Documente Academic
Documente Profesional
Documente Cultură
INTRODUCTION
1.1 OVERVIEW OF THE PROJECT An Online Job Portal where the job seekers can register themselves at the website and search jobs which are suitable for them where as the employers register with the website and upload jobs which are vacant at their company. Module Description: The new Online Job Portal system is to assign the work is been divided into three modules, Administrator Module Jobseeker Module Employer Module Administrator Module: The full control over the website, structure and content management, detailed user management, search engine reports, statistics and many others. Administrator having the functionality of viewing the report for user profile, feedback and posted job. Job Seeker Module: Job seeker can register themselves into this site. A new job seeker will have to go through a simple three step registration process, which includes a unique CV upload process. Candidate can enjoy the facilities of Job sites once they have registered onto the site. A job seeker can search for the jobs and then get the details for the employer. The site provides the job-seeker with a preformatted CV which can be downloaded. Candidate can have the functionality to see the user profile, view the entire job offers, change password and feedback. Employer Module: Employers to advertise the latest job openings in the organization over the internet. Depending upon the job requirements employer upload the resume with free of cost. Employers maintain the job seeker information at the same time company also getting an employee easily. Employer can send the company details to the candidate with administrator permission only. Employer can search for prospective candidates and the get the details for the candidate as well as download the CV of the candidate.
KGiSL - IIM
KGiSL - IIM
As per the Indian rules the people of India has the rights to know about any information that is done by the government. The datas in the prison are maintained in the physical format like a logbook. So the information is not easily reached to all the needed people.
Informations about the prisoners are not accessed by the public and the government finds difficult to maintain the prisoners database. It is an intranet based application. Only accessing within the prison, others district prison management cannot access the details. If user transfer one to another jail or prison in any district they add the details, it take much time to enter the whole details of prisoners. There is no parole processing in the existing system. There is no computer data entry in/out process in the existing system. There is no particular city handling the prison management system. Here day to- day entry has been viewed but not all the details. There is not used the bio-matrix concept (digital photos, palm reader, finger print, digital signatures, etc..) The criminal complete report update cannot be viewed. The detail of the journalist who wants to meet criminals was not entered. Here is disadvantage criminal was transferred from prison1 to prison2 the details of criminal details should be reentered, So it takes verification, time consuming, data entry, etc.
KGiSL - IIM
ADVANTAGES OF PROPOSED SYSTEM Easy to maintain prisoners information o The authorized people can perform prisoners database operations very efficiently. The interface is going to be developed in dream weaver which helps to an attractive interface with the help of all development in cross languages. Public can easily view the details of the prisoners Can sort any kind of data:
KGiSL - IIM
o The availability in each prison and the status can be easily updated.
The total number of prisoner according to prison, displaying number of male prisoner and female prisoner. Etc are also found.
NEED FOR PROPOSED SYSTEM Software solution is an IT solution provider for a dynamic environment where business and technology strategies converge. Their approach focuses on new ways of business combining IT innovation and adoption while also leveraging an organization and new products or service and to implement prudent business and technology strategies in todays environment. The benefits of the proposed system are, The data is more secure. The user can access anywhere inside the organization. It is an integrated system so that the data can be shared and updated easily. This application avoids the burden in deploying in each client machines. It is a platform independent. Support and maintenance of the system is easier.
KGiSL - IIM
FEASIBILTY STUDY
The feasibility of the project is analyzed in analysis phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential.
Three key considerations involved in the feasibility analysis are Economical feasibility Technical feasibility Social feasibility
Economical Feasibility This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased.
KGiSL - IIM
Social Feasibility The aspect of study is to check the level of acceptance of the system by the user. This includes the process of training the user to use the system efficiently. The user must not feel threatened by the system, instead must accept it as a necessity. The level of acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make him familiar with it. His level of confidence must be raised so that he is also able to make some constructive criticism, which is welcomed, as he is the final user of the system.
