1. INTRODUCTION As we all know we are living in a modern era i.e., The 21ST century. As the traditional way to approach things is eradicated as the time progressed ahead in the timeline many traditional worked habits also changed. People are more aware of the technologies that are being used right now. Many organizations are shifting towards more reliable and more accurate systems using various modes of computing in different fields. Whenever we consider a library management system, the modules which completes a proper management system are a well-organized solution for a library. A Database which is constantly managed and updated. A user can get full information of the books of the library easily. All the books are virtually accessible by the user without doing it manually. In the traditional library systems numerous fields are being considered from the perspective of the administrator and the user of the system. Various fields define the system i.e., book details, book ID, author name, etc. It is observed that this existing system uses old algorithms for the systems which are outdated and are less efficient. The tedious task of the system is to manage the records which represents which books are particularly used in a specific time period from the entire library. Earlier library systems were partially computerized that means keeping the records of the library books were done manually, the generation of the reports of the entire database was a manual task which is done by the working officials of the library. As the systems of that time are not fast or more advanced enough to calculate or analyze that amount of data in fraction of seconds. Here we are proposing a system where we are analyzing the existing Database of the library and generating a stock analysis of the books which represents which particular books are used extensively in a particular period of time, using the data analytics and the various data mining techniques. 1.1 Motivation Whenever we see a library management system, it usually consists of a modular based design i.e., each outcome of a module is used by the next module of the system. The existing systems are fully functional but not completely dependable. A user can perform all the actions of a library virtually in the existing management system. We observe that whenever a book is being stocked out of the library, the existing system only shows that which book is issued by the student or the teacher. But at the time of examinations it is very obvious that the particular subject books are very likely to be stocked out. At this time students issue more books of that subject, which results in stock out of the book in the library system, and there is no way that the other student who wants the book, can get the book in less period of time. As outcome of this scenario many students are left to study from the written notes all by themselves, without the help of any reference books. To eliminate this problem a stock analysis of the books can be generated which can show us the usage of particular books in a specific time period. This way a librarian can know which book are being extensively used in the time period and they can provide the book in the library after analyzing the stocks of the books. 1.2. Objective Here in the proposed work of ours we are implementing a library book-based analysis system using data clustering algorithms and data analytics techniques. We have the following goals for this project To provide a new mechanism for providing the stock analysis of the books available in the library database. To show which book has been issued mostly by the students as compared to the other books available for the same subject. To provide an analysis which will help the librarian to understand which books have the maximum uses which will help them to refill the stocks of those particulars books easily and to satisfy the need of a student or reader in time. 1.3 Scope This system will be effective in analysis of the books of the library as well as predicting the stock out of the particular books in the quarter of time. This will be done by utilizing the existing database of the library. The separation is done according to departmental basis i.e., user can generate the analysis after selecting the department, the semester of which the report or analysis is to be generated. This system is very much useful from the perspective of Librarian because in traditional library systems, there is a lack of module which can show the stocks of library books by predicting the usage of the particular books in particular time period. Organization of the rest of the sections are as follows, Section II describe the literature review Section III describes Problem Formulations Section IV Proposed System followed by References. 2. LITERATURE REVIEW Jian Wei Li et al. 1 proposed that with the constant development of modern library, the function of library has changed gradually. How to improve the utilization rate of library resources, how to serve readers better, and how to play more active roles, all have been becoming the concrete task of library in future. Clustering analysis is the process of grouping a set of physical abstract objects into classes of similar objects, and it has a very good application in library. The clustering analysis of readers behavior features in library automation system helps library improve services quality greatly, provide effective decision-making support for resource optimization, provide personalized information services for readers, and made library play more active roles in serving readers. 1 Tingting Zhu, Lili Zhang et al. 2 with the continuous development of librarianship, the functions of university library change. How to analyze the needs of university library users more effectively and rationally, thus provide corresponding service for the readers, has become a specific task which the future development of library will face. Data mining techniques can transform the collected data as questionnaires seeming to be uncorrelated and discrete into usable reference information provided to the library decision makers, which results in the effective dispose of the factors restraining users from using the library digital resource. 2 Ana Kovacevic et al. 3 With the increase in universal data volume, the technology of big data and its analytical processes are generally used to provide the description about massive datasets. Compared with other traditional datasets and its processes, big data includes semi structured and unstructured data that need more real time analysis. Big data also gets details about new prospects for determining new values, supports us to improve an in-depth understanding of the hidden values, and also incurs new challenges. 3 M.D. Anto Praveena et.al. 4 Since the field of Information Technology (IT) is improving a lot recently, this generates the data more easily. For instance, for every minute approximately 72 hours of video files are uploaded to YouTube by the people. This data growth challenges the field with the main problems of gathering and integrating huge volume of data from widely distributed data sources such as social media applications. 4 Raja Thangiah et al. 5 This study made an analysis of stock verification process in 12 academic libraries in Coimbatore district. This study reveals that, 66.67 percentage of colleges take stock verification through separate library committee from outside, 58.33 percentage of colleges take stock verification for the purpose checking the availability of books. 33.33 percentage of colleges lost 50 to 100 books at the time of stock verification,58.33 percentage of colleges take responsibility for the loss of books by the college management, 58.33 percentage of the colleges measure the loss through 3 percentages of total circulation of books in the library. 5 Fengjie Hao et al. 8 Digital library resources include text information, graphics, images, video, etc., mainly includes unstructured data, and partly are structured and semi-structured data. The data type is variety, and data generation, access and update are faster, meeting characteristics of the large data, velocity and variety. 