Accessibility / Report Error

Numerical simulations of fabric shields for bulletproof vest: determining the number of sheets to withstand ballistic impacts

Abstract

The main contribution of this research is to develop a FE model for evaluating impact loading against fabrics. Although the fabric model has been studied by some authors, this article contributes with a FE model with a new material formulation which takes into account the stress-strain limit to simulate the fabric rupture. As a case study, the author uses a bulletproof vest impact analysis and determine the number of sheets necessary to resist the ballistic impact. A sophisticated numerical algorithm is used. New constitutive equations are developed capable to take into account the material damage, yield stresses and rupture limits. This is based on elastoplasticity theory, with an adaptation of the function related to the hardening of the material. With this, it is possible to control the limits of the permissible stresses on the yarn and coating of the structural fabric and accurately represent the physical behavior of the materials used. The elastoplasticity and damage theories are developed and, finally, a numerical algorithm is presented for the determination of stresses, displacements and material deformations.

Keywords:
Fabric shield; bulletproof vest; ballistic impact

Graphical Abstract


INTRODUCTION

The particle method can be used in several fields, especially into researches about structural fabrics. It consists in studying the armor systems modeling, protections against explosions and lightweight structural fabrics submitted to the impact of a projectile. These lines of research use the concepts of the theory of the particles, see Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.), Zohdi (2003Zohdi, T. I. (Mar. 26, 2003). Genetic design of solids possessing a random-particulate microstructure. The Royal Society.), Zohdi and Wriggers (2001aZohdi, T. I.; Wriggers, P. (2001a). Computational micro-macro material testing. Arch. Comp. Meth. Eng., v. 9: 131-229.) and Bandeira and Zohdi (2019Bandeira, A. A.; Zohdi, T. I. (2019). 3D numerical simulations of granular materials using DEM models considering rolling phenomena. Computational Particle Mechanics, vol. 6 : 97-131.).

Fabric shields have been studied by several researchers. Specially, because there exist a wide range of applications for lightweight ballistic fabric shields, such as the protection of critical structural components in transport systems and the human body. Important works in this field were presented by Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.), Kato, Yoshino and Minami (1999Kato, S.; Yoshino, T.; Minami, H. (1999). Formulation of constitutive equations for fabric membranes based on the concept of fabric lattice model. Engineering Structures, vol. 21 : 691-708.), Pargana (2007Pargana, J. B. (2007). Advanced material model for coated fabrics used in tensioned fabric structures. Engineering Structures, vol. 29 : 1323-1336.) and Zohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.). In these researches, the authors affirm that some deficiencies are the susceptibility to being abruptly severed by sharp objects, which completely eliminates the fabric’s ability to stretch and absorb incoming kinetic energy and the environmental degradation of the fabric due to moisture, heat and sunlight, which is of growing concern, since many new fabrics have multiple purposes, such as electrical and chemical sensing, in addition to being part of a protective system.

Basically, Zohdi developed a computational framework using a coated network model in order to capture the basic characteristics of such systems that can provide qualitative information to guide and reduce time-consuming experiments. Fabric shields are solved by a method called network modeling, which although there are no particles in this method, the algorithm of solution (i.e., the integration of the equations in time) ends up being relatively similar to the particle method. The main difference, but not the only one, is that the numerical algorithm doesn't have to search for contact and geometric entities between the nodes, because they aren’t identified as particles. The numerical algorithm treats these nodes as pseudo-particles, which means that only the forces obtained by the finite element method are considered in these nodes, excluding the contact between eachother. Obviously, the contact forces developed between the rigid sphere and the nodes of the mesh are considered. This is a technique that allows the simulation of breakage, tearing and material separation (segregation) due to the impact at high rates of speed. Performing this modeling by using the classical finite element method procedures becomes extremely difficult, maybe impossible.

Technological advances in the area of fabric shields are presented by Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.), Kollegal and Sridharan (2000Kollegal, M. G.; Sridharan, S. (2000). Strength prediction of plain woven fabrics. J. Compos. Mater., v. 34: 240-257.), Lanir (1983Lanir, Y. (1983). Constitutive equations for fibrous connective tissues. J. Biomech, v. 16 (1): 1-12.), Lim, Shim and Ng (2003Lim, C. T.; Shim, V. P.; Ng, Y. H. (2003). Finite element modeling of the ballistic impact of fabric armour. Int. J. Impact Engrg., v. 28, n. 1: 13-31.), Powell and Zohdi (2009aPowell, D.; Zohdi, T. I. (2009a). A note on flaw-induced integrity reduction of structural fabric. The International Journal of Fracture/Letters in Micromechanics, v. 158: L89-L96.), Powell and Zohdi (2009bPowell, D.; Zohdi, T. I. (2009b). Attachment mode performance of network-modeled ballistic fabric shielding. Composites Part B: Engineering, v. 40, Issue 6: 451-460.), Tabiei (1999Tabiei, Y. J. (1999). Woven fabric composite material model with material nonlinearity for finite element simulation. Int. J. Solids Struct., v. 36: 2757-2771.), Zohdi (2002bZohdi, T. I. (2002b). Modeling and simulation of progressive penetration of multilayered ballistic fabric shielding. Comput. Mech., v. 29: 61-67.), Zohdi (2007Zohdi, T. I. (2007). A computational framework for network modeling of fibrous biological tissue deformation and rupture. Computer Methods in Applied Mechanics and Engineering, v. 196: 2972-2980.), Zohdi (2009Zohdi, T. I. (2009). Microfibril-based estimates of the ballistic limit of multilayered fabric shielding. The International Journal of Fracture/Letters in Micromechanics, v. 158: L81-L88.), Zohdi and Steigmann (2002Zohdi, T. I.; Steigmann, D. J. (2002). The toughening effect of microscopic filament misalignment on macroscopic fabric response. Int. J. Fract., v. 115: L9-L14.), Zohdi and Wriggers (2001bZohdi, T. I.; Wriggers, P. (2001b). Modeling and simulation of the decohesion of particulate aggregates in a binding matrix. Engineering Computations, vol. 18 : 79-95.), Zohdi and Wriggers (2008Zohdi, T. I.; Wriggers, P. (2008). Introduction to computational micromechanics. Second Reprinting. ed. Berlin: Springer,) and Atai and Steigmann (1997Atai, A. A.; Steigmann, D. J. (1997). On the nonlinear mechanics of discrete networks. Arch. Appl. Mech., v. 67: 303-319.). Among these, it is important to highlight the work of Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.) that simulate a numerical experimental test of a fabric shield subjected to ballistic impact.

Nowadays exists a wide variety of materials that can be used to fabricate fabric shields such as Kevlar, zylon and other aramid-based materials. Zylon is a polymeric material produced by the Toyobo Corporation, see Taylor and Vinson (1990Taylor, W.J., Jr.; Vinson, J. R. (1990). Modelling ballistic impact into flexible materials. AIAA J., vol. 28 : 2098-2103.), and has a multiscale structure constructed from polybenzoxale (PBO) microscale fibrils, which are bundled to form yarn, which are then tightly woven into sheets. Experimental ballistic data on zylon has recently became available, see Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.) for more details.

Experimental ballistic test for the evaluation of such materials are extremely expensive and time-consuming. For these reasons is necessary to develop numerical models to analyze fabric shields.

This research contributes to the development of a FE model with a new constitutive equation for fabric shields. It is the result of a combination of the theory of damage with the theory of elastoplasticity under large deformations. The hardening parameter is developed and subsequently modified to faithfully represent the physical and mechanical behavior of the fabric shields. This demonstration is concluded studying the physical behavior of this constitutive equation, as well as the calibration of the variables involved in this formulation. The advance in this type of approach, is to establish and respect maximum limits in the stresses values. Within this, there is a very positive advance in the numerical results obtained to represent the phenomenon of ballistic impact in fabric shields reliably to the reality. The rupture of the fabric shield and the damage of the yarn and coating must be similar when compared with an experimental result. In the numerical example a methodology is presented to design bulletproof vests. All fabric shield theory is minutely detailed and demonstrated in this article. An incremental layer analysis is performed through numerical simulations, seeking to determine the minimum number of sheets necessary to completely stop the projectile and, to investigate the rupture shapes of the bulletproof vest. Using the comercial software LS-DYNA this research sought to compare the results obtained by the program developed in this research, verifying the rupture configuration along the time. The final configuration of the ballistic impact experiment, presented by Zohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.) as a photography, are also used to check the final shape configuration.

DESCRIPTION OF THE COMPUTATIONAL NETWORK MODEL TO SIMULATE FABRIC SHIELDS

Figure 1
Representation of a network model of fabric (based onZohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.)).

The yarn is comprised of one-dimensional microscale fibrils, see Figure 1. The yarn has a coating to increase the resistance of the material. The fabric shields are made by yarn with coating arranged to form two-dimensional planar sheets. The fabric shield should be able to support a ballistic impact as shown in Figure 1.

Basically, if the properties of the fibrils are known, the structural scale properties can be constructed. For structural fabric, a typical quantity of interest is the global tensile force-deflection response. The compressive response is usually of little interest.

The numerical model consists to consider a network of coated yarn that captures stretching of interconnected yearn networks with coating contributions and interaction with impact projectiles, incorporating contact with friction. The deformation of the fabric is calculated by solving the coupled system of differential equations for the motion of lumped masses.

A real fabric shield is presented in Figure 2.

Figure 2
Photography of fabric shield.

DYNAMICS OF A NETWORK MODEL OF FABRIC AND PROJECTILES

The dynamics of the lumped masses are given by

m i r ¨ i = F i t o t t o t a l = F i c o n c o n t a c t f o r c e s + F i f r i c f r i c t i o n f o r c e s + I = 1 4 F I y a r n s u r r o u n d i n g y a r n + I = 1 4 F I c o a t i n g s u r r o u n d i n g c o a t i n g + F i d a m p d a m p i n g + F i g r a v g r a v i t y , (1)

where i=1,2,...,Nf, Nf is the number of lumped masses, mi is the mass of a single lumped mass (i.e., the total fabric mass divided by the total number of masses), ri is the position of node i, Fitot is the total force of node i, Ficon represents the normal contact forces contribution to node i (contact between the fabric node i and the projectile), Fifric represents the friction contact force contribution to node i, FIyarn and FIcoating represent the axial contributions of the four yarns and coatings intersecting at mass i, respectively, Fidamp is the external damping, that can be used to simulate the effects of the environment and Figrav is the gravity force. The forces from the Ith surrounding yarn-segment (there are four of them for the type of rectangular weaving pattern considered, see Figure 1) acting on the ith lumped mass is FIyarn. Clearly, FIyarn is a function of the mass positions (ri), which are all coupled together, leading to a system of equations.

The dynamics of the projectiles are given by

m p r ¨ p = F p t o t t o t a l = - i = 1 N c F i c o n c o n t a c t f o r c e s - i = 1 N c F i f r i c f r i c t i o n f o r c e s + F p d a m p d a m p i n g + F p g r a v g r a v i t y , (2)

where p=1,2,...,Np, Np is the number of particles, Nc is the number of fabric nodes in contact with the projectile, mp is the mass of a single projectile, rp is the position of projectile p, Fptot is the total force of the projectile. Note that the contact forces Ficon and Fifric presented in equation (2) is the same used in equation (1) for the correspondent lumped mass i in contact with the projectile p.

FORMULATIONS FOR YARN-SEGMENT NETWORK

Mechanical forces of a yarn-segment formulation under finite elastic deformation

To develop the constitutive equation for yarn-segments the following conditions are assumed: (1) it has uniaxial-stress condition, i.e., the forces only act along the length of the yarn-segments; (2) the yarn-segments remain straight, undergoing a homogeneous (axial) stress state, (3) the compressive response of a yarn-segment is insignificant and (4) the buckling phenomena is ignored.

In terms of one-dimensional constitutive laws, the stored energy of a single fibril is given by

ψ = 1 2 D E 2 , (3)

where D is the Young’s modulus and E is the Green-Lagrange strain. Using equation (125), the second Piola-Kirchhoff stress S is given by

S = ψ E = D E . (4)

It is convenient to work with quantities expressed in terms of the stretch ratio U, that can be obtained as

U = L L r , (5)

where L is the deformed length of the fibril and Lr is its original length. The Green-Lagrange strain is obtained from (119) as following

E = 1 2 [ ( L L r ) 2 1 ] . (6)

For this relaxed one-dimensional model, the Jacobian of F is

J = F (7)

and the stresses defined in equation (116) can be rewritten by

Σ J = P = J S = σ . (8)

When F1 the yarn has compression and when F>1 it has tensile stress. The compression is neglected, so, when F1 the first Piola-Kirchhoff stresses is enforced to be zero, i.e., P=0. The equations (118), (120) and (7) results in

F = J = U . (9)

The first Piola-Kirchhoff stress P can be expressed by

P = F y a r n A r , (10)

where Fyarn is the force of the yarn on the undeformed cross-sectional area Ar, in the reference configuration. Using the relations presented in equations (5), (8), (9) and (10) the force carried in the yarn-segment results in

F y a r n = U S A r = L L r S A r . (11)

Substituting (4) and (6) into (11) lies to

F y a r n = L 2 L r D A r [ ( L L r ) 2 1 ] . (12)

So, the yarn force presented in equation (1) can be defined by

F I y a r n = L I 2 L I r D I A I r [ ( L I L I r ) 2 1 ] α I , (13)

where

α I = r I + r I r I + r I , (14)

rI+ denotes the position vector of the endpoint connected to the lumped mass, rI denotes the endpoint that is connected to its neighboring mass and indicates the Euclidean norm in R3. See the geometrical interpretation of the yarn force in Figure 3.

Figure 3
Geometrical interpretation of the force at a yarn-segment.

