Skip to content

lanl/VPSC_code

Repository files navigation

Installation and run of code VPSC8
******************************************************************
The files required to compile and run the polycrystal plasticity code VPSC (version 8) are:
VPSC8_MAIN.FOR, VPSC8_SUB.FOR, VPSC8_DIM.FOR. As their names indicate, they contain
the main (driver) code, all subroutines and functions, and all arrays and variable
declarations and dimensioning, respectively.
For compilation with the G-Fortran compiler use the command ‘compileVPSC8’ to run
the batch file COMPILEVPSC8.BAT in the command window. Running the batch file creates
an executable VPSC8.EXE. The batch file reads:

@REM This file should be named compileVPSC8.bat
gfortran -fdefault-real-8 vpsc8dim.for vpsc8main.for vpsc8sub.for -o vpsc8.exe
@del *.mod

Using the double precision flag is necessary to guarantee convergence. The
 ‘-fbounds-check’ flag provides a warning when arrays exceed dimension.
 It is not included because it slows down the code but may be added for debugging.

Examples and the corresponding input/ouput files are part of the download package.
Current example file names use Windows backslash and are not case insensitive.
To run on Linux based systems the backslash has to be changed to forward slash in VPSC8.IN.
Also, because Linus is character sensitive, we have tried to match upper and lower case 
characters in VPSC8.IN with those in the file name.
The description of input/output files can be found in Chapter 5 of “Material modeling
with the visco-plastic self-consistent (VPSC) approach – Theory and Applications”,
by Tomé and  Lebensohn – Elsevier (2023). The description of the examples can be found in
Chapter 6.

Installation and run of pole figure plotting code POLE8
******************************************************************
POLE8 is a Fortran code used for plotting the output texture files generated by VPSC8, 
including those containing multiple textures.
The source code POLE8d can be downloaded from the same site, together with the User Manual,
and input/output files of examples.



U.S. GOVERNMENT RIGHTS & COPYRIGHT NOTICE
******************************************************************
© 2022. Triad National Security, LLC. All rights reserved.

This program was produced under U.S. Government contract 89233218CNA000001 for
Los Alamos National Laboratory (LANL), which is operated by Triad National Security, LLC
for the U.S. Department of Energy/National Nuclear Security Administration.
All rights in the program are reserved by Triad National Security, LLC, and the
U.S. Department of Energy/National Nuclear Security Administration.
The Government is granted for itself and others acting on its behalf a nonexclusive,
paid-up, irrevocable worldwide license in this material to reproduce, prepare derivative
works, distribute copies to the public, perform publicly and display publicly,
and to permit others to do so.

This program is open source under the BSD-3 License. Redistribution and use in source
and binary forms, with or without modification, are permitted provided that the
following conditions are met:
1. Redistributions of source code must retain the above copyright notice,
  this list of conditions and the following disclaimer.
2.Redistributions in binary form must reproduce the above copyright notice, this
  list of conditions and the following disclaimer in the documentation and/or
  other materials provided with the distribution.
3.Neither the name of the copyright holder nor the names of its contributors may
  be used to endorse or promote products derived from this software without specific
  prior written permission.

This software is provided by the copyright holders and contributors "as is" and any
express or implied warranties, including, but not limited to, the implied warranties
of merchantability and fitness for a particular purpose are disclaimed. In no event
shall the copyright holder or contributors be liable for any direct, indirect,
incidental, special, exemplary, or consequential damages (including, but not limited to,
procurement of substitute goods or services; loss of use, data, or profits; or business
interruption) however caused and on any theory of liability, whether in contract,
strict liability, or tort (including negligence or otherwise) arising in any way
out of the use of this software, even if advised of the possibility of such damage.