Sei sulla pagina 1di 38

CONTENTS

S.NO TITLE PAGE .NO


ACKNOWLEGEMENT
ABSTRACT
I INTRODUCTION
1.1 ORGANISATION PROFILE
1.2 SYSTEM SPECIFICATION
1.2.1 HARDWARE CONFIGURATION
1.2.2 SOFTWARE SPECIFICATION
1.3 ABOUT THE PROJECT
II SYSTEM STUDY
2.1 EXISTING SYSTEM
2.1.1 DRAWBACKS OF EXISTING SYSTEM
2.2 PROPOSED SYSTEM
2.2.1 FEATURES OF PROPOSED SYSTEM
III SYSTEM DESIGN AND DEVELOPMENT
3.1 FILE DESIGN
3.2 INPUT DESIGN
3.3 OUTPUT DESIGN
3.4 DATABASE DESIGN
3.5 SYSTEM DEVELOPMENT
3.6 MODULES DESCRIPTION
IV TESTING AND IMPLEMENTATION
CONCLUSION AND FUTURE ENHANCEMENT
BIBLIOGRAPHY
APPENDIX
A) DATA FLOW DIAGRAM
B) SAMPLE CODING
C) SCREENSHOTS
ABSTRACT

This will enable a more effective way to short list submitted candidate CVs from a
large number of applicants providing a consistent and fair CV ranking policy, which can be
legally justified. System will rank the experience and key skills required for particular job
position. Than system will rank the CV’s based on the experience and other key skills which
are required for particular job profile. This system will help the HR department to easily
shortlist the candidate based on the CV ranking policy. This system will focus not only in
qualification and in experience but also focuses on other important aspects, which are
required for particular job position. This system will help the human resource department to
select right candidate for particular job profile, which in turn provide expert workforce for
the organization.

Candidate here will register him/herself with all its details and will upload their own
CV into the system, which will be further used by the system to shortlist their CV. Candidate
can also give an online test, which will be conducted on personality questions as well as
aptitude questions. After completing the online test, candidate can view their own test results
in graphical representation with marks.
CHAPTER – I

INTRODUCTION

1.1 ORGANISATION PROFILE


ETS (Extol Tech Solution) is best software Development Company and All staffs
have more experienced and real field work experienced. ETS is experienced in delivery,
installation and providing back-up for customer system in order to minimize the effect of
possible faults.

We also special expertise in custom software development –providing specialized


products, IT services and custom end to end solutions to our enterprise customers. We
provide high quality software development services, professional consulting and
development outsourcing that would improve our customers operation

ETS is a full IT benefit based web designing and development organization having its
head quarter in jayanagar, Bangalore and branch is located in 159, Amman Complex, 2nd
floor, Mettur road, Erode

ETS always give the best effort for our customer satisfaction we take responsibility
for never gives up until the job done right

MISSION

Providing high quality software development services, professional consulting and


development outsourcing that would improve our customers operation. Making access to
information easier and secure to our customer

VISION

We develop innovative and creative products and services that provide total
communication and information solutions in IT
SYSTEM SPECIFICATION

1.2. HARDWARE SPECIFICATION

Processor : Core 2 Duo.

Hard Disk : 120 GB.

Monitor : 15’’ LED

Input Devices : Keyboard, Mouse

Ram : 3 GB

Mouse : Logitech

Keyboard : iball

1.2. SOFTWARE SPECIFICATION

Operating system : Windows 7 professional.

Coding Language : PHP

Database : MYSQL
ABOUT THE PROJECT:

The rapid development of modern Information and Communication technologies


(ICTs) in the past few years and their introduction into people’s daily lives has led to new
circumstances at all levels of their social environment (work, interpersonal relations,
entertainment, etc). People have been steadily turning to the web for job seeking and career
development, using web 2.0 services like LinkedIn and job search sites. On the other hand, a
lot of companies use online knowledge management systems to hire employees, exploiting
the advantages of the World Wide Web. These are termed systems and automate the process
of publishing positions and receiving CVs. The online recruitment problem is two-sided: It
can be seeker-oriented or company-oriented. In the first case, the system recommends to the
candidate a list of job positions that better fit his profile. In the second case recruiters publish
the specifications of available job positions, and the candidates can apply, submitting their
CVs.
The filtering module performs an automatic pre- screening of candidates, to identify
those that meet the minimum requirements of the offered position. The filtering process is
implemented as a series of XQueries. Using XQueries the recruiter is able to make iterative
queries tightening the minimum requirements. For example, he can query the system for
“candidates with a BSc on computer science and job experience over 3 years”. It must be
noted that the applicants rejected by the filtering module are no further considered for
recruitment.
SOFTWARE DESCRIPTION

Front End:

PHP

PHP started out as a small open source project that evolved as more and more people
found out how useful it was. Rasmus Lerdorf unleashed the first version of PHP way back in
1994.

 PHP is a recursive acronym for "PHP: Hypertext Preprocessor".

 PHP is a server side scripting language that is embedded in HTML. It is used to

manage dynamic content, databases, session tracking, even build entire e-commerce

sites.

 It is integrated with a number of popular databases, including MySQL, PostgreSQL,

Oracle, Sybase, Informix, and Microsoft SQL Server.

 PHP is pleasingly zippy in its execution, especially when compiled as an Apache

module on the Unix side. The MySQL server, once started, executes even very

complex queries with huge result sets in record-setting time.

 PHP supports a large number of major protocols such as POP3, IMAP, and LDAP.

PHP4 added support for Java and distributed object architectures (COM and

CORBA), making n-tier development a possibility for the first time.

 PHP is forgiving: PHP language tries to be as forgiving as possible.

 PHP Syntax is C-Like.


COMMON USES OF PHP

• PHP performs system functions, i.e. from files on a system it can create,

open, read, write, and close them.

• PHP can handle forms, i.e. gather data from files, save data to a file,

through email you can send data, return data to the user.

• You add, delete, modify elements within your database through PHP.

• Access cookies variables and set cookies.

• Using PHP, you can restrict users to access some pages of your website.

• It can encrypt data.

CHARACTERISTICS OF PHP

Five important characteristics make PHP's practical nature possible

• Simplicity

• Efficiency

• Security

• Flexibility

• Familiarity

In order to develop and run PHP Web pages three vital components need to be
installed on your computer system.

• Web Server − PHP will work with virtually all Web Server software,

including Microsoft's Internet Information Server (IIS) but then most often

used is freely available Apache Server.


• Database − PHP will work with virtually all database software, including

Oracle and Sybase but most commonly used is freely available MySQL

database.

• PHP Parser − In order to process PHP script instructions a parser must be

installed to generate HTML output that can be sent to the Web Browser.

This tutorial will guide you how to install PHP parser on your computer.

APACHE CONFIGURATION

If you are using Apache as a Web Server then this section will guide you to edit
Apache Configuration Files.

PHP.INI FILE CONFIGURATION

The PHP configuration file, php.ini, is the final and most immediate way to affect
PHP's functionality.

WINDOWS IIS CONFIGURATION

To configure IIS on your Windows machine you can refer your IIS Reference Manual
shipped along with IIS.

DATA TYPES

PHP stores integers in a platform-dependent range, either a 64-bit or 32-bit signed


integer equivalent to the C-language long type. Unsigned integers are converted to signed
values in certain situations; this behavior is different from other programming languages.
Integer variables can be assigned using decimal (positive and negative), octal, hexadecimal,
and binary notations.

Floating point numbers are also stored in a platform-specific range. They can be
specified using floating point notation, or two forms of scientific notation PHP has a native
Boolean type that is similar to the native Boolean types in Java and C++. Using the Boolean
type conversion rules, non-zero values are interpreted as true and zero as false, as in Perl and
C++. The null data type represents a variable that has no value; NULL is the only allowed
value for this data type.

Variables of the "resource" type represent references to resources from external


sources. These are typically created by functions from a particular extension, and can only be
processed by functions from the same extension; examples include file, image, and database
resources.

Arrays can contain elements of any type that PHP can handle, including resources,
objects, and even other arrays. Order is preserved in lists of values and in hashes with both
keys and values, and the two can be intermingled. PHP also supports strings, which can be
used with single quotes, double quotes, nowdoc or heredoc syntax.

The Standard PHP Library (SPL) attempts to solve standard problems and
implements efficient data access interfaces and classes.