Note that the deformed length of the fibril is calculated by

L = r I + r I . (15)

Mechanical forces due to the yarn and coating segments under finite elastic deformation

In this section the mechanical forces developed in the yarn-segment with coating is defined. Because of the networking model’s kinematic, the following relations are valid

L y a r n = L c o a t i n g = L , (16)

( L r ) y a r n = ( L r ) c o a t i n g = L r , (17)

U y a r n = U c o a t i n g = U . (18)

Observing the yarn force presented in equation (13), the mechanical forces for the yarn and coating can be defined, respectively, by

F I y a r n = L I 2 L I r ( D I ) y a r n ( A I r ) y a r n [ ( L I L I r ) 2 1 ] α I , (19)

F I c o a t i n g = L I 2 L I r ( D I ) c o a t i n g ( A I r ) c o a t i n g [ ( L I L I r ) 2 1 ] α I . (20)

A simple estimate of the increase in stiffness due to the coating can be determined by summing the forces

F I y a r n + F I c o a t i n g = L I 2 L I r [ ( L I L I r ) 2 1 ] { ( D I ) y a r n ( A I r ) y a r n + ( D I ) c o a t i n g ( A I r ) c o a t i n g } α I . (21)

As explained in (17), for the coating contribution, the enforcement of zero compressive stress is not necessary. In practice, for ballistic applications, the enforcement of this condition makes little difference since the material is nearly always in tension. The cross-section area of a microfibril is a circle of radii Rfibril. Let be Nfibril the number of microfibril in a yarn-segment, Ryarn the radii of initial cross section of the yarn-segment and T the thickness of the coating. So, the cross-section area of the yarn and coating are, respectively,

( A I r ) y a r n = π ( R y a r n ) 2 = N f i b r i l π ( R f i b r i l ) 2 , (22)

( A I r ) c o a t i n g = π [ ( R y a r n + T ) 2 ( R y a r n ) 2 ] , (23)

where

R y a r n = N f i b r i l R f i b r i l . (24)

For Zylon each yarn approximately contains Nfibril=350 microfibrils.

Damage evaluation in a yarn-segment network

The damage phenomenon was initially incorporated in fabric shields by Zohdi (2002bZohdi, T. I. (2002b). Modeling and simulation of progressive penetration of multilayered ballistic fabric shielding. Comput. Mech., v. 29: 61-67.). The idea is considering that the rupture of most fibers used as shielding is not sudden, but rather gradual. For Zohdi Zohdi (2002bZohdi, T. I. (2002b). Modeling and simulation of progressive penetration of multilayered ballistic fabric shielding. Comput. Mech., v. 29: 61-67.), this is attributed to inhomogeneous rupture of microscale filaments which comprise a single fiber, as well as internal microscale friction, which impedes micro-filament pull-out between the individual micro-filaments. Basically, on the continuum scale, this progressive degradation in each fiber comprising the fabric net can be represented by a damager parameter αIyarn such that it can construct a new Young’s modulus in each time as following

D I y a r n ( t ) = α I y a r n ( t ) D 0 I y a r n , (25)

where

0 < α I y a r n 1 (26)

and D0Iyarn is the Young modulus in the initial of the analysis, i.e., D0Iyarn=DIyarn(t=0). The damage variable for each yarn-segment typically has an evolution law associated with it, which represents progressive stretch-induced damage. Specifically, for a yarn that is undamaged, αIyarn=1, while for a yarn that is completely damaged, αIyarn=0. Hence, in the beginning of the analysis αIyarn(t=0)=1. Note that when the parameter αIyarn goes to zero the physical material parameter DIyarn also goes to zero.

The damage parameter proposed by Zohdi (2002bZohdi, T. I. (2002b). Modeling and simulation of progressive penetration of multilayered ballistic fabric shielding. Comput. Mech., v. 29: 61-67.) is governed by the following over-stress evolution equation

α ˙ I y a r n = ζ ( σ I σ c r i t 1 ) α I y a r n , (27)

where

ζ = { 0 , i f σ I < σ c r i t ζ * < 0 , i f σ I σ c r i t , (28)

σI is the Cauchy stress, σcrit is the Cauchy stress limit to starts the damage of the fibers and ζ is a rate parameter. It’s important to mention that this formulation considers that the Cauchy stress is positive in tensile case and zero in compressive case, i.e., if UI1 then σI=0.

For Zylon, according to the manufacturer, for a fibril, Ucrit=1.03 and the Young’s modulus is Dfibril=180GPa. From equation (121) the Green-Lagrange strain tensor is Ecrit=12(1.0321)=0.03045. From equations (4), (8) and (9), the Cauchy stress tensor lies to σcrit=UDE=1.031800000.03045=5645.43MPa. The rupture of the material Zylon is presented by Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.) and is supposed to occur when the stretch is around Urupture1.06, see Figure 4.

The damage parameter was also proposed by Zohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.) as shown in the following equation

α ˙ I y a r n = P ( | σ I | σ c r i t 1 ) , (29)

where the parameter P assumes the following values

P = { 0 i f | σ I | σ c r i t P * < 0 i f | σ I | > σ c r i t . (30)

The equation (29) can also be rewritten as

α I y a r n ( t i + 1 ) = α I y a r n ( t i ) + P ( | σ I | σ c r i t 1 ) Δ t , (31)

where Δt is the increment of time. The equations (27) and (31) are valid when the stretch is equal or higher than Ucrit. The inconvenience of using this kind of progressive damage is the control of the maximum stresses and stretches. It means that the rupture configuration can be significantly different from the final experimental shape.

Another equation to simulate damage was proposed by Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.) in the following manner

α I y a r n ( t ) = min { 1 α I ( 0 t c u r r e n t t ) e λ [ U I ( t ) U I , c r i t ] e 0.03 λ 1 e 0.03 λ , (32)

where UI(t) is the stretch of the yarn-segment I at time t, UI,crit is the critical stretch of the yarn-segment and λ0 is a damage decay parameter which is related to the amount of fibril misalignment that exists in the yarn. The authors in Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.) suggests that a best fit value is λ124. The equation (32) has a numerical instability problem to represent the case of no damage generated, λ0, and sudden rupture, λ.

Basically, a parameter αIyarn(t) is created to describe the failure of the yarn-segment by checking whether a critical stretch has been attained or exceeded, i.e., U(t)Ucrit and additionally, this parameter will track the progressive damage with a simple damage (with isotropic material).

This parameter, also called damage representation, was also proposed by Zohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.) in the following manner

α I y a r n ( t ) = min { 1 α I ( 0 t c u r r e n t t ) e λ [ U I ( t ) U I , c r i t U I , c r i t ] . (33)

Analyzing equation (33) is concluded that when λ the type of failure tends towards sudden rupture and when λ0 there is no damage generated. This formulation is better than the one presented in (32) because it doesn’t have any division by zero and all values of damage are positive, i.e., attend equation (26). This work suggests that a best fit value for equation (33) is λ135. This value gives a curve similar to the theoretical equation presented in (32), that is approximately equal to the experimental curve obtained by Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.).

The curves behavior of equations (32) and (33) are presented in Figure 4. The parameters used in equation (32) and (33) are λ=124 and λ=135, respectively. It is important to mention that in practical procedures, is suggested to consider the total damage when αIyarn approaches 0.02, see Figure 4.

Figure 4
Behavior of the damage parameter.

The equations (27), (32) and (33) indicate that damage is irreversible, i.e., αIyarn is a monotonically decreasing function.

The same formulations are applied for the yarn and coating.

Material behavior

It is important to mention that the yarn of fabric shield doesn’t have the standard plasticity with hardness, like the Von Mises criteria for example. The plasticity can be considered due to the coating of the yarn-segments.

To incorporate the elastoplastic formulation in the yarn-segment with coating, a plastic stretch strain model is used. A complete review of elastoplasticity in large deformation is presented in the end of this article. Consider one dimension and the relation presented in equation (9), is possible to write the following decomposition

F = F e F p U = U e U p , (34)

where Ue and Up is sometimes referred as an elastic and plastic stretch strain, respectively.

The Green-Lagrange strain is defined by

E = E e + E p , (35)

where Ee and Ep are the elastic and plastic part of Green-Lagrange strain, respectively.

The elastic part of the second Piola-Kirchhoff stress presented in equation (4) can be rewritten as

S e = D E e . (36)

Substituting (35) into (36) results in

S e = D ( E E p ) . (37)

Introducing equation (121) into (37), result in

S e = D [ 1 2 ( U 2 1 ) 1 2 ( U p 2 1 ) ] . (38)

The above equation can be rewritten as

S e = 1 2 D ( U 2 U p 2 ) . (39)

From equations (8) and (9) is possible to determine the Cauchy stress tensor

σ = U e S e = 1 2 D U e ( U 2 U p 2 ) . (40)

The equation (40) can also be written as

σ = U e S e = 1 2 D U e [ ( U e ) 2 1 ] , (41)

where Ue=U(Up)1.

The variation of the plastic stretch strain can be computed by the following relation

U ˙ p = { 0 i f | σ | σ y P ( | σ | σ y 1 ) i f | σ | > σ y a n d σ > 0 P ( | σ | σ y 1 ) i f | σ | > σ y a n d σ < 0 , (42)

where

σ y = σ y o + H ( U p ) , (43)

P is a rate parameter, σy is the yield stress (connected to stretch sensitivity), σyo is the initial yield stress and H is a hardening variable.

It is important to mention that when |σ|σy the plastic strain is zero, i.e., Ep=0. In this case, the plastic stretch tensor is Up=1 and the second Piola-Kirchhoff stress tensor is S=DE, where E=Ee. These relations can be verified in equation (39). The update of the plastic part of the stretch tensor can be computed from (42) as following

U p ( t i + 1 ) = U p ( t i ) + Δ U p ( t i ) , (44)

where

Δ U p ( t i ) = { 0 i f | σ | σ y P ( | σ | σ y 1 ) Δ t i f | σ | > σ y a n d σ > 0 P ( | σ | σ y 1 ) Δ t i f | σ | > σ y a n d σ < 0 , (45)

and Δt is the size of the time increment.

Analyzing the equations (40), (44) and (45) is possible to conclude that to compute the variation of the stretch tensor ΔUp is necessary to know the Cauchy stress tensor σ, that is unknown in the current time step and need to be calculated by equation (40). So, to solve it, the value of Up to be used in equation (40) is chosen to be the same of the previous step and its update is done in the end of the time step by using the equations (44) and (45) with the value of the Cauchy stress tensor obtained in equation (40). In the beginning of the analysis or in the elastic range the value of the plastic stretch tensor is Up=1.

1.1.1 Integration scheme to obtain the stresses in plasticity

The present section introduces one of the contributions to the field. Basically, the author uses an adapted algorithm from elastoplasticity and includes damage to it, to make the control of the maximum stretch and stress. Moreover, the parameters are calibrated to an abrupt rupture, not allowing for hardening.

