Vous êtes sur la page 1sur 73

1.

INTRODUTION PROFILE
1.1 Abstract:
In the modern world, companies are trying to cut off their time in finding the candidates and train them for the technologies required for their company. They are looking for organization who will be providing skilled professionals as well as the candidates who got having hand of experience in the real-time and with good educational background. Here comes the Student and Corporate community Portal site which will provide such kind of skilled candidates who has got technical experience in the real-time. This site maintains Professionals information and all his/her details at a secure manner in the database. Maintenance of this system using web applications is a revolutionary achievement, and moreover there is a collection of student data for the purpose of selecting the right candidate for organization by HR. Students and Corporate Community Portal will not only provide these kind of professional details but also provides bunch full of educational tutorials which will be monitored by real-time professional on a daily basis and it has got updated video tutorials for all technologies where in students can update technical knowledge skills according to the market expectations. The other features for Students and Corporate Community Portal are FAQs, Discussion forum, Article publishing, online examination, Guest book, News Updates, Resume Builder. This is the finest solution for the students who are willing to find/make good carrier.

1.2

Objective
The object of our project is to store the data of the students

belonging to different institution. This application is use full for the students who are searching for the job and it is also use full for the companies to select a right person for their organization. This helps us in the elimination of paper and manual procedures.

1.3

Challenges

This application can be mainly intended to create the rich user interface between jobseekers and industries. In this application helps for job seekers to upload his entire information, searching for jobs on a particular date. The registered HR can View the entire details can take necessary resumes from the portal by performing search.

1.4

Existing System
With this existing system we have lots of problem in finding an exact person

for an organization. Student used to carry bunch of papers with detailed description of his/her education details, personal details and all details about himself. When student is attending for an interview if in case he/her lost/forgotten any of the papers (with the above details), student might be losing his /her job, and with this system HR might not knowing complete details regarding the student before a student is facing an interview this might get loads of damage to the company in terms of especially time and money. Here is the solution for the above problem JOB PROTAL

1.5

Proposed System
Job Portal is a fully featured and is built specifically for automate students details, so that HR has got fine search to pick right candidate to his organization. It provides a single source of data storage for maintaining efficient information. It has a simple user interface and easy to access the information of students. The efficient security features provide data privacy and maintains data integrity. Eliminate duplicate data entry and redundant information storage. Provides Password facility for different users to ensure high level of security.

1.6

Introduction about Job portal:


Hear student has to register and create his/her profile with

academic details. Once the registration is completed all the student details are stored in the database. This is an automated process where students remain updated with their required details. An efficient mechanism for Student Information is implemented using this system. This application is user friendly and has got various controls for a fine search to the HR. This application makes overall system management much easier and flexible. There is no risk of data mismanagement at any level while the system is in use. The key idea behind this project is to develop a bridge between student and Companies. An organization hr will have the right accessing the student details for selecting a right student for their organization.

Modules: There are four main modules in this system. These are: 1. Admin Module: Approve registration: Administrator is responsible for approving the job providers registration. Approve posted jobs: The jobs posted by the job providers are approved by the administrator here. 2. Job Provider: View profile: Once logged in, job provider can view his profile while created during registration. Modify profile: Job Provider can modify his profile in this section Post job: Job Provider can post the jobs using this feature. View job: Job Provider can view all the jobs posted by him till date. Modify job: Job Provider can modify the job posted by him. Delete job : Job provider can delete the jobs posted by him
3

Search for job seeker: Job Provider can search for the desired candidate 3. Job seeker: Search job: Job seeker can search for the jobs based on criteria. Posts resume: Job Seeker can post his resume in to the job site using this feature. View new jobs: Job Seeker can view all the new jobs posted in the application. Apply for jobs: Job Seeker can apply for the jobs using this feature. View profile: Job Seeker can view his profile. Update profile: Job Seeker can update his profile Post FAQS: Faqs are posted by the job seeker in this section View FAQS: Faqs can be viewed by the job seeker. Post Articles: Job Seeker can post the articles using this module View Articles: Job Seeker can view the articles using this module Project ideas: Job Seeker can post the project ideas using this module View project ideas: Job Seeker can view the project ideas using this module View Applied Jobs: Job Seeker can view the jobs applied by him till date using this module 4. Normal User: Search job: User can search for the jobs based on criteria using this module.

System Requirements:
Hardware:
The Hardware consists of physical components of the computer that input storage processing control, output devices. The software that manages the resources of computer is known as operating systems. Computer always includes an external storage system to store data in programs. The popular storage medium are floppy disk, other media are hard disks and magnetic tapes etc. The kind of hardware used in the project is

Server side:
Minimum: 120GB Hard Disk Pentium : P-IV Processor RAM : 2GB Windows Operating System with Apache preloaded.

Client side:
Minimum: 40GB Hard Disk Pentium: P-IV Processor RAM : 2GB Windows Operating System with Apache preloaded

Software:
Software is a set of programs to do a particular task. Software is an essential requirement of computer systems. The kind of software used in this project is. Operating System: Language Database Network Type of server : : : : Windows XP PHP, HTML, AJAX. MYSQL LAN Apache

Browser and Galleon.

: Internet explorer, Mozilla fire fox, Google chrome, Conqueror

1.2 Feasibility Study:


The purpose of feasibility study is not to solve the problem, but to determine whether the problem is worth solving. The feasibility study concentrates on the following area.

1. Operational Feasibility 2. Technical Feasibility 3. Economic Feasibility Operational Feasibility:


Operational feasibility study tests the operational scope of the software to be developed. The proposed software must have high operational feasibility. The usability will be high.

Technical Feasibility:
The technical feasibility study compares the level of technology available in the software development firm and the level of technology required for the development of the product. Here the level of technology consists of the programming language, the hardware resources, Other software tools etc.

Economic Feasibility:
The economic feasibility study evaluate the cost of the software development against the ultimate income or benefits gets from the developed system. There must be scopes for profit after the successful Completion of the project.

