Dietmate: Your Partner in Diabetes Management
Ranking 6th among causes of death in Malaysia, accounting for 1.8% of mortality in 2022, diabetes presents a significant health challenge demanding accessible solutions. In response, Dietmate emerges as a crucial intervention, empowering individuals at risk, those diagnosed, and the public. By offer...
| Main Authors: | Naidu, Kamaleshwahrran, Mohamad Izzat Anis, Eusoff, Pichan, Sandhiya, Gunasegran, Sitha, Syifak, Izhar Hisham |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Kolej Komuniti Miri, Sarawak & Unit Penyelidikan dan Inovasi Politeknik
2024
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/41563/ http://umpir.ump.edu.my/id/eprint/41563/1/Dietmate%20-%20Your%20Partner%20in%20Diabetes%20Management.pdf |
Similar Items
Web And Mobile Based Fakulti Komputeran Hybrid Attendance System(Fkhas) With Implementation Of Rfid And Qr Technology
by: Sitha, Gunasegran
Published: (2023)
by: Sitha, Gunasegran
Published: (2023)
A Quick Glance at Numerical Modeling in Obstructed Human Airway
by: Nasrul Hadi, Johari, et al.
Published: (2012)
by: Nasrul Hadi, Johari, et al.
Published: (2012)
A survey on supervised machine learning in intrusion detection systems for Internet of Things
by: Shakirah, Saidin, et al.
Published: (2023)
by: Shakirah, Saidin, et al.
Published: (2023)
Are Your IT Staff Working Too Hard?
by: Oxley, A.
Published: (2008)
by: Oxley, A.
Published: (2008)
Are Your IT Staff Working Too Hard?
by: Oxley, A.
Published: (2008)
by: Oxley, A.
Published: (2008)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Accessing your farm anywhere and anytime
by: Lau, Jonathan Puong Fuang
Published: (2011)
by: Lau, Jonathan Puong Fuang
Published: (2011)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
Rainfall-runoff modelling using adaptive neuro-fuzzy inference system
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
Analysis of Foveal Avascular Zone for Grading of Diabetic Retinopathy
by: Ahmad Fadzil, M Hani, et al.
Published: (2011)
by: Ahmad Fadzil, M Hani, et al.
Published: (2011)
ObeM 2.0: Obesity management secured system 2.0
by: Syifak Izhar, Hisham, et al.
Published: (2021)
by: Syifak Izhar, Hisham, et al.
Published: (2021)
Safeguarding your PC
Published: (2008)
Published: (2008)
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
by: Nur Khairani, Kamarudin, et al.
Published: (2023)
Persatuan Teknologi Komputer (Petakom) Portal Management System (Ppms)
by: Narresh Naidu, Subramaniam
Published: (2022)
by: Narresh Naidu, Subramaniam
Published: (2022)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Area Analysis of Foveal Avascular Zone in Diabetic Retinopathy Color Fundus Images
by: Ahmad Fadzil, M Hani, et al.
Published: (2011)
by: Ahmad Fadzil, M Hani, et al.
Published: (2011)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
Move your data with you
Published: (2009)
Published: (2009)
Systematic description of the internet of things: A bibliometric analysis
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
Intrusion detection system using autoencoder based deep neural network for SME cybersecurity
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
by: Khaizuran Aqhar, Ubaidillah, et al.
Published: (2021)
Running Your Programs
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Testing Your Programs
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
'Push' and 'Pull' Modeling In RosettaNet's Business-To -Business e-Commerce Partner Interface Processes.
by: Ting, Tin Tin, et al.
Published: (2007)
by: Ting, Tin Tin, et al.
Published: (2007)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Analysis of foveal avascular zone in colour fundus images for grading of diabetic retinopathy severity
by: Ahmad Fadzil, M. Hani, et al.
Published: (2010)
by: Ahmad Fadzil, M. Hani, et al.
Published: (2010)
Improving
Your Program’s
Performance
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
An improved mapping pattern for Digital Watermarking using Hilbert-Peano Pattern
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
Intelligent autism screening using fuzzy agent
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
Web design attributes guideline to reinforce user trust, satisfaction, and loyalty for Malaysian university students / Ranjen Naidu Vasudiven
by: Ranjen Naidu , Vasudiven
Published: (2021)
by: Ranjen Naidu , Vasudiven
Published: (2021)
Prediction of Diabetes Using Hidden Naïve Bayes: Comparative Study
by: Al-Hameli, Bassam Abdo, et al.
Published: (2021)
by: Al-Hameli, Bassam Abdo, et al.
Published: (2021)
Determination of Foveal Avascular Zone in Diabetic Retinopathy Digital Fundus Images
by: Lila Izhar, Iznita, et al.
Published: (2010)
by: Lila Izhar, Iznita, et al.
Published: (2010)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
A Comparative Study on the Pre-Processing and Mining of Pima Indian Diabetes Dataset
by: Amatul, Zehra, et al.
Published: (2013)
by: Amatul, Zehra, et al.
Published: (2013)
Intelligent bee hive with honey flow extractor with application of solar panel as power source
by: Kumutha Naidu, Gunasegran
Published: (2019)
by: Kumutha Naidu, Gunasegran
Published: (2019)
Enhanced LSB watermarking methods based on scanning patterns for authentication of medical images
by: Syifak Izhar, Hisham
Published: (2016)
by: Syifak Izhar, Hisham
Published: (2016)
Dictionary-based diabetes distress detection mechanism using facebook reactions / Marian Cynthia Martin
by: Marian Cynthia , Martin
Published: (2020)
by: Marian Cynthia , Martin
Published: (2020)
CyberAid: Are your children safe from cyberbullying?
by: Thun, Lee Jia *, et al.
Published: (2021)
by: Thun, Lee Jia *, et al.
Published: (2021)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
Similar Items
-
Web And Mobile Based Fakulti Komputeran Hybrid Attendance System(Fkhas) With Implementation Of Rfid And Qr Technology
by: Sitha, Gunasegran
Published: (2023) -
A Quick Glance at Numerical Modeling in Obstructed Human Airway
by: Nasrul Hadi, Johari, et al.
Published: (2012) -
A survey on supervised machine learning in intrusion detection systems for Internet of Things
by: Shakirah, Saidin, et al.
Published: (2023) -
Are Your IT Staff Working Too Hard?
by: Oxley, A.
Published: (2008) -
Are Your IT Staff Working Too Hard?
by: Oxley, A.
Published: (2008)