IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

A COMPETENCY BASED RECRUITMENT MECHANISM USING COGNITIVE TAXONOMY AND VECTORIZATION TECHNIQUES

AUTHORS:
J.Meshak Selva Kumar
S.Soundarya
S.Kivin Joseva
Mentor
K .Vinotha
Affiliation
M.I.E.T. Engineering College, M.I.E.T. Engineering College, Tiruchirapalli,Tamil Nadu
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

a competency-based recruitment platform designed to address the limitations of traditional resume-driven hiring systems. In existing recruitment processes, candidates often rely on self-declared skills and unverifiable credentials, leading to inefficiencies, bias, and incorrect hiring decisions. This paper proposes a skill-first hiring system where candidates are evaluated through structured assessments and are issued verified certificates based on their actual performance. The system integrates skill testing, certification, job matching, and hiring analytics into a unified platform. Employers can utilize intelligent metrics such as hiring confidence score, risk score, and role fit index to make data-driven decisions. The platform reduces dependency on resumes and enables fair opportunities for candidates, especially freshers, to prove their abilities. Additionally, it improves hiring accuracy, reduces recruitment time, and enhances transparency in the hiring process. Future enhancements include AI-based recommendation systems and blockchain-enabled certificate verification for global trust. Devourtise aims to create a scalable, unbiased, and efficient hiring ecosystem driven by real skill validation.

Keywords
Article Metrics
Article Views
14
PDF Downloads
1
HOW TO CITE
APA

MLA

Chicago

Copy

Kumar, J. S., S.Soundarya, & Joseva, S. (2026). A Competency Based Recruitment Mechanism using Cognitive Taxonomy and Vectorization Techniques. International Journal of Science, Strategic Management and Technology, 02(04). https://doi.org/10.55041/ijsmt.v2i4.029

Kumar, J.Meshak, et al.. "A Competency Based Recruitment Mechanism using Cognitive Taxonomy and Vectorization Techniques." International Journal of Science, Strategic Management and Technology, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i4.029.

Kumar, J.Meshak, S.Soundarya, and S.Kivin Joseva. "A Competency Based Recruitment Mechanism using Cognitive Taxonomy and Vectorization Techniques." International Journal of Science, Strategic Management and Technology 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i4.029.

References
1.Jafar, M. A. Khan, S. U. Rehman, and A. Ahmed, “Blockchain-Based Electronic Voting Systems: A Systematic Literature Review and Meta- Analysis,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 5, pp. 112–120, 2022.

2.Jafar, M. A. Khan, and A. Ahmed, “Blockchain for Electronic Voting System – Review and Open Challenges,” Journal of Network Security, vol. 9, no. 3, pp. 45–58, 2021.

3.Hajian Berenjastanaki, M. R. Farahani, and S. Mohammadi, “Blockchain-Based E-Voting Systems: A Technology Review,” IEEE Access, vol. 11, pp. 10339–10354, 2023.

4.Springall, Z. Durumeric, and J. A. Halderman, “Security Analysis of the Estonian Internet Voting System,” in Proc. ACM Conference on Computer and Communications Security (CCS), pp. 703–715, 2014.

5.Behl and A. Kumar, “Internet Voting in Estonia 2005–2019: Evidence from Experience,” Procedia Computer Science, vol. 167, pp. 2150–2159, 2020.

6.Sharma and V. Gupta, “Digital Voting Systems using Aadhaar Authentication,” International Journal for Research in Applied Science and Engineering Technology (IJRASET), vol. 11, no. 6, pp. 234–240,2023.

7.Kumar, R. Singh, and P. Verma, “E-Voting System Using Blockchain and Face Recognition,” International Research Journal of Engineering and Technology (IRJET), vol. 11, no. 1, pp. 1200–1205, 2024.

8.Verma and N. Sharma, “Online Voting with Face Recognition and One-Time Password,” SSRN Electronic Journal, pp. 1–10, 2023.

9.Reddy and S. Naidu, “E-Voting System Using Aadhaar Card Based on Blockchain Technology,” ResearchGate Publication, pp. 1–8, 2024.

10.Sarkar, “Cost-Efficient Online Voting System Based on Facial Recognition,” International Journal of Computer Applications, vol. 182, no. 45, pp. 25–30, 2024.

 
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Cybersleuth AI: Intelligent Network Forensics Analyzer
string(12) "R.Rajashekar" R.Rajashekar, et al.
(2026)
DOI: 10.55041/ijsmt.v2i3.400
Shapawng Yawng Manu Poi: It’s Historical and Cultural Importance of the Festival Among the Singpho Community
string(14) "Arpita Dowarah" Dowarah, A.
(2026)
DOI: 10.55041/ijsmt.v2i3.266
The Role of Digital Media in Shaping Contemporary Art and Cultural Identity
string(9) "Anitha R." R., A.
(2026)
DOI: 10.55041/ijsmt.v1i1.005
Scroll to Top