Остановите войну!
for scientists:
default search action
Philip Achimugu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c7]Tolulope Olushola Olufemi, Oluwatolani Achimugu, Suleiman Abu Usman, Enem Theophilus Aniemeka, Philip Achimugu, Chinonyelum Vivian Nwufoh, Ridwan Kolapo:
Comparative Analysis to Develop a Dimensionality Reduction Model for Classifying Intrusion Detection Systems. IRICT (2) 2023: 133-140 - 2021
- [j5]Anabi Hilary Kelechi, Mohammed H. Alsharif, Damilare Abdulbasit Oluwole, Philip Achimugu, Osichinaka C. Ubadike, Jamel Nebhen, Aderemi Aaron-Anthony Atayero, Peerapong Uthansakul:
The Recent Advancement in Unmanned Aerial Vehicle Tracking Antenna: A Review. Sensors 21(16): 5662 (2021)
2010 – 2019
- 2016
- [j4]Philip Achimugu, Ali Selamat, Roliana Ibrahim:
ReproTizer: A Fully Implemented Software Requirements Prioritization Tool. Trans. Comput. Collect. Intell. 22: 80-105 (2016) - 2015
- [p1]Philip Achimugu, Ali Selamat:
A Hybridized Approach for Prioritizing Software Requirements Based on K-Means and Evolutionary Algorithms. Computational Intelligence Applications in Modeling and Control 2015: 73-93 - 2014
- [j3]Philip Achimugu, Ali Selamat, Roliana Ibrahim, Mohd Naz'ri Mahrin:
A systematic literature review of software requirements prioritization research. Inf. Softw. Technol. 56(6): 568-585 (2014) - [c6]Philip Achimugu, Ali Selamat, Roliana Ibrahim:
A Preference Weights Model for Prioritizing Software Requirements. ICCCI 2014: 30-39 - [c5]Philip Achimugu, Ali Selamat, Roliana Ibrahim:
A Web-Based Multi-Criteria Decision Making Tool for Software Requirements Prioritization. ICCCI 2014: 444-453 - [c4]Philip Achimugu, Ali Selamat, Roliana Ibrahim:
A Clustering Based Technique for Large Scale Prioritization during Requirements Elicitation. SCDM 2014: 623-632 - [c3]Philip Achimugu, Ali Selamat, Roliana Ibrahim:
Applying Fuzzy-TOPSIS Algorithm in Prioritizing Software Requirements. SoMeT 2014: 659-671 - [c2]Philip Achimugu, Ali Selamat, Roliana Ibrahim:
A Process Model for Efficient Software Engineering Practice. SoMeT 2014: 721-735 - 2011
- [i3]Adeniran Isola Oluwaranti, Achimugu Philip:
Development and Deployment of Fixed Wireless Access in South West Nigeria: Performance and Evaluation. CoRR abs/1108.1152 (2011) - [i2]Oluwagbemi Oluwatolani, Abah Joshua, Achimugu Philip:
The Impact of Information Technology in Nigeria's Banking Industry. CoRR abs/1108.1153 (2011) - [i1]Achimugu Philip, Oluwagbemi Oluwatolani, Abah Joshua:
Development of a Window Based Security System for Electronic Data Interchange. CoRR abs/1108.1154 (2011) - 2010
- [j2]Achimugu Philip, Babajide Afolabi, Adeniran Isola Oluwaranti, Gambo Ishaya, Oluwagbemi Oluwatolani:
Software Architecture and Methodology as a Tool for Efficient Software Engineering Process: A Critical Appraisal. J. Softw. Eng. Appl. 3(10): 933-938 (2010) - [j1]Achimugu Philip, Babajide Afolabi, Adeniran Isola Oluwaranti, Oluwagbemi Oluwatolani, Gambo Ishaya:
Towards an Efficient Information Systems Development Process and Management: A Review of Challenges and Proposed Strategies. J. Softw. Eng. Appl. 3(10): 983-989 (2010) - [c1]Philip Achimugu, H. Abimbola Soriyan, Oluwagbemi Oluwatolani, Anu Ajayi:
Record Linkage System in a Complex Relational Database - MINPHIS Example. MedInfo 2010: 1127-1130
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-22 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint