Aim: The present study aims to improve the poor water solubility of zaltoprofen which is a non-steroidal anti-inflammatory drug (NSAIDs) with a potent analgesic effect using solid dispersion then formulate it as a hollow type suppository to be more convenient for geriatric patients. Materials and Method: Zaltoprofen solid dispersions were prepared by solvent evaporation technique in different zaltoprofen: Soluplus® ratios. Results: Among the formulations tested, zaltoprofen solid dispersion preparation using 1:5 (zaltoprofen: Soluplus®) ratio showed the highest solubility and selected for further investigation. Solid dispersion characterization was evaluated by differential scanning calorimetry (DSC), X-ray diffraction study (XRD) and Fou
... Show MoreTo enhance the structural performance of concrete-filled steel tube (CFST) columns, various strengthening techniques have been proposed, including the use of internal steel stiffeners, external wrapping with carbon fiber-reinforced polymer (CFRP) sheets, and embedded steel elements. However, the behavior of concrete-filled stainless-steel tube (CFSST) columns remains insufficiently explored. This study numerically investigates the axial performance of square CFSST columns internally strengthened with embedded I-section steel profiles under biaxial eccentric loading. Finite element (FE) simulations were conducted using ABAQUS v. 6.2, and the developed models were validated against experimental results from the literature. A comprehen
... Show MoreThe need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreWith the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show More