8 Amir Michail et al. 6 Data mining is widely used in business to gain a competitive edge. An effective data mining application in the retail environment is shopping basket analysis. Progress in barcode technology has made it possible to store busker dura that contains items purchased on a per-transaction basis. By using data mining technology, one can find patterns in items that are bought in combination. 6 Wensheng Wang et al. 9 Web data mining decides which books are browsed most and which books should be booked largely. It gives a qualitative standard. But when to book, how many books should we book and what is the best safe stocks, these problems will be solved by optimization theory which can give a detailed booking quantity standard. 9 Maram Abdulrahman Almaghrabi et al. 7 We have defined the data mining problem and made an initial plan for recommending KOBSON services to new users by analyzing the process with domain experts and identifying their need to improve KOBSONs user-oriented services. Our objective was to help new users of the KOBSON DL (as well as the ones who have a problem in finding relevant resources) in finding appropriate information by recommending them the service that similar users have found the most useful for them. The recommendation can be generated starting from the users profile information and from the similarity of the users behavior (when interacting with the KOBSON DL) with that of other users. The data mining process is performed as illustrated in Figure 2. Users search history data (from the KOBSON proxy server log) and their profiles (from the KOBSON database) are collected and then analyzed. Appropriate data from the log are parsed using regular expressions. From the log file, we extract users who have downloaded at least one paper from the DL. The parsed log data and user profiles are then loaded into the previously created database tables (Oracle 10 g rel. 10.2, www.oracle.com), as shown in Figure 2. In the next step, data preparation, these data are transformed and normalized into a format suitable for clustering the users 7 Ahalya .G et al. 11 Every group is known as a cluster, which consists of objects that have affinity within the cluster and disparity with the objects in other groups. This paper is intended to examine and evaluate various data clustering algorithms. The two major categories of clustering approaches are partition and hierarchical clustering. The algorithms which are dealt here are k-means clustering algorithm, hierarchical clustering algorithm, density-based clustering algorithm, self-organizing map algorithm, and expectation maximization clustering algorithm. All the mentioned algorithms are explained and analyzed based on the factors like the size of the dataset, type of the data set, number of clusters created, quality, accuracy and performance. This paper also provides the information about the tools which are used to implement clustering approaches. 11 Prof. M. A. Deshmukh et al. 12 Cluster analysis itself is not one specific algorithm, but the general task to be solved. It can be achieved by various algorithms that differ significantly in their notion of what constitutes a cluster and how to efficiently find them. Popular notions of clusters include groups with small distances among the cluster members, dense areas of the data space, intervals or particular statistical distributions. 12 2.1 Background History Peng Hua Chen et al. 1 According to the statistical analysis, the departments of Chinese, politics and law, finance, foreign language and Mathematics are the most active departments whose students borrowed much more books than the other departments. But the numbers of students of the above departments are also much more than that of other departments. So, whats that could not reflect the objective demand of readers. From the results of cluster analysis based on the average loan rates of departments (book/person/year), we can see that The numbers of some departments are fewer, but the average loan rates of them are relatively high. 1 Lili Zhang et al. 2 Librarians not only should pay more attention to the specialties and academics research of all subjects, but also should not ignore the needs of some of small departments. And then, the library also can focus on recommending books to the active groups, have interactive communication with readers, and play more active roles to achieve the goal of efficient access to the reader needs and the reasonable books procurement based on the results of clustering. 2 Girija Chetty et al. 7 The dataset has subjects field corresponding to different disciplines, with each subject given a catalogue number. In addition, to text-based resources, different multimedia sources have also been included as resources. To the best of our knowledge, this is the first publicly available research testbed for investigating personalization and user centered modelling in the area of digital libraries and repositories. 7 Vladan Devedzic et al. 3 Classification algorithms may be tested with new records, based on the classification model built. The results obtained with the test data, can be used as an indicator, of how well the model will work with new data. 3 Wensheng Wang et al. 9 With the explosive growth of information sources available on the World Wide Web, it has become increasingly necessary for users to utilize automated tools in find the desired information resources, and to track and analyze their usage patterns. These factors give rise to the necessity of creating server side and client-side intelligent systems that can effectively mine for knowledge. Web mining can be broadly defined as the discovery and analysis of useful information from the World Wide Web. This describes the automatic search of information resources available online. 9 Prof. R. A. Gulhane et al. 15 The appropriate clustering algorithm and parameter settings (including values such as the distance function to use, a density threshold or the number of expected clusters) depend on the individual data set and intended use of the results. Cluster analysis as such is not an automatic task, but an iterative process of knowledge discovery or interactive multi-objective optimization that involves trial and failure. 15 2.2 Existing System Shaochun Xu et al. 10 Libraries have collected a large amount of data, such as books, research articles and reports, both in physical and electronic formats. The library collection was originally for researchers or public users to find necessary information they need. However, this data becomes so large and the format is so various which might affect the efficient use. Although a lot of library data has been digitalized, most of them have not been used for data mining or big data technology. 10 Wensheng Wang et al. 9 On the other hand, although some work has been done in the past on how to maintain those library collections in order to efficiently and effectively use. there is no much research on using meta data to organize digital assets so that the big data and cloud computing technology could be used. 9 Ksm Swaminathan et al. 5 In the context of libraries, verification of stock is different from the verification of stock in stores in Private or Government business organizations, the purpose of the job and the difference in the meaning of Store and Stock are concerned. The collection in the libraries contains various types of information sources. The library is a public institution and collections subjected to accounting and checking, verification and reporting. 