{"id":6878,"date":"2025-04-24T16:56:26","date_gmt":"2025-04-24T16:56:26","guid":{"rendered":"https:\/\/ijete.com\/?page_id=6878"},"modified":"2026-02-24T16:44:14","modified_gmt":"2026-02-24T16:44:14","slug":"volume","status":"publish","type":"page","link":"https:\/\/ijete.com\/index.php\/volume\/","title":{"rendered":"CURRENT ISSUES"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6878\" class=\"elementor elementor-6878\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c821f0 e-flex e-con-boxed e-con e-parent\" data-id=\"5c821f0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f052325 e-con-full e-flex e-con e-child\" data-id=\"f052325\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-21cd25f e-con-full e-flex e-con e-child\" data-id=\"21cd25f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e81f60b elementor-widget elementor-widget-heading\" data-id=\"e81f60b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">IJETEV1I1A001 - E-MEDICARE REVOLUTIONIZING HEALTHCARE \nDELIVERY WITH AI-DRIVEN SOLUTIONS <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-462c18e e-con-full e-flex e-con e-child\" data-id=\"462c18e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a7f3027 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a7f3027\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #b20909;\">AUTHORS<\/span> :<\/strong> Mrs. R. Arthi M.E, Manoj V, Dinesh D, Tejesh Reddy M<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-272822a elementor-widget elementor-widget-post-info\" data-id=\"272822a\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-fcdd1a1 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/ijete.com\/index.php\/2025\/04\/24\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>April , 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-453b0d1 elementor-widget elementor-widget-text-editor\" data-id=\"453b0d1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #b20909;\"><strong>ABSTRACT<\/strong><\/span> &#8211; Artificial intelligence is revolutionizing healthcare, and EmAI is leading the way with smart, AI-driven solutions. Our platform, E-Medicare, enhances healthcare accessibility and efficiency by offering features like an Emergency Alert System, Quick Medicine Finder, AI-powered appointment scheduling, real-time monitoring, and personalized treatment plans. With a focus on secure medical records, user friendly interfaces, and seamless provider collaboration, EmAI creates a more connected and patient-centric healthcare experience. By bridging gaps in medical services, the platform ensures timely interventions, better resource management, and improved patient outcomes. In this presentation, we\u2019ll explore how EmAI is redefining digital healthcare, its cutting-edge technology, and its real-world impact in making medical services more efficient, accessible, and holistic.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40e82cb elementor-widget elementor-widget-button\" data-id=\"40e82cb\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/ijete.com\/wp-content\/uploads\/2025\/04\/IJETEV1I1A001.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DOWNLOAD<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82591e3 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"82591e3\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f2a401d e-con-full e-flex e-con e-child\" data-id=\"f2a401d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba5ed7 elementor-widget elementor-widget-heading\" data-id=\"2ba5ed7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">IJETEV1I1A002 - BLOSTERING WEB SECURITY BY INTEGRATING FRAMEWORKS TO DETECT SQL INJECTION AND XSS VULNERABILITIES\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8fb186 e-con-full e-flex e-con e-child\" data-id=\"e8fb186\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6147974 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6147974\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #b20909;\">AUTHORS<\/span> :<\/strong> G. Sivakumar, \u00a0Arthi M.E, Sahasra S, Gowtham Siddarth N<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3511af elementor-widget elementor-widget-post-info\" data-id=\"f3511af\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-fcdd1a1 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/ijete.com\/index.php\/2025\/04\/24\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>April , 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfa6d49 elementor-widget elementor-widget-text-editor\" data-id=\"dfa6d49\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #b20909;\"><strong>ABSTRACT<\/strong><\/span> &#8211; With the increasing number of web applications, cyber threats such as SQL Injection (SQLi) and Cross-Site Scripting (XSS) have become more prevalent. This paper presents a framework for bolstering web security by integrating multiple detection mechanisms for SQLi and XSS vulnerabilities. The system combines automated scanning techniques with penetration testing tools such as SQLMap for SQL Injection and script-based analysis for XSS detection. The proposed framework enhances web security by assisting security professionals in identifying vulnerabilities and mitigating potential threats before exploitation occurs. The findings emphasize the importance of proactive security assessment in modern web applications. Additionally, this research explores novel techniques in heuristic analysis, machine learning-based anomaly detection, an<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7518b1 elementor-widget elementor-widget-button\" data-id=\"a7518b1\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/ijete.com\/wp-content\/uploads\/2025\/06\/IJETEV1I1A002.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DOWNLOAD<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7be0e60 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7be0e60\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67063b8 e-con-full e-flex e-con e-child\" data-id=\"67063b8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ad4228 elementor-widget elementor-widget-heading\" data-id=\"6ad4228\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><span style=\"letter-spacing: 0px\">IJETEV1I1A003 -&nbsp;<\/span> ANDROID HACKING AND EXPLOITATION   \nUSING KALI LINUX : A CYBER FORENSIC ANALYSIS OF                                 \nVULNERABIILTIES   AND MITIGATION <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e7b475d e-con-full e-flex e-con e-child\" data-id=\"e7b475d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14798b3 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"14798b3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #b20909;\">AUTHORS<\/span> :<\/strong> G.Vishvanath Sundharam, Sudhakaran S, Vijayasarathi S,\u00a0 James Godwin G.