2. SOFTWARE DEVOLOPMENT METHODOLOGY


A software development methodology or system development methodology in software engineering is a framework that is used to structure, plan, and control the process of developing an information system. Every software development methodology approach acts as a basis for applying specific frameworks to develop and maintain software. Several software development approaches have been used since the origin of information technology. These are:

Waterfall: a linear framework Prototyping: an iterative framework Incremental: a combined linear-iterative framework Spiral: a combined linear-iterative framework Rapid application development (RAD): an iterative framework Extreme Programming

Waterfall development:
The Waterfall model is a sequential development approach, in which development is seen as flowing steadily downwards (like a waterfall) through the phases of requirements analysis, design, implementation, testing (validation), integration, and maintenance. The basic principles are: Project is divided into sequential phases, with some overlap and splashback acceptable between phases.

Emphasis is on planning, time schedules, target dates, budgets and implementation of an entire system at one time.

Tight control is maintained over the life of the project via extensive written documentation, formal reviews, and approval/signoff by the user and information technology management occurring at the end of most phases before beginning the next phase.

The Waterfall model is a traditional engineering approach applied to software engineering. It has been widely blamed for several large-scale government projects running over budget, over time and sometimes failing to deliver on requirements due to the Big Design Up Front approach. Except when contractually required, the Waterfall model has been largely superseded by more flexible and versatile methodologies developed specifically for software development.

Prototyping
Software prototyping, is the development approach of activities during software development, the creation of prototypes, i.e., incomplete versions of the software program being developed. The basic principles are: Not a standalone, complete development methodology, but rather an approach to handle selected parts of a larger, more traditional development methodology (i.e. incremental, spiral, or rapid application development (RAD)). Attempts to reduce inherent project risk by breaking a project into smaller segments and providing more ease-of-change during the development process. User is involved throughout the development process, which increases the likelihood of user acceptance of the final implementation. 8

Small-scale mock-ups of the system are developed following an iterative modification process until the prototype evolves to meet the users requirements.

While most prototypes are developed with the expectation that they will be discarded, it is possible in some cases to evolve from prototype to working system.

A basic understanding of the fundamental business problem is necessary to avoid solving the wrong problem.

Incremental development:
Various methods are acceptable for combining linear and iterative systems development methodologies, with the primary objective of each being to reduce inherent project risk by breaking a project into smaller segments and providing more ease-of-change during the development process. The basic principles are: A series of mini-Waterfalls are performed, where all phases of the Waterfall are completed for a small part of a system, before proceeding to the next increment, or Overall requirements are defined before proceeding to evolutionary, miniWaterfall development of individual increments of a system, or The initial software concept, requirements analysis, and design of architecture and system core are defined via Waterfall, followed by iterative Prototyping, which culminates in installing the final prototype, a working system.

Spiral development:

The spiral model is a software development process combining elements of both design and prototyping-in-stages, in an effort to combine advantages of top-down and bottom-up concepts. It is a meta-model, a model that can be used by other models. The basic principles are: Focus is on risk assessment and on minimizing project risk by breaking a project into smaller segments and providing more ease-of-change during the development process, as well as providing the opportunity to evaluate risks and weigh consideration of project continuation throughout the life cycle.

Each cycle involves a progression through the same sequence of steps, for each part of the product and for each of its levels of elaboration, from an overall concept-of-operation document down to the coding of each individual program.

Each trip around the spiral traverses four basic quadrants: (1) determine objectives, alternatives, and constraints of the iteration; (2) evaluate alternatives; Identify and resolve risks; (3) develop and verify deliverables from the iteration; and (4) plan the next iteration.

Begin each cycle with an identification of stakeholders and their win conditions, and end each cycle with review and commitment.

Rapid application development:


Rapid application development (RAD) is a software development methodology, which involves iterative development and the construction of prototypes. Rapid application development is a term originally used to describe a software development process introduced by James Martin in 1991. The basic principles are:

10

Key objective is for fast development and delivery of a high quality system at a relatively low investment cost.

Attempts to reduce inherent project risk by breaking a project into smaller segments and providing more ease-of-change during the development process.

Aims to produce high quality systems quickly, primarily via iterative Prototyping (at any stage of development), active user involvement, and computerized development tools. These tools may include Graphical User Interface (GUI) builders, Computer Aided Software Engineering (CASE) tools, Database Management Systems (DBMS), fourth-generation programming languages, code generators, and object-oriented techniques.

Key emphasis is on fulfilling the business need, while technological or engineering excellence is of lesser importance.

Project control involves prioritizing development and defining delivery deadlines or time boxes. If the project starts to slip, emphasis is on reducing requirements to fit the time box, not in increasing the deadline.

Generally includes joint application design (JAD), where users are intensely involved in system design, via consensus building in either structured workshops, or electronically facilitated interaction.

Active user involvement is imperative.

Iteratively produces production software, as opposed to a throwaway prototype.

11

Produces documentation necessary to facilitate future development and maintenance.

Standard systems analysis and design methods can be fitted into this framework.

Other practices:
Other methodology practices include:

Object-oriented development methodologies, such as Grady Booch's objectoriented design (OOD), also known as object-oriented analysis and design (OOAD). The Booch model includes six diagrams: class, object, state transition, interaction, module, and process.

Top-down programming: evolved in the 1970s by IBM researcher Harlan Mills (and Nicklaus Wirth) in developed structured programming.

Unified Process (UP) is an iterative software development methodology framework, based on Unified Modeling Language (UML). UP organizes the development of software into four phases, each consisting of one or more executable iterations of the software at that stage of development: inception, elaboration, construction, and guidelines. Many tools and products exist to facilitate UP implementation. One of the more popular versions of UP is the Rational Unified Process (RUP).