5 Raja Thangiah et al. 5 Most of the libraries have open access and there are chances to damage, misplacement and loss of books. But this system should be thrown away by the slogan by the father of library science Dr. S.R.Ranganathan, Books are for use. The books should be placed in shelves in proper way to identify by the readers and library staff. Hence, the stock verification becomes easy and important for library activity. In an open access library reader can handle the books freely in the stock room. 5 Amir Michail et al. 6 Large amount of data is gathered in different databases because of advanced methods of data collection. The demand for grouping the important data and extract the useful information from data is increased. Clustering is the distribution of data into groups of identical objects which has affinity within the cluster and disparity with the objects in the other groups. Patterns within the same cluster are closely related than to the data in the adjacent clusters. Here, there is need to know the difference between the unsupervised classification and supervised classification that is between clustering and discriminate analysis 6 Maram Abdulrahman Almaghrabi et al. 7 The model structured by Decision Tree C4.5 Algorithm in the data mining, the author gains some potential links among the factors affecting the using of library digital resource. This kind of mining information through decision tree algorithm can enable the library decision makers to know about the users various needs of using the librarys information resource, so it provides scientific reference indexes for the librarys future reform and development, and provides sufficient and credible data for the follow-up improvement of service. In other words, it furthest increases the use ratio of library resources, playing a scientific analysis and prediction role for the development of librarianship. Certainly, because the sample size and items in this model are not enough, analyzing degree and knowledge contents gained are not satisfying, and the credibility is not high enough, this model can only be named as a simple and shallow classification analysis model.. 7 Lichao Chen et al. 10 The hardware and software for storing and analyzing big data is cheaper and available for business and government now which makes the big data technique interesting to a lot of users including library. The important part is that the user could make prediction based on big data analysis. Work about big data in library could also be found because library data need to be transformed into information or knowledge which then be used by users. Bell tried to explore the issues and possibility of big data in library. Parry studied how colleges are using big data to help students chose classes, retain them, and provided necessary advising. 10 Amir Michail et al. 6 ways library classes are reused in practice, which we call reuse patterns. This is done by data mining existing applications that use the library. For example, we may find that most application classes that inherit from a library class Widget tend to override its member function paint(). As another example, we may notice that most application classes that instantiate a library class Painter and that call its member function begin() also call its member function end(). 6 2.3 Limitations Jian Wei Li et al. 1 In traditional library, the decisions are subjective, one sided or blind most of the time because the decision-making rely on the experience, then they could not adapt to the development times. The unified focus decision-making information could be extracted from a variety of internal and external information involved in the Library Information. 1 Lili Zhang et al. 2 Due to lack of technical support means, the former service promotion strategies of the library were mostly established based on experience. As a result, the propagandas were not niche targeting at all, which greatly weakened the promotion effect. Through analyzing the user survey questionnaires with the help of the decision model, we reach a conclusion that whether the readers know about the librarys digital resources is the most direct factor that influences the use ratio of digital resources. 2 Viktor Pocajt et al. 3 Classification algorithms may be tested with new records, based on the classification model built. The results obtained with the test data, can be used as an indicator, of how well the model will work with new data. We used 60 per cent of our data for building the model and the remaining 40 per cent for testing it. 3 Dr. B. Bharathi et al. 4 Many datasets have definite levels of heterogeneity in structure, semantics, type, organization, granularity and accessibility. Data representation aims to make data more important for data analytics and user analysis. Any improper data representation may reduce the value of the data originality and even disturbs effective data analysis process Hence if the data is represented effectively, then analysis process will be done easier. 4 Girija Chetty et al. 7 The dataset has subjects field corresponding to different disciplines, with each subject given a catalogue number. In addition, to text-based resources, different multimedia sources have also been included as resources. The methodology for the design of the data store is as shown in the Figure 1 schematic. To the best of our knowledge, this is the first publicly available research testbed for investigating personalization and user centered modelling in the area of digital libraries and repositories. 7 Hari Mohan Pandey et al. 11 Characterizing data into a smaller number of clusters will definitely lead to a loss in some details but data will be interpreted. It represents data objects by fewer numbers of clusters and thus, it models, data by using its own clusters. Cluster analysis is the arrangement of a set of patterns (generally shown as a vector of measurements multidimensional space) into clusters based on similarity. The explosion of availability of information on the Internet requires that libraries evolve into value-added information providers, rather than mere curators of collections. Modern libraries need to stay relevant to a diverse, technologically savvy patron base and to facilitate and add value to the research community, while facing significant resource constraints. To face these challenges, libraries need to embrace digital technologies and library management systems (LMS) in order to work smart and achieve more with less. While LMS systems have been around for decades, libraries can explore the new frontier by embracing open source solutions, like open source software (OSS) library systems, which are free to acquire. They need to collaborate with computer experts and become technologically savvy to harness the full power of OSS solutions to meet the specific needs of the library and patron base. This article provides an overview of the availability, benefits, and drawbacks of various LMS systems and OSS variants, drawing from experiences in the present Indian context. 11 3. PROBLEM FORMULATION In the traditional library systems numerous fields are being considered from the perspective of the administrator and the user of the system. Various fields define the system. Data mining techniques are used to recommend digital library services based on the users profile and search history. First, similar users were clustered together, based on their profiles and search behavior. Then predictive classification for recommending appropriate services to them was used. It has been shown that users in the same cluster have a high probability of accepting similar services or their patterns. Data mining is widely used in a system now a days because as the databases are rapidly increasing day by day, there is a much need of the data analytics tools because if the smallest amount of data loses its integrity in the database, there may be chance of occurrence of false results and decisions in the algorithmic instructions. Following system comprises both the data mining techniques and data analysis algorithms which is crucial for the system architecture. Our system implements a method to analyze and generate a stock verification which can represent usage of particular book stock in a selected time period. 