PHP OBJECTS

Basic object-oriented programming functionality was added in PHP 3 and improved


in PHP 4 This allowed for PHP to gain further abstraction, making creative tasks easier for
programmers using the language. Object handling was completely rewritten for PHP 5,
expanding the feature set and enhancing performance. In previous versions of PHP, objects
were handled like value types. The drawback of this method was that code had to make
heavy use of PHP's "reference" variables if it wanted to modify an object it was passed rather
than creating a copy of it. In the new approach, objects are referenced by handle, and not by
value.

PHP 5 introduced private and protected member variables and methods, along with
abstract classes, final classes, abstract methods, and final methods. It also introduced a
standard way of declaring constructors and destructors, similar to that of other object-
oriented languages such as C++, and a standard exception handling model. Furthermore, PHP
5 added interfaces and allowed for multiple interfaces to be implemented. There are special
interfaces that allow objects to interact with the runtime system. Objects implementing Array
Access can be used with array syntax and objects implementing Iterator or Iterator Aggregate
can be used with the for each language construct. There is no virtual table feature in the
engine, so static variables are bound with a name instead of a reference at compile time.

If the developer creates a copy of an object using the reserved word clone, the Zend
engine will check whether a clone() method has been defined. If not, it will call a default
clone() which will copy the object's properties. If a clone() method is defined, then it will be
responsible for setting the necessary properties in the created object. For convenience, the
engine will supply a function that imports the properties of the source object, so the
programmer can start with a by-value replica of the source object and only override
properties that need to be changed.

USE

PHP is a general-purpose scripting language that is especially suited to server-side


web development, in which case PHP generally runs on a web server. Any PHP code in a
requested file is executed by the PHP runtime, usually to create dynamic web page content or
dynamic images used on websites or elsewhere.

It can also be used for command-line scripting and client-side graphical user interface (GUI)
applications. PHP can be deployed on most web servers, many operating systems and
platforms, and can be used with many relational database management systems (RDBMS).
Most web hosting providers support PHP for use by their clients. It is available free of
charge, and the PHP Group provides the complete source code for users to build, customize
and extend for their own use.
PHP acts primarily as a filter, taking input from a file or stream containing text
and/or PHP instructions and outputting another stream of data. Most commonly the output
will be HTML, although it could be JSON, XML or binary data such as image or audio
formats. Since PHP 4, the PHP parser compiles input to produce bytecodefor processing by
the Zend Engine, giving improved performance over its interpreter predecessor.

Originally designed to create dynamic web pages, PHP now focuses mainly on
server-side scripting, and it is similar to other server-side scripting languages that provide
dynamic content from a web server to a client, such as Microsoft's ASP.NET, Sun
Microsystems' JavaServer Pages, and mod_perl.

PHP has also attracted the development of many software frameworks that provide
building blocks and a design structure to promote rapid application development (RAD).
Some of these include PRADO, CakePHP, Symfony, CodeIgniter, Laravel, Yii
Framework, Phalcon and Zend Framework, offering features similar to other web
frameworks.

SECURITY

In 2013, 9% of all vulnerabilities listed by the National Vulnerability Database were


linked to PHP;[184] historically, about 30% of all vulnerabilities listed since 1996 in this
database are linked to PHP. Technical security flaws of the language itself or of its core
libraries are not frequent (22 in 2009, about 1% of the total although PHP applies to about
20% of programs listed). Recognizing that programmers make mistakes, some languages
include taint checking to automatically detect the lack of input validation which induces
many issues. Such a feature is being developed for PHP, but its inclusion into a release has
been rejected several times in the past. There are advanced protection patches such as
Suhosin and Hardening-Patch, especially designed for web hosting environments.

There are certain language features and configuration parameters (primarily the
default values for such runtime settings) that make PHP applications prone to security issues.
Among these, magic_quotes_gpc and register_globals configuration directives are the best
known; the latter made any URL parameters become PHP variables, opening a path for
serious security vulnerabilities by allowing an attacker to set the value of any uninitialized
global variable and interfere with the execution of a PHP script. Support for "magic quotes"
and "register global" has been deprecated as of PHP 5.3.0, and removed as of PHP 5.4.0

Another example for the runtime settings vulnerability comes from failing to disable
PHP execution (via engine configuration directive) for the directory where uploaded images
are stored; leaving the default settings can result in execution of malicious PHP code
embedded within the uploaded images. Also, leaving enabled the dynamic loading of PHP
extensions (via enable_dl configuration directive)[196] in a shared web hosting environment
can lead to security issues.