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-013dc7e elementor-widget elementor-widget-post-info\" data-id=\"013dc7e\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-fcdd1a1 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/ijete.com\/index.php\/2025\/04\/24\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>April , 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e141f9e elementor-widget elementor-widget-text-editor\" data-id=\"e141f9e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #b20909;\"><strong>ABSTRACT<\/strong><\/span> &#8211;\u00a0<span style=\"font-family: inherit; font-weight: inherit; letter-spacing: 0px;\">IT security is a paramount concern in today&#8217;s internet landscape due to the prevalence of communication activities. Testing for personal data theft using social engineering methods aims to identify potential security vulnerabilities in the system and network of a user&#8217;s Android device. These vulnerabilities could be exploited by hackers if users are unaware of social engineering tactics, allowing for data theft through the use of a Remote Administration Tool (RAT) inadvertently downloaded onto the Android device. The deployment of a RAT via social engineering represents a viable and effective method for compromising the privacy of Android users. This study provides an overview of fundamental concepts related to data theft, ranging from recent call and personal data breaches to the remote manipulation of Android users&#8217; cameras and microphones. users no longer need to install additional tools manually. Apart from that, Kali Linux also has an intuitive user interface so that users can efficiently operate the system and the tools provided. Another advantage is modifying and customizing the tools according to user needs through manual configuration or built-in features such as meta packages. Thus, Kali Linux is one of the right choices for android hacking practitioners in conducting security testing on the Android system.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b6190ca elementor-widget elementor-widget-button\" data-id=\"b6190ca\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/ijete.com\/wp-content\/uploads\/2025\/06\/IJETEV1I1A003.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DOWNLOAD<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c76a332 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c76a332\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6670637 e-con-full e-flex e-con e-child\" data-id=\"6670637\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c6a9031 elementor-widget elementor-widget-sidebar\" data-id=\"c6a9031\" data-element_type=\"widget\" data-widget_type=\"sidebar.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section id=\"block-2\" class=\"widget widget_block widget_search\"><div class=\"widget-content\"><form role=\"search\" method=\"get\" action=\"https:\/\/ijete.com\/\" class=\"wp-block-search__button-outside wp-block-search__text-button wp-block-search\"    ><label class=\"wp-block-search__label\" for=\"wp-block-search__input-1\" >Search<\/label><div class=\"wp-block-search__inside-wrapper \" ><input class=\"wp-block-search__input\" id=\"wp-block-search__input-1\" placeholder=\"\" value=\"\" type=\"search\" name=\"s\" required \/><button aria-label=\"Search\" class=\"wp-block-search__button wp-element-button\" type=\"submit\" >Search<\/button><\/div><\/form><\/div><\/section><section id=\"block-3\" class=\"widget widget_block\"><div class=\"widget-content\"><div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><h2 class=\"wp-block-heading\">Recent Posts<\/h2><ul class=\"wp-block-latest-posts__list wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/ijete.com\/index.php\/2026\/02\/24\/sample\/\">sample<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/ijete.com\/index.php\/2026\/01\/15\/ijetev1i2a002-art-integration-a-cross-cultural-approach-to-teaching-and-learning-in-the-twenty-first-century\/\">IJETEV1I2A001 &#8211; ART INTEGRATION- A CROSS-CULTURAL APPROACH TO TEACHING AND LEARNING IN THE TWENTY FIRST CENTURY<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/ijete.com\/index.php\/2026\/01\/15\/elementor-7010\/\">ART INTEGRATION- A CROSS-CULTURAL APPROACH TO TEACHINGAND LEARNING IN THETWENTY FIRST CENTURY<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/ijete.com\/index.php\/2025\/06\/25\/ijetev1i1a003\/\">IJETEV1I1A003 &#8211; ANDROID HACKING AND EXPLOITATIONUSING KALI LINUX : A CYBER FORENSIC ANALYSIS OFVULNERABIILTIES AND MITIGATION<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/ijete.com\/index.php\/2025\/06\/25\/ijetev1i1a002\/\">IJETEV1I1A002 &#8211; BLOSTERING WEB SECURITY BY INTEGRATING FRAMEWORKS TO DETECT SQL INJECTION AND XSS VULNERABILITIES<\/a><\/li>\n<\/ul><\/div><\/div><\/div><\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7169719 e-flex e-con-boxed e-con e-parent\" data-id=\"7169719\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IJETEV1I1A001 &#8211; E-MEDICARE REVOLUTIONIZING HEALTHCARE DELIVERY WITH AI-DRIVEN SOLUTIONS AUTHORS : Mrs. R. Arthi M.E, Manoj V, Dinesh D, Tejesh Reddy M ABSTRACT &#8211; Artificial intelligence is revolutionizing healthcare, and EmAI is leading the way with smart, AI-driven solutions. Our platform, E-Medicare, enhances healthcare accessibility and efficiency by offering features like an Emergency Alert System, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6878","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/pages\/6878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/comments?post=6878"}],"version-history":[{"count":59,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/pages\/6878\/revisions"}],"predecessor-version":[{"id":7058,"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/pages\/6878\/revisions\/7058"}],"wp:attachment":[{"href":"https:\/\/ijete.com\/index.php\/wp-json\/wp\/v2\/media?parent=6878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}