Agile software development refers to a group of software development methodologies based on iterative development, where requirements and solutions evolve via collaboration between self-organizing cross-functional teams. The term was coined in the year 2001 when the Agile Manifesto was formulated. 12

A software requirements specification (SRS): a requirements


specification for a software system is a complete description of the behavior of a system to be developed and may include a set of use cases that describe interactions the users will have with the software. In addition it also contains non-functional requirements. Non-functional requirements impose constraints on the design or implementation. The software requirement specification document enlists all necessary requirements for project development. To derive the requirements we need to have clear and thorough understanding of the products to be developed. This is prepared after detailed communications with project team and the customer.

3. Software Development Environments


3.1 About HTML: HTML:
Hypertext Markup Language (HTML) is the main markup language for displaying web pages and other information that can be displayed in a web browser. HTML is written in the form of HTML elements consisting of tags enclosed in angle brackets (like <html>), within the web page content. HTML tags most commonly come in pairs like <h1> and </h1>, although some tags, known as empty elements, are unpaired, for example <img>. The first tag in a pair is the start tag, the second tag is the end tag (they are also called opening tags and closing tags). In between these tags web designers can add text, tags, comments and other types of text-based content. The purpose of a web browser is to read HTML documents and compose them into visible or audible web pages. The browser does not display the HTML tags, but uses

13

the tags to interpret the content of the page. HTML elements form the building blocks of all websites. HTML allows images and objects to be embedded and can be used to create interactive forms. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. It can embed scripts in languages such as JavaScript which affect the behavior of HTML web pages. There are some WYSIWYG editors (What You See Is What You Get), in which the user lays out everything as it is to appear in the HTML document using a graphical user interface(GUI), where the editor renders this as an HTML document, no longer requiring the author to have extensive knowledge of HTML. The WYSIWYG editing model has been criticized,[64][65] primarily because of the low quality of the generated code; there are voices advocating a change to the WYSIWYM model (What You See Is What You Mean).

3.2 About PHP:


PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open source general-purpose scripting language that is especially suited for web development and can be embedded into HTML. PHP is a general-purpose server-side scripting language originally designed for Web development to produce dynamic Web pages. It is one of the first developed serverside scripting languages to be embedded into an HTML source document rather than calling an external file to process data. The code is interpreted by a Web server with a PHP processor module which generates the resulting Web page. It also has evolved to include a command-line interface capability and can be used in standalone graphical applications.

14

PHP was originally created by Rasmus Leadoff in 1995. The main implementation of PHP is now produced by The PHP Group and serves as the formal reference to the PHP language. PHP is a general-purpose scripting language that is especially suited to serverside web development where PHP generally runs on a web server. Any PHP code in a requested file is executed by the PHP runtime, usually to create dynamic web page content or dynamic images used on Web sites or elsewhere. It can also be used for command-line scripting and client-side graphical user interface (GUI) applications. PHP can be deployed on most Web servers, many operating systems and platforms, and can be used with many relational database management systems (RDBMS). It is available free of charge, and the PHP Group provides the complete source code for users to build, customize and extend for their own use. XAMPP is a free and open source cross-platform web server solution stack package, consisting mainly of the Apache HTTP Server, MySQL database, and interpreters for scripts written in the PHP and Perl programming languages. The PHP interpreter only executes PHP code within its delimiters. Anything outside its delimiters is not processed by PHP (although non-PHP text is still subject to control structures described in PHP code). The most common delimiters are <? php to open and ?> to close PHP sections. Variables are prefixed with a dollar symbol, and a type does not need to be specified in advance. Unlike function and class names, variable names are case sensitive. Both double-quoted ("") and here doc strings provide the ability to interpolate a variable's value into the string. <!DOCTYPE html> <html> <head> <meta charset="utf-8"> 15

<title>PHP Test</title> </head> <body> <?php echo 'Hello World'; ?> </body> </html>

3.3 About JavaScript: JavaScript


JavaScript is a compact, object-based scripting language for developing client and server Internet applications. JavaScript statements can be embedded directly in an HTML page. These statements can recognize and respond to user events such as mouse clicks, form input, and page navigation. For example, you can write a JavaScript function to verify that users enter valid information into a form. Without any network transmission, an HTML page with embedded JavaScript can interpret the entered text and alert the user with a message dialog if the input is invalid. Or you can use JavaScript to perform an action (such as play an audio file, execute an applet, or communicate with a plug-in) in response to the user opening or exiting a page. JavaScript is a programmable API that allows cross-platform scripting of events, objects, and actions. It allows the page designer to access events such as startups, exits, and users' mouse clicks. JavaScript extends the programmatic capabilities of most browsers to a wide range of authors, and is easy enough for anyone who can compose HTML. Using JavaScript, even less-experienced developers will be able to direct responses from a variety of events, objects, and actions. It provides 16

anyone who can compose HTML with the ability to change images and play different sounds in response to specified events, such as a users' mouse click or screen exit and entry. JavaScript code is typically embedded into an HTML document using the SCRIPT tag. You are free to embed as many scripts into a single document as you like, using multiple SCRIPT tags. A script embedded in HTML with the SCRIPT tag uses the format:

<script language="JavaScript"> <!-document. write ("Hello World!"); //--> </script> Scripts can be placed inside comment fields to ensure that your JavaScript code is not displayed by old browsers that do not recognize JavaScript. The markup to begin a comment field is <!-- while you close a comment field using //-->. JavaScript code, much like other programming languages, is made up of statements, which serve to make assignments, compare values, and execute other sections of code.

3.4 About My SQL:


MySQL is a open source Relational Database Management System. MySQL is very fast reliable and flexible Database Management System. It provides a very high performance and it is multi threaded and multi user Relational Database management system.

MySQL is one of the most popular relational databases Management System on the web. The MySQL Database has become the world's most popular open source Database, because it is free and available on almost all the platforms. The MySQL can run on UNIX, window, and Mac OS. MySQL is used 17

for the internet applications as it provides good speed and is very secure. MySQL was developed to manage large volumes of data at very high speed to overcome the problems of existing solutions. MySQL can be used for verity of applications but it is mostly used for the web applications on the internet.