4.2 BACK END

MYSQL

MySQL is an open-source relational database management system(RDBMS). Its


name is a combination of "My", the name of co-founder Michael Widenius's daughter, and
"SQL", the abbreviation for Structured Query Language. The MySQL development project
has made its source code available under the terms of the GNU General Public License, as
well as under a variety of proprietary agreements. MySQL was owned and sponsored by a
single for-profit firm, the Swedish company MySQL AB, now owned by Oracle
Corporation.[9] For proprietary use, several paid editions are available, and offer additional
functionality.

MySQL is a central component of the LAMP open-source web application software


stack (and other "AMP" stacks). LAMP is an acronym for "Linux, Apache, MySQL,
Perl/PHP/Python". Applications that use the MySQL database include: TYPO3, MODx,
Joomla, WordPress, Simple Machines Forum, phpBB, MyBB, and Drupal. MySQL is also
used in many high-profile, large-scale websites, including Google (though not for searches),
Facebook, Twitter, Flickr, and YouTube.

HISTORY

MySQL was created by a Swedish company, MySQL AB, founded by David


Axmark, Allan Larsson and Michael "Monty" Widenius. Original development of MySQL
by Widenius and Axmark began in 1994.[27] The first version of MySQL appeared on 23
May 1995. It was initially created for personal usage from mSQL based on the low-level
language ISAM, which the creators considered too slow and inflexible. They created a new
SQL interface, while keeping the same API as mSQL. By keeping the API consistent with
the mSQL system, many developers were able to use MySQL instead of the (proprietarily
licensed) mSQL antecedent.

LIMITATIONS

When using some storage engines other than the default of InnoDB, MySQL does not
comply with the full SQL standard for some of the implemented functionality, including
foreign key references and check constraints. Up until MySQL 5.7, triggers are limited to
one per action / timing, meaning that at most one trigger can be defined to be executed after
an INSERT operation, and one before INSERTon the same table. No triggers can be defined
on views .MySQL database's inbuilt functions like UNIX_TIMESTAMP() will return 0 after
03:14:07 UTC on 19 January 2038. Recently, there had been an attempt to solve the problem
which had been assigned to the internal queue.
HIGH AVAILABILITY SOFTWARE

MySQL Fabric is an integrated system for managing a collection of MySQL servers,


and a framework on top of which high availability and database sharding is built. MySQL
Fabric is open-source, and supports procedure execution in the presence of failure, providing
an execution model usually called resilient execution. MySQL client libraries are extended so
they are hiding the complexities of handling failover in the event of a server failure, as well
as correctly dispatching transactions to the shards.

PHPMYADMIN

phpMyAdmin is a free and open source tool written in PHP intended to handle the
administration of MySQL with the use of a web browser. It can perform various tasks such as
creating, modifying or deleting databases, tables, fields or rows; executing SQL statements;
or managing users and permissions. The software, which is available in 78 languages, is
maintained by The phpMyAdmin Project

TECHNIQUES USED:

The system derives and ranks the candidates that have passed the filtering stage,
based on classic IR techniques. Each candidate’s rank acts as a score of how well his profile
fits the recruiter’s specifications. Ranking is based on the analytic hierarchy process, or AHP.

The first step in the analytic hierarchy process is to define the ranking criteria and the
criteria’s. grades. The grades may take numeric values or take the form: excellent, very good,
average, poor and very poor and may differ for each criterion. The criteria we used in our
system are:

 Personality traits: the average scores from the 4 personality categories shown.

 Education: The number of years of full-time formal (academic) learning.

 Work Experience (Years in a related position)

 Loyalty (years the candidate spent per job).

 Skills: The optional skills the candidate fulfils.


The second step is the elicitation of pair wise comparison judgments. Specifically, the
recruiter has to compare the importance of the abovementioned criteria, entering weights.
These weights rank the relative significance of each pair of criteria. For example, the
recruiter has to decide how much more important is work experience from education. For this
procedure a web form was implemented.

