Distributor Perform 3D CSI Jakarta

Perform3D

PERFORMANCE-BASED DESIGN OF 3D STRUCTURES

Perform3D is a nonlinear analysis and design product focused on displacement-based and capacity design of buildings.

Distributor Perform 3D CSI Jakarta

Modeling

Nonlinear features include a number of nonlinear building components such as frame hinges, shear walls, dampers, braces, and seismic isolators.
Distributor Perform 3D CSI Jakarta

Analysis

The Perform3D analysis engine provides tools for performance-based design, including nonlinear pushover and dynamic earthquake analyses. The analysis engine is 64-bit and the product has the ability to run up to 8 analyses in parallel.
Distributor Perform 3D CSI Jakarta

Performance Assessment

Perform3D includes a number of tools for measuring the response of model and assessing the behavior of the structure, including strain gage elements and deformation and strength capacity definitions on both elastic and inelastic components.
Distributor Perform 3D CSI Jakarta
The limit state feature in Perform3D can be used to aggregate response data into demand-over-capacity ratios for ease of performance assessment.
Distributor Perform 3D CSI Jakarta

Import and Export

Perform3D models can be exported from SAP2000 or ETABS and serve as a starting point for your Perform3D model.

System Requirement ETABS

Processor

  • Minimum: Intel Pentium 4 or AMD Athlon 64
  • Recommended: 9th generation Intel Core i5/i7/i9, AMD Ryzen 5/7/9 with Zen 2 architecture, or better desktop CPU
  • A 64-bit CPU is required

Operating System

  • Microsoft® Windows 10 or 11 (64 bit)

Video Card

  • Minimum: Supporting 1080p (1920×1080) resolution and 16 bits colors for standard (GDI+) graphics mode
  • Recommended: Discrete video card with NVIDIA GPU or equivalent
  • For better graphics quality in terms of anti-aliasing and line thickness, the device raster drawing capabilities should support legacy depth bias.

Memory

  • Minimum: 8 GB RAM
  • The problem size that can be solved and the speeds for solution & response recovery increase considerably with more RAM.

Disk Space

  • 6 GB to install the software.
  • Additional space will be required for running and storing model files and analysis results, dependent upon the size of the models
  • Recommended: 500GB or larger PCIe Solid State Drive (SSD). External and network drives are not recommended.
GeoStudio 3D

GeoStudio 3D

GeoStudio 3D Seequent | The Bentley Subsurface Company Seequent is the subsurface software company within Bentley Systems. Together, we’re helping build a more resilient future by connecting the built world above ground with the hidden world below it. It’s easy to...

Confidential AI

Confidential AI

Confidential AI Confidential AI is a new platform to securely develop and deploy AI models on sensitive data using confidential computing. The solution provides data teams with infrastructure, software, and workflow orchestration to create a secure, on-demand work...

Confidential Data Search

Confidential Data Search

Filesystem Encryption Keep individual files and folders safe to defend against malicious actors and meet compliance.  When it comes to analyzing sensitive data such as financial or medical datasets, organizations have to compromise on security or performance. Current...

GeoStudio 2D

GeoStudio 2D

GeoStudio 2DSeequent | The Bentley Subsurface Company Seequent is the subsurface software company within Bentley Systems. Together, we’re helping build a more resilient future by connecting the built world above ground with the hidden world below it. It’s easy to...

Filesystem Encryption

Filesystem Encryption

Filesystem Encryption Keep individual files and folders safe to defend against malicious actors and meet compliance.  To enhance data loss prevention and comply with privacy regulations, businesses are constantly looking to strengthen their security posture. Many...

Transparent Database Encryption

Transparent Database Encryption

Transparent Database Encryption Fortanix simplified database encryption by providing a single integrated key management and hardware security module (HSM) to manage and store cryptographic keys across all your databases.  In times of relentless cyberattacks and...

Software Original
×

Software-Original.Com

× Contact Us