MySQL Features
1. MySQL are very fast and much reliable for any type of application. 2. MySQL is very Lightweight application. 3. MySQL command line tool is very powerful and can be used to run SQL queries against database. 4. MySQL Supports indexing and binary objects. 5. It is allow changes to structure of table while server is running. 6. MySQL has a wide user base. 7. It is a very fast thread-based memory allocation system. 8. MySQL Written in C and C++ language. 9. MySQL code is tested with different compilers. 10. MySQL is available as a separate program for use in a client/server network environment. 11. The MySQL available for the most Unix operating platform. 12. MySQL are the available for window operating system window NT, window 95 ,and window 98. 13. MySQL available for OS/2. 14. Programming libraries for C, Python, PHP, Java , Delphi etc. are available to connect to MySQL database. 18

MySQL Advantages:
Reliability and Performance MySQL is very reliable and high performance relational database management system. It can used to store many GB's of data into database. Availability of Source MySQL source code is available that's why now you can recompile the source code. Cross-Platform support MySQL supports more than twenty different platform including the major Linux distribution .Mac OS X ,Unix and Microsoft windows. Large pool of Trained and Certified Developers MySQL is very popular and it is world most popular open source Database. So it is easy to find high quality staff around the world. Powerful Uncomplicated software The MySQL has most capabilities to handle most corporate database application and used to very easy and fast.

3.5
Login: <?php

Pseudo Code:

mysql_connect("localhost","root",""); mysql_select_db("online_exam"); $user_name=$_POST['uname']; $password=$_POST['pwd'];

19

$sql="select

from

user_data

where

user_name='$user_name'

and

password='$password'"; $data=mysql_query($sql); $res=mysql_fetch_array($data); $count=mysql_num_rows($data); if($count=='0') { echo "<script> location='error.php' </script>"; } else { $position=$res['position']; $_SESSION['user_name']=$res['user_name']; $_SESSION['uniq_id']=$res['uniq_id']; if($position=='admin') { $_SESSION['position']=$position; echo "<script> location='admin.php' </script>"; } else { User not exits } ?> Logout:

20

<?php session_destroy(); echo "<script> location='index.php'</script>"; ?>

Register: <?php mysql_connect("localhost","root",""); mysql_select_db("online_exam"); $user_name=$_POST['user_name']; $first_name=$_POST['first_name']; $last_name=$_POST['last_name']; $dob_date=$_POST['dob_date']; $dob_month=$_POST['dob_month']; $dob_year=$_POST['dob_year']; $gender=$_POST['gender']; $phone_no=$_POST['phone_no']; $email=$_POST['email']; $password=$_POST['password']; $conform_password=$_POST['conform_password']; $alt_email=$_POST['alt_email']; $hint_ques=$_POST['hint_ques']; $hint_ans=$_POST['hint_ans']; $city=$_POST['city']; $state=$_POST['state']; $country=$_POST['country']; 21

$pin=$_POST['pin']; $sql="insert into user_data values ('','$user_name','$first_name','$last_name','$dob_date','$dob_month','$dob_year','$ge nder', '$phone_no','$email','$password','$alt_email','$hint_ques','$hint_ans','$city','$state','$ country','$pin','user')"; $data=mysql_query($sql); echo"<h1>Sucessfully Registerd</h1>"; echo"<h2>click here for <a href='index.php'>login</a></h2>"; ?>

Approval Post Job.php <?php mysql_connect("localhost","root",""); mysql_select_db("job_portal"); $sql="select * from post_jobs where status='0'"; $rec=mysql_query($sql); echo "<form name='approve' method='post' action='approve_posted_job.php'>"; echo "<table border='1'>"; while($res=mysql_fetch_row($rec)) { echo"<tr>"; echo"<td>"; echo "<input type='checkbox' name='check[]' value='$res[0]'>"; echo $res[0]; echo "</td>"; echo "<td>"; 22

echo $res[1]; echo "</td>"; echo "<td>"; echo $res[2]; echo "</td>"; echo "<td>"; echo $res[3]; echo "</td>"; echo "<td>"; echo $res[4]; echo "</td>"; echo "<td>"; echo $res[5]; echo "</td>"; echo "<td>"; echo $res[6]; echo "</td>"; echo "<td>"; echo $res[7]; echo "</td>"; echo "<td>"; echo $res[10]; echo "</td>"; echo "<td>"; echo $res[11]; echo "</td>"; echo "</tr>"; } echo "<table>"; View Profile: 23

<table width="68%" border="0" align="center" cellpadding="3" cellspacing="3"> <tr> <td colspan="3" align="center"><?php error_reporting(0); include("../database.inc"); $user=$_SESSION['login_user']; $sql="select * from $table6 where user_id='$user' and position='Admin' and status='Active'"; $res=mysql_query($sql); $data=mysql_fetch_array($res); $img="../".$data['image_path']; ?></td> </tr> <tr> <td width="44%" align="right"><strong>Full Name : </strong></td> <td width="28%"><input name="name" type="text" id="name" disabled="disabled" value="<?php echo $data['full_name'] ?>"/></td> <td width="28%" align="center"><strong>Profile Picture </strong></td> </tr> <tr> <td height="24" align="right"><strong>Gender:</strong></td> <td> <?php $gen=$data['gender']; if($gen=="Male") { echo "<input name='gen' type='radio' value='Male' disabled='disabled' checked='checked'/> Male <input name='gen' type='radio' value='Female' disabled='disabled'/> 24