The integration scheme of the elastoplastic constitutive equation is shown in Algorithm 1. The formulation is presented in Appendix B APPENDIX B: OVERHAUL OF SOLID MECHANICS From the continuum mechanics, the second Piola-Kirchhoff stress tensor S is defined by S = F − 1 P , (110) where P is the first Piola-Kirchhoff stress tensor that correlates nominal stress per unit reference area and F is the deformation gradient defined as F = ∇ x = ∂ x ∂ x r . (111) In above equation, x and xr are the position vector of the nodes in current configuration and reference configuration, respectively. The Cauchy stress tensor σ associates the superficial force vector t (or stress vector per unit of area in the current configuration) with the unit normal vector at the surface in current configuration n defined by t = σ n . (112) Using the Nanson theory and considering J = det F (113) and t r = P n r , (114) is possible to demonstrate the following relation P = J σ F − T . (115) The Kirchhoff-Trefftz stress tensor is defined by Σ = P F T = F S F T = J σ . (116) Note that the second Piola-Kirchhoff stress tensor S is symmetric and doesn’t have a physical interpretation, the first Piola-Kirchhoff stress P is nonsymmetrical, the Kirchhoff-Trefftz stress tensor Σ is symmetrical, the Cauchy stress tensor σ is symmetrical and they are energetically conjugate by this relation S:E˙=P:F˙. The displacements gradient L is defined by L = ∇ u = F − I , (117) where u is the displacements vector of the nodes and I is the identity matrix. The quadratic stretches tensor or right Cauchy-Green strain C is defined by C = F T F . (118) The Green-Lagrange strain tensor is calculated by E = 1 2 ( C − I ) . (119) The stretch tensor U is calculated by U 2 = C . (120) The Green-Lagrange strain tensor can be written also as E = 1 2 ( U 2 − I ) . (121) The following strains belong to the Hill family: ε m = { 1 m ( λ m − 1 ) , i f m ≠ 0 ln ( λ ) , i f m = 0 , (122) where m is a integer value and λ is the stretch. The equation (121) corresponds to (122) when the parameter m is equal to 2. The rotation tensor R can be calculated by the following polar decompositions F = R U = V R , (123) where V is the left stretch tensor. The rotation tensor is orthogonal, i.e., detR=+1. For hyperelastic materials, the following relations that correlates stresses with strains are valid: P = ∂ ψ ∂ F , (124) S = ∂ ψ ∂ E , (125) where ψ(F) and ψ(E) are the function of specific strain energy. A hyperelastic material is necessarily elastic and reversible. The tensor that represents the tangential stiffness is given by D = ∂ 2 ψ ∂ F 2 = ∂ P ∂ F , (126) D = ∂ 2 ψ ∂ E 2 = ∂ S ∂ E . (127) and Appendix C APPENDIX C: OVERHAUL OF ELASTIC-PLASTICITY MATERIAL Introduction In order to incorporate the plasticity in the yarn segments, an overhaul of elastoplastic constitutive equation for large deformation is needed. Elastic-plastic behavior is characterized by a response from the material, initially elastic, and from a certain level of tension by essentially plastic behavior. The plastic behavior of the material is usually accompanied by an invariance of its volume. The typical behavior of an elastoplastic material submitted to uniaxial tension is shown in Figure 25. The Figure 25b represents the elastic-plastic model with hardening. Figure 25 Uniaxial test of elastic plastic material: a) elastic-perfectly-plastic model, b) elastic-plastic model with hardening. When the initial limit tension σy0 is reached, the limit tension value σy may or may not remain constant with increasing deformation. If this value does not depend on the increase of the plastic extension, the material has a perfectly plastic behavior, see Figure 25a. If, on the other hand, the value of the tension increase with the growth of the plastic extension, it is said that the material is undergoing a hardening, see Figure 25b. Over time, several studies on elastoplasticity have been carried out. One can cite, for example, the works done by Chen and Han (1988), Hill (1950), Kachanov (2004), Lubliner (1984), Pimenta (1992), Simo and Ortiz (1985), Simo and Taylor (1985), Simo (1992) and Wriggers, Eberlein and Reese (1996). In this section, a succinct approach on the formulation of elastoplasticity under large deformation will be presented. Through this formulation, the elastoplasticity algorithm used in this research will be developed. It should be noted, that after obtained the plasticity algorithm, some modifications will be done, i.e., the function corresponding to the hardening parameter will be adapted and the damage parameter will be included, as presented in chapter 4. Kinematics Consider the composition F = F e F n , (128) where F is total deformation gradient, Fe is the elastic part of the deformation gradient from the natural to the current configuration and Fn=Fp corresponds to the plastic part from the initial reference configuration to the natural one, see Figure 26. Figure 26 Geometrical interpretation of the tensors for elastic-plastic constitutive equations. In most cases, one sets Fp(0)=I. The elastic and the plastic parts have the following polar decompositions F e = R e U e = V e R e , (129) F p = R p U p = V p R p , (130) where Ue is the right elastic stretching tensor, Ve is the left elastic stretching tensor, Re is the elastic rotation tensor, Up is the right plastic stretching tensor, Vp is the left plastic stretching tensor and Rp is the plastic rotation tensor. As the natural configuration is not fixed, this means that F˙p≠0 whenever the material yields. So, at each instant, is considered a new fixed reference configuration that is set instantaneously coincident with the current natural one. The deformation gradient from this new reference configuration is now denoted by Ft and given by F t = F F n − 1 , (131) see again Figure 26 for a geometrical representation. This gradient has the following polar decomposition F t = R t U t . (132) At each instant, the following identities hold F t = F e , (133) R t = R e , (134) U t = U e . (135) Considering these relations ∂v∂x=∂v∂xr∂xr∂x=F˙F−1 and ∂v∂xn=∂v∂xr∂xr∂xn=F˙Fn−1, where ∂v∂xr=F˙ and ∂v∂xn=F˙t, the velocity gradient from the instantaneously fixed natural configuration is F ˙ t = F ˙ F n − 1 . (136) Changing Fp and F˙p to the same reference configuration, one concludes that F t p = R t p = U t p = I , (137) F ˙ t p = F ˙ p F p − 1 . (138) Hence, one has F ˙ t = F ˙ e + F e F ˙ t p F e − 1 . (139) Since the equation (137) is valid, one has E t p = U t p . (140) For the same reason one may instantaneously write E ˙ t p = U ˙ t p . (141) The elastic Green-Lagrange strain tensor, as shown in equation (121), is defined by E e = 1 2 ( U e 2 − I ) . (142) Considering cie the principal axes of the right Cauchy-Green strain tensors C, once Ue has the spectral decomposition Ue=λiecie⊗cie, where λie=cie, and using the relations present in (121) one may write Ee as the spectral decomposition below E e = ε m e c i e ⊗ c i e , (143) where ε m e ( λ i e ) = { 1 m ( λ i e m − 1 ) , i f m ≠ 0 ln ( λ i e ) , i f m = 0 . (144) The total strain from the fixed natural configuration is defined by E t = E t ( U t ) . (145) In view of (133), at current time, the following identity holds E t = E e . (146) Isotropic plasticity In plasticity the elastic domain encompasses all admissible stress states and is described by the yield function F ( S e , α ) ≤ 0, (147) where F:S×ℝnh→ℝ and α is the (nh×1) vector of the hardening parameters. F does not depend on hardening parameters in the particular case of ideal plasticity. The surface in S described by F(Se,α)=0 is called yield surface. In isotropic plasticity, first is assumed that elasticity is isotropic and described by S e = D e E e , (148) S ˙ e = D e E ˙ e , (149) and the yield function (147) is written as displayed below F ( S e , α ) = σ ¯ ( S e ) − σ y ( α ) ≤ 0, (150) in which σ¯ is an isotropic function of its argument and equal to the uniaxial stress in a simple tension test. This means the following S e = σ e ⊗ e ⇒ σ ¯ = σ , (151) where e is the unitary vector in the axial direction of the test and σ is the corresponding uniaxial stress. σ¯ is then called equivalent stress. On the other hand σy is the yield stress measured in a simple tension test and α is the isotropic hardening parameter. The plastic dissipation per unit volume in the natural configuration is given by the internal dissipation, as displayed below D n = P int n − ψ ˙ = S e : ( E ˙ t − E ˙ e ) , (152) where ψ(Ee) is the strain energy function per unit volume in the natural configuration of an elastic material and the operator is defined as A:B=tr(ATB), where tr(⋅) indicates the trace operator. In order to formulate the constitutive rate equations of plasticity, is stated that the Principle of Maximum Plastic Dissipation max S e ∈ S ( D n ) , s u b j e c t t o F ( S e ) ≤ 0, (153) is a necessary and sufficient condition for the determination of Se. Mathematical Programming asserts that (153) can be transformed to the following unconstrained problem ∂ ∂ S e [ − S e : ( E ˙ t − E ˙ e ) + λ F ] = 0, (154) where λ is the Lagrange multiplier. Thus, one has E ˙ t − E ˙ e = λ N , (155) where N = ∂ F ∂ S e = ∂ σ ¯ ∂ S e . (156) N is the normal to the yield surface F=0 in the stress space. Since F is an isotropic function of Se and the elasticity is isotropic, N, Se and Ue are coaxial. Thus, (155) implies that E˙t−E˙e, N, Se and Ue are coaxial. It is easy to demonstrate the following result E ˙ t = E ˙ e + E ˙ t p , (157) which is similar to the additive decomposition of the total strain in small strain plasticity. From S ˙ t p = − D e ( E ˙ t − E ˙ e ) (158) and S ˙ e = D e ( E ˙ t − ( E ˙ t − E ˙ e ) ) , (159) one arrives at S ˙ t p = − D e E ˙ t p (160) and S ˙ e = D e ( E ˙ t − E ˙ t p ) . (161) From (157), (160) and (161), one necessarily has E ˙ t p = λ N . (162) Mathematical Programming asserts also that F must be convex and the following Kuhn-Tucker optimality conditions must hold λ≥0, F≤0 and λF=0. So, from (162) follows ‖ E ˙ t p ‖ = λ ‖ N ‖ . (163) When λ=0, i.e., when F<0, or when F=0 and F˙<0, there is no plastic strain rate and E˙tp=0. Hence, one has E˙t=E˙e. From S˙e=DeE˙e follows S˙t=DeE˙t. When λ>0, i.e., when F=0 and F˙=0, one has from (150), by differentiation, the following equation F ˙ = N : S ˙ e − h α ˙ = 0, (164) where h = d σ y d α . (165) Defined α such that D n = ( N : S e ) α ˙ , (166) then, from (155) follows λ = α ˙ . (167) Introducing (161) in (164), one has F ˙ = N : D e ( E ˙ t − E ˙ t p ) − h α ˙ = 0. (168) With the aid of (162) the equation (168) can be rewritten by F ˙ = N : D e E ˙ t − N : D e λ N − h α ˙ = 0 . (169) Introducing (167) into (169), obtain F ˙ = N : D e E ˙ t − ( N : D e N + h ) α ˙ = 0 . (170) The above equation leads to the following result α ˙ = 1 N : D e N + h N : D e E ˙ t . (171) Note that for α˙>0 and introducing the equations (162) and (167) into (161) can be rewritten by S ˙ t = D e ( E ˙ t − α ˙ N ) . (172) Thus, one may write S ˙ t = { D e E ˙ t , i f F < 0 o r i f F = 0 a n d F ˙ < 0, D e p E ˙ t , i f F = 0 a n d F ˙ = 0, (173) where D e p = D e − 1 N : D e N + h ( D e N ) ⊗ ( D e N ) . (174) Dep is called the tensor of elastic-plastic tangent moduli for the pair {St,Et}. If one rephrases (153) as min S e ∈ S ( ∂ ψ * ∂ S e : S ˙ t p ) , s u b j e c t t o F ( S e ) ≤ 0. (175) From (175) results the following unconstrained minimization problem min S e ∈ S ( ∂ ψ * ∂ S e : S ˙ t p + λ F ( S e , α ) ) . (176) Mathematical Programming then asserts that ∂ ∂ S e ( ∂ ψ * ∂ S e : S ˙ t p + λ F ) = 0, (177) which leads to ∂ 2 ψ * ∂ S e 2 : S ˙ t p + λ N = D e − 1 S ˙ t p + λ N = 0. (178) Introducing S˙tp=−De(E˙t−E˙e) in the equation above, one arrives at (155). In metal plasticity, is assumed that the plastic part of the deformation gradient is isochoric. Thus, one has J p = det U p = 1, (179) which implies S p h ( ln U p ) = S p h ( ln U ˙ p ) = S p h ( E ˙ t p ) = 0 (180) and Σ i = Σ i e . (181) According to (155), if N is deviatoric, then E˙tp is deviatoric too. This implies (179). In the case of isochoric plasticity, one has Pintr=Pintn and Dr=Dn. Stress integration In plasticity, the constitutive equations are rate equations. So, it is necessary to formulate a stress integration algorithm in order to obtain an approximate solution for the quasi-static problem at discrete instants {t0,t1,t2,⋯,ti,ti+1,⋯}. Consider the material state at instant ti, at which Fi, Uip and αi are supposed to be known. Hence, from (128) one has F i e = F i U i p − 1 . (182) If the polar decomposition F i e = R i e U i e (183) is performed, the stress tensor at this instant can be computed through S i e = ∂ ψ ∂ E e ( E i e ) , (184) where E i e = 1 2 ( U i e 2 − I ) . (185) The above equation lies to E ˙ i e = U i e U ˙ i e . (186) At instant ti+1 only the deformation gradient Fi+1 is assumed to be known. The following trial elastic state is defined, assuming that the plastic part of the deformation has not changed, F t e = F i + 1 U i p − 1 . (187) The polar decomposition F t e = R t e U t e , (188) is then performed and the strain tensor Ete is computed with the aid of E t e = 1 2 ( U t e 2 − I ) . (189) The stress tensor in this state is given by S t = ∂ ψ ∂ E e ( E t e ) . (190) If Ft=F(St)<0, then the trial state is admissible, Δα=0, and S i + 1 e = S t , α i + 1 = α i a n d U i + 1 p = U i p . (191) If Ft≥0, there is an incremental plastic stretch ΔUp such that F i + 1 e = F t e Δ U p − 1 a n d F i + 1 p = Δ U p U i p . (192) The plastic stretch tensor at the end of the increment, denoted by Ui+1p, is obtained from Fi+1p through U i + 1 p = ( F i + 1 p T F i + 1 p ) 1 2 . (193) The incremental stress integration algorithm is formulated by the following constrained minimization problem, which must be solved for Si+1e, min ψ * ( Δ S p ) s u b j e c t t o F ( S i + 1 e , α i + 1 ) = 0, (194) where Δ S p = S i + 1 e − S t . (195) The equation (195) is based on (175) and is equivalent to the following unconstrained minimization problem min [ ψ * ( Δ S p ) + Δ α F ( S i + 1 e ) ] , (196) where Δα is the Lagrange multiplier. (196) leads to the following system { ∂ ψ * ∂ S e ( S i + 1 e − S t ) + Δ α N i + 1 = 0, F ( S i + 1 e , α i + Δ α ) = 0. (197) In (197), the following normal has been introduced N i + 1 = ∂ F ∂ S e ( S i + 1 e ) . (198) The solutions of (197) are Si+1e and Δα. If ψ* and F are convex, (194) has a unique solution and the Newton Method applied to (197) is globally convergent. From (194) results the following Kuhn-Tucker optimality conditions Δ α ≥ 0, F ≤ 0 a n d Δ α F = 0. (199) When ψ* is given by ψ ( E e ) = 1 2 E e : D e E e a n d ψ * ( S e ) = 1 2 S e : D e − 1 S e , (200) delivers { D e − 1 ( S i + 1 e − S t ) + Δ α N i + 1 = 0, F ( S i + 1 e , α i + Δ α ) = 0. (201) Equation (201) is the incremental counterpart of (178). Hence, one may write Δ E t p = − D e − 1 ( S i + 1 e − S t ) = Δ α N i + 1 , (202) where (202) is the incremental counterpart of (178). After solving (197), one has Si+1e and Δα. Afterwards, the following quantities can be computed Δ E t p = Δ α N i + 1 , Δ U p = U i p − 1 Δ E t p , F i + 1 p = Δ U p U i p , U i + 1 p = ( F i + 1 p T F i + 1 p ) 1 2 , α i + 1 = α i + Δ α . (203) Note that, when Ni+1 is deviatoric, ΔEtp is also deviatoric and ΔUp is isochoric. It is important to remark additionally that Ni+1, Si+1e, St, ΔUp and ΔEtp are coaxial. Equation (201) yields also S i + 1 e = S t − D e Δ E t p = S t − Δ α D e N i + 1 . (204) The analytical solution of (204) is given by S i + 1 e = S p h ( S t e ) + σ y i + 1 σ ¯ t D e v ( S t e ) , (205) where σ y i + 1 = σ y ( α i + 1 ) = σ y ( α i + Δ α ) a n d F t = σ ¯ t − σ y ( α i ) . (206) This solution is known as the radial return method. Thus, from (204), one has S t − Δ α D e N i + 1 = S p h ( S t e ) + σ y i + 1 σ ¯ t D e v ( S t e ) . (207) Considering that S t = S p h ( S t e ) + D e v ( S t e ) , (208) equation (207) can be rewritten as S p h ( S t e ) + D e v ( S t e ) − Δ α D e N i + 1 = S p h ( S t e ) + σ y i + 1 σ ¯ t D e v ( S t e ) . (209) The value of Δα is obtained from the above equation, just solving the following relation Δ α D e N i + 1 = ( 1 − σ y i + 1 σ ¯ t ) D e v ( S t e ) = ( F t σ ¯ t ) D e v ( S t e ) . (210) The so-called tensor of algorithmic tangent moduli is defined by D a lg = ∂ S i + 1 e ∂ E t . (211) Remember that (211) is referenced to the natural configuration at the instant ti and is valid for the logarithmic stress and strain tensors from this configuration. Plasticity algorithmic The geometrical interpretation of the update procedure is shown in Figure 27. Figure 27 Interpretation of the update procedure for elastic-plastic constitutive equations. For computational purposes the radial return algorithm on principal axes for the von Mises plasticity with isotropic hardening is summarized below. Algorithm 3 Plasticity algorithmic. I) Trial step: a) Fte=Fi+1Uip−1, Cte=(Fte)TFte; b) Ute=(Cte)1/2, Et=12(Ute2−I); c) Rte=FteUte−1, Ste=DeEt; d) Ft=σ¯t−σy(αi) II) Radial return algorithm: If (Ft<0) then Elastic step: 1. αi+1=αi; 2. Ui+1p=Uip ; 3. Si+1=Ste; 4. Di+1=De; Else if (Ft≥0) then Elastic-plastic step: 1. Δα, αi+1=αi+Δα; σy(αi+1)=σy(αi)+hΔα; 2. ΔEp=ΔαNi+1, ΔUp=Uip−1ΔEp, Fi+1p=ΔUpUip, Ui+1p=[(Fi+1p)TFi+1p]12 3. Si+1=Ste−DeΔEp; 4. Di+1=Dep; End if. .