From these comparisons a matrix A with dimensions × is derived, where n is the


number of the criteria. The matrix A is in the form: Then we sum each column of the
reciprocal matrix and divide each element with the sum of its column, normalizing the
matrix. The global priority vector, that stores the weights of the ranking criteria is obtained
by averaging across the rows.

Then we move to the pair wise comparisons of the candidates with respect to each
ranking criterion forming 9 matrices. The elements of these matrices are automatically
calculated from the candidates’ grades to each criterion, creating 9 vectors that are the local
priority vectors. Then we compute the overall composite weight, that acts as the candidate
rank, which is the linear combination of the priority vector computed by the recruiter’s
judgments and the local priority vectors computed automatically.
CHAPTER – II

SYSTEM STUDY

2.1 EXISTING SYSTEM

Existing system performs cutthroat process that generally leaves the companies with a

good, but not great employee at a significant financial investment. As the industries have

grown, their hiring needs has rapidly grown. To serve these hiring needs certain consultancy

units like employment websites have come into existence. They offer a solution in which the

candidate has to upload their information and submit it to the website. Then these websites

would search the candidates based on certain keywords. These websites are middle level

organizations between the candidate and recruiter. These websites are also not flexible as the

candidate has to upload there resume in a particular layout, and these formats changed from

system to system.

2.1.1 DRAWBACKS

 This system requires large memory space as it stores data related to CV’s.

 May provide inaccurate results if data not entered properly.

 These systems charge a certain amount per resume


2.2 PROPOSED SYSTEM

The motivation behind this system is to develop an application that will assist
organizations in the recruitment process. This is far different approach than employment
websites. Our system allow the candidates to enter information about academics, skill set etc.
and upload their resumes. The entered information is then analyzed by our system. This
makes our search process easy. The analyzing system works on the algorithm that uses
ranking, which is a sub domain of Text Mining. System reads the information entered by user
such as SSC marks, HSC marks, and degree aggregate, programming languages known and
performs ranking. This acquired information is stored in the database. This stored
information can be accessed by admin, admin can simply provide keywords to the system
and system will find all the relevant resumes that match with the keywords.

2.2.1 FEATURES
 This system can be used in many business sectors that may require expert candidate.

 This system will reduce workload of the human resource department.

 This system will help the human resource department to select right candidate for

particular job profile which in turn provide expert workforce for the organization.

 Admin or the concern person can easily shortlist a candidate based on their online test

marks and can select an appropriate candidate for desired job profile.
CHAPTER – III

SYSTEM DESIGN AND DEVELOPMENT

Design phase was started by reviewing the study phase activities and making
decisions about which functions are to be performed by hardware, software. The output input
of the file design for each of the programs was done.

Steps involved in designing phase were

 The functions to be performed is identified

 The input, output and file design is performed

 The system and component cost requirements is specified.

3.1 FILE DESIGN

The file design is the last phase that indicates the final system and process of the final
System. In the design phase of “PERSONALITY PREDICTION THROUGH CV
ANALYSIS” the database tables, input screen design and output design etc are designed

 The database tables where designed by using all the necessary fields in compact
manner.
 All the input screens in this system are user friendly and understandable format. Also
the sizes of all the screens are standardized.
 Icons are designed in this system are brief, compact and self-explanatory. The icons
are sharp and novice user can invoke the system.
 Reports generated here give the minute information, which helps the manager to take
vital decisions

The importance of software design can be stated with a single word “QUALITY”.
Design is a place where quality is fostered in software development.
3.2 INPUT DESIGN

Input design is the process of converting user-originated inputs to a computer


understandable format. Input design is one of the most expensive phases of the operation of
computerized system and is often the major problem of a system. A large number of
problems with a system can usually be tracked backs to fault input design and method. Every
moment of input design should be analyzed and designed with utmost care.

The system takes input from the users, processes it and produces an output. Input
design is link that ties the information system into the world of its users. The system should
be user-friendly to gain appropriate information to the user. The decisions made during the
input design are

 To provide cost effective method of input.


 To achieve the highest possible level of accuracy.
 To ensure that the input is understand by the user.