KGiSL - IIM
KGiSL - IIM
understanding of the technology and HTML to create web pages, and implement a server to host them. As their experience increases they may also become able to produce graphics to enhance the site, and more complicated and functional navigation.
J2EE
Eclipse is a framework for delivering what the project calls "rich-client applications" whose main aim is to provide a framework intended to implement Integrated Development Environments (IDEs) which are environments dedicated for programming. Eclipse is a platform-independent software, it means that you can execute it on several operating systems like Windows, Linux, Mac OS etc, due to the fact it has been written in Java. It has been designed in such a way that all functionalities of the software come from the adjunction of plug-ins to the runtime application. This allows Eclipse to be what you want it to be by adding or deleting plug-ins. By default the Eclipse software is provided with a Java IDE called JDT (Java Development Tool) but if you need it you are able to add IDEs such as C/C++, PHP etc according to your needs. Also, Eclipse can do things totally different from programming. For example the software Azure us, a very well known and used bit torrent client, is based on the Eclipse framework.
Oracle-10g
The Oracle Server relational language is called Transact-RDBMS. Oracle is a set oriented language. This means that Oracle can query many rows from one or more tables using just one statement. Oracle Server is relatively easy to manage through the use of graphical computing environment for almost every task of the system and database administrations Server Query Analyzer provides a graphical presentation of the execution plan of a query. Writing a Basic SQL Statement Restricting and Sorting Data Single Row Functions Displaying Data from Multiple Tables 11 KGiSL - IIM
Features of Oracle: Oracle is a database that responds very well with excellent performance in demanding environments. Oracle is a major database which along with its added features passes the ACID test, which is important in insuring the integrity of data. This is very important because data is the heart of any system in organization. The Oracle Server relational language is called Transact-RDBMS. Oracle is a set oriented language. This means that Oracle can query many rows from one or more tables using just one statement. Oracle Server is relatively easy to manage through the use of graphical computing environment for almost every task of the system and database administrations Server Query Analyzer provides a graphical presentation of the execution plan of a query. A reliable and adequate database system has the following properties:
Atomicity: That is Results of a transaction's execution are either all committed or all rolled back.
Consistency: The database is transformed from one valid state to another valid state. Illegal transactions aren't allowed and, if an integrity constraint can't be satisfied then the transaction is rolled back. 12 KGiSL - IIM
Durability: Once committed (completed), the results of a transaction are permanent and survive future system and media failures and thus ensuring maintenance and protection of data.
Project complexity
Development Time (Months) TDEV = 2.5*(PM) 0.38 TDEV = 2.5*(PM) 0.35 TDEV = 2.5*(PM) 0.32
14
KGiSL - IIM
15
KGiSL - IIM
Arrow An arrow identifies the data flow in motion. It is a pipeline through which information is flown like the rectangle in the Flow Chart.
Data may flow a source to a processor and from a data store or process. An arrow line depicts the flow, with the arrowhead pointing in the direction of flow.
Circle Circle stands for process that converts the data into information
A process represents transformation where incoming data flow is changed into outgoing flows.
16
KGiSL - IIM
Open End Box An Open End Box represents a data store, data at rest or temporary reposition of data.
A graphical picture of the logical steps and sequence involved in a procedure or a program is called a flow chart. Unlike detailed flow chart, Data Flow Diagram does not supply detailed description of the modules but graphically describes a systems data how the data interact with the system. Six rules for considering the Data flow Diagram Arrows should not cross each other Squares, circles and Data Store must have names Decomposed data flow squares and circles can have the same names. Choose meaningful names for data flow Draw all data flows around the outside of the diagram.