Algorithm 1
Elastoplasticity with damage.

To illustrate the behavior between stretch and stress by using the elastoplastic algorithm, is considered a simple numerical example of a Zylon yarn segment, with length L=0.00254m, Young modulus D=180GPa and critical stretch Ucrit=1.03. As explained before, the Cauchy stress limit lies to σ=5645.43MPa and the rupture occurs when Urupture1.06. In order to generate a tensile force, in each time increment of Δt=106s the yarn segment was increased its length in ΔL=2.03107m. The case that have no damage in the yarn segment (λ=0) and have only elastoplasticity with parameter P=104, the numerical result obtained is shown in Figure 5. Observe that this constitutive law doesn’t give values of stresses higher than the limit established, i.e., σσy.

Figure 5
Graphic of the elastoplastic constitutive law: (λ=0 and P=104).

Mechanical forces due to the yarn and coating segments considering plasticity and damage

In this section the real force developed by the yarn and coating segments considering plasticity and damage effects is presented. Substituting equation (39) into (11) and using the relations presented in equations (16) to (21), lies to

F I y a r n = L I 2 L I r [ ( L I L I r ) 2 ( U I p y a r n ) 2 ] { α I y a r n E 0 I y a r n ( A I r ) y a r n } α I (46)

F I c o a t i n g = L I 2 L I r [ ( L I L I r ) 2 ( U I p c o a t i n g ) 2 ] { α I c o a t i n g ( E 0 I ) c o a t i n g ( A I r ) c o a t i n g } α I , (47)

where αI, (AIr)yarn and (AIr)coating are defined in (14), (22) and (23), respectively.

The Cauchy stress tensor for the yarn and coating are respectively

σ I y a r n = L I 2 L I r [ ( L I L I r ) 2 ( U I p y a r n ) 2 ] { α I y a r n ( E 0 I ) y a r n } , (48)

σ I c o a t i n g = L I 2 L I r [ ( L I L I r ) 2 ( U I p c o a t i n g ) 2 ] { α I c o a t i n g ( E 0 I ) c o a t i n g } . (49)

Note that UIpyarn and UIpcoating are calculated independently by the Algorithm 1. To illustrate the behavior of the curve correlating stretch and stress taking into account the elastoplasticity and damage, the same example of the yarn segment presented in section 4.4.1 is considered. The equation (33) is used to calculate the damage. In case that have a rather gradual damage in the yarn segment (λ=135) and elastoplasticity with parameter P=104, the numerical result obtained is shown in Figure 6. For the plastic part of the graphic, the damage curve is similar to the one presented in Figure 4. It’s a gradual and exponential loss of stiffness. It is important to mention that the Figure 6 can be also obtained with the parameters λ=135 and P=0.

Figure 6
Graphic of the elastoplastic constitutive law with rather gradual damage (λ=135 and P=104 or P=0).

This formulation presented in section 4.4 is more stable than the others ones presented. To simulate a sudden rupture, the parameter λ. In this numerical example it should be λ=104, see Figure 7.

Figure 7
Graphic of the elastoplastic constitutive law with sudden damage (λ=104 and P=104).

The material stress-stretch relations presented in Figure 6 and Figure 7, obtained by the constitutive formulation developed in this research, are in agreement with the ones presented in Zohdi and Powell (2006).

This formulation presented in this section will be used in the numerical examples brought at the end of this article to simulate the yarn-segment and coating. It is important to mention that each material has its damage parameter as well as its physical parameters. This constitutive equation means a considerable contribution to the study of fabric shields. It is important to note that the hardening function has been adapted and that the plasticity algorithm has the main function of controlling the tensions acting on the material, preventing them from being higher than the yield stresses. The abrupt rupture constitutive model perfectly simulates the zylon behavior as its curve shows no yielding.

MECHANICAL FORCES DEVELOPED BY THE CONTACT BETWEEN YARN-SEGMENTS AND PROJECTILES

The fabric/rigid-body interaction was developed by Zohdi (2010aZohdi, T. I. (2010a). High-speed impact of electromagnetically sensitive fabric and induced projectile spin. Comput Mech, vol. 46 : 399-415.) and Zohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.) based on classical contact algorithms. A variety of contact algorithms is presented by Wriggers (2002Wriggers, P. (2002). Computational Contact Mechanics. [S.l.]: John Wiley & Sons Ltd, England,).

The contact between a rigid projectile with a fabric shield is performed as a contact point-to-point, i.e., between the fabric node and the projectile, that is described by the position of its center of mass. Basically, according to Zohdi (2010aZohdi, T. I. (2010a). High-speed impact of electromagnetically sensitive fabric and induced projectile spin. Comput Mech, vol. 46 : 399-415.) and Zohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.), if penetration of a fabric node into the projectile is detected (“contact”), the following procedures are enacted: (1) move the fabric node to the closest point on the rigid body’s surface and (2) if there is friction, then a stick condition is assumed, i.e, assuming a common position and velocity for the point on the surface of the projectile and the fabric node. The friction force is then checked against the static limit, which if violated, enacts a sliding friction force. See Figure 8 for a geometrical representation.

Figure 8
Interpenetration of a fabric node (picture based on Zohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.) and Zohdi (2010aZohdi, T. I. (2010a). High-speed impact of electromagnetically sensitive fabric and induced projectile spin. Comput Mech, vol. 46 : 399-415.)).

In Figure 8, rif(t) is the position of the converged value from the previous time step, rif,pred(t+Δt) is the predicted contact position in current time step, rif,corr(t+Δt) is the corrected contact position in current time step, rp,cm(t+Δt) is the position of the center of mass of the projectile in current time step, rp,cp(t+Δt) is the position of the closest point on the surface of the contacting object in current time step and R is the radii of the projectile.

Geometrical interpretation for a fabric node

Assuming interpenetration for a node i, see Figure 8, the contact force on a node i can be calculate as

F i c o n = m i Δ t 2 [ r i f , c o r r ( t + Δ t ) r i f , p r e d ( t + Δ t ) ] , (50)

where mi is the lamped mass of the node i of the fabric. From above equation, the corrected contact position is given by

r i f , c o r r ( t + Δ t ) = r i f , p r e d ( t + Δ t ) + Δ t 2 m i F i c o n , (51)

where the predicted contact position is defined by

r i f , p r e d ( t + Δ t ) = r i f ( t ) + Δ t [ ϕ v i f , p r e d ( t + Δ t ) + ( 1 ϕ ) v i f ( t ) ] , (52)

where vif,pred(t+Δt) is the velocity of the node i in time step t+Δt, vif(t) is the velocity of the converged value from the previous time step (t) and ϕ is the trapezoidal time-stepping parameter. The velocity of the predicted contact position is calculated by

v i f , p r e d ( t + Δ t ) = v i f ( t ) + Δ t m i [ ϕ F i f , p r e d , o t h ( t + Δ t ) + ( 1 ϕ ) F i f , o t h ( t ) ] , (53)

where Fif,oth(t) are all forces other than the contact forces. In this work, the forces other than contact are considered to be

F i f , o t h o t h e r f o r c e s t h a n c o n t a c t = I = 1 4 F I y a r n s u r r o u n d i n g y a r n + I = 1 4 F I c o a t i n g s u r r o u n d i n g c o a t i n g + F i d a m p d a m p i n g + F i g r a v g r a v i t y . (54)

The equation (52) can be rewritten as

r i f , p r e d ( t + Δ t ) = r i f ( t ) + Δ t v i f ( t ) + ϕ Δ t [ v i f , p r e d ( t + Δ t ) v i f ( t ) ] . (55)

Substituting (53) into (55), lies to

r i f , p r e d ( t + Δ t ) = r i f ( t ) + Δ t v i f ( t ) + ϕ ( Δ t ) 2 m i [ ϕ F i f , p r e d , o t h ( t + Δ t ) + ( 1 ϕ ) F i f , o t h ( t ) ] . (56)

Procedure to calculate the Fabric motion

Figure 9
Geometrical interpenetration of a fabric node update.

To updated each fabric node i, basically, the projectile is frozen and a new position of the fabric node i is computed taking into account the contact conditions, i.e., if occurs penetration into the projectile, the position of the fabric node must be correct, see Figure 9.

The procedure used in this research is described as following. In the beginning of each time increment, the first step consists to calculate the predicted contact position rif,pred(t+Δt) by using equation (52). If the contact occurs, see Figure 9, the fabric node must move to the closest point on the rigid body’s surface. For this purpose, first is assumed that the projectile-fabric surface “sticks”. So, the fabric node is corrected to

r i f , c o r r ( t + Δ t ) = r i p , c p ( t + Δ t ) , (57)

where rip,cp(t+Δt) is the closest point on the surface of the contacting object. For an in-depth review of these types of methods see Wriggers (2002Wriggers, P. (2002). Computational Contact Mechanics. [S.l.]: John Wiley & Sons Ltd, England,). Additionally, values to the velocity must be assigned. Considering “stick” case, is assigned the velocity of the fabric node vif,corr(t+Δt) to that of the closest point on the body vip,cp(t+Δt), for node i, as

v i f , c o r r ( t + Δ t ) = v i p , c p ( t + Δ t ) . (58)

The friction force is calculated using

F i f r i c = m i v ˙ i F i c o n F i f , o t h , (59)

where the contact force Ficon is computed by equation (50) and v˙i can be considered to be the acceleration of the projectile, since it is considered “stick” case. The acceleration v˙i can be computed by equation (83).

If the friction force exceeds the theoretical limit

F i f r i c > μ s F i c o n , (60)

then the assumption that there is “stick” is incorrect, and sliding must occur, resulting in a nonmatching velocity of

v i f , c o r r ( t + Δ t ) = v i f , p r e d ( t + Δ t ) + Δ t m i [ F i c o n + F i f r i c ] , (61)

with the (frictional) projection

F i f r i c = μ d F i c o n v i p , c p v i f , c p v i p , c p v i f , c p , (62)

where the velocity of the node i of the fabric at the closest contact point vif,cp is assumed to be

v i f , c p = v i f , c o r r ( t + Δ t ) . (63)

Procedure to calculate the projectile motion

After the calculations culminating in equation (62) have been completed, the velocity of the projectile is recalculated using (summing the nodal contributions)

v p ( t + Δ t ) = v p ( t ) Δ t m p i = 1 N c ( F i c o n + F i f r i c ) + Δ t m p [ ϕ F p o t h ( t + Δ t ) + ( 1 ϕ ) F p o t h ( t ) ] , (64)

where Nc is the number of nodes in contact and

r p ( t + Δ t ) = r p ( t ) + Δ t [ ϕ v p ( t + Δ t ) + ( 1 ϕ ) v p ( t ) ] . (65)

In this work, these forces other than contact are considered to be

F p o t h o t h e r f o r c e s t h a n c o n t a c t = F p d a m p d a m p i n g + F p g r a v g r a v i t y . (66)

The equation (65) can be rewritten by

r p ( t + Δ t ) = r p ( t ) + v p ( t ) Δ t + Δ t ϕ [ v p ( t + Δ t ) v p ( t ) ] . (67)

Substituting (64) into (67) lies to

r p ( t + Δ t ) = r p ( t ) + v p ( t ) Δ t + ϕ ( Δ t ) 2 m p { i = 1 N c ( F i c o n + F i f r i c ) + [ ϕ F p o t h ( t + Δ t ) + ( 1 ϕ ) F p o t h ( t ) ] } . (68)

The velocity of any point j on the surface of the body can be determined by simply calculating

v j = v p , c m + ω p × r p , c m j . (69)

The projectile’s angular velocity and rotation are determined in a similar manner by integrating the equations for an angular momentum balance

H ˙ p = d d t ( I ¯ p , s ω p ) = M p t o t , (70)

where I¯p,s is the mass moment of the projectile, ωp is the angular velocity and Mptot is the sum of all moment contributions external to the projectile, around its center of mass. A general rigid body solution algorithm is provided by Zohdi (2010a).

Solving equation (70):

t 1 t 2 d ω p = t 1 t 2 1 I ¯ p , s M p t o t d t ω p ( t 2 ) = ω p ( t 1 ) + Δ t I ¯ p , s M p t o t . (71)

Then, based in equation (71), the time discretization is done by the following equation:

ω p ( t + Δ t ) = ω p ( t ) + Δ t I ¯ p , s { M p t o t ( t ) + [ M p t o t ( t + Δ t ) M p t o t ( t ) ] } , (72)

where is a scalar value with range 0<ϕ1. It is important to mention that when the parameter ϕ=0 the system is solved by explicit method and for 0<ϕ1 the system is solved by implicit method. The equation (72) can be rewritten as

ω p ( t + Δ t ) = ω p ( t ) + Δ t I ¯ p , s [ M p t o t ( t + Δ t ) + ( 1 ) M p t o t ( t ) ] . (73)

The moment Mptot can also be calculated by

M p t o t = i = 1 N c r p c × F i f r i c , (74)

where Fifric is the friction force between the nodes i of the fabric and the projectile. This force is applied at the contact point on the surface of the projectile.