System analysis decide the following input design details like, what data to input,
what medium to use, how the data should be arranged or coded, data items and transactions
needing validations to detect errors and at last the dialogue to guide user in providing input.

Input data of a system may not be necessarily is raw data captured in the system from
scratch. These can also be the output of another system or subsystem.

3.3 OUTPUT DESIGN

Output design generally refers to the results and information that are generated by the
system for many end-users; output is the main reason for developing the system and the basis
on which they evaluate the usefulness of the application.

The output is designed in such a way that it is attractive, convenient and informative.
Forms are designed in various features, which make the console output more pleasing. As the
outputs are the most important sources of information to the users, better design should
improve the system’s relationships with user and also will help in decision-making. Form
design elaborates the way output is presented and the layout available for capturing
information.

All records from various databases with same table names are retrieved.

3.4 DATABASE DESIGN

Database Name: cloud_stroage

Table : users

Primary key: id

Entity name Type Description


Id int(11) Primary key
Username Varchar(150) Name of the user
Gender Tinyint(3) Gender of the user
email Varchar(150) Email id of the user
phone Int(11) Phone number
Experience Varchar(100) Experience of the user
Qualification Varchar(100) Qualification of the user
Key_skills Varchar(100) User study skills
Password Varchar(250) User password
File_name Varchar(255) File name of the cv
Aptitude_score Int(11) Score of aptitude
Personality_score Int(11) Personality score
Created_at Date Creation date
Table: answer

Primary key: id

Entity name Type Description


Id int(11) Primary key
content Varchar(155) Answer of the content
Question_id Int(11) Question id
Ques_type int(11) Type of question
Correct Int(11) correct

Table name : aptitude_ques

Primary key: id

Entity name Type Description


Id int(11) Primary key
Que_type Int(11) Type of the question
Question Varchar(355) Question
Option 1 Varchar(255) Option 1 for question
Option 2 Varchar(255) Option 2 for question
Option 3 Varchar(255) Option 3 for question
Option 4 Varchar(255) Option 4 for question
Answer Varchar(255) Answer for the question
Status Int(11) Status of the question
Table name : aptitude_score

Primary key: id

Entity name Type Description


Id int(11) Primary key
score Int(11) score

Table name : job_details

Primary key: id

Entity name Type Description


Id int(11) Primary key
Job_id Int(11) Id for the job
Designation Varchar(100) Designation
Salary Int(11) Salary for the designation
place Varchar(100) Place of the job

Table name : personality_answer

Primary key: id

Entity name Type Description


Id int(11) Primary key
Content Varchar(255) Answer for the content
Question_id Int(11) Question id
correct Int(11) correct
Table name : personality_question

Primary key: id

Entity name Type Description


Id int(11) Primary key
Que_type Int(11) Type of the question
Question Varchar(355) Question
Option 1 Varchar(255) Option 1 for question
Option 2 Varchar(255) Option 2 for question
Option 3 Varchar(255) Option 3 for question
Option 4 Varchar(255) Option 4 for question
Answer Varchar(255) Answer for the question
Status Int(11) Status of the question

Table name : preferred_cv_data

Primary key: id

Entity name Type Description


Id int(11) Primary key
Job_id Int(11) Id for the job
Designation Varchar(100) Designation
Salary Int(11) Salary for the designation
place Varchar(100) Place of the job
File_name Varchar(100) File name
Table name : requirement_details

Primary key: id

Entity name Type Description


Id Int(11) Primary key
Job_id Int(11) Id for the job
Designation Varchar(100) Designation
Salary Int(11) Salary for the designation
place Varchar(100) Place of the job
experience Varchar(100) Experience for the job
qualification Varchar(100) Qualification of the candidate
Key_skills Varchar(100) Key skills of the candidate
status Int(11) Status

Table name : tbl_company

Primary key: id

Entity name Type Description


Id Int(11) Primary key
Companyname Varchar(100) Company name
companyimage Varchar(100) Company image
3.4 SYSTEM DEVELOPMENT
A system development project encompasses all the activities undertaken from the
time at which a potential requirement is identified until the resulting system is fully
implemented and accepted by the end user. The process can involve many stages over a long
period. The following section highlights some fundamental issues to be considered, outlines
the main stages in development and procuring new systems.