Female"; } else { echo "<input name='gen' type='radio' value='Male' disabled='disabled'/> Male <input Female"; } ?></td> <td rowspan="6" align="center"><img src="<?php echo $img ?>" width="152" height="198" style="border:outset"/></td> </tr> <tr> <td align="right"><strong>Organization Name:</strong></td> <td><input type="text" name="orgname" disabled="disabled" value="<?php echo $data['org_name'] ?>"/></td> </tr> <tr> <td align="right"><strong>Established Date: </strong></td> <td><input type="text" name="estdate" disabled="disabled" value="<?php echo $data['estb_date'] ?>"/></td> </tr> <tr> <td align="right"><strong>Employee Id </strong></td> <td><input type="text" name="empid" disabled="disabled" value="<?php echo $data['emp_id'] ?>"/></td> </tr> <tr> <td align="right"><strong>Personal Email Id </strong></td> 25 name='gen' type='radio' value='Female' disabled='disabled' checked='checked'/>

<td><input type="text" name="pempid" disabled="disabled" value="<?php echo $data['per_email'] ?>"/></td> </tr> <tr> <td align="right"><strong>Organization Email Id:</strong></td> <td><input type="text" name="orgeid" disabled="disabled" value="<?php echo $data['org_email'] ?>"/></td> </tr> <tr> <td align="right"><strong>Organization Address: </strong></td> <td><textarea name="orgadd" disabled="disabled"><?php echo $data['org_address'] ?></textarea></td> <td>&nbsp;</td> </tr> <tr> <td align="right"><strong>Description About Organization:</strong></td> <td><textarea name="desorg" disabled="disabled"><?php echo $data['about_org'] ?></textarea></td> <td>&nbsp;</td> </tr> <tr> <td colspan="3" align="center"><input type="submit" name="Submit" value="Submit" /></td> </tr> <tr> <td>&nbsp;</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> 26

<td>&nbsp;</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> <tr> <td>&nbsp;</td> <td>&nbsp;</td> <td>&nbsp;</td> </tr> </table> Update Profile: <?php if(isset($_POST['update'])) { error_reporting(0); include("../database.inc"); $user=$_SESSION['login_user']; $name=$_POST['name']; $gen=$_POST['gen']; $orgname=$_POST['orgname']; $estdate=$_POST['estdate']; $empid=$_POST['empid']; $pempid=$_POST['pempid']; $orgeid=$_POST['orgeid']; $orgadd=$_POST['orgadd']; $desorg=$_POST['desorg']; $sql="update $table6 set full_name='$name', gender='$gen', org_name='$orgname', estb_date='$estdate', emp_id='$empid', 27

per_email='$pempid', org_email='$orgeid', org_address='$orgadd', about_org='$desorg' where user_id='$user' and position='Admin' and status='Active'"; if(mysql_query($sql)) { echo "profile Update successfull"; } else { echo "profile Update failed"; } } ?> Approve Posted Job: <?php mysql_connect("localhost","root",""); mysql_select_db("job_portal"); $arr=$_POST['check']; $countid=count($arr); //echo count($arr); for($i=0; $i<$countid; $i++) { $uid=$arr[$i]; $sql="update post_jobs set status='1' where job_id='$uid'"; mysql_query($sql); } //echo "<script> location='admin_job.php'</script>"; ?> 28

Delete Job Details: <?php mysql_connect("localhost","root",""); mysql_select_db("job_portal"); $job_id=$_POST['check']; echo"<font color='white'>$job_id</font>"; $count_id=count($job_id);

// $count=0; for($i=0; $i< $count_id; $i++) { $jdd=$job_id[$i]; $sql="delete from post_jobs where job_id='$jdd'"; echo $sql; //$count++; mysql_query($sql); } ?> Job Seeker And Provider: <?php mysql_connect("localhost","root",""); mysql_select_db("job_portal"); $location=$_POST['location']; $basic_graduation=$_POST['basic_graduation']; $post_graduation=$_POST['post_graduation']; $doctorate_phd=$_POST['doctorate_phd'];

29

if(!empty($location) && !empty($basic_graduation) && !empty($post_graduation) && !empty($doctorate_phd)) { $sql="select * from jobseeker_registration where city='$location' and and and BASIC_GRADUATION='$basic_graduation' POST_GRADUATION='$post_graduation' DOCTORATE_PHD='$doctorate_phd'"; //echo $sql; } elseif(!empty($location) empty($post_graduation)) { $sql="select * from jobseeker_registration where city='$location' and and BASIC_GRADUATION='$basic_graduation' POST_GRADUATION='$post_graduation'"; //echo $sql; } elseif(!empty($location) && !empty($basic_graduation)) { $sql="select //echo $sql; } elseif( !empty($location)) { $sql="select * from jobseeker_registration where city='$location'"; //echo $sql; } else { echo "<script> location='search_job_seeker.php'</script>"; 30 * from jobseeker_registration where city='$location' and BASIC_GRADUATION='$basic_graduation'"; && !empty($basic_graduation) && !

} $data=mysql_query($sql); echo"<table border='2'>"; echo"<tr><td>user_id</td><td>contact_number</td><td>email_id</td><td>basic_ graduation</td><td>post_graduation</td><td>doctorate_phd</td></tr>"; while($rec=mysql_fetch_row($data)) { echo"<tr>"; echo"<td>"; echo $rec[0]; echo"</td>"; echo"<td>"; echo $rec[10]; echo"</td>"; echo"<td>"; echo $rec[11]; echo"</td>"; echo"<td>"; echo $rec[14]; echo"</td>"; echo"<td>"; echo $rec[15]; echo"</td>"; echo"<td>"; echo $rec[16]; echo"</td>"; echo"</tr>"; } echo"</table>"; ?>

31

Post Job Details: <?php echo $uid; mysql_connect("localhost","root",""); mysql_select_db("job_portal"); //$job_id=$_POST['job_id']; $job_title=$_POST['job_title']; $job_description=$_POST['job_description']; $job_location=$_POST['job_location']; $qualification=$_POST['qualification']; $skills=$_POST['skills']; $experience=$_POST['experience']; $others=$_POST['others']; $posted=$uid; $date=$_POST['date']; $str="select max(job_id+1) from post_jobs"; $data=mysql_query($str); $rec=mysql_fetch_row($data); if(!empty($rec[0])) $job_id=$rec[0]; else $job_id=1; $sql="insert $experience','$others','$uid','0','0')"; mysql_query($sql); ?> into post_jobs

values('$job_id','$job_title','$job_description','$job_location','$qualification','$skills','