In this work, the rolling of the projectile is taken into account. Therefore, the friction force is modeled by assuming that sliding and rolling may occur between the contact pair, i.e., whether it is pure sliding, sliding with rolling or pure rolling.

The rotation vector θp of a particle is obtained by

ω p = d θ p d t t 1 t 2 d θ p = t 1 t 2 ω p d t θ p ( t 2 ) = θ p ( t 1 ) + ω p Δ t . (75)

The time discretization is done by the following equation:

θ p ( t + Δ t ) = θ p ( t ) + Δ t { ω p ( t + Δ t ) + ( 1 ) ω p ( t ) } . (76)

Finally, for a point P belonging to a projectile in the initial configuration placed rpcP|t=0 from its center, its current position is defined by:

r p P ( t + Δ t ) = r p ( t + Δ t ) + r p c P | t = 0 × θ p ( t + Δ t ) . (77)

Based on equation (64), the dynamics of the projectile is given by

m p r ¨ p = F p t o t = i = 1 N c ( F i c o n + F i f r i c ) + [ ϕ F p o t h ( t + Δ t ) + ( 1 ϕ ) F p o t h ( t ) ] . (78)

It is important to mention that in this work spheres are used to model projectiles. Therefore, the contact point can easily be found and is not necessary to find the current position of any point at the projectile’s surface related to its center. Then, it is neglected in the numerical algorithm.

OTHER MECHANICAL FORCES

Damping force

The other force that can be taken into account is the damping effect given by

F i d a m p = c i r ˙ i , (79)

where cir˙i is the external damping, that can be used to simulate the effects of the environment.

Gravity force

The other force that needs to be taken into account is the gravitational force, which acts in a downwards (z direction) and is given by

F i g r a v = m i g z ^ , (80)

where g is the gravity acceleration and z^ is the unit vector in the z direction.

NUMERICAL SOLUTION SCHEME

In order to describe the overall time-stepping scheme, is considered the dynamics of a single ith lumped mass as presented in equation (1) and the dynamics of a single pth particle presented in equation (2). The rotation in the node of the fabric is neglected and is only considered in the projectiles. Basically, comparing the fabric shields formulation with the standard contact mechanics formulation used in finite element method, the fabric nodes can be considered to be the “slave node” and the projectiles the “master node (target)”. Within this meaning, the algorithm has the basic aim to calculate the converged positions and velocities for all fabric nodes, taking into account that in the end of each iteration the positions and velocities of the projectiles must be corrected. So, in the end of each time step, the values converged to the correct solution.

For this purpose, let the position vector be defined by

r = [ r 1 f r 2 f r N f f r 1 p r 2 p r N p p ] T = [ r i r p ] T (81)

and the velocity vector defined by

v = [ v 1 f v 2 f v N f f v 1 p v 2 p v N p p ] T = [ v i v p ] T , (82)

where i=1,2,,Nf, Nf is the number of lumped mass, p=1,2,,Np, Np is the number of projectiles.

Adaptive time-stepping scheme

The time-stepping scheme used in this work is based on the original works presented by Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.), Zohdi and Wriggers (2008Zohdi, T. I.; Wriggers, P. (2008). Introduction to computational micromechanics. Second Reprinting. ed. Berlin: Springer,), Zohdi (2010aZohdi, T. I. (2010a). High-speed impact of electromagnetically sensitive fabric and induced projectile spin. Comput Mech, vol. 46 : 399-415.) and Zohdi (2010bZohdi, T. I. (2010b). On the dynamics of charged electromagnetic particulate jets. Arch. Comput. Methods Eng., vol. 17 : 109-135.). The only difference is that, in this article, the convergences is verified not only considering displacements, but also velocities. Employing a trapezoidal rule, such that 0ϕ1, the following relations are valid:

v ˙ i ( t + ϕ Δ t ) = v i ( t + Δ t ) v i ( t ) Δ t ; (83)

v i ( t + Δ t ) = v i ( t ) + 1 m i t t + Δ t F i t o t d t = v i ( t ) + Δ t m i [ ϕ F i t o t ( t + Δ t ) + ( 1 ϕ ) F i t o t ( t ) ] . (84)

The position can be computed by applying the mid-point rule, which results in

r i ( t + Δ t ) = r i ( t ) + Δ t v i ( t + ϕ Δ t ) r i ( t ) + Δ t [ ϕ v i ( t + Δ t ) + ( 1 ϕ ) v i ( t ) ] . (85)

Substituting equation (84) into (85) is obtained

r i ( t + Δ t ) = r i ( t ) + v i ( t ) Δ t + ϕ ( Δ t ) 2 m i [ ϕ F i t o t ( t + Δ t ) + ( 1 ϕ ) F i t o t ( t ) ] . (86)

The equation (86) can be solved recursively by recasting the relation as

r i L + 1 = r i L + v i L Δ t + ϕ ( Δ t ) 2 m i [ ϕ F i t o t , L + 1 + ( 1 ϕ ) F i t o t , L ] , (87)

and the same for equation (84) as

v i L + 1 = v i L + Δ t m i [ ϕ F i t o t , L + 1 + ( 1 ϕ ) F i t o t , L ] , (88)

where superscript L and L+1 indicates the indices of the current and the future time-step in the discretization, respectively. Basically, the superscript L is a time interval counter. This is a generalized one-step scheme, with ϕ(0,1], in which, when ϕ=0 is the explicit Euler integration scheme, while ϕ=1 is the fully implicit Euler integration scheme. The implicit implementation of the position and velocity updates, as is evident from equations (84) and (86), requires an iterative solution for riL+1 and viL+1.

The set of equations represented by (87) and (88) can be solved recursively by recasting the relation as

r i L + 1, K = r i L + v i L Δ t + ϕ ( Δ t ) 2 m i [ ϕ F i t o t , L + 1, K 1 + ( 1 ϕ ) F i t o t , L ] (89)

v i L + 1, K = v i L + Δ t m i [ ϕ F i t o t , L + 1, K 1 + ( 1 ϕ ) F i t o t , L ] , (90)

where K=1,2,3 is the index of iteration within time-step L+1. These equations can also be represented in the following form:

r i L + 1, K = G r ( r i L + 1, K 1 ) + R i , r ; (91)

v i L + 1, K = G v ( v i L + 1, K 1 ) + R i , v . (92)

where,

F i t o t , L + 1 , K - 1 F i t o t , L + 1 , K - 1 r 1 L + 1 , K - 1 , r 2 L + 1 , K - 1 , , r N p L + 1 , K - 1 , (93)

F i t o t , L F i t o t , L r 1 L , r 2 L , , r N p L , (94)

G r ( r i L + 1, K 1 ) = ( ϕ Δ t ) 2 m i F i t o t , L + 1, K 1 , (95)

R i , r = r i L + v i L Δ t + ϕ ( Δ t ) 2 m i ( 1 ϕ ) F i t o t , L , (96)

G v ( v i L + 1, K 1 ) = ϕ Δ t m i F i t o t , L + 1, K 1 , (97)

R i , v = v i L + Δ t m i ( 1 ϕ ) F i t o t , L . (98)

The terms Ri,r and Ri,v are remainder terms that do not depend on the solution. The convergence of such a scheme is dependent on the behavior of Gr and Gv. The form of the error function is presented below as

ϖ i , r L + 1 , K r i L + 1 , K - r i L + 1 , (99)

ϖ i , v L + 1 , K v i L + 1 , K - v i L + 1 . (100)

Based in the formulations presented by Zohdi (2014aZohdi, T. I. (2014a). A direct particle-based computational framework for electrically-enhanced thermo-mechanical sintering of powdered materials. Math. Mech. Solids : 1-21.), a sufficient condition for convergence is the existence of a contraction mapping regarding the displacements. In this work, the author utilizes a contraction mapping regarding both the displacements and velocities, as

r i L + 1, K r i L + 1 = G r ( r i L + 1, K 1 ) G r ( r i L + 1 ) η r L + 1, K r i L + 1, K 1 r i L + 1 , (101)

v i L + 1, K v i L + 1 = G v ( v i L + 1, K 1 ) G v ( v i L + 1 ) η v L + 1, K v i L + 1, K 1 v i L + 1 , (102)

where 0ηrL+1,K<1 and 0ηvL+1,K<1 for each iteration K. Then ϖi,rL+1,K0 and ϖi,vL+1,K0 for any arbitrary starting value riL+1,K=0 and viL+1,K=0, as K, which is a contraction condition that is sufficient, but not necessary, for convergence. The convergence of equation (89) is scaled by ηr(ϕΔt)2mi (see equation (95)) and the convergence of equation (90) is scaled by ηvϕΔtmi (see equation (97)). Therefore, the contraction constant of Gr and Gv is directly dependent on the magnitude of the interaction forces (Fi), inversely proportional to the masses mi and directly proportional to Δt. Thus, decreasing the time-step size improves the convergence.

Zohdi (2002aZohdi, T. I. (2002a). An adaptive-recursive staggering strategy for simulating multifield coupled processes in microheterogeneous solids. Int. J. Numer. Methods Engrg., v. 53: 1511-1532.) proposed an approach to maximize the time-step sizes to decrease overall computing time and keep the numerical solution’s accuracy. This propose takes into account only the position vector’s errors. Here, this propose is extending also for the velocity vector’s errors. Basically, these following expressions are assumed:

η r L + 1, K S r ( Δ t ) 2 (103)

η v L + 1, K S v Δ t , (104)

where Sr and Sv are constants. The error resulted within an iteration is according to

[ S r ( Δ t r ) 2 ] K ϖ i , r L + 1,0 = ϖ i , r L + 1, K (105)

( S v Δ t v ) K ϖ i , v L + 1,0 = ϖ i , v L + 1, K . (106)

where ϖi,rL+1,0=riL+1,K=1riL and ϖi,vL+1,0=viL+1,K=1viL. These above equations can be rewritten as

Δ t r = 1 S r 1 2 ( ϖ i , r L + 1, K ϖ i , r L + 1,0 ) 1 2 K , (107)

Δ t v = 1 S v ( ϖ i , v L + 1, K ϖ i , v L + 1,0 ) 1 K . (108)

According to Zohdi (2014aZohdi, T. I. (2014a). A direct particle-based computational framework for electrically-enhanced thermo-mechanical sintering of powdered materials. Math. Mech. Solids : 1-21.), in the end of the time-step iteration, ϖi,rL+1,K=TOLr and ϖi,vL+1,K=TOLv, where TOLr and TOLv are tolerances for the position and velocity vectors, respectively. So, assuming that Sr and Sv are constants, a new smaller step size can be defined as

Δ t t o l = Δ t m i n T O L r ϖ i , r L + 1,0 1 2 K d ϖ i , r L + 1 , K ϖ i , r L + 1,0 1 2 K Λ K , r ; T O L v ϖ i , v L + 1,0 1 2 K d ϖ i , v L + 1 , K ϖ i , v L + 1,0 1 2 K Λ K , v = Δ t m i n Λ K , r ; Λ K , v Λ K = Δ t Λ K , (109)

where Kd is the number of desired iterations. According to Zohdi (2014aZohdi, T. I. (2014a). A direct particle-based computational framework for electrically-enhanced thermo-mechanical sintering of powdered materials. Math. Mech. Solids : 1-21.), the expression in (109) can also be used for time-step enlargement, if convergence is met in less than Kd iterations, usually chosen to be between 5 to 10 iterations.