Systems development is the process of defining, designing, testing, and implementing


a new software application or program. It could include the internal development of
customized systems, the creation of database systems, or the acquisition of third party
developed software. Written standards and procedures must guide all information systems
processing functions. The organization’s management must define and implement standards
and adopt an appropriate system development life cycle methodology governing the process
of developing, acquiring, implementing, and maintaining computerized information systems
and related technology.

An information system acquired today must not only satisfy present business needs it
must be flexible and capable of being enhanced to meet changing circumstances well into the
future. Thus a pre-requisite to the introduction of a new system is for management to identify
and understand their organization mission and its related information needs. Writing this
down helps to ensure common understanding and direction and provides a yardstick against
which achievement can be measured.
3.4.1 DESCRIPTION OF MODULES

the project has classified into the following modules namely:

ADMIN

- Add Apptitude questions

- Add Personality questions

- Add job details

- View details

USER

- Register user

- Write Test

- View result

MODULES DESCRIPTION

ADMIN

Add Aptitude questions

- Aptitude questions are added by admin

- Admin create questions with details of question type, question options and answer.
Add Personality questions

- Personality question are added by admin

- Admin create questions with details question, openness to experience,

conscientiousness, agreebleness, neuroticism

Add job details

- Add job with details job id, designation, salary, place.

- View and add job details

Preferred cv

- Upload preferred cv and scan cv details

- Add and scan prefered cv details

Requirement details

- Enter job id were automatically display designation, salary, place etc

- Add details about experience, qualification, keyskills, preferred cv.

Shortlist cv

- Admin can select id and scan cv

- View scan results with details student name, resume, expected value, results etc

- Results is a type of graph sheet


View personality questions

- Admin can view the details of personality question

- Admin can edit or delete the personality questions

View aptitude questions

- Admin can view the details of aptitude question

- Admin can edit or delete the aptitude questions

View job details

- Admin can view Job details with the details of designation, salary, place

- Admin can edit and delete job details

USER

TEST

- User can attend the test and submit the answers

- User can attend test personality question, english question, programming question etc

RESULTS

- User can view the result as in the type of graph

- User also view personality score


CHAPTER – IV
TESTING AND IMPLEMENTATION

4.1 SYSTEM TESTING


The purpose of testing is to discover errors. Testing is the process of trying to
discover every conceivable fault or weakness in a work product. It provides a way to check
the functionality of components, sub-assemblies, assemblies and/or a finished product. It is
the process of exercising software with the intent of ensuring that the Software system meets
its requirements and user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement.

TYPES OF TESTS

Unit testing

Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual software
units of the application .it is done after the completion of an individual unit before
integration. This is a structural testing, that relies on knowledge of its construction and is
invasive. Unit tests perform basic tests at component level and test a specific business
process, application, and/or system configuration. Unit tests ensure that each unique path of a
business process performs accurately to the documented specifications and contains clearly
defined inputs and expected results.

Functional test

Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and user
manuals.

Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.


Functions : identified functions must be exercised.

Output : identified classes of application outputs.

Systems/Procedures: interfacing systems or procedures must be invoked.

Organization and preparation of functional tests is focused on requirements, key functions, or


special test cases. In addition, systematic coverage pertaining to identify Business process
flows; data fields, predefined processes, and successive processes must be considered for
testing. Before functional testing is complete, additional tests are identified and the effective
value of current tests is determined.

System Test

System testing ensures that the entire integrated software system meets requirement.
It tests a configuration to ensure known and predictable results. An example of system testing
is the configuration oriented system integration test. System testing is based on process
descriptions and flows, emphasizing pre-driven process links and integration points.

White Box Testing

White Box Testing is a testing in which in which the software tester has knowledge of
the inner workings, structure and language of the software, or at least its purpose. It is
purpose. It is used to test areas that cannot be reached from a black box level.

Black Box Testing

Black Box Testing is testing the software without any knowledge of the inner
workings, structure or language of the module being tested. Black box tests, as most other
kinds of tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document.
Test objectives

 All field entries must work properly.

 Pages must be activated from the identified link.

 The entry screen, messages and responses must not be delayed.

Integration Testing

Software integration testing is the incremental integration testing of two or more


integrated software components on a single platform to produce failures caused by interface
defects. The task of the integration test is to check that components or software applications,
e.g. components in a software system or – one step up – software applications at the company
level – interact without error.

