Malaysia has been supported by one of the high-speed fiber internet connections called TM UniFi. TM UniFi is very familiar to be used as a medium to apply Small Office Home Office (SOHO) concept due to the COVID-19 pandemic. Most of the communication vendors offer varieties of network services to fulfill customers' needs and satisfaction during the pandemic. Quality of Services is queried by most users by the fact of increased on users from time to time. Therefore, it is crucial to know the network performance contrary to the number of devices connected to the TM UniFi network. The main objective of this research is to analyze TM UniFi performance with the impact of multiple device connections or users' services. The study was conducted to analyze the QoS on its traffic, packets transfer, RTT, latency, and throughput. Wireshark simulation program has been used as a network traffic capture where PCAP files have been analyzed by using PCAP Analyzer for Splunk. Traffic filtering has been enabled to capture selected traffic to measure network performance. The result shows that better network performance can be achieved if a smaller number of devices are connected at the same time. The percentage of packet loss, RTT, latency is increased when more users connected at the same time. The throughput also shows a decrease for multi-device connections. Based on the analysis it can be concluded that TM UniFi still can provide good network services for the SOHO network environment and sufficient bandwidth despite the rapid user growth in Malaysia.
The study focused on the identification of the natural relation between the organizational components, and the most important is the organizational structure, which not hid its effect on each function and operation of the organizational structure through commanding the individual craters and its forms according to the requirement of these function, also it has relation with an organic synthesis that between the dimensions of the organic synthesis and the practice side in the commission of Integrity.
The problem of the research pensioned in some questions about hypothesis and theoretical parts, in which they go a mention about the hypothesis questions is to use all the knowledge's in this atmosphere and th
... Show MoreForeign trade receives a good deal of economists' attention for its active contribution to economic growth, and imports of goods and services that could not be produced locally constitute an important share of the local economy. Agricultural imports constitute an important share of the total imports due to their role in fulfilling the needs of local markets; however, the agricultural sector in Iraq contributes no more than a limited share of the country's need, which has encouraged the import of a variety of fruits, vegetables and strategic crops and different types of red and white meat. For the sake of identifying the factors affecting the demand on agricultural imports in Iraq, the following factors has been analyzed: th
... Show MoreIn the present work, a d.c. magnetron sputtering system was designed and fabricated. The chamber of this system was includes from two copper coaxial cylinders where the inner one used as a cathode (target) while the outer one used as the anode with Solenoid magnetic coil located on the outer cylinder (anode). The axial profile of magnetic field for various coil current (from 2A to 14 A) are shown. The plasma characteristics in the normal glow discharge region are diagnostics by the 2.2mm diameter Langmuir probe with different length along the cathode and located at different radial positions 1cm and 2cm from the cathode surface. The result of this work shows that, the electron energy distributions at different radial positions along the
... Show MoreThe use analysis value chain such information in the provision as financial so information quality meet and satisfy the needs of users such information , particularly investors and lenders as the identification needs financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the
... Show MoreBackground/Objectives: The purpose of this study was to classify Alzheimer’s disease (AD) patients from Normal Control (NC) patients using Magnetic Resonance Imaging (MRI). Methods/Statistical analysis: The performance evolution is carried out for 346 MR images from Alzheimer's Neuroimaging Initiative (ADNI) dataset. The classifier Deep Belief Network (DBN) is used for the function of classification. The network is trained using a sample training set, and the weights produced are then used to check the system's recognition capability. Findings: As a result, this paper presented a novel method of automated classification system for AD determination. The suggested method offers good performance of the experiments carried out show that the
... Show MoreThis paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec
... Show MoreThe judgment enjoys many potential sources. If we look at these sources with analytical view that enable us to identify the potentials of strength in them which is the existence of features that distinct each place from the other one, which can be considered opportunities that provide the designer and the planner the possibility to design and planning which is based on subs taken from the reality of the available data of the location.
At this point outstands the role of development sources as one of the processes of re-configuring the place which appear as a result of a reality that requires setting new goals for the society and to achieve these goals it takes observations dealing with the place policies that should be taken, so this
The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.
In this, search the comparison between binary lo
... Show Moreتعد الموازنة الأداة الأساسية لتنفيذ أولويات أية دولة، ويتوجب النظر إليها في ضوء المناخ الاجتماعي والسياسي والاقتصادي، لأنها تساعد في توجيه الاقتصاد لتحقيق النمو ورفع مستوى الرفاهية. اعتمدت وزارة المالية في أعداد الموازنة السنوية بعد 9/4/ 2003 أسلوباً مغايراً لما كان معتمداً في العقود الماضية، إذ كانت هناك موازنتين الأولى الموازنة الجارية، والثانية الموازنة الاستثمارية رغم وجود قانون يحتم إصدار موازنة
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show More