Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
This will enable a more effective way to short list submitted candidate CVs from a
large number of applicants providing a consistent and fair CV ranking policy, which can be
legally justified. System will rank the experience and key skills required for particular job
position. Than system will rank the CV’s based on the experience and other key skills which
are required for particular job profile. This system will help the HR department to easily
shortlist the candidate based on the CV ranking policy. This system will focus not only in
qualification and in experience but also focuses on other important aspects, which are
required for particular job position. This system will help the human resource department to
select right candidate for particular job profile, which in turn provide expert workforce for
the organization.
Candidate here will register him/herself with all its details and will upload their own
CV into the system, which will be further used by the system to shortlist their CV. Candidate
can also give an online test, which will be conducted on personality questions as well as
aptitude questions. After completing the online test, candidate can view their own test results
in graphical representation with marks.
CHAPTER – I
INTRODUCTION
ETS is a full IT benefit based web designing and development organization having its
head quarter in jayanagar, Bangalore and branch is located in 159, Amman Complex, 2nd
floor, Mettur road, Erode
ETS always give the best effort for our customer satisfaction we take responsibility
for never gives up until the job done right
MISSION
VISION
We develop innovative and creative products and services that provide total
communication and information solutions in IT
SYSTEM SPECIFICATION
Ram : 3 GB
Mouse : Logitech
Keyboard : iball
Database : MYSQL
ABOUT THE PROJECT:
Front End:
PHP
PHP started out as a small open source project that evolved as more and more people
found out how useful it was. Rasmus Lerdorf unleashed the first version of PHP way back in
1994.
manage dynamic content, databases, session tracking, even build entire e-commerce
sites.
module on the Unix side. The MySQL server, once started, executes even very
PHP supports a large number of major protocols such as POP3, IMAP, and LDAP.
PHP4 added support for Java and distributed object architectures (COM and
• PHP performs system functions, i.e. from files on a system it can create,
• PHP can handle forms, i.e. gather data from files, save data to a file,
through email you can send data, return data to the user.
• You add, delete, modify elements within your database through PHP.
• Using PHP, you can restrict users to access some pages of your website.
CHARACTERISTICS OF PHP
• Simplicity
• Efficiency
• Security
• Flexibility
• Familiarity
In order to develop and run PHP Web pages three vital components need to be
installed on your computer system.
• Web Server − PHP will work with virtually all Web Server software,
including Microsoft's Internet Information Server (IIS) but then most often
Oracle and Sybase but most commonly used is freely available MySQL
database.
installed to generate HTML output that can be sent to the Web Browser.
This tutorial will guide you how to install PHP parser on your computer.
APACHE CONFIGURATION
If you are using Apache as a Web Server then this section will guide you to edit
Apache Configuration Files.
The PHP configuration file, php.ini, is the final and most immediate way to affect
PHP's functionality.
To configure IIS on your Windows machine you can refer your IIS Reference Manual
shipped along with IIS.
DATA TYPES
Floating point numbers are also stored in a platform-specific range. They can be
specified using floating point notation, or two forms of scientific notation PHP has a native
Boolean type that is similar to the native Boolean types in Java and C++. Using the Boolean
type conversion rules, non-zero values are interpreted as true and zero as false, as in Perl and
C++. The null data type represents a variable that has no value; NULL is the only allowed
value for this data type.
Arrays can contain elements of any type that PHP can handle, including resources,
objects, and even other arrays. Order is preserved in lists of values and in hashes with both
keys and values, and the two can be intermingled. PHP also supports strings, which can be
used with single quotes, double quotes, nowdoc or heredoc syntax.
The Standard PHP Library (SPL) attempts to solve standard problems and
implements efficient data access interfaces and classes.
PHP OBJECTS
PHP 5 introduced private and protected member variables and methods, along with
abstract classes, final classes, abstract methods, and final methods. It also introduced a
standard way of declaring constructors and destructors, similar to that of other object-
oriented languages such as C++, and a standard exception handling model. Furthermore, PHP
5 added interfaces and allowed for multiple interfaces to be implemented. There are special
interfaces that allow objects to interact with the runtime system. Objects implementing Array
Access can be used with array syntax and objects implementing Iterator or Iterator Aggregate
can be used with the for each language construct. There is no virtual table feature in the
engine, so static variables are bound with a name instead of a reference at compile time.