The numerical solution scheme is shown on Algorithm 2 in Appendix A APPENDIX A: NUMERICAL SOLUTION SCHEME ALGORITHM Algorithm 2 Numerical solution scheme. ITERATIVE IMPLICIT SOLUTION METHOD Step 1 Start a global fixed iteration and set the iteration counter K=0. Store the variables: riL(riL+1,0), viL(viL+1,0), rpL(rpL+1,0), vpL(vpL+1,0), θpL(θpL+1,0) and ωpL(ωpL+1,0). Compute other forces: Fif,oth,L(riL,viL,rpL,vpL,ωpL) and Fpoth,L(riL,viL,rpL,vpL,ωpL). Compute the total force: Fitot,L(riL,viL,rpL,vpL,ωpL) and Fptot,L(riL,viL,rpL,vpL,ωpL). Compute the total momentum: Mptot,L(riL,viL,rpL,vpL,ωpL). Update the iteration counter K=K+1. Step 2 Make a loop from i=1 to i=Nf and compute for each fabric node i: a) Compute forces: Fif,pred,oth,,L+1,K−1(riL+1,K−1,viL+1,K−1,rpL+1,K−1,vpL+1,K−1,ωpL+1,K−1).b) Compute mass predicted position and predicted velocity: rif,pred,L+1,K=rif,L+vif,LΔt+ϕ(Δt)2mi[ϕFif,pred,oth,L+1,K−1+(1−ϕ)Fif,oth,L], vif,pred,L+1,K=vif,L+Δtmi[ϕFif,pred,oth,L+1,K−1+(1−ϕ)Fif,oth,L].c) Enforce contact if necessary (if contact occurs do the following procedures): Consider “stick case”. Make rif,corr,L+1,K=rip,cp,L+1,K and vif,corr,L+1,K=vip,cp,L+1,K. Compute Ficon=miΔt2[rif,corr,L+1,K−rif,pred,L+1,K] and Fifric=miΔt(vif,corr,L+1,K−vif,L)−Ficon−Fif,oth,L. IF Fifric≤μsFicon THEN “stick case”. Leave like that. The contact condition is satisfied. ELSE “slip case”. Update the velocity vif,corr,L+1,K=vif,pred,L+1,K+Δtmi[Ficon+Fifric] and the friction force Fifric=μdFiconvip,cp,L+1,K−vif,corr,L+1,Kvip,cp,L+1,K−vif,corr,L+1,K. Step 3 Make a loop from p=1 to p=Np and compute for each projectile p: a) Compute forces: Fpoth,L+1,K−1(riL+1,K,viL+1,K,rpL+1,K−1,vpL+1,K−1,ωpL+1,K−1). b) Compute momentum: Mptot,L+1,K−1(riL+1,K,viL+1,K,rpL+1,K−1,vpL+1,K−1,ωpL+1,K−1).c) Compute position, velocity, angular velocity and rotation: rpL+1,K=rpL+vpLΔt+ϕ(Δt)2mp{−∑i=1Nc(Ficon+Fifric)+[ϕFpoth,L+1,K−1+(1−ϕ)Fpoth,L]}, vpL+1,K=vpL−Δtmp∑i=1Nc(Ficon+Fifric)+Δtmp[ϕFpoth,L+1,K−1+(1−ϕ)Fpoth,L]. ωpL+1,K=ωpL+ΔtI¯i,s[∅Mptot,L+1,K−1+(1−∅)Mptot,L]. θpL+1,K=θpL+Δt[∅ωpL+1,K−1+(1−∅)ωpL]. Step 4 Compute/update forces: Fitot,L+1,K (similar to step 2). Step 5 Compute/update fabric/coating damage: αIyarn and αIcoating. Step 6 Compute/update fabric/coating plastic stretch: Up,Iyarn and Up,Icoating. Step 7 Measure normalized error quantities: a) ϖK,r≝∑i=1Nf+NpriL+1,K-riL+1,K-1∑i=1Nf+NpriL+1,K-riL , ϖK,v≝∑i=1Nf+NpviL+1,K-viL+1,K-1∑i=1Nf+NpviL+1,K-viL and ϖK,ω≝∑p=1NpωpL+1,K-ωpL+1,K-1∑p=1NpωpL+1,K-ωpL. b) Zk,r≝ϖK,rTOLr , .Zk,v≝ϖK,vTOLv and Zk,ω≝ϖK,ωTOLω . c) ΛK,r≝TOLrϖ0,r12KdϖK,rϖ0,r12K , ΛK,v≝TOLvϖ0,v12KdϖK,vϖ0,v12K and ΛK,ω≝TOLωϖ0,ω12KdϖK,ωϖ0,ω12K. Step 8 IF (Zk,r≤1ANDZk,v≤1ANDZk,ω≤1)ANDK≤Kd THEN Increment time: t=t+Δt, Construct the next time step: (Δt)new=ΛK(Δt)old, where ΛK=min[ΛK,r,ΛK,v,ΛK,ω], Select the minimum size: Δt=min[(Δt)lim,(Δt)new], Go to step 1. ELSE Go to step 9. Step 9 IF (Zk,r>1ORZk,v>1ORZk,ω>1)ANDK<Kd THEN Update the iteration counter: K=K+1, Go to step 2. ELSE Go to step 10. Step 10 IF (Zk,r>1ORZk,v>1ORZk,ω>1)ANDK=Kd THEN Construct a next time step: (Δt)new=ΛK(Δt)old, where ΛK=min[ΛK,r,ΛK,v,ΛK,ω], Select the minimum size: Δt=min[(Δt)lim,(Δt)new], Restart at time t: Set riL+1,0=riL, viL+1,0=viL, rpL+1,0=rpL, vpL+1,0=vpL and ωpL+1,0=ωpL, Go to step 1. ELSE Set a larger number for the variable Kd, Restart at time t: Set riL+1,0=riL, viL+1,0=viL, rpL+1,0=rpL, vpL+1,0=vpL and ωpL+1,0=ωpL, Go to step 1. . This numerical algorithm has a new approach, being presented in a much more complete and detailed way. However, it is adapted fromZohdi (2014bZohdi, T. I. (2014b). Additive particle deposition and selective laser processing-a computational manufacturing framework.Comput. Mech., vol. 54 : 171-191.), Zohdi (2014aZohdi, T. I. (2014a). A direct particle-based computational framework for electrically-enhanced thermo-mechanical sintering of powdered materials. Math. Mech. Solids : 1-21.), Zohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.) and Zohdi (2010aZohdi, T. I. (2010a). High-speed impact of electromagnetically sensitive fabric and induced projectile spin. Comput Mech, vol. 46 : 399-415.).

NUMERICAL EXAMPLES

In this section, numerical results using the theory described in this article are presented. The examples are modeled in the currently developed program and in the comercial program LS-DYNA, a module of ANSYS. The examples where simulated in a machine with Intel Core i7 7700HQ (2.80GHz processing), graphic card 4095MB NVIDIA GeForce GTX 1050 Ti, 256 MB storage SSD and 1 TB SSHD-8GB.

Fabric shield composed by one sheet with yarn and coating

The basic aim of this example is to apply the formulations presented in this article to simulate, numerically, structural fabric shields and investigate in details these systems and the behavior of the yarn-segment with coating.

This model consists of one sheet of fabric shield and a spherical projectile with an incoming velocity of vp=500m/s, see Figure 10. In this model, the boundaries of the fabric shield are completely restricted. It is worth mentioning that the geometry and some material parameters are based on the work developed by Zohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.). This is done with the objective to compare the numerical results and the final deformed configuration shape. Although damping and gravity effects are considered in this analysis, it is important to remark that their contribution are negligible in the present case study, because of the high projectile speed.

Figure 10
Numerical model geometry: impact of a spherical projectile with an incoming velocity of 500m/s into a fabric shield (one sheet).

The geometry of the system is presented in Figure 10 and the parameters used in the numerical simulation are given as following.

  • Numerical solution scheme:

  • ¬ trapezoidal time-stepping parameter ϕ=0.5 (mid-point rule);

  • ¬ initial time-step size of Δt=1010seconds;

  • ¬ iterative limit per time-step Kd=20;

  • ¬ iterative tolerances per time-step TOLr=106, TOLv=106, TOLw=106;

  • ¬ gravity acceleration of g=(0;0;9.81)m/s;

  • ¬ damping coefficient ci=0.01Ns/m.

  • Fabric shield:

  • ¬ size of the sheet: 0.254m×0.254m;

  • ¬ lumped masses: 100×100 (100 nodes in each direction);

  • ¬ initial length Lr=0.00254m (stretched, but without tension).

  • Yarn properties:

  • ¬ the yarn-segment is made by Zylon;

  • ¬ Young’s modulus of a Zylon microfibril Dyarn=180GPa;

  • ¬ radius of a Zylon microfibril Rfibril=3.9555105m;

  • ¬ yarn with approximately Nfibril=350 microfibrils;

  • ¬ radius of the yarn-segment Ryarn=7.4104m;

  • ¬ critical stretch to failure of a Zylon micro-fibril of Ucrit=1.034;

  • ¬ rupture around Urupture=1.06;

  • ¬ maximum Cauchy stress σy=6435.66MPa;

  • ¬ density of a Zylon microfibril ρyarn=1540kg/m3;

  • ¬ damage rate for the yarn-segment λ=135;

  • ¬ plastic rate for the yarn-segment P=0.

  • Coating properties:

  • ¬ the coating-segment is made by a metal material;

  • ¬ Young’s modulus of the coating Dyarn=50GPa;

  • ¬ thickness of the coating T=1.85104m (25% of the radius of the yarn-segment);

  • ¬ critical stretch to failure Ucrit=1.002;

  • ¬ rupture around Urupture=1.04;

  • ¬ maximum Cauchy stress σy=100.30MPa;

  • ¬ density of the coating ρcoating=5000kg/m3;

  • ¬ damage rate for the coating-segment λ=135;

  • ¬ plastic rate for the coating-segment P=0;

  • Projectile:

  • ¬ Young’s modulus of Dp=210GPa;

  • ¬ specific mass of ρp=4522.55kg/m3;

  • ¬ diameter of the spherical projectile dp=0.025m;

  • ¬ mass of the projectile mp=0.037kg;

  • ¬ dynamic viscosity of the air ce=0.00265Ns/m2;

  • ¬ local average velocity of the external interstitial medium of ve=0m/s;

  • ¬ projectile velocity of vp=500m/s.

Figure 11
Motion configurations over time.

After the numerical simulation, some configurations were selected to illustrate the motion of the projectile and the behavior of the fabric shield, see Figure 11. Each sheet of fabric shield contains 10.000 nodes and 19.800 elements.

It is observed in Figure 11a that the projectile is in eminence for impact on the fabric shield. In Figure 11b, the projectile penetrates the fabric shield and in Figure 11c, it overtakes it completely. In Figure 11d, the projectile is viewed well away from the fabric, leaving a hole.

The damages of the yarns and coatings at time 3.2104s are presented in Figure 12a and Figure 12b, respectively. It can be seen that the yarns that were not destroyed during the impact, were not damaged, i.e., the damage parameter continues equal to 1. The coating segments have already suffered damage, especially in the region around the hole. The farthest coating segments from the hole were not damaged.

Figure 12
Damage of yarn and coating at time 3.2104s.

The stresses of the yarns and coatings at time 3.2104s are presented in Figure 13.

Figure 13
Cauchy stress of yarn and coating at time 3.2104s.

To represent geometrically the physical phenomenon, generated by the ballistic impact between the projectile and the fabric shield, some configurations were selected over time, as shown in the Figure 14.

Figure 14
Particle and fabric shield configurations over time (with one layer).

The velocity of the projectile after crossing the fabric shield is vp=367.13m/s. As shown in the figures, it is observed that the projectile pierced the fabric shield. Analyzing the value of the velocity of the projectile, it is observed that only one layer of shield reduced the velocity by approximately 26.6%. So, as a way to stop the projectile, and consequently prevent full penetration into the fabric shield, it is necessary to add more sheets (layers) of fabric shield. This discussion will be presented in the next section.

Modeling using LS-DYNA

The same example was modelled using LS-DYNA. The projectile was defined as a solid element (as particle) and the structural fabric as a shell element, with a standard Belytschko-Tsay membrane formulation suitable for fabrics and materials where the flexural stiffness is negligible. To reduce the storage cost and the analisys time requirement, shell elements where used instead of bars. For the structural fabric, its material model was chosen from the options with viscoplastic deformation rate (“power law plasticity”). In order to describe the interaction between the bodies during the impact, the automatic type of surface-to-surface contact was used.

The numerical results of this modeling are illustrated in Figure 15 and Figure 16.

Figure 15
Front view of the impact of the projectile against a sheet of Zylon.

The rupture configuration shown in Figure 15 has the same shape of the one obtained by the program developed in this research, see Figure 11, Figure 12 and Figure 13.

The lateral view presented in Figure 16, generated by the LS-DYNA analysis, has the same behavior as the one obtained by the numerical program developed in this research, see Figure 14.

It can be observed that the rupture format is very similar between the two kind of analysis, one modelled with shells (LS-DYNA) and the other one by bars (this research). The small difference can be associated with the different way to model the fabric structure. The author affirm that the rupture configuration obtained in this research has more accuracy with the real phenomenon, observed experimentally in Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.).

Figure 16
Side view of the impact of the projectile against a sheet of Zylon.

Fabric shield composed by several sheets with yarn and coating

Since the objective of the analysis is to dimension a bulletproof vest capable of stopping the projectile, one begins to investigate how many layers of shield are necessary to stop the projectile. For this purpose, another layer of fabric shield is added 0.0004 meters away from the previous one. It should be noted that in each layer is considered the same physical and geometric properties of the fabric shield presented in the previous section. In this way, this procedure is done several times until the goal of stopping the projectile is reached. So, twelve kind of reinforcement situations were modeled for the fabric shield, where in each of them another layer of fabric was added keeping the same distance from the previous one.

For the sake of simplicity, in this example, only the numerical results for 12-layer fabric shield will be presented. In that model, the discretization contains 120.000 nodes and 237.600 elements.

Figure 17
Numerical results for the model of twelve layers at time 7.7105s.

The Figure 17 shows the projectile in a configuration where its velocity is almost zero. The Figure 17a illustrates the Cauchy stress on the yarn and Figure 17b illustrates the Cauchy stress on the coating. Figure 17c shows that the yarns were undamaged and Figure 17d illustrates how the coating has been damaged.

To represent geometrically the physical phenomenon, generated by the ballistic impact between the projectile and the fabric shield with twelve sheets, some configurations were selected over time, as shown in the Figure 18. It is concluded in this model that nine layers of fabric shield are required to completely stop the projectile. With twelve sheets, the projectile stops completely and the reaction of the fabric shield change the direction of its velocity. In this way, the structural fabric pushes the projectile to the opposite direction from the initial one. After the velocity reaches the null value, it is inverted and its value begins to increase gradually, as expected for the physical behavior.

Figure 18
Particle and fabric shield configurations over time (with twelve layers).

To better understand the analyzes performed, a comparative study of the velocity of the projectile over time was done for each model studied. Figure 19 describes the velocity of the projectile over the time for the twelve models realized. The values of the velocities were plotted from the time t=1.15104s to vp=131,50m/s. It is noticed that with the addition of fabric shield layers a significant drop in speed occurs. From the ninth layer this speed drop becomes small.

Figure 19
Relationship between velocity and time for each model from 1 sheet to 12 sheets.

The Figure 20 shows the configuration of the system, composed by the projectile and six layers of fabric shield, at time 1.15104s. Figure 20a shows that the projectile has penetrated more than half in all fabric layers, and for this reason, its velocity will remain constant and equal to 1.82104s, since there is no more fabric capable of resisting its movement. It is observed in Figure 20b that the fabric around the projectile is destroyed.

Figure 20
Structural fabric configuration at time v for the model with 6 sheets.

The Figure 21 illustrates the exact configuration in which the projectile is completely stopped by the fabric shield composed by nine layers. Analyzing Figure 21a, it is perceived that the projectile penetrated less than half of its diameter. For this reason, the last layers of fabric still offer resistance to the projectile penetration. As explained earlier, once the projectile penetrates beyond its half in the last layer of the fabric shield, practically the projectile will continue without any resistance and with constant velocity, see the time-history of projectile velocities for each model in Figure 19.

Figure 21
Structural fabric configuration at time 1.82104s for the model with 9 sheets.

Another study was carried out observing the projectile in the configuration defined at time 7.7105s. At this specific time, the velocity of the projectile in each model was measured. In this way, a curve was constructed that related the number of layers of fabric shield with the respective speed of the projectile, as shown in Figure 22. It is observed in this curve that the relationship between the velocity (v) and the number of layers of fabric shield (x) is non-linear. A study was carried out to define the trend line of the curve, thus obtaining a fifth-degree polynomial, defined by the equation v=0,0123x5+0,4375x45,7882x3+37,509x2156,82x+493,45. With this, it has been proven that there is a highly non-linear relationship when layers are added to the fabric shield.