3.1 Aim Our aim is to develop a system i.e., Library Book Based Analysis System, which is based on the Data Mining techniques and as well as the Data analytics technologies. We are using the existing Library Database of Our College. This way we are keeping our project relevant to the existing Database. The main aim of our project is to analyze and represent the stock of the books of our college library, so that the librarian can know which books are more likely to get stock out in that time so that they can arrange more books of that particular genre in our library. So that the students can get the books in proper time as they required. This system will also show that which books are not being used frequently by the students, so that library can update new books in place of those old least used books. 3.2 Problem Definition In library, readers have variable behavior characteristics in borrowing books. They can issue whichever book they want from the library. The existing system stores entry if that particular book being issued by the reader, and the stock is decremented by the number of particular books being issued. This is done by the scanning the bar code of the library book which responds to the particular book data available in the database. The observation is that, whenever a book is issued, the existing system cannot predict that which book is going to be used the most in upcoming time. It can only show that which book is stock out at the current moment. This results in students not getting the required book whenever they need it. This scenario is much likely to be seen in every library of any college. Our system will be designed in such a way that it can predict and analyze the book being used extensively in a selected timeline by using the existing library database to keep the system relevant as much as possible to the current scenario. 4. PROPOSED SYSTEM In traditional library, the decisions are subjective, and predictive if proper approach is used or applied onto the existing system. It is one sided or blind most of the time because the decision-making relies on the experience, then they could not adapt to the development times. In the proposed system we will use the datasets obtained from the library, which is utilized for the analytical purpose using various association mining, Data mining and Data Analysis techniques. The proposed system will show usage of books, books status, and stock variation. The system will be divided into various modules which will function out various calculations onto the Database i.e., it can be association mining, clustering, or analysis of the data. The Filtration of the departments will be done for the easy approach for the system. After selecting the department and semester user will get a list of books where he can easily find out that which book is having the maximum usage amongst the other books of that particular subject. The proposed shows a stock analysis which also helps library to find out the theft or misplacing of the library books. The use of numerous techniques in the system makes this system depended as itll be more efficient to use and analyze the Datasets. Each variation in stock is shown in a graphical manner, so user can easily see the analysis reports easily. This report is generated using the J-Free Integration Module of java.. 4.1 Methodology As the time progresses, the functions of university library change. How to analyze the needs of university library users more effectively and rationally, thus provide corresponding service for the readers, has become a specific task which the future development of library will face. This research is done by the survey method and the questionnaire is used as a tool. The questionnaire method was followed to get data for the study. The stock verification becomes easy and important for library activity. In an open access library reader can handle the books freely in the stock room. The stock verification has some major advantages in the stock verification including disclose the position of the loss of documents, so that the replacement may be made in case of important document loss which provides adequate account of the percentage of inevitable loss and provides opportunities to weed out long un-used, very old editions of books from the library. The methodology can be understood in following ways- After defining the project objectives and requirements, formulate data mining problem definition and prepare initial strategy for achieving these goals. After collecting the data, analyze it to familiarize with it and discover initial insight also evaluate the quality of data. Prepare the final data set from the initial raw data that will be used in the process. Select cases and variables that are appropriate for analyses and perform the necessary data transformations. Apply appropriate modeling techniques and calibrate the model to optimize the results. The results show patterns (i.e. the model) discovered for the data analyzed. If necessary, loop back to the preparation phase to bring the form of the data in line with the specific requirements for particular data mining techniques. 4.2 Algorithm Following Algorithms and techniques are used in the proposed system- Apriori Algorithm Apriori is an algorithm for frequent item set mining and association rule learning over transactional databases. It proceeds by identifying the frequent individual items in the database and extending them to larger and larger item sets as long as those item sets appear sufficiently often in the database. The frequent item sets determined by Apriori can be used to determine association rules which highlight general trends in the database this has applications in domains such as market basket analysis. Apriori uses a bottom up approach, where frequent subsets are extended one item at a time (a step known as candidate generation), and groups of candidates are tested against the data. The algorithm terminates when no further successful extensions are found. Apriori uses breadth-first search and a Hash tree structure to count candidate item sets efficiently. It generates candidate item sets of length k from item sets of length k-1. Then it prunes the candidates which have an infrequent sub pattern. According to the downward closure lemma, the candidate set contains all frequent k-length item sets. After that, it scans the transaction database to determine frequent item sets among the candidates. Method Let k1 Generate frequent item sets of length 1 Repeat until no new frequent item sets are identified 1. Generate length (k1) candidate item sets from length k frequent item sets 2. Prune candidate item sets containing subsets of length k that are infrequent 3. Count the support of each candidate by scanning the DB 4. Eliminate candidates that are infrequent, leaving only those that are frequent Furthermore, the Apriori algorithm can be understood by given pseudo-code Join Step Ck is generated by joining Lk-1 with itself. Prune Step Any (k-1)-itemset that is not frequent cannot be a subset of a frequent k-itemset Pseudo-code Ck Candidate itemset of size k K-means is a famous non-supervised clustering algorithm used to organize the data. It is a partitioning algorithm wherein the resultant clusters are independent and bound. There are broadly two main stages of algorithm implementation. Firstly, the data is divided into k number of clusters with assumed k value in advance. Among the given set of data take k number of points and assume it as a centroid for that respective cluster. Secondly, calculate the distance between point and centroid and assign the point to the cluster, which has the least distance which brings the point closest centroid. This method reduces the number of iterations and change of locations of points in clusters. K-means (MacQueen, 1967) is one of the classical unsupervised learning algorithms that solve the well-known clustering problem. The procedure follows a simple and easy way to classify a given data set through a certain number of clusters (assume k clusters) fixed a priori. The main idea is to define k centroids, one for each cluster. These centroids should be placed in a cunning way because of different location causes different result. 1. Place K points into the space represented by the objects that are being clustered. These points represent initial group centroids. 2. Assign each object to the group that has the closest centroid. 3. When all objects have been assigned, recalculate the positions of the K centroids. 