This is a Java Program to Implement Borwein Algorithm. Borwein’s algorithm is an algorithm devised by Jonathan and Peter Borwein to calculate the value of 1/π.
Here is the source code of the Java Program to Implement Borwein Algorithm. The Java program is successfully compiled and run on a Windows system. The program output is also shown below.
/** ** Java Program to Implement Borwein Algorithm **/ import java.util.Scanner; /** Class Borwein **/ public class Borwein { /** compute 1/pi **/ public double getOneByPi(int k) { double ak = 6.0 - 4 * Math.sqrt(2); double yk = Math.sqrt(2) - 1.0; double ak1 ; double yk1 ; for (int i = 0; i < k; i++) { yk1 = (1 - Math.pow((1 - yk * yk * yk * yk),(0.25)))/(1 + Math.pow((1 - yk * yk * yk * yk),(0.25))); ak1 = ak * Math.pow((1 + yk1), 4) - Math.pow(2, 2 * i + 3) * yk1 * (1 + yk1 + yk1 * yk1); yk = yk1; ak = ak1; } return ak; } /** Main function **/ public static void main (String[] args) { Scanner scan = new Scanner(System.in); System.out.println("Borwein 1/Pi Algorithm Test\n"); /** Make an object of Borwein class **/ Borwein b = new Borwein(); System.out.println("Enter number of iterations "); int k = scan.nextInt(); System.out.println("\nValue of 1/pi : "+ b.getOneByPi(k)); } }
Output:
Borwein 1/Pi Algorithm Test Enter number of iterations 5 Value of 1/pi : 0.31830988618379075
Related posts:
Java Program to Implement Sorted Doubly Linked List
Quick Intro to Spring Cloud Configuration
Intro to the Jackson ObjectMapper
Spring Boot - Build Systems
Java TreeMap vs HashMap
Java Program to Generate All Possible Combinations Out of a, b, c, d, e
Intersection of Two Lists in Java
Guide to the Synchronized Keyword in Java
Spring Data JPA Delete and Relationships
Spring Security – security none, filters none, access permitAll
Spring Security with Maven
Spring Security Login Page with React
Java Program to Implement a Binary Search Tree using Linked Lists
Java Program to Create a Random Linear Extension for a DAG
Spring Boot - Exception Handling
Java Program to implement Bi Directional Map
Display Auto-Configuration Report in Spring Boot
Spring Security Custom AuthenticationFailureHandler
Retrieve User Information in Spring Security
How to Kill a Java Thread
Java Program to Implement Skew Heap
Introduction to Spring Security Expressions
Java Program to Perform Insertion in a 2 Dimension K-D Tree
Spring Boot - Tomcat Port Number
Apache Tiles Integration with Spring MVC
Lớp LinkedHashMap trong Java
Java Program to Implement Bloom Filter
Prevent Brute Force Authentication Attempts with Spring Security
Java Program to Implement PriorityQueue API
Reading an HTTP Response Body as a String in Java
Java Program to Find the Longest Subsequence Common to All Sequences in a Set of Sequences
Java Program to Implement the Vigenere Cypher