32

4. System Design
4.1 Logical Database Design:

Table structure for table apply_for_jobs Type JOB_ID varchar(15) NAME varchar(15) LAST_NAME varchar(15) MAIL varchar(20) CONTACT_NUMBER varchar(15) ADDRESS varchar(50) KEY_SKILL varchar(50) EXPERIENCE varchar(10) NAMEOF_FIRM varchar(10) YEAR varchar(10) MONTH varchar(20) SUMMARY varchar(200) RESUME_UPLOAD varchar(200)
33

Field

Null Default No No No No No No No No No No No No No

Table structure for table ideas_junction Field IDEA_TITLE CATEGORY DESCRIPTION POSTED_BY ABSTRACT DATE Type varchar(25) varchar(15) varchar(50) varchar(50) varchar(500) varchar(15) Null Default No No No No No No

Table structure for table jobseeker_registration Field USER_ID PASSWORD CONFIRM_PASSWORD FIRST_NAME LAST_NAME SEX CITY STATE ZIP COMPANY CONTACT_NUMBER EMAIL_ID HINT_QUESTION HINT_ANSWER BASIC_GRADUATION POST_GRADUATION DOCTORATE_PHD ATTACH_RESUME Type varchar(15) varchar(20) varchar(20) varchar(20) varchar(20) varchar(10) varchar(25) varchar(25) varchar(15) varchar(30) varchar(30) varchar(20) varchar(25) varchar(25) varchar(15) varchar(15) varchar(15) varchar(30) Null Default No No No No No No No No No No No No No No No No No No

Table structure for table post_articles Type ID varchar(15) ART_TITLE varchar(25) DESCRIPTION varchar(50) Field Null Default No No No
34

FILE POSTED_BY STATUS DATE

varchar(50) varchar(25) varchar(10) varchar(15)

No No No No

Table structure for table post_faqs Type ID varchar(15) QUESTION varchar(50) ANSWER varchar(50) POSTED_BY varchar(10) STATUS varchar(15) DATE varchar(10) CATEGORY varchar(15) Field Null Default No No No No No No No

Table structure for table post_jobs Field JOB_ID JOB_TITLE JOB_DESCRIPTION JOB_LOCATION QUALIFICATION SKILLS EXPERIENCE OTHERS posted_by STATUS DATE COMPANY Type varchar(10) varchar(25) varchar(50) varchar(25) varchar(15) varchar(15) varchar(30) varchar(30) varchar(50) varchar(10) varchar(15) varchar(25) Null Default No No No No No No No No No No No No

Table structure for table registration Field ID Type Null Default varchar(15) No
35

COMPANY_NAME LOCATION ADDRESS CONTACT_PERSON MOBILE_NUMBER COMPANY_DESCRIPTION NOOF_EMPLOYEES EMAIL USER_NAME PASSWORD PASS_HINTQUESTION PASS_HINTANSWER STATUS

varchar(25) varchar(25) varchar(35) varchar(20) varchar(15) varchar(50) varchar(15) varchar(20) varchar(15) varchar(15) varchar(25) varchar(25) tinyint(1)

No No No No No No No No No No No No No

Table structure for table users Field FIRST_NAME LAST_NAME EMAIL_ID HINT_QUESTION HINT_ANSWER USER_ID PASSWORD TYPEOF_USER Type varchar(15) varchar(15) varchar(15) varchar(30) varchar(50) varchar(15) varchar(15) varchar(10) Null Default No No No No No No No No

36

5. Behavioral Description
5.1 Data Flow:
A data flow diagram is graphical tool used to describe and analyze movement of data through a system. These are the central tool and the basis from which the other components are developed. The transformation of data from input to output, through processed, may be described logically and independently of physical components associated with the system. These are known as the logical data flow diagrams. The physical data flow diagrams show the actual implements and movement of data between people, departments and workstations. A full description of a system actually consists of a set of data flow diagrams. Using two familiar notations Yourdon, Gane and Sarson notation develops the data flow diagrams. Each component in a DFD is labeled with a descriptive name. Process is further identified with a number that will be used for identification purpose. The development of DFDs is done in several levels. Each process in lower level diagrams can be broken down into a more detailed DFD in the next level. The lop-level diagram is often called context diagram. It consists a single process bit, which plays vital role in studying the current system. The process in the context level diagram is exploded into other process at the first level DFD. 37

The idea behind the explosion of a process into more process is that understanding at one level of detail is exploded into greater detail at the next level. This is done until further explosion is necessary and an adequate amount of detail is described for analyst to understand the process. A DFD is also known as a bubble Chart has the purpose of clarifying system requirements and identifying major transformations that will become programs in system design. So it is the starting point of the design to the lowest level of detail. A DFD consists of a series of bubbles joined by data flows in the system.

DFD Symbols:
In the DFD, there are four symbols 1. A square defines a source (originator) or destination of system data 2. An arrow identifies data flow. It is the pipeline through which the information flows 3. A circle or a bubble represents a process that transforms incoming data flow into outgoing data flows. 4. An open rectangle is a data store, data at rest or a temporary repository of data Process that transforms data flow.

Source or Destination of data Data flow 38

Data Store

Constructing a DFD:
Several rules of thumb are used in drawing DFDs: 1. Process should be named and numbered for an easy reference. Each name should be representative of the process. 2. The direction of flow is from top to bottom and from left to right. Data traditionally flow from source to the destination although they may flow back to the source. One way to indicate this is to draw long flow line back to a source. An alternative way is to repeat the source symbol as a destination. Since it is used more than once in the DFD it is marked with a short diagonal. 3. When a process is exploded into lower level details, they are numbered. 4. The names of data stores and destinations are written in capital letters. Process and dataflow names have the first letter of each work capitalized. A DFD typically shows the minimum contents of data store. Each data store should contain all the data elements that flow in and out. Questionnaires should contain all the data elements that flow in and out. Missing interfaces redundancies and like is then accounted for often through interviews.