If the developer creates a copy of an object using the reserved word clone, the Zend
engine will check whether a clone() method has been defined. If not, it will call a default
clone() which will copy the object's properties. If a clone() method is defined, then it will be
responsible for setting the necessary properties in the created object. For convenience, the
engine will supply a function that imports the properties of the source object, so the
programmer can start with a by-value replica of the source object and only override
properties that need to be changed.
USE
It can also be used for command-line scripting and client-side graphical user interface (GUI)
applications. PHP can be deployed on most web servers, many operating systems and
platforms, and can be used with many relational database management systems (RDBMS).
Most web hosting providers support PHP for use by their clients. It is available free of
charge, and the PHP Group provides the complete source code for users to build, customize
and extend for their own use.
PHP acts primarily as a filter, taking input from a file or stream containing text
and/or PHP instructions and outputting another stream of data. Most commonly the output
will be HTML, although it could be JSON, XML or binary data such as image or audio
formats. Since PHP 4, the PHP parser compiles input to produce bytecodefor processing by
the Zend Engine, giving improved performance over its interpreter predecessor.
Originally designed to create dynamic web pages, PHP now focuses mainly on
server-side scripting, and it is similar to other server-side scripting languages that provide
dynamic content from a web server to a client, such as Microsoft's ASP.NET, Sun
Microsystems' JavaServer Pages, and mod_perl.
PHP has also attracted the development of many software frameworks that provide
building blocks and a design structure to promote rapid application development (RAD).
Some of these include PRADO, CakePHP, Symfony, CodeIgniter, Laravel, Yii
Framework, Phalcon and Zend Framework, offering features similar to other web
frameworks.
SECURITY
There are certain language features and configuration parameters (primarily the
default values for such runtime settings) that make PHP applications prone to security issues.
Among these, magic_quotes_gpc and register_globals configuration directives are the best
known; the latter made any URL parameters become PHP variables, opening a path for
serious security vulnerabilities by allowing an attacker to set the value of any uninitialized
global variable and interfere with the execution of a PHP script. Support for "magic quotes"
and "register global" has been deprecated as of PHP 5.3.0, and removed as of PHP 5.4.0
Another example for the runtime settings vulnerability comes from failing to disable
PHP execution (via engine configuration directive) for the directory where uploaded images
are stored; leaving the default settings can result in execution of malicious PHP code
embedded within the uploaded images. Also, leaving enabled the dynamic loading of PHP
extensions (via enable_dl configuration directive)[196] in a shared web hosting environment
can lead to security issues.
MYSQL
HISTORY
LIMITATIONS
When using some storage engines other than the default of InnoDB, MySQL does not
comply with the full SQL standard for some of the implemented functionality, including
foreign key references and check constraints. Up until MySQL 5.7, triggers are limited to
one per action / timing, meaning that at most one trigger can be defined to be executed after
an INSERT operation, and one before INSERTon the same table. No triggers can be defined
on views .MySQL database's inbuilt functions like UNIX_TIMESTAMP() will return 0 after
03:14:07 UTC on 19 January 2038. Recently, there had been an attempt to solve the problem
which had been assigned to the internal queue.
HIGH AVAILABILITY SOFTWARE
PHPMYADMIN
phpMyAdmin is a free and open source tool written in PHP intended to handle the
administration of MySQL with the use of a web browser. It can perform various tasks such as
creating, modifying or deleting databases, tables, fields or rows; executing SQL statements;
or managing users and permissions. The software, which is available in 78 languages, is
maintained by The phpMyAdmin Project
TECHNIQUES USED:
The system derives and ranks the candidates that have passed the filtering stage,
based on classic IR techniques. Each candidate’s rank acts as a score of how well his profile
fits the recruiter’s specifications. Ranking is based on the analytic hierarchy process, or AHP.
The first step in the analytic hierarchy process is to define the ranking criteria and the
criteria’s. grades. The grades may take numeric values or take the form: excellent, very good,
average, poor and very poor and may differ for each criterion. The criteria we used in our
system are:
Personality traits: the average scores from the 4 personality categories shown.