Acceptance Testing

User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.

Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
4.2 SYSTEM IMPLEMENTATION

Implementation is the process of converting a new or revised system design into an


operational one when the initial design was done by the system; a demonstration was given
to the end user about the working system. This process is uses to verify and identify any
logical mess working of the system by feeding various combinations of test data.

When the management of the system approves the system implemented in the
concern, initially the system was run parallel with existing manual system. The system has
been tested with live data and has proved to be error free and user friendly.

System implementation is made up of many activities. Coding is the process of


whereby the physical design specifications created by the analysis team turned into working
computer code by the programming team.

Once the coding process is begin and proceed in parallel, as each program module
can be tested. Installation is the process during which the current system is replaced by the
new system. This includes conversion of existing data, software, and documentation and
work procedures to those consistent with the new system. It is result from the installation
process, user guides provides the information of how the use the system and its flow.

Training plan is a strategy for training user so they quickly learn to the new system.
The development of the training plan probably began earlier in the project.
The implementation methodology includes the following phases - discovery, system
development, and user acceptance testing and production rollout. The Discovery Phase is
preceded by a Project Kick-off Work-session that includes application demonstrations,
completion and review of requirements and configuration questionnaires, identification of
key client documentation, as well as consultation on possible process re-engineering needs.

The trainer will deliver the Administrator Training on-site, face-to-face, to a


maximum of system administrators, so each learner gets personalized attention and can ask
and get specific answers to questions. If it's more convenient for them and they can be offered
the training facilities.
CHAPTER – V

CONCLUSION AND BIBLIOGRAPHY

5.1 CONCLUSION
In this work we have proposed and implemented a company oriented e-recruitment
system that assist the recruiter in his decision-making process.
Our system automatically filters the candidates that don’t meet the minimum
requirements of the offered position. Finally, the candidates are ranked based on the Analytic
Hierarchy Process.
A number of tests were performed for evaluating the developed system. We found
that the system is able to effectively match candidates to offered positions based on their
qualifications and competencies.
In this research paper we proposed prediction of CV Analysis system will help the
human resource department to select right candidate for particular job profile which in turn
provide expert workforce for the organization. This project provide good for me as it
provided practical knowledge of not only programming in PHP and web based application
and no some extent Windows Application and SQL Server, but also about all handling
procedure related with “PERSONALITY PREDICTION SYSTEM THROUGH CV
ANALYSIS”. It also provides knowledge about the latest technology used in developing web
enabled application and client server technology that will be great demand in future. Through
implementation and simulation, we show that our solution is both scalable and efficient.

FUTURE ENHANCEMENT:
In future , we have to implement the concept of SMS sending. Although we tried to
be as through as possible in the implementation of our project but there were a large number
of features we could not implement due to want of time or for other reasons. And we provide
additionally each and every users having login to view their Experience details.
BIBLIOGRAPHY

BOOK REFERENCE:

 PHP & MySQL Novice to Ninja – by Kevin Yank


 Head First PHP & MySQL – by Lynn Beighley & Michael Morrison
 PHP: A Beginner’s Guide – by Vikram Vaswani
 David Sawyer McFarland, "JavaScript and jQuery - The missing manual", 3rd ed,
2014, O'Reilly.
 Jonathan Chaffer and Karl Swedbery, "Learning jQuery", 4th ed, 2013, Packt
Publishing.
 Codd E. F., "A Relational Model of Data for Large Shared Data Banks",
Communications of the ACM, vol. 13, issue 6, pp. 377–387, June 1970.

Websites:

 http://ieeexplore.ieee.org/document/7784983
 http://php.net/.
 http://php.net/manual/en/.
 http://php.net/manual/en/langref.php.
APPENDIX

DATA FLOW DIAGRAM

LEVEL – 0

View Question
Add question Personality And Test
prediction
ADMIN through cv
USER
View result analysis register
LEVEL – 1

USER TEST RESULT


SERIES

ADMIN

DATABASE
LEVEL – 2

ADD
ADMIN ADD JOB
QUESTION
DETAILS

HOMEPAGE

TEST RESULT VIEW


USER PERSONALITY
SERIES SCORE