4. Repeat Steps 2 and 3 until the centroids no longer move. This produces a separation of the objects into groups from which the metric to be minimized can be calculated. Given Ki ti1, ti2 ,, ti(m), the centroids function Let us understand this equation by example, suppose the tuple is needed to be clustered is 2, 4, 10, 12, 3, 20, 30, 11, 25 given k2 and then select m12 and m24 as the initial group centroids. The distance between point and centroid is measured by Euclidean Distance The results of cluster analysis of the tuples by implementing k-means algorithm as shown in Table Table 1.1 Obtained Value of Clustering Example Number Of Iterations M1 M2 K1 K2 1 3 18 2,3,4,10 12,20,30,11,25 2 4.75 19.6 2,3,4,10,11,12 20,30,25 3 7 25 2,3,4,10,11,12 20,30,25 C) Association Mining Rule Learning Association rule learning is a rule-based machine learning method for discovering interesting relations between variables in large databases. It is intended to identify strong rules discovered in databases using some measures of interestingness. This rule-based approach also generates new rules as it analyzes more data. The ultimate goal, assuming a large enough dataset, is to help a machine mimic the human brains feature extraction and abstract association capabilities from new uncategorized data. Association Rule 4.3 Flow Chart Figure 1.1 Flow Chart for Analysis System 4.4 Data Flow Diagram Level 0 Data Graphs Figure 2.1 Level 0 Data Flow Diagram Level 1 Figure 2.1 Level 1 Data Flow Diagram 4.5 UML Activity Diagram Figure 4.1 Activity Diagram for Analysis System Used Case Diagram extends User Fig 5.1 Used Case Diagram for Analysis System REFERENCES 1 Jian Wei Li, Peng Hua Chen, The application of Cluster analysis in Library system. Institute of Electrical and Electronics Engineers (IEEE) 978-1-4244-3531 February 2008. 2 Tingting Zhu, Lili Zhang, Application of Data Mining in the Analysis of Needs of University Library Users, The 6th International Conference on Computer Science Education (ICCSE 2011). Superstar Virgo, Singapore. August 3-5, 2011. 3 Ana Kovacevic, Vladan Devedzic, Viktor Pocajt, Using data mining to improve digital library services, ResearchGate, 05 June 2014. 4 M.D. Anto Praveena, Dr. B. Bharathi, A Survey Paper on Big Data Analytics, International Conference on Information, Communication Embedded Systems 2017. 5 Raja Thangiah, Ksm Swaminathan, Stock Verification of Books in Academic Libraries A Special Reference to Selected College Libraries in Coimbatore District A Study, ResearchGate, 15 January 2018. 6 Amir Michail, Data Mining Library Reuse Patterns using Generalized Association Rules, Institute of Electrical and Electronics Engineers (IEEE), March 2000. 8 Fengjie Hao, Fei Liu, Research of Hadoop-based digital library data service system, 9th International Conference on Intelligent Human-Machine Systems and Cybernetics, 2017. 9 Wensheng Wang, A Library Booking Policy based on Stocking Theory, IITA International Conference on Services Science, Management and Engineering, 2009. 10 Chunning Wang, Shaochun Xu, Lichao Chen, Xuhui Chen, Exposing Library Data with Big Data Technology A Review, Okayama, Japan, 2016 IEEE ICIS 2016, June 26-29, 2016. 11 Ahalya .G, Hari Mohan Pandey, Data Clustering Approaches Survey and Analysis. 2015 1st International Conference on Futuristic trend in Computational Analysis and Knowledge Management (ABLAZE-2015), 2015. 12 Prof. M. A. Deshmukh, Prof. R. A. Gulhane, Importance of Clustering in Data Mining, International Journal of Scientific Engineering Research, Volume 7, Issue 2, February-2016 PAGE PAGE MERGEFORMAT 2 PAGE MERGEFORMAT 2 Library Analysis User User Library Analysis User Data Preprocess Data Analysis Graph Manager Database Load database to system Preprocess dataset from the acquired database Perform k-means clusters for semester and department wefijfjwfdededddddepardddddepartmentdepartment Perform analysis for individual books and groups (year,department,semester) Perform graph-based analysis ( x co-ordinate stock of book available and y co-ordinate time in which book is issued ) Load Data Analysis Perform Graphing Perform Apriori Perform Clustering Process Dataset
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-10-12T164900.176/xmpCreateDate/rdfDescription/rdfRDF/xxmpmeta kWe4Yi2qACdrWO SE
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-10-12T164917.916/xmpCreateDate/rdfDescription/rdfRDF/xxmpmeta jy2IZS8m5a-d4wX5DRy68pr 4Pz s7 w5ZMK kB3rwWg 0w3CDO mmFcrRIJs BtXwcWVmL73USJ-tLZDurZzQR0_vmvjZw3AI1iGVtLDQ4SFNYI1gts. fT15lzp1Ze_
xxmpmeta xmlnsxadobensmeta/rdfRDF xmlnsrdfhttp//www.w3.org/1999/02/22-rdf-syntax-nsrdfDescription rdfaboutuuidfaf5bdd5-ba3d-11da-ad31-d33d75182f1b xmlnsxmphttp//ns.adobe.com/xap/1.0/xmpCreateDate2018-10-13T171307.320/xmpCreateDate/rdfDescription/rdfRDF/xxmpmeta 0x9fucCEm-/E5)8u_ PeEsouj4xY V u7J 16hmY4wdNBj6D HgW(9(EhAUd)XAl f7to31ocPLl9
[email protected]@D0I//1jpG)Qu FVf,4Znp8dq6upwoqnX2j883Avm5 BuVoy04.84 DqlPwD5Wo X 4n3)RPo-UXE5I7
qOC.9iYBTyqcIMkRF4ZK7Z
J_9VuMuE,YU6pXXuO
kRI9TADNP 7EZNEnKnIVI/ZKAd 1.PqoBHCB_ZLn-OCQh4YSSIf1XnyW 4 /i [email protected],,-BgzpPBojZkKFZMc6
@0u RTIvYMN/u0X T3V-sVmIky T -Gq3b,k [email protected] 2yum7Xk/gPRO_ajYMCYAkx,OzKwtZiy_cS3a4TIJKA3OdF()YJu_XW9F2sMCs,7Za2A HcvCjJ_x [email protected] eeOVnIax.y81wd8(7OZ5MkAFN2x
[email protected]//pBMkW-MY2k
,ZL(pO-W mhEoRThyLm59OckZYG02)[email protected](-fiAnnfgqVMoAz74OIdxI7 sXuI5MRR 4FFI ig
r1YbkkDG.JmAc/_tVD u7J kzV5gc-vsp6b7GWxG_ r _iOiij)H6psciq6I Ox8o.yJrHdAe kzMIIcfB
ziu8M _xLVzEwZy,@ Yktrrx4 7jY6bf.IMyPLgPexr
)zz/1vGkmxmb.W [email protected]/[email protected],n0Q_-muk,3Fg9WjGS-hnh0R3K/ Gp,CYGqRj76zM.bJ upgideXjERVLNXZ M9NMH(C
(
(
()jk-,y 0Tmkze/
m,RhorG Y, B8L 1(IzZYrH9pd4n(KgVB,lDAeX)Ly5otebW3gpj/gQjZTae9i5j5fE514g7vnO( ,[email protected] /[email protected] 6Q 790( g,JNSQp7otykEiMEJfsJBdfQjeJ1UAL(W6FWE,XEuU1LNyEt7iDUnY,.YeB3i5 M.e0LoFZ nw3Yyghg X/[email protected] gzSj8YJv ,0t9De)FC 2DfZ @/jpbB1(fa,lw, twD5Y,.Xf kzx.lI.r vJ mpb9NG
iPtKI
xXghmP.W7 ozw5NL.FWEz IE 9eV)qSQ(g87kEviMMpHsJBdaQrE1UNLzW.FWE,[email protected]([email protected] 7/PzeW ev_zd3GYFXkn-kE879eNkJezdReGCj)n(- 7/wY.Z)tP8005w9vzAEuss4d6 fjf4Jw moV1prSl7 du)MoAOR/JWfee RS8LNCZSecWPbzUoDF/8wgbWq0JndmjIBg
v.XU(s1K-Kr , mCet2QtZ3s8 eY.n58Y
v z v2Ctq L)b
5(ZuE.R35SE_WmbB1(ofal,BCthtt.BUoiMDkp UM 0DIcH(2P Of8IMCe F)bsq8zR/7
bVML gVJi ),6tU-s7I48D5S(@(p.nxf6a
2 [email protected] @cLtEjsGHmX(yOgPc7SmOy3e
G qmWBDyQXX7/FI 41naXnk82mH4I2eOw xvp9hxs pgFC0K,[email protected] rci YB EelMw Jo_dmEo(5RCtK6Cn Qt)s jQ aYf,B6)S Qr)ojXHqOY)gvXSpeL8J9pBfdy/sT
32WiiB.E mGG AIoNNd1tnB CXKABYbqDHvsmZfkU3acBrUj,yTr6 C8Zua
6pkdAcee wrY0XH-CXefbzPioDF/Z8W7U12_dD) [email protected]
Hcs63Re97mVf Hg.mtE)
3C
1.0 also loves to visit many countries
1.0 INTRODUCTION
Steven Sim Leong Thun is the founder of the famous dessert in Malaysia, Secret Recipe. He was born in Kota Bharu, Kelantan in 1959, the youngest of eight siblings was from a poor family. Before he started his own business, he doing a marketing director at a multinational company. He also loves to visit many countries to exploring food culture them. He quitted his job as a marketing director at a multinational company and started his first premise namely ‘Secret Recipe’ in SS2 Petaling Jaya with his three nephews who are trained-bakers and kept strong about his concept of building a global brand eventually in 1997 which is 100% Malaysian brand name. Steven Sim has entrepreneurial traits which assist him to be successful in his venture
The ‘secret’ behind the success of this chain is Datuk Steven Sim, who is the founder, Chief Executive Officer and Managing Director of Secret Recipe Cakes and Cafe Sdn Bhd where he is known for being one of the most successful marketers in Malaysia. Secret Recipe has successfully established its brand name in Malaysia, Singapore, Indonesia, Thailand, China, Philippines, Brunei, and Australia by virtue of its fine quality cakes, fusion food and distinctive service. From there, he would grow the brand from strength to strength where it now has more than 270 outlets of which 80 are in other countries, close to a total 4,000 employees.