17
KGiSL - IIM
Level-1
Prisoner Details
18
KGiSL - IIM
19
KGiSL - IIM
20
KGiSL - IIM
21
KGiSL - IIM
Employer Details
Administrator Details
22
KGiSL - IIM
Normalization It is a technique for designing relational database tables to minimize duplication of information. The goals of normalization are, Eliminating redundant data Ensuring data dependencies make sense. Types of Normalization are, 1. 1st Normal form 2. 2nd Normal form 3. 3rd Normal form 1st Normal form The first normal form (or 1NF) requires that the values in each column of a table are atomic. By atomic we mean that there are no sets of values within a column. 2nd Normal form The second normal form (or 2NF) any non-key columns must depend on the entire primary key. In the case of a composite primary key, this means that a non-key column cannot depend on only part of the composite key.
23
KGiSL - IIM
Size 50 20 50 20 20
Description Company Name Email-Id User-Id Password Address Mobile Number Place
Size 20 20 20 20 20 50
24
Jobseeker: Personal Information Primary Key : User name Name Data type Uname Pwd Cpwd Email-Id Add DOB Gender Mobile No Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar
Size 20 20 20 20 50 20 7 20
Description User name Password Confirm Password Email-Id Address Date Of Birth Gender Mobile Number
Jobseeker: Professional Information Foreign Key : Name Name Name Qualify X-Marks XII-Marks UG Marks PG Marks Skills AOI Achievements Others
Data type Varchar Varchar Varchar Varchar Number Varchar Number Varchar Varchar Varchar
Size 20 20 20 20 50 20 20 20 50 50
Description User Name Qualification Tenth Marks Twelfth Marks UG Marks PG Marks Skill Sets Area Of Interest Achievements Others
25
KGiSL - IIM
26
KGiSL - IIM
1. In the Requirements Analysis phase (a) The problem is specified along with the desired service objectives (goals) (b) The constraints are identified 2. In the specification phase the system specification is produced from the detailed definitions of (a) and (b) above. This document should clearly define the product function. 3. In the system and software design phase, the system specifications are translated into a
software representation. The software engineer at this stage is concerned with: Data structure Software architecture Algorithmic detail and Interface representations
27
KGiSL - IIM
28
KGiSL - IIM
29
KGiSL - IIM
Expected Results
Actual Results
Pass /Fail
Enter username and Please Enter user password name and password Pass by message by text box Password character should display like (dot) Displaying password character dot Pass Display invalid username / password by message box Displaying Enter password by message box Home page was displayed with user roles
Enter password
Enter invalid username Error message and password should displayed Enter without password Enter password displayed by message box Home page should be display with user roles
Pass
Pass
Enter Username and password then click login button Registration form Test Case ID 6 Click Submit Button Without Entering Any Fields. 7 Test Case Description
Pass
Pass/Fail
Pass
4.1.1.2 Integration Testing Incremental integration testing involves continuous testing of an application as new functionality is added. This requires that aspects of an application's functionality be able to work separately before all parts of the application are completed. Full integration testing tests combined parts of an application to determine if they function together correctly. 30 KGiSL - IIM
Validation Testing: Tests to determine whether an implemented system fulfills its requirements. The checking of data for correctness or for compliance with applicable standards, rules, and conventions. The process of applying specialized security test and evaluation
procedures, tools, and equipment needed to establish acceptance for joint usage of an AIS by one or more departments or agencies and their contractors. Test Case ID 12 Test Case Description Enter the alphabetical characters in the mobile number Field Enter the Id in the Dropdown list Box. Expected Results It wont allow you to enter the alphabetical characters. It wont allow you to Enter ID. Actual Results It wont allow you to enter the alphabetical characters. It wont allow you to Enter ID. Pass/Fail Pass
13
Pass
31
KGiSL - IIM
4.2.1. General Risks A risk is a potential event with negative consequences that has not happened yet. However a risk could also be defined as the event with unforeseen positive consequences. By identifying the risks we can avoid failures and increase the success rate of our system. During the risk management process, the following things were discussed. They are What are the risks in my project? What can go wrong in my project? What are important risks? What shall we do to reduce severity or avoid risk? What is the risk status?