Figure 22
Relationship between velocity and number of sheets at time 7.7105s and the tendency curve.

Another pertinent investigation is to observe the shape that the fabric shield ruptures. The hole in the fabric shield (composed by one layer) caused by the ballistic impact obtained through numerical simulation is represented in the Figure 23a. The experimental trial was conducted by Zohdi and Powell (2006Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.) and the photograph of the fabric shield, after their experimental test, is shown in the Figure 23b, being used by the authors as a valid comparison for their work. Comparing the two figures, one obtained by numerical simulation and other by experimental results, it is concluded that both rupture configurations of the of fabric shields are practically the same.

The Figure 23c and Figure 23d illustrate the configuration of the projectile when it is almost stopped.

Figure 23
Results obtained numerically and experimentally.

The shape of the hole left in the structural fabric after the ballistic impact of the projectile was the same in all models. Of course, the velocity of the projectile had a distinct behavior, as shown in Figure 19.

Modeling using LS-DYNA

The same previous example was modelled using LS-DYNA. It´s important to remark that the objective in this section is to investigate the rupture shape of the fabric shield and the number of sheets necessary to completely stop the projectile. The numerical results of this modeling are illustrated in Figure 24.

The analisys from LS-DYNA gives a similar result to the one presented by the program developed in this research. The only diffence is the number of sheets necessary to stop the projectile, in which LS-DYNA required a higher number of sheets, it means that, in this research, the number of sheets necessary to completely stop the projectile is 9, while in LS-Dyna it is 13. Despite this, the same behaviour occurs in both analisys, i.e., the projectile pierces the fabric structure, stops and then, bounces backward.

Figure 24
Front view of the impact of the projectile against multiple sheets of Zylon.

CONCLUSIONS

The basic aim of this research was to present a methodology to dimension bulletproof vests formed by fabric shields, capable of resisting ballistic impacts. For this purpose, a complete revision was made in the theoretical formulation applied to the fabric shields to obtain a result very close to reality, especially when compared with the LS-DYNA results and the experimental ballistic test performed by Zohdi (2014cZohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.). Particular attention was given to the constitutive equation of the material, the yarn and the coating. The reason for this was to respect the maximum stress that the material can withstand, especially at the moment of impact. To this end, the elastoplastic theory was adapted to the constitutive equation of the material. Then, the damage parameter was added in the material constitutive equation. In this sense, this research contributed a lot to the scientific community, in order to more accurately determine the number of sheets in the bulletproof vest to stop a projectile. If tensile stresses were not respected, a smaller layer of fabric shield would probably be required. Thus, the author conclude that the numerical results obtained, after comparison with LS-DYNA, were very satisfactory.

It was observed that, as one layer of fabric is very close to the other, a representative number of layers is necessary to prevent the bullet from overtaking the vest. It suggests for future work the study of a configuration for these structures so that the layers can be further apart from each other, increasing the efficiency of the system and consequently, the resistance of the shield.

ACKNOWLEDGEMENTS

The author wishes to express sincere appreciation to the independent public foundation Capes (Coordenação de Aperfeiçoamento de Pessoal de Nível Superior, Ministry of Education of Brazil, Brasília-DF, Brazil), which mission is to foster research and the scientific and technological development. This work was supported by Capes, under the grants BEX 2565/15-3. The authors would like to thank the CRML (Computational Materials Research Laboratory, University of California at Berkeley, USA), specially Tarek Ismail Zohdi for the collaboration and support during my post-doctorate.

RFERENCES

  • Zohdi, T. I.; Powell, D. (2006). Multiscale construction and large-scale simulation of structural fabric undergoing ballistic impact. Comput. Methods Appl. Mech. Engrg., v. 195 (1-3): 94-109.
  • Zohdi, T. I. (Mar. 26, 2003). Genetic design of solids possessing a random-particulate microstructure. The Royal Society.
  • Zohdi, T. I.; Wriggers, P. (2001b). Modeling and simulation of the decohesion of particulate aggregates in a binding matrix. Engineering Computations, vol. 18 : 79-95.
  • Bandeira, A. A.; Zohdi, T. I. (2019). 3D numerical simulations of granular materials using DEM models considering rolling phenomena. Computational Particle Mechanics, vol. 6 : 97-131.
  • Kato, S.; Yoshino, T.; Minami, H. (1999). Formulation of constitutive equations for fabric membranes based on the concept of fabric lattice model. Engineering Structures, vol. 21 : 691-708.
  • Pargana, J. B. (2007). Advanced material model for coated fabrics used in tensioned fabric structures. Engineering Structures, vol. 29 : 1323-1336.
  • Zohdi, T. I. (2014c). Impact and penetration resistance of network models of coated lightweight fabric shielding. GAMM-Mitt., v. 37, n. 1: 124 - 150.
  • Kollegal, M. G.; Sridharan, S. (2000). Strength prediction of plain woven fabrics. J. Compos. Mater., v. 34: 240-257.
  • Lanir, Y. (1983). Constitutive equations for fibrous connective tissues. J. Biomech, v. 16 (1): 1-12.
  • Lim, C. T.; Shim, V. P.; Ng, Y. H. (2003). Finite element modeling of the ballistic impact of fabric armour. Int. J. Impact Engrg., v. 28, n. 1: 13-31.
  • Powell, D.; Zohdi, T. I. (2009a). A note on flaw-induced integrity reduction of structural fabric. The International Journal of Fracture/Letters in Micromechanics, v. 158: L89-L96.
  • Powell, D.; Zohdi, T. I. (2009b). Attachment mode performance of network-modeled ballistic fabric shielding. Composites Part B: Engineering, v. 40, Issue 6: 451-460.
  • Tabiei, Y. J. (1999). Woven fabric composite material model with material nonlinearity for finite element simulation. Int. J. Solids Struct., v. 36: 2757-2771.
  • Zohdi, T. I. (2002b). Modeling and simulation of progressive penetration of multilayered ballistic fabric shielding. Comput. Mech., v. 29: 61-67.
  • Zohdi, T. I. (2007). A computational framework for network modeling of fibrous biological tissue deformation and rupture. Computer Methods in Applied Mechanics and Engineering, v. 196: 2972-2980.
  • Zohdi, T. I. (2009). Microfibril-based estimates of the ballistic limit of multilayered fabric shielding. The International Journal of Fracture/Letters in Micromechanics, v. 158: L81-L88.
  • Zohdi, T. I.; Steigmann, D. J. (2002). The toughening effect of microscopic filament misalignment on macroscopic fabric response. Int. J. Fract., v. 115: L9-L14.
  • Zohdi, T. I.; Wriggers, P. (2001a). Computational micro-macro material testing. Arch. Comp. Meth. Eng., v. 9: 131-229.
  • Zohdi, T. I.; Wriggers, P. (2008). Introduction to computational micromechanics. Second Reprinting. ed. Berlin: Springer,
  • Atai, A. A.; Steigmann, D. J. (1997). On the nonlinear mechanics of discrete networks. Arch. Appl. Mech., v. 67: 303-319.
  • Taylor, W.J., Jr.; Vinson, J. R. (1990). Modelling ballistic impact into flexible materials. AIAA J., vol. 28 : 2098-2103.
  • Zohdi, T. I. (2010a). High-speed impact of electromagnetically sensitive fabric and induced projectile spin. Comput Mech, vol. 46 : 399-415.
  • Wriggers, P. (2002). Computational Contact Mechanics. [S.l.]: John Wiley & Sons Ltd, England,
  • Zohdi, T. I. (2010b). On the dynamics of charged electromagnetic particulate jets. Arch. Comput. Methods Eng., vol. 17 : 109-135.
  • Zohdi, T. I. (2014a). A direct particle-based computational framework for electrically-enhanced thermo-mechanical sintering of powdered materials. Math. Mech. Solids : 1-21.
  • Zohdi, T. I. (2002a). An adaptive-recursive staggering strategy for simulating multifield coupled processes in microheterogeneous solids. Int. J. Numer. Methods Engrg., v. 53: 1511-1532.
  • Zohdi, T. I. (2014b). Additive particle deposition and selective laser processing-a computational manufacturing framework.Comput. Mech., vol. 54 : 171-191.
  • Chen, W. F.; Han, D. J. (1988). Plasticity for Structural Engineers. New York: Springer-Verlag,
  • Hill, R. (1950). The mathematical theory of plasticity. [S.l.]: Oxford University Press, Oxford (UK),
  • Kachanov, L. M. (2004). Fundamentals of the Theory of Plasticity. [S.l.]: Dover Publications,
  • Lubliner, J. (1984). A maximum-dissipation principle in generalized plasticity. Acta Mechanica, vol. 52 : 225-237.
  • Pimenta, P. M. (1992). Finite Deformation Soil Plasticity on Principal Axes. III Complas. Barcelona, Espanha: [s.n.].
  • Simo, J. C.; Ortiz, M. (1985). A unified approach to finite deformation elastoplasticity based on the use of hyperelastic constitutive equations. Comp. Meth. Appl. Mech. Engrg., vol. 49 : 221-245.
  • Simo, J. C.; Taylor, R. L. (1985). Consistent Tangent Operators for Rate-Independant Elasto-plasticity. Computer Methods in Applied Mechanics and Engineering, vol. 48 : 101-18.
  • Simo, J. C. (1992). Algorithms for static and dynamic multiplicative plasticity that preserve the classical return mapping schemes of the infinitesimal theory. Computer Methods in Applied Mechanics and Engineering, North-Holland, vol. 99 : 61- 112.
  • Wriggers, P.; Eberlein, R.; Reese, S. (1996). A comparison of three-dimensional continuum and shell elements for finite plasticity. Int. J. Solids and Structures, vol. 33 : 3309-3326.

APPENDIX A: NUMERICAL SOLUTION SCHEME ALGORITHM

Algorithm 2
Numerical solution scheme.

APPENDIX B: OVERHAUL OF SOLID MECHANICS

From the continuum mechanics, the second Piola-Kirchhoff stress tensor S is defined by

S = F 1 P , (110)

where P is the first Piola-Kirchhoff stress tensor that correlates nominal stress per unit reference area and F is the deformation gradient defined as

F = x = x x r . (111)

In above equation, x and xr are the position vector of the nodes in current configuration and reference configuration, respectively. The Cauchy stress tensor σ associates the superficial force vector t (or stress vector per unit of area in the current configuration) with the unit normal vector at the surface in current configuration n defined by

t = σ n . (112)

Using the Nanson theory and considering

J = det F (113)

and

t r = P n r , (114)

is possible to demonstrate the following relation

P = J σ F T . (115)

The Kirchhoff-Trefftz stress tensor is defined by

Σ = P F T = F S F T = J σ . (116)

Note that the second Piola-Kirchhoff stress tensor S is symmetric and doesn’t have a physical interpretation, the first Piola-Kirchhoff stress P is nonsymmetrical, the Kirchhoff-Trefftz stress tensor Σ is symmetrical, the Cauchy stress tensor σ is symmetrical and they are energetically conjugate by this relation S:E˙=P:F˙. The displacements gradient L is defined by

L = u = F I , (117)

where u is the displacements vector of the nodes and I is the identity matrix. The quadratic stretches tensor or right Cauchy-Green strain C is defined by

C = F T F . (118)

The Green-Lagrange strain tensor is calculated by

E = 1 2 ( C I ) . (119)

The stretch tensor U is calculated by

U 2 = C . (120)

The Green-Lagrange strain tensor can be written also as

E = 1 2 ( U 2 I ) . (121)

The following strains belong to the Hill family:

ε m = { 1 m ( λ m 1 ) , i f m 0 ln ( λ ) , i f m = 0 , (122)

where m is a integer value and λ is the stretch. The equation (121) corresponds to (122) when the parameter m is equal to 2.

The rotation tensor R can be calculated by the following polar decompositions

F = R U = V R , (123)

where V is the left stretch tensor. The rotation tensor is orthogonal, i.e., detR=+1.

For hyperelastic materials, the following relations that correlates stresses with strains are valid:

P = ψ F , (124)

S = ψ E , (125)

where ψ(F) and ψ(E) are the function of specific strain energy. A hyperelastic material is necessarily elastic and reversible. The tensor that represents the tangential stiffness is given by

D = 2 ψ F 2 = P F , (126)

D = 2 ψ E 2 = S E . (127)

APPENDIX C: OVERHAUL OF ELASTIC-PLASTICITY MATERIAL

Introduction

In order to incorporate the plasticity in the yarn segments, an overhaul of elastoplastic constitutive equation for large deformation is needed.

Elastic-plastic behavior is characterized by a response from the material, initially elastic, and from a certain level of tension by essentially plastic behavior. The plastic behavior of the material is usually accompanied by an invariance of its volume. The typical behavior of an elastoplastic material submitted to uniaxial tension is shown in Figure 25. The Figure 25b represents the elastic-plastic model with hardening.

Figure 25
Uniaxial test of elastic plastic material: a) elastic-perfectly-plastic model, b) elastic-plastic model with hardening.

When the initial limit tension σy0 is reached, the limit tension value σy may or may not remain constant with increasing deformation. If this value does not depend on the increase of the plastic extension, the material has a perfectly plastic behavior, see Figure 25a. If, on the other hand, the value of the tension increase with the growth of the plastic extension, it is said that the material is undergoing a hardening, see Figure 25b.

Over time, several studies on elastoplasticity have been carried out. One can cite, for example, the works done by Chen and Han (1988), Hill (1950), Kachanov (2004), Lubliner (1984), Pimenta (1992), Simo and Ortiz (1985), Simo and Taylor (1985), Simo (1992) and Wriggers, Eberlein and Reese (1996). In this section, a succinct approach on the formulation of elastoplasticity under large deformation will be presented. Through this formulation, the elastoplasticity algorithm used in this research will be developed. It should be noted, that after obtained the plasticity algorithm, some modifications will be done, i.e., the function corresponding to the hardening parameter will be adapted and the damage parameter will be included, as presented in chapter 4.