Behind the success of Secret Recipe is Steven Sim who, ever since the early days of his enterprise, focused heavily on brand building whilst creating a menu that enclose the best of local and western cuisine which is most notably a cakes. It is a universal food and simple found in every culture, race and nation. Steven Sim realized how he could implement innovative brand features that would set Secret Recipe above the competition. He has also cited retaining Malaysian favourites in his international outlets as a reason for his brands success. As a famous brand in various countries, the biggest challenge faced by Steven Sim is to ensure consistent product quality, especially taste in every branch of every menu except menu which should be modified based on local preferences. For this purpose, Steven Sim establish a management system such as creating team managers franchise, which is responsible for checking the quality of the product regularly, in every branch and conduct employee training.
In the early stages, Steven Sim decided to venture into this business to find that there is a significant deficiency, the concept cafe offers a casual atmosphere and enjoy a relaxing meal at the time. Steven Sim identify and grab this opportunity, and take the risk of introducing the concept of a meal in a casual, relaxed yet elegant.
2.0 Roles of Managers
In managing an organization, effective management is something that is very important. The Manager assists in ensuring that each task is properly implemented and meets the objectives set by an organization. According to Henry Mintzberg, the role of the manager is divided into three parts such as ;
2.1 Interpersonal Roles
The manager’s responsibility to involve interactions and relationships with organizational members and other constituents. There are three interpersonal roles played by the manager.
Firstly, a leader must have a role of the manager as a figurehead. The manager performs several symbolic or ritual tasks which are managers appear in the community function, attending social events, signing official documents or presenting certificates and awards. For example, Steven Sim attended a dinner supper for the launching of the new Secret Recipe branch which will open on 23 October 2013 in Cambodia with all the team work and staff.
Secondly, as a role of leader, manager should direct, coordinate and motivate employees to carry out their work to ensure that the work performed complies with what has been designed. This is because, manager are responsible for the success or failure of their organizational units. For example, Steven Sim always encourages and guiding for teamwork and lower employees to carry out their duties and become smooth to increase sales at each Secret Recipe branch to achieve target goals.
Thirdly the communication or cooperation which facilitates a close working relationship between people or organizations that called a liaison for manager. The Manager is responsible for maintaining network connections either inside or outside the organization via email, phone calls or meetings. For example, Steven Sim is always looking for support to interact with individuals or outsiders who want to be part of a Secret Recipe branch that can influence the organization’s success.
2.2 Information Roles
Managers are responsible for ensuring that the people with whom they work have sufficient information to do their jobs effectively. By the very nature of managerial responsibilities, managers become a communication centers of units and communication source for work group within an organization. There a three type of information roles.
Firstly, as a monitor managers should seek and receive information, scan periodic reports and maintain individual relationships such as managers constantly monitor the environment outside and within that affect the organization. For example, Steven Sim will do research related to lifestyle, cultural differentiation, the main types of food and food culture community in the country. This is to ensure product Secret Recipe easily accepted by the local community.
Secondly, managers must disseminate important information obtained either from within or outside the organization to members of the organization through memos, reports or phone calls. Most important, managers must ensure that their employees have the information necessary to perform their duties efficiently and effectively. For example, Steven Sim announces sales target for each Secret Recipe branch in November 2018 to sales supervisor through a memos.
Thirdly, Managers must be spoekesperson to often communicate information to individuals outside their units and organizations such as managers communicating information to members of organizations and outsiders through speeches, reports and memos. For example, Steven Sim communicates with journalists who want to know about the success of Secret Recipe entrepreneurs who have opened nearly 300 branches worldwide.
2.3 Decisional Roles
The role in which a manager processes information and reaches conclusions. Managers make a decisions. The organization commit their work groups to courses of action and allocate resources so that group plans can be implemented. There are four type of decisional roles.
Firstly, entrepreneur like managers are acting as pioneers to initiate a project that capitalize on opportunities that have been identified and encourages change and innovation. For example, Steven Sim acquired the idea of expanding its range of products to meet the needs of its customers and still wants to eat cakes such as opening a healthy vegetarian concept where their cakes are free of sugar, eggless, high fibre and low calories ideal for diabetics.
Secondly, the manager as a disturbance handler are makes decisions or actions appropriate to the crisis that arises in the organization so that the problematic organizational environment can be solved. This may involve dealing with an irate customer, negotiating with an uncooperative supplier, or intervening in a dispute between employees. For example, Steven Sim took action to resolve the conflict among workers who had been struck by not giving a good service by giving an award or bonus to employees who could increase monthly sales at each outlet.
Thirdly, the manager have to determine how limited organizational resources allocator are shared and used by all members of the organization to achieve the goal organization. For example, Steven Sim wants to set up a new branch in Thailand with the allocation of funding, sufficient staff, as well as other organizations resource can applied that can achieve the organization’s goals.