32
KGiSL - IIM
4.3.1 Implementation Procedures Implementation of software refers to the final installation of the package in its real environment, to the satisfaction of the intended users and the operation of the system. The active user must be aware of the benefits of using the system Their confidence in the software is built up Proper guidance is imparted to the user so that he is comfortable in using the application. The user must know that for viewing the result, the server program should be running in the server. If the server object is not up running on the server, the actual processes wont take place.
33
KGiSL - IIM
34
KGiSL - IIM
CHAPTER-V
CONCLUSION
The project is able to successfully incorporate all the requirements specified by the user. Proper care has been taken during database design to maintain data integrity and to avoid data redundancy. A client side validation has also been done with utmost care by considering all the possibilities and requirements of different users to avoid data inconsistency. Design procedures and user manuals are also included in the project to help users better understand the system.
The online job portal system mainly helps the candidate for searching the jobs and admin can access the information in a better way. After implementing the project, the users can feel flexible in managing the portal database in web.
This project is aimed at developing a web-based and central Recruitment Process System. Some features of this system will be creating vacancies, storing Applicants data, Interview process initiation, Scheduling Interviews, Storing Interview results for the applicant and finally Hiring of the applicant. Reports may be required to be generated for the use of Company. This system preparing the report likewise feedback report, user profile, posted jobs.
This project is purely user friendly and platform independent. So, user can run this tool in any environment. It is very easy to implement or add any feature to this tool. Finally it is very needful and simple tool for any organization.
35
KGiSL - IIM
The Online Job Portal system is developed in such a way that any further enhancements can be done with ease. The application has the capability for easy modification. New modules can be added to the existing system with less effort.
A mail server can be attached and updated data can be mailed to users. All the candidate details and employer details can be stored in this database.
36
KGiSL - IIM
JavaScript Programmer's Reference, Cliff Wootton, Wrox Publications, Har/Cdr edition (April 13, 2009)
37
KGiSL - IIM
Home Page
38
KGiSL - IIM
39
KGiSL - IIM
40
KGiSL - IIM
Sample Resume
41
KGiSL - IIM
42
KGiSL - IIM
Admin Login
43
KGiSL - IIM
44
KGiSL - IIM
45
KGiSL - IIM
46
KGiSL - IIM
47
KGiSL - IIM
3.SOURCE CODE
using System; using System.Data; using System.Configuration; using System.Collections; using System.Web; using System.Web.Security; using System.Web.UI; using System.Web.UI.WebControls; using System.Web.UI.WebControls.WebParts; using System.Web.UI.HtmlControls; using System.Data.OracleClient; using System.Windows.Forms;
48
KGiSL - IIM
49
KGiSL - IIM
TextBox22.Text + "')", conn); cmd.ExecuteNonQuery(); MessageBox.Show("Records Saved"); cmd = new OracleCommand("select p_id from tb_nominal order by p_id", conn); dr = cmd.ExecuteReader(); while (dr.Read()) { pid = Convert.ToInt32(dr[0].ToString());
50
KGiSL - IIM
View
using System; using System.Data; using System.Configuration; using System.Collections; using System.Web; using System.Web.Security; using System.Web.UI; using System.Web.UI.WebControls; using System.Web.UI.WebControls.WebParts; using System.Web.UI.HtmlControls; using System.Data.OracleClient; using System.Windows.Forms;
51
KGiSL - IIM
52
KGiSL - IIM
Interview request
using System; using System.Data; using System.Configuration; using System.Collections; using System.Web;
53
KGiSL - IIM
54
KGiSL - IIM
4. ABBREVATIONS
db http BCNF tb_Case tb_district tb_interview_req tb_jailer tb_nominal Database. Hyper Text Transfer protocol. Boyce-Codd Normal Form. case register table district register table interview requester table jailer table nominal registration table
55
KGiSL - IIM
Time Chart:
56
KGiSL - IIM
57
KGiSL - IIM