Then we move to the pair wise comparisons of the candidates with respect to each
ranking criterion forming 9 matrices. The elements of these matrices are automatically
calculated from the candidates’ grades to each criterion, creating 9 vectors that are the local
priority vectors. Then we compute the overall composite weight, that acts as the candidate
rank, which is the linear combination of the priority vector computed by the recruiter’s
judgments and the local priority vectors computed automatically.
CHAPTER – II
SYSTEM STUDY
Existing system performs cutthroat process that generally leaves the companies with a
good, but not great employee at a significant financial investment. As the industries have
grown, their hiring needs has rapidly grown. To serve these hiring needs certain consultancy
units like employment websites have come into existence. They offer a solution in which the
candidate has to upload their information and submit it to the website. Then these websites
would search the candidates based on certain keywords. These websites are middle level
organizations between the candidate and recruiter. These websites are also not flexible as the
candidate has to upload there resume in a particular layout, and these formats changed from
system to system.
2.1.1 DRAWBACKS
This system requires large memory space as it stores data related to CV’s.
The motivation behind this system is to develop an application that will assist
organizations in the recruitment process. This is far different approach than employment
websites. Our system allow the candidates to enter information about academics, skill set etc.
and upload their resumes. The entered information is then analyzed by our system. This
makes our search process easy. The analyzing system works on the algorithm that uses
ranking, which is a sub domain of Text Mining. System reads the information entered by user
such as SSC marks, HSC marks, and degree aggregate, programming languages known and
performs ranking. This acquired information is stored in the database. This stored
information can be accessed by admin, admin can simply provide keywords to the system
and system will find all the relevant resumes that match with the keywords.
2.2.1 FEATURES
This system can be used in many business sectors that may require expert candidate.
This system will help the human resource department to select right candidate for
particular job profile which in turn provide expert workforce for the organization.
Admin or the concern person can easily shortlist a candidate based on their online test
marks and can select an appropriate candidate for desired job profile.
CHAPTER – III
Design phase was started by reviewing the study phase activities and making
decisions about which functions are to be performed by hardware, software. The output input
of the file design for each of the programs was done.
The file design is the last phase that indicates the final system and process of the final
System. In the design phase of “PERSONALITY PREDICTION THROUGH CV
ANALYSIS” the database tables, input screen design and output design etc are designed
The database tables where designed by using all the necessary fields in compact
manner.
All the input screens in this system are user friendly and understandable format. Also
the sizes of all the screens are standardized.
Icons are designed in this system are brief, compact and self-explanatory. The icons
are sharp and novice user can invoke the system.
Reports generated here give the minute information, which helps the manager to take
vital decisions
The importance of software design can be stated with a single word “QUALITY”.
Design is a place where quality is fostered in software development.
3.2 INPUT DESIGN
The system takes input from the users, processes it and produces an output. Input
design is link that ties the information system into the world of its users. The system should
be user-friendly to gain appropriate information to the user. The decisions made during the
input design are
System analysis decide the following input design details like, what data to input,
what medium to use, how the data should be arranged or coded, data items and transactions
needing validations to detect errors and at last the dialogue to guide user in providing input.
Input data of a system may not be necessarily is raw data captured in the system from
scratch. These can also be the output of another system or subsystem.
Output design generally refers to the results and information that are generated by the
system for many end-users; output is the main reason for developing the system and the basis
on which they evaluate the usefulness of the application.
The output is designed in such a way that it is attractive, convenient and informative.
Forms are designed in various features, which make the console output more pleasing. As the
outputs are the most important sources of information to the users, better design should
improve the system’s relationships with user and also will help in decision-making. Form
design elaborates the way output is presented and the layout available for capturing
information.
All records from various databases with same table names are retrieved.
Table : users
Primary key: id
Primary key: id
Primary key: id
Primary key: id
Primary key: id
Primary key: id
Primary key: id
Primary key: id
Primary key: id
Primary key: id
An information system acquired today must not only satisfy present business needs it
must be flexible and capable of being enhanced to meet changing circumstances well into the
future. Thus a pre-requisite to the introduction of a new system is for management to identify
and understand their organization mission and its related information needs. Writing this
down helps to ensure common understanding and direction and provides a yardstick against
which achievement can be measured.
3.4.1 DESCRIPTION OF MODULES
ADMIN
- View details
USER
- Register user
- Write Test
- View result
MODULES DESCRIPTION
ADMIN
- Admin create questions with details of question type, question options and answer.