Silent Features of DFDs 1. The DFD shows flow of data, not of control loops and decision are controlled considerations do not appear on a DFD. 2. The DFD does not indicate the time factor involved in any process whether the data flows take place daily, weekly, monthly or yearly. 3. The sequence of events is not brought out on the DFD.

39

Types of Data Flow Diagrams


1. Current Physical 2. Current Logical 3. New Logical 4. New Physical 1. Current Physical: In Current Physical DFD process label include the name of people or their positions or the names of computer systems that might provide some of the overall system-processing label includes an identification of the technology used to process the data. Similarly data flows and data stores are often labels with the names of the actual physical media on which data are stored such as file folders, computer files, business forms or computer tapes. 2. Current Logical: The physical aspects at the system are removed as mush as possible so that the current system is reduced to its essence to the data and the processors that transforms them regardless of actual physical form. 3. New Logical: This is exactly like a current logical model if the user were completely happy with he user were completely happy with the functionality of the current system but had problems with how it was implemented typically through the new logical model will differ from current logical model while having additional functions, absolute function removal and inefficient flows recognized. 4. New Physical: The new physical represents only the physical implementation of the new system.

40

Rules Governing the DFDS Process


1) No process can have only outputs. 2) No process can have only inputs. If an object has only inputs than it must be a sink. 3) A process has a verb phrase label.

Data Store
1) Data cannot move directly from one data store to another data store, a process must move data. 2) Data cannot move directly from an outside source to a data store, a process, which receives, must move data from the source and place the data into data store 3) A data store has a noun phrase label. Source Or Sink The origin and / or destination of data. 1) Data cannot move direly from a source to sink it must be moved by a process A source and /or sink has a noun phrase land

41

5.1.1 Data Flow Diagrams:

DFD FOR JOB PORTAL:

42

Data Flow Diagram for Login

start

yes

admin

no

logi n

Go to respective home page

Go to login page

stop

43

Data Flow Diagram for Admin

Yes start admin

No

Logi n Home Page Go to login page

Approve Registration Approve Jobs

View Profile

LOgout 44

Stop

Data Flow Diagram for job provider:

start

Institute

Yes Home Page View Profile

Logi n

No

Go to login page

Modify Profile

Post job Modify Job View JOb Delete Job Search For Job seeker View

Stop 45

Data Flow Diagram for job provider:

start

Job provider

Yes Home Page View Profile

Logi n

No

Go to login page

Modify Profile

Post job Modify Job View JOb Delete Job Search For Job seeker 46

Change Password

Stop Data Flow Diagram for jobseeker:

start

Job seeker

Yes Search job Post resume

Logi n

No

Go to login page

View New Jobs

Apply For Jobs Post Faqs View faqs Post Articles Project Ideas Apply job

47

Stop

Data Flow Diagram for Normal user

start

Normal User

Yes Search job About us

Logi n

No

Go to login page

carriers

Register

Stop

48

5.2 USECASE DIAGRAM Admin USE Case Diagram:

49

job provider use case Diagram:

50

jobseeker use case Diagram

51

Normal User:

52

6. Design
6.1 E-R Diagram:

53

7. Functional Description
Database
A database management, or DBMS, gives the user access to their data and helps them transform the data into information. Such database management systems include dBase, paradox, IMS, SQL Server and SQL Server. These systems allow users to create, update and extract information from their database. A database is a structured collection of data. Data refers to the characteristics of people, things and events. SQL Server stores each data item in its own fields. In SQL Server, the fields relating to a particular person, thing or event are bundled together to form a single complete unit of data, called a record (it can also be referred to as raw or an occurrence). Each record is made up of a number of fields. No two fields in a record can have the same field name. During an SQL Server Database design project, the analysis of your business needs identifies all the fields or attributes of interest. If your business needs change over time, you define any additional fields or change the definition of existing fields.

SQL Server Tables


MYSQL stores records relating to each other in a table. Different tables are created for the various groups of information. Related tables are grouped together to form a database. Primary Key 54

Every table in MYSQL has a field or a combination of fields that uniquely identifies each record in the table. The Unique identifier is called the Primary Key, or simply the Key. The primary key provides the means to distinguish one record from all other in a table. It allows the user and the database system to identify, locate and refer to one particular record in the database.

Relational Database
Sometimes all the information of interest to a business operation can be stored in one table. MYSQL makes it very easy to link the data in multiple tables. Matching an employee to the department in which they work is one example. This is what makes MYSQLa relational database management system, or RDBMS. It stores data in two or more tables and enables you to define relationships between the tables and enables you to define relationships between the tables.

Foreign Key
When a field is one table matches the primary key of another field is referred to as a foreign key. A foreign key is a field or a group of fields in one table whose values match those of the primary key of another table.

Referential Integrity
Not only does MYSQL allow you to link multiple tables, it also maintains consistency between them. Ensuring that the data among related tables is correctly matched is referred to as maintaining referential integrity.

Data Abstraction
A major purpose of a database system is to provide users with an abstract view of the data. This system hides certain details of how the data is stored and maintained. Data abstraction is divided into three levels.

Physical level: This is the lowest level of abstraction at which one describes how
the data are actually stored. 55

Conceptual Level: At this level of database abstraction all the attributed and what
data are actually stored is described and entries and relationship among them.

View level: This is the highest level of abstraction at which one describes only part
of the database.

Advantages of RDBMS
Redundancy can be avoided Inconsistency can be eliminated Data can be Shared Standards can be enforced Security restrictions ca be applied Integrity can be maintained Conflicting requirements can be balanced Data independence can be achieved.

