2012
DOI: 10.4028/www.scientific.net/amm.215-216.1136
|View full text |Cite
|
Sign up to set email alerts
|

The Analysis on the Typical Parts in F1 Race Car

Abstract: This document explains and demonstrates how to analyze the stress of the axle, modify the rear wing and SolidWorks dynamic simulation analysis for the F1 Race Car. It offers a variety of results visualization tools that allow investigators to gain valuable insight into the design of the F1 race car, and makes it easy to share analysis results effectively with everyone involved in the F1 race car product development process.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…To handle this issue, many key agreement protocols in three-party settings have been developed. [25][26][27][28][29][30][31][32] In a three-party key agreement protocol, two users can authenticate each other and establish a session key with the aid of a trusted server. In this way, each user only needs to remember a password with the server, which eliminates the key management problems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To handle this issue, many key agreement protocols in three-party settings have been developed. [25][26][27][28][29][30][31][32] In a three-party key agreement protocol, two users can authenticate each other and establish a session key with the aid of a trusted server. In this way, each user only needs to remember a password with the server, which eliminates the key management problems.…”
Section: Introductionmentioning
confidence: 99%
“…In 2012, Lai et al first presented a three-party key agreement protocol by using the extended chaotic map. [25] Later, Zhao et al pointed out that Lai et al's protocol cannot withstand the off-line password guessing attack. [26] To overcome the weakness, Zhao et al also proposed an improved protocol.…”
Section: Introductionmentioning
confidence: 99%