Author of the publication

Treasury Single Account and Performance of the Public Sector in Nigeria

, , , , , , and . International Journal on Economics, Finance and Sustainable Development, 3 (12): 113-124 (December 2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Lucky,
add a person with the name Lucky,
 

Other publications of authors with the same name

Hybrid Nearest Neighbors Ant Colony Optimization for Clustering Social Media Comments., and . Informatica (Slovenia), (2020)Treasury Single Account and Performance of the Public Sector in Nigeria, , , , , , and . International Journal on Economics, Finance and Sustainable Development, 3 (12): 113-124 (December 2021)Measuring and mitigating security and privacy issues on android applications.. University College London, UK, (2019)British Library, EThOS.POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps., and . WISEC, page 221-222. ACM, (2016)Factors influencing users to use unsecured wi-fi networks: evidence in the wild., , , and . WiSec, page 203-213. ACM, (2019)Determining miRNA-disease associations using bipartite graph modelling., , , , , , and . BCB, page 672. ACM, (2013)Tracking Epidemics with Natural Language Processing and Crowdsourcing., , , , and . AAAI Spring Symposium: Wisdom of the Crowd, volume SS-12-06 of AAAI Technical Report, AAAI, (2012)Bayesian computation for logistic regression, and . Computational Statistics & Data Analysis, 48 (4): 857--868 (Apr 1, 2005)Applying Fellegi-Sunter (FS) Model for Traceability Link Recovery between Bug Databases and Version Archives., , and . APSEC, page 146-153. IEEE Computer Society, (2011)Insider threat detection model for the cloud., , and . ISSA, page 1-8. IEEE, (2013)