Impact Analysis of A Car Bumper Using Carbon Fiber Reinforced PEI And S2 Glass/Epoxy Materials By Solid Works Software
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
Bumper is an important part which is used as protection for passengers from front and rear collision. The intend of this study was to investigate the structure and material employed for car bumper in one of the car manufacturer. In this study, the most important variables like material, structures, shapes and impact conditions are studied for analysis of the bumper beam in order to improve the crashworthiness during collision. The simulation of a bumper is characterized by impact modeling using Pro/Engineer, impact analysis is done by COSMOS according to the speed that is 13.3 m sec-1 (48 km h-1) given in order to analyze the results. This speed is according to regulations of Federal Motor Vehicle Safety Standards, FMVSS 208- Occupant Crash Protection whereby the purpose and scope of this standard specifies requirements to afford impact protection for passengers.
Authors and Affiliations
Ayyappa Swamy GV| ME Department, Prasiddha College of Engg and Technology, Anathavaram, swamy16@rocketmail.com, P Satish Reddy| ME Department, Prasiddha College of Engg and Technology, Anathavaram, satish2436@gmail.com, Matta Manoj| ME Department, Prasiddha College of Engg and Technology, Anathavaram, mattamanoj13@gmail.com, P. Bhaskar| ME Department, Prasiddha College of Engg and Technology, Anathavaram, smilybobbys@gmail.com
Ladderal Structure Of Super Resolution With Support Of Inpainting
Inpainting is the process of reconstructing lost or deteriorated part of images based on the background information. i. e. image Inpainting fills the missing or damaged region in an image utilizing spatial informatio...
Reliability of Chandrapur-Padghe HVDC Line (Chapad) ±500kv HVDC Link
This paper presents an over view of the present status of the reliability model of HVDC link in between CHANDRAPUR & PADGE terminal stations. It is well known fact that it is well-known fact that major generating sta...
Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity
A range of privacy models as well as anonymization algorithms have been developed. In tabular micro data some of the no responsive attributes called quasi identifiers can be used to reidentify individuals and their s...
A Novel Approach For Improve Reliability Using Secure Distributed De-duplication System In Cloud
Information De-duplication strategy is utilized for wiping out the copy duplicates of rehashed information in distributed storage and to diminish the information duplication. This method is utilized to enhance stockp...
Green cloud computing: A survey
Green cloud computing is energy oriented distributed networking system with the internet. Now days this cutting edge research topic is highly essential to make the system efficient with environment friendly. Using th...