Add Personality questions
Preferred cv
Requirement details
Shortlist cv
- View scan results with details student name, resume, expected value, results etc
- Admin can view Job details with the details of designation, salary, place
USER
TEST
- User can attend test personality question, english question, programming question etc
RESULTS
TYPES OF TESTS
Unit testing
Unit testing involves the design of test cases that validate that the internal program
logic is functioning properly, and that program inputs produce valid outputs. All decision
branches and internal code flow should be validated. It is the testing of individual software
units of the application .it is done after the completion of an individual unit before
integration. This is a structural testing, that relies on knowledge of its construction and is
invasive. Unit tests perform basic tests at component level and test a specific business
process, application, and/or system configuration. Unit tests ensure that each unique path of a
business process performs accurately to the documented specifications and contains clearly
defined inputs and expected results.
Functional test
Functional tests provide systematic demonstrations that functions tested are available
as specified by the business and technical requirements, system documentation, and user
manuals.
System Test
System testing ensures that the entire integrated software system meets requirement.
It tests a configuration to ensure known and predictable results. An example of system testing
is the configuration oriented system integration test. System testing is based on process
descriptions and flows, emphasizing pre-driven process links and integration points.
White Box Testing is a testing in which in which the software tester has knowledge of
the inner workings, structure and language of the software, or at least its purpose. It is
purpose. It is used to test areas that cannot be reached from a black box level.
Black Box Testing is testing the software without any knowledge of the inner
workings, structure or language of the module being tested. Black box tests, as most other
kinds of tests, must be written from a definitive source document, such as specification or
requirements document, such as specification or requirements document.
Test objectives
Integration Testing
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
4.2 SYSTEM IMPLEMENTATION
When the management of the system approves the system implemented in the
concern, initially the system was run parallel with existing manual system. The system has
been tested with live data and has proved to be error free and user friendly.
Once the coding process is begin and proceed in parallel, as each program module
can be tested. Installation is the process during which the current system is replaced by the
new system. This includes conversion of existing data, software, and documentation and
work procedures to those consistent with the new system. It is result from the installation
process, user guides provides the information of how the use the system and its flow.
Training plan is a strategy for training user so they quickly learn to the new system.
The development of the training plan probably began earlier in the project.
The implementation methodology includes the following phases - discovery, system
development, and user acceptance testing and production rollout. The Discovery Phase is
preceded by a Project Kick-off Work-session that includes application demonstrations,
completion and review of requirements and configuration questionnaires, identification of
key client documentation, as well as consultation on possible process re-engineering needs.
5.1 CONCLUSION
In this work we have proposed and implemented a company oriented e-recruitment
system that assist the recruiter in his decision-making process.
Our system automatically filters the candidates that don’t meet the minimum
requirements of the offered position. Finally, the candidates are ranked based on the Analytic
Hierarchy Process.
A number of tests were performed for evaluating the developed system. We found
that the system is able to effectively match candidates to offered positions based on their
qualifications and competencies.
In this research paper we proposed prediction of CV Analysis system will help the
human resource department to select right candidate for particular job profile which in turn
provide expert workforce for the organization. This project provide good for me as it
provided practical knowledge of not only programming in PHP and web based application
and no some extent Windows Application and SQL Server, but also about all handling
procedure related with “PERSONALITY PREDICTION SYSTEM THROUGH CV
ANALYSIS”. It also provides knowledge about the latest technology used in developing web
enabled application and client server technology that will be great demand in future. Through
implementation and simulation, we show that our solution is both scalable and efficient.
FUTURE ENHANCEMENT:
In future , we have to implement the concept of SMS sending. Although we tried to
be as through as possible in the implementation of our project but there were a large number
of features we could not implement due to want of time or for other reasons. And we provide
additionally each and every users having login to view their Experience details.
BIBLIOGRAPHY
BOOK REFERENCE:
Websites:
http://ieeexplore.ieee.org/document/7784983
http://php.net/.
http://php.net/manual/en/.
http://php.net/manual/en/langref.php.
APPENDIX
LEVEL – 0
View Question
Add question Personality And Test
prediction
ADMIN through cv
USER
View result analysis register
LEVEL – 1
ADMIN
DATABASE
LEVEL – 2
ADD
ADMIN ADD JOB
QUESTION
DETAILS
HOMEPAGE