The manager as a negotiator are represents an organization in the field of consultation involving jurisdiction. Managers may negotiator with employees, suppliers, customers, or other work group. For example, Steven Sim deals with the production department that produces the menus at Secret Recipe to get special offers for its core customers.
3.0 Management Skills
Management skills are required for a manager to fulfill their responsibilities. Every organization needs a manager to make a decision, give directions to employees and so on. Therefore, each manager needs to have the skills to manage an organization such as ;
3.1 Conceptual Skill
Ability to view the organization as a whole and integrate the relationship between the parts within the organization, as well as have far-reaching knowledge and insight to make decisions involving long-term effects. For example, Steven Sim realized how he could implement innovative brand features that would set Secret Recipe above the competition. So, he decide to take a risk for building the Secret Recipe outlet in every country.
3.2 Human Skill
Lead, motivate, manage conflict and influence individuals by understanding the feelings, behaviours and attitudes of other individuals. Ability to communicate with various groups of people such as meet with customers, meeting with senior officers and communicating with employees. For example, Steven Sim is constantly working to address employee performance problems by giving award to those who work hard every month to increase sales and provide feedback to employees so they know Secret Recipe’s vision and mission to achieve the goal.
3.3 Technical Skill
Ability to apply procedures and method techniques in a particular field. The mastery of technical skills can help lower-level managers to provide advice, clarification and tutoring on technical aspects in detail to employees. For example, Steven Sim applies the existing methods and skills to a person to venture into their respective fields such as financial managers, those in the accounting field group who are able to know about withdrawing money or entering the organization at each Secret Recipe branch.
4.0 Function of Management
In my opinion, how the POLC function can help leaders manage their organizational effectiveness by guiding future activities.
Firstly, Planning is a process by which the manager determines the goals to be achieved and determines the most appropriate action to take at all levels of the organization to achieve the organization’s goals. Such as, Steven Sim focuses on a brand building strategy to make Secret Recipe different with competitors. This includes creating a logo, corporate colours to choose business, detailing the marketing strategy, producing uniform employees, designing the display menu, set the interior design for cafes, and setting standards for customer service.
Secondly, Managers need to organize and distribute organizational resources to fulfill their assigned tasks in order to achieve the target. For example, Steven Sim compiled limited organizational resources such as employees, capital, land, entrepreneurs to work well in the organization to distribute their respective duties to avoid overlapping work.
Thirdly, managers need to lead the people to influence the behaviour of employees so that they can carry out tasks that are given in an effective and efficient way to achieve goals. For example Steven Sim needs to lead each unit and employee with an explanation of the task list that needs to be done to increase sales at each Secret Recipe outlet.
Fourthly, controlling is one of the ways managers monitor current performance and take corrective actions to ensure the end result of work is achieved as expected. For example, Steven Sim Steven Sim needs to control the position of the Secret Recipe brand in several ways, including product excellence, additional features, experience, service quality, innovation, product warranty, guarantee, packaging, brand name, image, service promises and more to ensure the organization runs smoothly
Related posts:
- Title: managers make decisions when it comes
- CHAPTER is increasingly recognized as of strategic importance
- EFFECT ……………………………..……… Signature Date Gladys Mwinzi HD:-312
- The of AMME __________________________________________________________ Connection topology optimisation for
- Business Date: 29.05.2018 Contents TOC o “1-3” h
- PROFESSIONAL _Toc524814760 h 21Threat of substitutes PAGEREF
1.0. to find it tremendously problematic to
1.0. Introduction
This chapter of the concept paper presents the background of the study, problem statement, purpose of the study, objectives of the study, research questions, scope of the study, significance of the study and the conceptual framework
1.1. Background to the study
Education is a gadget used to effect countrywide progress. Educational aims stand fixed out in the National Plan on Education in relations of their application to the requirements of the individual and society. The National Strategy is established with aims and objectives, to facilitate educational growth in the country. These goals and intents invite the school head to provide vital roles include enhancing real administrative skills and styles to manage colleges, improve job performance among teachers so students’ academic performance is boosted (Fika, I. Ibi, M. and Aji, B., 2015).
It is not astonishing that there is massive demand for operative administration of secondary schools. A good number of school heads haven’t considered the different administrative techniques which determine students’ academic performance in the country. Hence, some of them seem to find it tremendously problematic to successfully lead their schools (Akinnibagbe , 2002).
With the fast changing world, it is impossible for people of preferred managerial technique or type to embrace all knowledge, awareness or power to realise success (Muthondu G.W., 2007). These longstanding forms of management provide power and are a heading to one or few individuals involved in administrative positions. Leadership being gender requires that prospective leaders be trained to adapt to the fluctuating society and make an effort to teach and model different management techniques which will most effectually lead various institutions to achieve set goals.
Students’ performance in examinations is because of different factors; which include provision of physical facilities, classroom size, effective school discipline policies, administrative support and effective leadership. As several studies in Botswana, Nigeria, and Papua New Guinea concur to this (Muli, M.M , 2005). Good administration brings about necessary guidance in the school, clarity of direction and rewards to ensure effective performance of students.
1.2. Problem statement
Administration at work in educational institutions is a dynamic process where an individual is not only accountable for the group’s errands, but also actively seeks the cooperation and assurance of all the group members in achieving group goals in a particular perspective (Aji, B.M, 2014). Administration ensures that students perform to the maximum, since it ensures that tasks are accomplished and the responsible parties assigned for greater strengthening of the institution with emphasis put on recognition, service provision and motivation (Balunywa, W.S. , 2000). However, of all the above contributions of school administration towards academic performance, performance tends to be alarming and wanting in schools as a result of managerial techniques used which influences the organisational culture. Such managerial techniques are made of a set of attitudes, traits, and skills in the principals formed based on four factors: values, trusting employees, leadership orientation, and a sense of security shaped in important situations
1.3. Purpose of the study
The purpose of the study is to examine the effect of school administration on students’ academic performance in Isingiro District.
1.4. Objective of the study
i. To establish the different factors that affect students’ academic performance.
ii. To investigate the contribution of school administrators towards students’ academic performance
iii. To determine the possible measures to the challenges faced by students in Isingiro District.
1.5. Research questions
i. What are the different factors that affect students’ academic performance?
ii. What is the contribution of school administrators towards students’ academic performance?
iii. What are the possible measures to the challenges faced by students in Isingiro District?
