All Fine GEO5 software orders must submit the “Fine Order Inquiry Form” to email@example.com for invoicing.
Ground Loss - GEO5
This program is used for analysis and determination of the shape of subsidence trough above excavations and to evaluate the damage to buildings situated in the affected area.
- Subsidence trough analysis using the Volume Loss Method or classical theories (Peck, Limanov, Fazekas)
- Shape of subsidence trough estimated using Gauss or Aversin approximation
- Can model sequential excavation and multiple tunnel tubes
- Determination of subsidence trough shape, settlement, gradient and horizontal strains
- Subsidence trough analysis at ground surface or at given depth
- Consideration of layered geological profile when using traditional methods
- Implemented table with recommended values of VL and k when using the Volume Loss Method
- Assessment of building damage
Explanation of Product Terms
Hardware Key (Hardlock/HW Key): Hardlock is a piece of hardware (i.e. USB or dongle) used to eliminate software piracy. Therefore, the software only runs on a computer with connected hardlock. Licenses locked to hardware key are not limited to one computer, but to any computer with connected hardlock. For example, it allows the users to run programs on an office computer or on a notebook out of the office. For larger companies we offer Network hardlocks, which are attached to one computer on a network allowing product usage on other computers connected to the same network.
Software Key (SW Key): Software key is a unique code (Token) that is installed on a user’s computer, which works in a similar way like a hardlock. This key is bound to the hardware of a given computer. The first installation on the client’s computer is done using the software key Token. The software key is bound to the hardware parameters of a given computer on which the key is installed. If these parameters are changed the software cannot be launched until the issue is resolved by reporting the Hardware Changes (to restore the full functionality).
Token: Token is a onetime use unique code to install the software key on the client’s computer. For example, “1234_5_ABCDEFGHXYZABCLO” (1234 is user number, 5 is key sequence number)
Local Licence (Software Key): If you buy a local licence with a software key, the software can be installed and used on one computer only. If you buy a new computer, the key can be transferred (only if you have the commercial version of software). The software key is sent by email within working hours. Individual programs can be installed using one or more local keys according to individual user needs.
Local Licence (Hardware Key): If you buy a local licence with a hardlock, you can install the programs on an arbitrary number of computers, however the programs will only work on the computer to which the hardlock is connected. Individual programs can be installed using one or more local keys according to individual user needs.
Network Licence (Hardware Key): Our network licences are only distributed with a hardlock. If you buy a network licence, you may use the software on more computers in the network. The maximum number of users that can work with the software at once is given by the number of purchased licences (i.e Max. 10 users or Max. 50 users). In order to run the application, the appropriate network hardlock has to be connected to a computer in the network.
Software Maintenance: Fine Maintenance subscribers get all updates and upgrades (new Editions) for free. Software Maintenance is available as an annual subscription for the amount of 15% of the software program and can be purchased in conjunction with your Local or Network licence. Please contact ETIA if you already have a Local/Network licence and would like to purchase maintenance separately.