Disadvantages of DBMS
A significant disadvantage of the DBMS system is cost. In addition to the cost of purchasing of developing the software, the hardware has to be upgraded to allow for the extensive programs and the workspace required for their execution and storage. While centralization reduces duplication, the lack of duplication requires that the database be adequately backed up so that in case of failure the data can be recovered.

56

8. Project Design
1. Performance Requirements:
SOFTWARE ENGINEERING PARADIGM APPLIED- (RAD-MODEL) The two design objectives continuously sought by developers are reliability and maintenance. Reliable System There are two levels of reliability. The first is meeting the right requirements. A careful and through systems study is needed to satisfy this aspect of reliability. The second level of systems reliability involves the actual working delivered to the user. At this level, the systems reliability is interwoven with software engineering and development. There are three approaches to reliability. 1. Error avoidance: Prevents errors from occurring in software. 2. Error detection and correction: In this approach errors are recognized whenever they are encountered and correcting the error by effect of error, of the system does not fail. 3. Error tolerance: In this approach errors are recognized whenever they occur, but enables the system to keep running through degraded perform or by applying values that instruct the system to continue process. Maintenance: The key to reducing need for maintenance, while working, if possible to do essential tasks. 1. More accurately defining user requirement during system development. 2. Assembling better systems documentation. 3. Using more effective methods for designing, processing, login and communicating information with project team members. 4. Making better use of existing tools and techniques. 57

5. Managing system engineering process effectively.

Output Design:
One of the most important factors of an information system for the user is the output the system produces. Without the quality of the output, the entire system may appear unnecessary that will make us avoid using it possibly causing it to fail. Designing the output should process the in an organized well throughout the manner. The right output must be developed while ensuring that each output element is designed so that people will find the system easy to use effectively. The term output applying to information produced by an information system whether printed or displayed while designing the output we should identify the specific output that is needed to information requirements select a method to present the formation and create a document report or other formats that contains produced by the system.

Types of output:
Whether the output is formatted report or a simple listing of the contents of a file, a computer process will produce the output. A Document A Message Retrieval from a data store Transmission from a process or system activity Directly from an output sources

Layout Design:
It is an arrangement of items on the output medium. The layouts are building a mock up of the actual reports or document, as it will appear after the system is in operation. The output layout has been designated to cover information. The outputs are presented in the appendix.

Input design and control:


58

Input specifications describe the manner in which data enter the system for processing. Input design features will ensure the reliability of the systems and produce results from accurate data, or thus can be result in the production of erroneous information. The input design also determines whenever the user can interact efficiently with this system.

Objectives of input design:


Input design consists of developing specifications and procedures for data preparation, the steps necessary to put transaction data into a usable from for processing and data entry, the activity of data into the computer processing. The five objectives of input design are: Controlling the amount of input Avoiding delay Avoiding error in data Avoiding extra steps Keeping the process simple

Controlling the amount of input:


Data preparation and data entry operation depend on people, because labor costs are high, the cost of preparing and entering data is also high. Reducing data requirement expense. By reducing input requirement the speed of entire process from data capturing to processing to provide results to users.

Avoiding delay:
The processing delay resulting from data preparation or data entry operations is called bottlenecks. Avoiding bottlenecks should be one objective of input.

Avoiding errors:
Through input validation we control the errors in the input data.

Avoiding extra steps:


59

The designer should avoid the input design that cause extra steps in processing saving or adding a single step in large number of transactions saves a lot of processing time or takes more time to process.

Keeping process simple:


If controls are more people may feel difficult in using the systems. The bestdesigned system fits the people who use it in a way that is comfortable for them.

Normalization
It is a process of converting a relation to a standard form. The process is used to handle the problems that can arise due to data redundancy i.e. repetition of data in the database, maintain data integrity as well as handling problems that can arise due to insertion, updation, deletion anomalies.

Decomposing is the process of splitting relations into multiple relations to eliminate anomalies and maintain anomalies and maintain data integrity. To do this we use normal forms or rules for structuring relation. Insertion anomaly: Inability to add data to the database due to absence of other data. Deletion anomaly: Unintended loss of data due to deletion of other data. Update anomaly: Data inconsistency resulting from data redundancy and partial update Normal Forms: anomalies. These are the rules for structuring relations that eliminate

First Normal Form:


A relation is said to be in first normal form if the values in the relation are atomic for every attribute in the relation. By this we mean simply that no attribute value can be a set of values or, as it is sometimes expressed, a repeating group.

60

Second Normal Form:


A relation is said to be in second Normal form is it is in first normal form and it should satisfy any one of the following rules. 1) Primary key is a not a composite primary key 2) No non key attributes are present 3) Every non key attribute is fully functionally dependent on full set of primary key.

Third Normal Form:


A relation is said to be in third normal form if their exits no transitive dependencies.

Transitive Dependency:
If two non key attributes depend on each other as well as on the primary key then they are said to be transitively dependent. The above normalization principles were applied to decompose the data in multiple tables thereby making the data to be maintained in a consistent state.

Data Dictionary
After carefully understanding the requirements of the client the the entire data storage requirements are divided into tables. The below tables are normalized to avoid any anomalies during the course of data entry.

61

9. SCREEN SHOTS
Index.php

Register.php

62

Login.php

63

Searchjob.php

view jobs.ph

64

post resume:

65

66

Search

post article:

67

project ideas;

apply for job:

68

View new jobs: myprofile.php

69

modify profile:

70

delete jobs.php

search for job seeker:

71

10. Conclunclusion
The project has been appreciated by all the users in the organization. It is easy to use, since it uses the GUI provided in the user dialog. User friendly screens are provided. The usage of software increases the efficiency, decreases the effort. It has been efficiently employed as a Site management mechanism. It has been thoroughly tested and implemented.

72

11. Bibliography
Php and MySQL Web Development By Luke Welling, Laura Thomson SOFTWARE ENGINEERING By Roger. S. Pressman SQL FOR PROFESSIONALS By Jain JavaScript: The Definitive Guide By David Flanagan

73

Vous aimerez peut-être aussi