strong>”. Also, if<br />

FORTRAN intrinsic functions or basic external<br />

functions are used, they are listed under “FORTRAN<br />

basic functions”.<br />

• Notes<br />

Discusses various considerations that the user should<br />

be aware of when using the subroutine.<br />

• Example<br />

An example of the use of the subroutine is shown.<br />

For clarity and ease of understanding, any applications<br />

to a certain field of engineering or physical science<br />

have not been described. In case other subroutines<br />

must be used as well as the subroutine to obtain a<br />

mathematical solution, the example has been designed<br />

to show how other subroutines are involved. This is<br />

especially true in the chapters concerning linear<br />

equations or eigenvalues etc. Conditions assumed in<br />

an example are mentioned at the beginning of the<br />

example.<br />

Method<br />

The method used by the subroutine is outlined. Since<br />

this is a usage manual, only practical aspects of the<br />

algorithm or computational procedures are described.<br />

References on which the implementation is based and<br />

those which are important in theory, are listed in<br />

Appendix D “References”, so refer to them for further<br />

information or details beyond the scope of the “Method”<br />

section.<br />

In this manual, included are the <strong>SSL</strong> <strong>II</strong> Subroutine list<br />

and four appendices. In the <strong>SSL</strong> <strong>II</strong> Subroutine list, <strong>SSL</strong><br />

<strong>II</strong> Subroutines are arranged in the order of fields and then<br />

in the order of their classification codes. This list can be<br />

used for quick reference of subroutines.<br />

Appendix A explains the functions of the auxiliary<br />

subroutines and Appendix B contains the three lists,<br />

which are concerned respectively with<br />

• General subroutines<br />

• Slave subroutines<br />

• Auxiliary subroutines<br />

General subroutines is an alphabetical listing of all<br />

subroutines. In the list, if a certain entry uses other<br />

subroutines, they are shown on the right. Slave<br />

subroutines is an alphabetical listing of slave subroutines

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!