1.6. Scope of the study
The study will focus on effect of school administrators on students’ academic performance The study is limited to school administrators as the independent variable and students’ academic performance as the dependent variable. The study will be carried out in Isingiro District. This so because of the limited finances and with government aided schools in place within the district whose academic performance tends to fluctuate each and every year.
1.7. Significance of the study
The results of this study will be valuable to researchers and scholars, as it would form a basis for further research. Scholars will use this study as a basis for discussions on school administration and students’ academic performance as it will provide the scholars with empirical studies that they will use in their studies. The study will also add to the body of knowledge in the education discipline by bridging the existing gap. This study will make several contributions to both knowledge building and practice improvement with several policies recommendation put forward
1.8. Conceptual framework
Independent Variable Dependent Variable
Mediating/intervening variable
Source: Researcher 2018
?
2.0. Literature review
Principalship is a critical management skill involving the ability to encourage group of people towards common goal. Leadership focuses on the development of followers and their needs. Managers exercising transformational administrative style focusing on the development of value system of employees, their motivational level and moralities with the development of their skills, (Sashkin, M. ;Sashkin, M. , 2003). Different administrative styles of a school principal which include initiative, consideration and participatory structure of management (Omolayo B., 2009)
Initiative structure of administration is the extent to which a principal defines managers and group member roles, initiates actions, organizes group activities and defines how task are to be accomplished by the group. A leader in this structure defines his goals and facilitates group movement toward them. This administrative style decides everything and tries to manipulate the followers into approving his ideas on how the school should function. A leader in this group does not give trust to any member of the group.
Lee (1995) reported that, the Initiative structure of management leadership style results in the group members reacting aggressively and apathetically in the work environment. This often results in unending industrial disputes in an organization hence affecting the overall achievement of the organizational goals and objectives. Mwalala, (2008) observed that Initiative structure and harsh climate leads to poor performance of students. Initiative structure of management, also known as autocratic leaders, provide clear expectations for what needs to be done, when it should be done, and how it should be done. There is also a clear division between the leader and the followers.
In their study, Lewin and Caillords (2001) found that participative administrator, also known as democratic leadership, is generally the most effective administrative style. Participatory structure leadership not only offers guidance to group members, but they are allowed to participate in the group and allow input from other group members. Hence, children in this group were less productive than the members of the Initiative structure group, but their contributions were of a much higher quality. Participative administrator encourages group members to participate, but retain the final say over the decision-making process. Group members feel engaged in the process and are more motivated and creative who in turn improve their performance as well as the performance of the organization.
3.0. Methodology
The researcher will adopt a descriptive research survey for this study it is suitable for the study as it gives the researcher the opportunity of obtaining respondents’ opinion from the entire population sampled. The total population of the study is made up of 5 Secondary Schools in Isingiro district during the 2015/2017 academic session. The population is chosen for investigation due to the researcher’s interest. Simple Random Sampling method will be used. The Schools in the Zone are grouped according the three divisions in the district. Simple Random Sampling method will be used to select the Schools under study. The sample size will comprise of 60 teachers from the secondary schools being studied which will constitute the number of questionnaires obtained after distribution.
A Structured Questionnaire will be used for data collection process. The questionnaire items will be validated to ascertain its suitability for use in data collection. The whole content of the questionnaire and its structure will critically be examined and corrections made where required and its reliability determined using a test –retest method.
Data collected will be edited upon the receipt of the questionnaires to ensure accuracy and consistency of the information given by the respondents. Data will be entered in the computer using a SPSS version 20, descriptive, principal component, correlation and regression analysis will be used to establish the relationship between the study variables. Responses from the questionnaire will be analysed using the descriptive statistics of frequency counts, percentage, and inferential statistics and descriptive statistics of frequency counts and percentages will also be used in analysing demographic variables and research questions.
For data analysis and presentation, the data collected will be edited and checked to ensure uniformity, accuracy, consistency and comprehensiveness. The structured questionnaires will be coded, questions grouped, tabulated and frequencies run according to the objectives of the study, the data will be analysed and the information presented using statistical frequency tables, graphs and pie – charts.
?
4.0. References
Aji, B.M. (2014). Leadership styles of head of department and academic staff performance: Unpublished Master Dissertation, University of Maiduguri, Nigeria.
Akinnibagbe . (2002). The relationship between leadership and follower in-role performance and satisfaction with the leader: The mediating effects of empowerment and trust in the leader. Leadership and Organization Development Journal, 28,(1), 4-19.
Balunywa, W.S. . (2000). A hand Book of Business Management. Kampala: Ugandan Press. .
Fika, I. Ibi, M. and Aji, B. (2015). Leadership styles of head of department and academic staff performance in the University of Maiduguri: Maiduguri Journal of Education Studies, 8(1) 83-94.
Lee D. (1995). Leadership theory, application and skill development: USA: South- West College Publishing.
Lewin, K ; Caillords, f. (2001). Financing secondary education in development: strategic for sustainable growth: Paris International Institute for Education Planning. UNESCO.
Muli, M.M . (2005). Effects of Head Teachers Management Styles on Performance in Physics at K.S.C.E. Examination in Mutomo Division, Kitui District: Unpublished M. ed. Project, University of Nairobi.
Muthondu G.W. (2007). “Teachers’ Perception of Female Head Teachers’ Leadership Styles in Public Secondary School in Nairobi Province: Unpublished Master Dissertation, University of Nairobi. .
Mwalala D.B. . (2008). Influences of Head Teachers’ Leadership Styles on K.C.S.E Performance in Public Secondary School in Taita District: Unpublished Master Dissertation, University of Nairobi. .
Okumbe, J. A. (1998). Educational Management: Theory and Practice. Nairobi: Nairobi University Press.
Omolayo B. (2009). Effects of leadership styles on job related tension and psychological sense of community in work organization: case study of four organization in Lagos State, Nigeria: Bangladesh. E.J Social. 4,(2)133-157.
Sashkin, M. &Sashkin, M. . (2003). Leadership That Matters. San Francisco: BarrettKoehler Publishers Inc.
Related posts:
- Table -1.4Research Questions PAGEREF _Toc509252236 h –
- London external requirements….(Page 9) 2.3 Design teaching and
- center161925 program, Sk. Tawfique M Haque, Professor
- BACKGROUND ____________________________ Prof. Date JKUAT, Kenya DEDICATIONS
- In implement the changes based on the findings.
- CHAPTER it may generate an information or