Online ISSN: 2515-8260

Keywords : Organization


A STUDY ON E-TRAINING PROCESS INSELECTED IT AND ITES COMPANIES WITH SPECIAL REFERENCE TO CHENNAI

M.M. Shanmugapriya; Dr.D. Venkatramaraju

European Journal of Molecular & Clinical Medicine, 2022, Volume 9, Issue 8, Pages 1229-1235

            Employee E-Trainingis a cycle where individuals master expertise, information, disposition, and conduct required to proficiently play out the gig. It is a specialty of expanding the information and abilities of a representative for making a specific showing. The intention is to foster the capacities of the individual and fulfill the current and future labor supply need. Preparing need must be coordinate with the need of the individual and assist him with filling toward the path which drives him to progress. To adapt to the adjustment of inward and outside climate the representative should be prepared. Preparing abbreviates the time expected for representatives to arrive at their productivity level. They increment the quality and the amount handled and lessens the inactive time. A powerful arranged very much oversaw preparing program increment and efficiency, cost control, lower worker turnover and better human relations inside the firm. In this study it is to figure out the preparation viability among ITES area. An example size of 70 was gathered from an organized poll. This study was determined by utilizing factual devices like chi-square, one-way Anova, Correlation.

COOPERATION OF THE UNITED STATES OF AMERICA WITH THE REPUBLIC OF UZBEKISTAN IN FIELD OF PROVIDING SECURITY IN THE CENTRAL ASIA

Kudrat Ortikov; Barno Nazarova; Jakhongir Rustamov

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 2, Pages 635-639

Abstract. In this article author is tried to show explicit cooperation of the Republic of Uzbekistan and the United States of America in field of providing security in the region of Central Asia. Besides, in the article is given information the role of the Republic of Uzbekistan in the sphere of maintaining stable situation in the region and assistance of the USA. The article includes itself also information of modern policy of the Republic of Uzbekistan towards the Islamic Republic of Afghanistan and further proposals to provide its stable situation.

Understanding Micro Small Medium Enterprise in Indonesia

Iwan Koerniawan; Yulia Tri Samiha; Cut Erika Ananda Fatimah; Ade Ananto Terminanto; Rita Irviani

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 2, Pages 1191-1203

is hampered. Understanding the intricate details of the issues being looked by
MSME's is accepted to have an association with endeavors to renew the business in the
current advanced time. Hence, we have directed a field study utilizing observational
techniques and delineated arbitrary examples to comprehend the attributes of these MSME's
issues. At last, we prevailing with regards to summing up the discoveries of the MSME's
investigation among some MSME's entertainers in the region. Our discoveries incorporate;
First, MSME's are held to occupy the time clear at home. Furthermore, MSME's are
completed without having a reasonable administrative vision and mission. Third, as a normal
individual MSME's there, it is completed with its own little capital without capital advances
from money related organizations or other outside gatherings with a benefit sharing
framework. In this way, we recommend that the discoveries of the difficult qualities will be 
understood if the MSME's get colleagues and subsidizing to help oversee and deal with the
financials and the outlook of the MSME's so they can expand their business profitability

The Organization and Management of National Education System

Wiflihani .; Juliaans Eliezer Rulland Marantika; Hery Winoto Tj; Dicky Hendrawan; Pradana Chairy Azhar; Mohzana .

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 2, Pages 1349-1365

understudies that endures all through life. Training is sorted out by
giving models, building self discipline, and building up understudies' innovativeness in the
learning procedure. Training is completed by building up a culture of perusing, composing and
math for all residents. Instruction is completed by enabling all segments of society through
support in the organization and quality control of instructive administrations. In the
administration of the national instruction framework, the party in question is the president, while
the operationalization of the board by the president is alloted to the service or clergyman

Efficient Security Measures to Avoid Data Vul-nerabilities in Cloud Using Encryption Tech-niques

Nomula Manoj Kumar Reddy; S Divya

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 3, Pages 1571-1581

Thetechnology of engineering science is growingfaster and its usage isto bootincreasing speedily. The data and its usage has become an important issue in existence. There by the storage of data may be a crucial issue in means of life. For this data storage, Cloud Computing is useful. Cloud computing is that the follow of using a network of remote servers hosted on internet to store, manage and methodology data on demand and pay as per use. It provides access to a pool of shared resources instead of native servers or personal computers. as a result, outfit do not acquire the things physically, it saves managing value and time for organizations. As a result of the sector of cloud computing is spreading the new techniques are developing. This increase in cloud computing setting to boot can increase security challenges for cloud developers. Most of the organizations are an excellent deal concerned regarding the possession of their data.This analysis paper presents a review on the cloud computing concepts yet as security issues inherent at intervals the context of cloud computing and cloud infrastructure. This paper in addition analyses the key analysis and challenges that presents in cloud computing and offers best practices to service suppliers yet as enterprises. The foremost goal is to review different types of attacks and encryption techniques to secure the cloudmodel.