2023 13th International Conference on Software Technology and Engineering (ICSTE) - Conference Table of Contents | IEEE Xplore
International Conference on Software Technology and Engineering (ICSTE)

2023 13th International Conference on Software Technology and Engineering (ICSTE)

DOI: 10.1109/ICSTE61649.2023

27-29 Oct. 2023

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Software Technology and Engineering (ICSTE), 2023 13th International Conference on

Copyright Page

Publication Year: 2023,Page(s):4 - 4

Table of Contents

Publication Year: 2023,Page(s):5 - 8

Preface

Publication Year: 2023,Page(s):9 - 9

Organizing Committee

Publication Year: 2023,Page(s):10 - 11

Keynote

Publication Year: 2023,Page(s):12 - 15
The risk of cyberattacks increases along with the quantity of e-commerce websites. One of the frequent attacks that target and threaten said websites is cross-site scripting (XSS) attack. They take use of flaws in online applications to insert harmful code into a website, which can be exploited to steal confidential data or impair the performance of the website. XSS attacks can have significant ef...Show More
Software engineering applications in domains like embedded systems and health care have increased exponentially during the last few years. Developing, analyzing, and customization of languages is one of the core software engineering aspects. This usually involves lexical, syntactical, and semantic operations, technically termed parsing. For this, several parsers have been introduced in state-of-th...Show More
Monkey testing is one of the autonomous Graphical User Interface (GUI) automation testing techniques. Due to the complex GUI of Electronic Design Automation (EDA) software applications, applying Monkey Testing in a timely manner is very challenging. By making use of the GUI regressions knowledge about the application we can have a faster and improved Monkey testing approach. Yet directing the impr...Show More
As smartphones become an integral part of our daily lives, cybercriminals continue to devise new and sophisticated techniques to gain unauthorized access to these devices. Remote access attacks have become prevalent, with attackers exploiting vulnerabilities in the operating system or user behavior to gain access to sensitive information. In this study, we conducted penetration testing of remote s...Show More
Web-based Geographical Information Systems (Web-GIS) aim to store, analyze, and disseminate geospatial information, enabling effective decision-making. However, their development requires professional expertise and incurs high development costs, resulting in resource limitations for many organizations in developing their own GIS. To address these challenges, we propose a Geo-Location System (GLS) ...Show More
The research centered on the utilization of a mobile app with location-based capabilities created in the React Native Framework for the purpose of pet adoption. The core inquiry revolved around assessing the efficacy of the CareForPaws mobile app’s functionalities, which encompass pet adoption management, monitoring systems, and personality & location-based matching. To gather data for the study, ...Show More
This study aimed to assess the usability attributes of the MABIS mobile app among Philippine National Police (PNP) personnel, focusing on effectiveness, efficiency, learnability, memorability, errors, and cognitive load. A survey-based methodology was employed, following the dimensions of the PACMAD usability model. The findings revealed that the application exhibited consistently high efficiency,...Show More
The use of Internet of Things-based thermal sensor cameras for temperature detection in manufacturing has gained popularity in recent years due to the potential of these cameras to increase the efficiency of manufacturing processes while simultaneously reducing the time wasted on downtime. On the other hand, there is a lack of implementation studies in the real world that offer valuable insights i...Show More
The study presents Door2Dorm, an IoT-based Dormitory Management System (DMS) that integrates facial and fingerprint recognition biometrics. The system enhances dormitory security and management by providing robust identity verification and access control. Through functionality testing, cross-browser testing, usability testing, user acceptance testing, and user experience testing, the study demonst...Show More
The ecological monitoring situation demonstrates the capability of monitoring for a wide range of environmental parameters, thereby providing hospital staff with access to real- time environmental data that can aid in the early detection of environmental hazards and prompt remediation. This research aims to maintain a safe and healthy environment for patients and staff by observing humidity, tempe...Show More
The rail industry is shifting from time-based maintenance to condition-based maintenance (CBM) to improve maintenance efficiency and reduce maintenance costs. For CBM, IoT gateways are installed in rail vehicles to collect and pre-process sensor data before sending them to an analysis system in the cloud. Containers make it easy to flexibly update CBM’s application components in the gateway; Kuber...Show More
Code that disregards fundamental sound design practices is said to “smell.” While a code smell is not normally a bug, conventional wisdom suggests that it could lead to bugs when the software is later modified. This makes logical sense, but is there empirical evidence that supports this argument? If code smells can be shown to metastasize over time, are there some code smells that more virulent th...Show More
As modern software systems become more and more complex, bugs (also called faults) are prevalent and inevitable. Automated fault localization focuses on identifying faulty program elements that cause software failures. Mutation-based fault localization (MBFL) is one popular approach and has been proved to be more effective in real bugs. However, MBFL brings a problem of execution cost since it req...Show More
Blockchain is a disruptive technology known for its security features and continuous development. Despite blockchain’s notable features, such as immutability, it is still a compelling solution for various industry use cases. Albeit technical hitches such as network overload are still of concern to use this technology in an enterprise context. Some factors to consider include high transaction throu...Show More
The study aims to develop a mobile application catering to motorists across various locations in the Philippines. This app aims to provide motorists with high-quality vehicle services, including mechanical repairs to maintain their cars in good condition and other services focused on ensuring vehicle safety. The researchers also offer assistance in utilizing the mobile application, acting as a ser...Show More
Each fitness app has its own method and effectiveness on how their users become physically active to improve their general health. This study proposes a prototype design of the “Wellness wise” app, a tracker, fitness, and mental health mobile application using the Design Thinking Methodology, including Empathy, Define, Ideate, Prototype, and Test. The authors gather data through survey to determin...Show More
Society gradually forgets the start of a language and starts to lose its culture and traditions; these are called endangered languages. Many languages in the Philippines fall under the endangered language that needs to be preserved so the next generation can savor its cultural richness. The preservation can be done with the help of technology. The use of digital repositories for the public can pre...Show More
This study aims to identify Age-Related Macular Degeneration on complex data (existence of other retinal diseases in fundus images containing AMD). With the rise of artificial intelligence for automation of pattern recognition, image processing would become a viable way of aiding the detection of diseases for medical science. This study involves Image Data Gathering, application of CLAHE on the gr...Show More

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Software Technology and Engineering (ICSTE), 2023 13th International Conference on