Malaysia has been supported by one of the high-speed fiber internet connections called TM UniFi. TM UniFi is very familiar to be used as a medium to apply Small Office Home Office (SOHO) concept due to the COVID-19 pandemic. Most of the communication vendors offer varieties of network services to fulfill customers' needs and satisfaction during the pandemic. Quality of Services is queried by most users by the fact of increased on users from time to time. Therefore, it is crucial to know the network performance contrary to the number of devices connected to the TM UniFi network. The main objective of this research is to analyze TM UniFi performance with the impact of multiple device connections or users' services. The study was conducted to analyze the QoS on its traffic, packets transfer, RTT, latency, and throughput. Wireshark simulation program has been used as a network traffic capture where PCAP files have been analyzed by using PCAP Analyzer for Splunk. Traffic filtering has been enabled to capture selected traffic to measure network performance. The result shows that better network performance can be achieved if a smaller number of devices are connected at the same time. The percentage of packet loss, RTT, latency is increased when more users connected at the same time. The throughput also shows a decrease for multi-device connections. Based on the analysis it can be concluded that TM UniFi still can provide good network services for the SOHO network environment and sufficient bandwidth despite the rapid user growth in Malaysia.
facing economic units operating in the environment sector of the Iraqi
industrial many pressures in its seeking to measure and evaluate its performance because of variables, today's corporate environment, as the case which makes looking for a methodology can be adopted to evaluate its performance with a more holistic, rather than being limited to traditional measures that are no longer enough to keep pace with rapid changes in today's corporate environment, which requires that measures of performance are derived from the strategy of unity and commensurate with the specificity of the environment in Iraq. Try searching discussion Ttormwhrat and performance measurement systems to suit the business strategies and directions of change
... Show MoreSurvival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete
... Show MoreIt is well-known that the existence of outliers in the data will adversely affect the efficiency of estimation and results of the current study. In this paper four methods will be studied to detect outliers for the multiple linear regression model in two cases : first, in real data; and secondly, after adding the outliers to data and the attempt to detect it. The study is conducted for samples with different sizes, and uses three measures for comparing between these methods . These three measures are : the mask, dumping and standard error of the estimate.
Multiple myeloma (MM) is a heterogenous plasma cell malignancy with various complications. Sclerostin is a Wingless-type (Wnt) inhibitor specifically expressed by osteocytes; it acts as a negative regulator of bone formation.
To assess plasma sclerostin level in MM patients and find its correlations with clinical and laboratory data, including osteolytic bone disease and international staging system (ISS).
This cr
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreThis research deals with the study of the relationship between the success factors as the independent variable and product strategies as the dependent variable , has reacted to these variables to form the frame , which is the research which centered research problem about the extent to which industrial companies the vision and knowledge of Muslim women survive and develop in the business market , which can be expressed about the extent of awareness of corporate success factors and the use of product strategies and what the relationship between the factors and strategies , while expressing the importance of research to make the focus on the product occupies a paramount importance in the industrial sector companies in relation to t
... Show MoreBackground: Many countries recommend the use of long-acting reversible contraceptive intrauterine device immediately after cesarean delivery. The cesarean delivery rate in Iraqi public hospitals is 32.2% and may reach 85.8% in private hospitals. Immediate post-partum intrauterine device insertion at cesarean is rarely done in Iraq.
Objectives: To assess the safety and practicality of immediate post-partum intrauterine device insertion during cesarean delivery for family planning and pregnancy spacing in Iraqi women.
Subjects and Methods: A single arm clinical trial included 150 eligible women who attended Al-Elwiyah Maternity Teaching Hospital or Al Hayat Rahibat Hospita
... Show MoreThe purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st
... Show More
Multipoint forming process is an engineering concept which means that the working surface of the punch and die is produced as hemispherical ends of individual active elements (called pins), where each pin can be independently, vertically displaced using a geometrically reconfigurable die. Several different products can be made without changing tools saved precious production time. Also, the manufacturing of very expensive rigid dies is reduced, and a lot of expenses are saved. But the most important aspects of using such types of equipment are the flexibility of the tooling. This paper presents an experimental investigation of the effect of three main parameters which are blank holder, rubber thickness and forming speed th
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database