Development And Analysis of Waste Human Hair Fiber Reinforced Composite


  • Tesfaye Worku* Department of Textile Engineering, Kombolcha Institute of Technology, Wollo University, Kombolcha, Ethiopia.



Feathers from other birds and animals, including human hair and chicken feathers, are frequently regarded as waste materials, and popular disposal techniques like burning and burying them contribute to environmental contamination. Nevertheless, fiber-reinforced textile composite materials can be made from these waste resources Human hair fibers were used to create a composite in this study, and the mechanical and physical characteristics of the final composite sample were examined. Different ratios of unsaturated polyester resin to human hair were used to construct the composite sample, which was then examined according to predefined parameters for its mechanical and physical properties. The composite material, consisting of human hair fibers and a polymer matrix, exhibited favorable outcomes by displaying high strength and stiffness, making it appropriate for the production of lightweight ceiling boards for homes. The study revealed an initial increase in both flexural and compressional strength for the first two composite samples, followed by a gradual decrease as fiber content was increased while reducing resin content. Additionally, the research indicated a proportional rise in water absorption percentage with increased fiber content and decreased polyester resin in the composite. Overall, these results point to the possibility of effectively producing a composite material with high strength and rigidity through the incorporation of human hair fibers as reinforcement in a polymer matrix. This material would be perfect for lightweight home ceiling board applications.


Download data is not yet available.


Composite, Human hair fiber, Matrix, Unsaturated polyester, Epoxy




How to Cite

Worku, T. (2023). Development And Analysis of Waste Human Hair Fiber Reinforced Composite. Abyssinia Journal of Engineering and Computing, 3(2), 34–41.



Original Research Article