Back to Current Issues

OUTLET SUPERVISOR: LEADERSHIP AND OVERSIGHT FOR CUSTOMERS

B. Lakshmi, M. Kavya,

Affiliations
Department of Computer Applications, V.R.S.E.C, Vijayawada -7, Andhra Pradesh, India
:10.22362/ijcert/2018/v5/i3/v5i301


Abstract
The Shopping Mall Management System will allow more than one shop owner to set up different shops, to sell various products under one roof, i.e. mall. The mall performs the creation of a set of different shops, such as a bookstore, a shoe store, clothes store, jewellery store etc. In the existing mechanism, customers need to search for the shop’s manually in a mall. Shop owners also directly contact the mall administrator for their new shop setup. Even mall administrator also maintains the shop’s data manually. It is like storing information in records. It will create the burden for the management to keep all the records. It is a very much time-consuming process. The article is going to develop a web-based application which is shopping mall management system. This application can be applied to any shop. The Mall owner is the super user and has complete control over all the activities that can be performed. The app notifies the administrator of all shop creation requests, and the administrator can then approve or reject them. The administrator maintains whole mall database. That means updating, deletion, reset tasks are managed.


Citation
B. Lakshmi,M. Kavya (2018). OUTLET SUPERVISOR: LEADERSHIP AND OVERSIGHT FOR CUSTOMERS. International Journal of Computer Engineering In Research Trends, 5(3), 72-76. Retrieved from http://ijcert.org/ems/ijcert_papers/V5I301.pdf


Keywords : outlet, oversight, supervision, opportunistic, architecturally

References
[1] Arentze, T. A., Oppewal, H., & Timmermans, H. J. (2005). “A Multipurpose Shopping Trip Model to Assess Retail Agglomeration Effects”. Journal of Marketing Research, 42(1), 109-115. 

[2] Arnold, M. J., & Reynolds, K. E. (2003). “Hedonic shopping motivations”. Journal of Retailing, 79(2), 77-95.

[3] Aronson, E., & Aronson, J. (2012). “The social animal”, (11th ed). New York: Worth.

[4] Bachi Reddy Sarath Kumar Reddy, G.Viswanath, “Authorized Deduplication: An Approach for Secure Cloud Environment”. International Journal of Computer Engineering In Research Trends, Volume 4, Issue 8, August -2017, pp. 341-345, ISSN: 2349-7084.
 
[5]   http://www.w3schools.com/html/default.asp.

[6]   http://www.w3schools.com/css/default.asp.


DOI Link : https://doi.org/10.22362/ijcert/2018/v5/i3/v5i301

Download :
  V5I301.pdf


Refbacks : Currently there are no refbacks

Quick Links


DOI:10.22362/ijcert


Science Central

Score: 13.30



Submit your paper to editorijcert@gmail.com

>