Kinematics

Consider the composition

F = F e F n , (128)

where F is total deformation gradient, Fe is the elastic part of the deformation gradient from the natural to the current configuration and Fn=Fp corresponds to the plastic part from the initial reference configuration to the natural one, see Figure 26.

Figure 26
Geometrical interpretation of the tensors for elastic-plastic constitutive equations.

In most cases, one sets Fp(0)=I. The elastic and the plastic parts have the following polar decompositions

F e = R e U e = V e R e , (129)

F p = R p U p = V p R p , (130)

where Ue is the right elastic stretching tensor, Ve is the left elastic stretching tensor, Re is the elastic rotation tensor, Up is the right plastic stretching tensor, Vp is the left plastic stretching tensor and Rp is the plastic rotation tensor.

As the natural configuration is not fixed, this means that F˙p0 whenever the material yields. So, at each instant, is considered a new fixed reference configuration that is set instantaneously coincident with the current natural one. The deformation gradient from this new reference configuration is now denoted by Ft and given by

F t = F F n 1 , (131)

see again Figure 26 for a geometrical representation. This gradient has the following polar decomposition

F t = R t U t . (132)

At each instant, the following identities hold

F t = F e , (133)

R t = R e , (134)

U t = U e . (135)

Considering these relations vx=vxrxrx=F˙F1 and vxn=vxrxrxn=F˙Fn1, where vxr=F˙ and vxn=F˙t, the velocity gradient from the instantaneously fixed natural configuration is

F ˙ t = F ˙ F n 1 . (136)

Changing Fp and F˙p to the same reference configuration, one concludes that

F t p = R t p = U t p = I , (137)

F ˙ t p = F ˙ p F p 1 . (138)

Hence, one has

F ˙ t = F ˙ e + F e F ˙ t p F e 1 . (139)

Since the equation (137) is valid, one has

E t p = U t p . (140)

For the same reason one may instantaneously write

E ˙ t p = U ˙ t p . (141)

The elastic Green-Lagrange strain tensor, as shown in equation (121), is defined by

E e = 1 2 ( U e 2 I ) . (142)

Considering cie the principal axes of the right Cauchy-Green strain tensors C, once Ue has the spectral decomposition Ue=λieciecie, where λie=cie, and using the relations present in (121) one may write Ee as the spectral decomposition below

E e = ε m e c i e c i e , (143)

where

ε m e ( λ i e ) = { 1 m ( λ i e m 1 ) , i f m 0 ln ( λ i e ) , i f m = 0 . (144)

The total strain from the fixed natural configuration is defined by

E t = E t ( U t ) . (145)

In view of (133), at current time, the following identity holds

E t = E e . (146)

Isotropic plasticity

In plasticity the elastic domain encompasses all admissible stress states and is described by the yield function

F ( S e , α ) 0, (147)

where F:S×nh and α is the (nh×1) vector of the hardening parameters. F does not depend on hardening parameters in the particular case of ideal plasticity. The surface in S described by F(Se,α)=0 is called yield surface.

In isotropic plasticity, first is assumed that elasticity is isotropic and described by

S e = D e E e , (148)

S ˙ e = D e E ˙ e , (149)

and the yield function (147) is written as displayed below

F ( S e , α ) = σ ¯ ( S e ) σ y ( α ) 0, (150)

in which σ¯ is an isotropic function of its argument and equal to the uniaxial stress in a simple tension test. This means the following

S e = σ e e σ ¯ = σ , (151)

where e is the unitary vector in the axial direction of the test and σ is the corresponding uniaxial stress. σ¯ is then called equivalent stress. On the other hand σy is the yield stress measured in a simple tension test and α is the isotropic hardening parameter. The plastic dissipation per unit volume in the natural configuration is given by the internal dissipation, as displayed below

D n = P int n ψ ˙ = S e : ( E ˙ t E ˙ e ) , (152)

where ψ(Ee) is the strain energy function per unit volume in the natural configuration of an elastic material and the operator is defined as A:B=tr(ATB), where tr() indicates the trace operator. In order to formulate the constitutive rate equations of plasticity, is stated that the Principle of Maximum Plastic Dissipation

max S e S ( D n ) , s u b j e c t t o F ( S e ) 0, (153)

is a necessary and sufficient condition for the determination of Se. Mathematical Programming asserts that (153) can be transformed to the following unconstrained problem

S e [ S e : ( E ˙ t E ˙ e ) + λ F ] = 0, (154)

where λ is the Lagrange multiplier. Thus, one has

E ˙ t E ˙ e = λ N , (155)

where

N = F S e = σ ¯ S e . (156)

N is the normal to the yield surface F=0 in the stress space. Since F is an isotropic function of Se and the elasticity is isotropic, N, Se and Ue are coaxial. Thus, (155) implies that E˙tE˙e, N, Se and Ue are coaxial. It is easy to demonstrate the following result

E ˙ t = E ˙ e + E ˙ t p , (157)

which is similar to the additive decomposition of the total strain in small strain plasticity. From

S ˙ t p = D e ( E ˙ t E ˙ e ) (158)

and

S ˙ e = D e ( E ˙ t ( E ˙ t E ˙ e ) ) , (159)

one arrives at

S ˙ t p = D e E ˙ t p (160)

and

S ˙ e = D e ( E ˙ t E ˙ t p ) . (161)

From (157), (160) and (161), one necessarily has

E ˙ t p = λ N . (162)

Mathematical Programming asserts also that F must be convex and the following Kuhn-Tucker optimality conditions must hold λ0, F0 and λF=0. So, from (162) follows

E ˙ t p = λ N . (163)

When λ=0, i.e., when F<0, or when F=0 and F˙<0, there is no plastic strain rate and E˙tp=0. Hence, one has E˙t=E˙e. From S˙e=DeE˙e follows S˙t=DeE˙t. When λ>0, i.e., when F=0 and F˙=0, one has from (150), by differentiation, the following equation

F ˙ = N : S ˙ e h α ˙ = 0, (164)

where

h = d σ y d α . (165)

Defined α such that

D n = ( N : S e ) α ˙ , (166)

then, from (155) follows

λ = α ˙ . (167)

Introducing (161) in (164), one has

F ˙ = N : D e ( E ˙ t E ˙ t p ) h α ˙ = 0. (168)

With the aid of (162) the equation (168) can be rewritten by

F ˙ = N : D e E ˙ t N : D e λ N h α ˙ = 0 . (169)

Introducing (167) into (169), obtain

F ˙ = N : D e E ˙ t ( N : D e N + h ) α ˙ = 0 . (170)

The above equation leads to the following result

α ˙ = 1 N : D e N + h N : D e E ˙ t . (171)

Note that for α˙>0 and introducing the equations (162) and (167) into (161) can be rewritten by

S ˙ t = D e ( E ˙ t α ˙ N ) . (172)

Thus, one may write

S ˙ t = { D e E ˙ t , i f F < 0 o r i f F = 0 a n d F ˙ < 0, D e p E ˙ t , i f F = 0 a n d F ˙ = 0, (173)

where

D e p = D e 1 N : D e N + h ( D e N ) ( D e N ) . (174)

Dep is called the tensor of elastic-plastic tangent moduli for the pair {St,Et}. If one rephrases (153) as

min S e S ( ψ * S e : S ˙ t p ) , s u b j e c t t o F ( S e ) 0. (175)

From (175) results the following unconstrained minimization problem

min S e S ( ψ * S e : S ˙ t p + λ F ( S e , α ) ) . (176)

Mathematical Programming then asserts that

S e ( ψ * S e : S ˙ t p + λ F ) = 0, (177)

which leads to

2 ψ * S e 2 : S ˙ t p + λ N = D e 1 S ˙ t p + λ N = 0. (178)

Introducing S˙tp=De(E˙tE˙e) in the equation above, one arrives at (155). In metal plasticity, is assumed that the plastic part of the deformation gradient is isochoric. Thus, one has

J p = det U p = 1, (179)

which implies

S p h ( ln U p ) = S p h ( ln U ˙ p ) = S p h ( E ˙ t p ) = 0 (180)

and

Σ i = Σ i e . (181)

According to (155), if N is deviatoric, then E˙tp is deviatoric too. This implies (179). In the case of isochoric plasticity, one has Pintr=Pintn and Dr=Dn.

Stress integration

In plasticity, the constitutive equations are rate equations. So, it is necessary to formulate a stress integration algorithm in order to obtain an approximate solution for the quasi-static problem at discrete instants {t0,t1,t2,,ti,ti+1,}.

Consider the material state at instant ti, at which Fi, Uip and αi are supposed to be known. Hence, from (128) one has

F i e = F i U i p 1 . (182)

If the polar decomposition

F i e = R i e U i e (183)

is performed, the stress tensor at this instant can be computed through

S i e = ψ E e ( E i e ) , (184)

where

E i e = 1 2 ( U i e 2 I ) . (185)

The above equation lies to

E ˙ i e = U i e U ˙ i e . (186)

At instant ti+1 only the deformation gradient Fi+1 is assumed to be known. The following trial elastic state is defined, assuming that the plastic part of the deformation has not changed,

F t e = F i + 1 U i p 1 . (187)

The polar decomposition

F t e = R t e U t e , (188)

is then performed and the strain tensor Ete is computed with the aid of

E t e = 1 2 ( U t e 2 I ) . (189)

The stress tensor in this state is given by

S t = ψ E e ( E t e ) . (190)

If Ft=F(St)<0, then the trial state is admissible, Δα=0, and

S i + 1 e = S t , α i + 1 = α i a n d U i + 1 p = U i p . (191)

If Ft0, there is an incremental plastic stretch ΔUp such that

F i + 1 e = F t e Δ U p 1 a n d F i + 1 p = Δ U p U i p . (192)

The plastic stretch tensor at the end of the increment, denoted by Ui+1p, is obtained from Fi+1p through

U i + 1 p = ( F i + 1 p T F i + 1 p ) 1 2 . (193)

The incremental stress integration algorithm is formulated by the following constrained minimization problem, which must be solved for Si+1e,

min ψ * ( Δ S p ) s u b j e c t t o F ( S i + 1 e , α i + 1 ) = 0, (194)

where

Δ S p = S i + 1 e S t . (195)

The equation (195) is based on (175) and is equivalent to the following unconstrained minimization problem

min [ ψ * ( Δ S p ) + Δ α F ( S i + 1 e ) ] , (196)

where Δα is the Lagrange multiplier. (196) leads to the following system

{ ψ * S e ( S i + 1 e S t ) + Δ α N i + 1 = 0, F ( S i + 1 e , α i + Δ α ) = 0. (197)

In (197), the following normal has been introduced

N i + 1 = F S e ( S i + 1 e ) . (198)

The solutions of (197) are Si+1e and Δα. If ψ* and F are convex, (194) has a unique solution and the Newton Method applied to (197) is globally convergent. From (194) results the following Kuhn-Tucker optimality conditions

Δ α 0, F 0 a n d Δ α F = 0. (199)

When ψ* is given by

ψ ( E e ) = 1 2 E e : D e E e a n d ψ * ( S e ) = 1 2 S e : D e 1 S e , (200)

delivers

{ D e 1 ( S i + 1 e S t ) + Δ α N i + 1 = 0, F ( S i + 1 e , α i + Δ α ) = 0. (201)

Equation (201) is the incremental counterpart of (178). Hence, one may write

Δ E t p = D e 1 ( S i + 1 e S t ) = Δ α N i + 1 , (202)

where (202) is the incremental counterpart of (178). After solving (197), one has Si+1e and Δα. Afterwards, the following quantities can be computed

Δ E t p = Δ α N i + 1 , Δ U p = U i p 1 Δ E t p , F i + 1 p = Δ U p U i p , U i + 1 p = ( F i + 1 p T F i + 1 p ) 1 2 , α i + 1 = α i + Δ α . (203)

Note that, when Ni+1 is deviatoric, ΔEtp is also deviatoric and ΔUp is isochoric. It is important to remark additionally that Ni+1, Si+1e, St, ΔUp and ΔEtp are coaxial. Equation (201) yields also

S i + 1 e = S t D e Δ E t p = S t Δ α D e N i + 1 . (204)

The analytical solution of (204) is given by

S i + 1 e = S p h ( S t e ) + σ y i + 1 σ ¯ t D e v ( S t e ) , (205)

where

σ y i + 1 = σ y ( α i + 1 ) = σ y ( α i + Δ α ) a n d F t = σ ¯ t σ y ( α i ) . (206)

This solution is known as the radial return method. Thus, from (204), one has

S t Δ α D e N i + 1 = S p h ( S t e ) + σ y i + 1 σ ¯ t D e v ( S t e ) . (207)

Considering that

S t = S p h ( S t e ) + D e v ( S t e ) , (208)

equation (207) can be rewritten as

S p h ( S t e ) + D e v ( S t e ) Δ α D e N i + 1 = S p h ( S t e ) + σ y i + 1 σ ¯ t D e v ( S t e ) . (209)

The value of Δα is obtained from the above equation, just solving the following relation

Δ α D e N i + 1 = ( 1 σ y i + 1 σ ¯ t ) D e v ( S t e ) = ( F t σ ¯ t ) D e v ( S t e ) . (210)

The so-called tensor of algorithmic tangent moduli is defined by

D a lg = S i + 1 e E t . (211)

Remember that (211) is referenced to the natural configuration at the instant ti and is valid for the logarithmic stress and strain tensors from this configuration.

Plasticity algorithmic

The geometrical interpretation of the update procedure is shown in Figure 27.

Figure 27
Interpretation of the update procedure for elastic-plastic constitutive equations.

For computational purposes the radial return algorithm on principal axes for the von Mises plasticity with isotropic hardening is summarized below.

Algorithm 3
Plasticity algorithmic.

Edited by

Editor:

Marcílio Alves.

Publication Dates

  • Publication in this collection
    24 June 2020
  • Date of issue
    2020

History

  • Received
    20 Feb 2020
  • Reviewed
    25 Apr 2020
  • Accepted
    28 Apr 2020
  • Published
    04 May 2020
Individual owner www.lajss.org - São Paulo - SP - Brazil
E-mail: lajsssecretary@gmsie.usp.br