{"id":42,"date":"2014-05-05T06:24:54","date_gmt":"2014-05-05T06:24:54","guid":{"rendered":"http:\/\/www.ysrgst.org\/irict\/?page_id=42"},"modified":"2018-05-27T07:41:52","modified_gmt":"2018-05-27T07:41:52","slug":"committees","status":"publish","type":"page","link":"https:\/\/irict.co\/?page_id=42","title":{"rendered":"Conference Tracks"},"content":{"rendered":"<h3><span style=\"color: #ff6600;\"><strong><span style=\"color: #333399;\">IRICT<\/span> <span style=\"color: #ff9900;\">2018<\/span> <span style=\"color: #000000;\">Tracks<\/span><\/strong><\/span><\/h3>\n<h4>The topics are included below, but not limited to:<\/h4>\n<p><strong>\u00a0<\/strong><\/p>\n<h4><span style=\"color: #333399;\"><strong>1. Artificial Intelligence and Soft Computing<br \/>\n<\/strong><\/span><\/h4>\n<h4><em><strong>Track Co-Chairs:<\/strong><\/em><\/h4>\n<ol>\n<li><span style=\"color: #333399;\"><strong>Abdulrahman Alsewari<\/strong><\/span>,\u00a0<span style=\"color: #000000;\"><em>Universiti Malaysia Pahang,\u00a0<\/em>Malaysia<\/span><\/li>\n<li><span style=\"color: #333399;\"><strong>Abdulrazak Alhababi<\/strong><\/span>,\u00a0<span style=\"color: #000000;\"><em>UNIMAS,<\/em>\u00a0Malaysia<\/span><\/li>\n<li><span style=\"color: #333399;\"><strong>Ashraf Osman<\/strong><\/span>,\u00a0<span style=\"color: #000000;\"><em>Alzaiem Alazhari University,\u00a0<\/em>Sudan<\/span><\/li>\n<\/ol>\n<h4><strong><em>Topics:<\/em> <\/strong><\/h4>\n<h4>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Natural Language Processing<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fuzzy Logic<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Knowledge Acquisition and Expert Systems<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Design Automation<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Reasoning and Decision Support Systems<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Hybrid Algorithms<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Genetic Algorithms<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Machine Learning<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Deep Learning<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Multi-Objective Optimization<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Computational Intelligence<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Neural Networks<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Evolutionary Algorithms<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Differential Evolution<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Combinatorial Optimization<\/h4>\n<h4><\/h4>\n<h4 class=\"lc\"><span style=\"color: #333399;\"><strong>2. Data Science and Big Data Analytics<\/strong><\/span><\/h4>\n<h4><em><strong>Track Co-Chairs:<\/strong><\/em><\/h4>\n<ol>\n<li><span style=\"color: #333399;\"><strong>Ahmed Hamza<\/strong><\/span>,\u00a0<em>King Abdulaziz University,\u00a0<\/em>KSA<\/li>\n<li><span style=\"color: #333399;\"><strong>Mohammed\u00a0Alsarem<\/strong><\/span>,<em>\u00a0Taibah University, KSA<\/em><\/li>\n<li><span style=\"color: #333399;\"><strong>Yogan J Kumar<\/strong><\/span><em>,\u00a0Universiti Teknikal Malaysia Melaka,\u00a0<\/em>Malaysia<\/li>\n<\/ol>\n<h4 class=\"lc\"><em><strong>Topics:<\/strong><\/em><\/h4>\n<h4>&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data mining and knowledge discovery<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Machine learning<br \/>\n&#8211;\u00a0 \u00a0 \u00a0 \u00a0Pattern recognition<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Big Data Analytics and data science<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data-driven problem solving<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Distributed Database Systems<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Mining<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Warehouse<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Knowledge Data Engineering<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Behavioral Mining<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Decision Trees<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Bioinformatics<br \/>\n&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Chemoinforamtics<\/h4>\n<h4><\/h4>\n<h4 class=\"lc\"><span style=\"color: #333399;\"><strong>3. Business Intelligence\u00a0<\/strong><\/span><\/h4>\n<h4><em><strong>Track Co-Chairs:<\/strong><\/em><\/h4>\n<ol>\n<li><span style=\"color: #333399;\"><strong>Asma Ahmed Alhashmi<\/strong><\/span>,\u00a0<em>Mysore University,\u00a0<\/em>India<\/li>\n<li><span style=\"color: #333399;\"><strong>Essa Hezzam<\/strong><\/span>,\u00a0<em>Taibah University<\/em>, KSA<\/li>\n<\/ol>\n<h4><em><strong>Topics:<\/strong><\/em><br \/>\n&#8211;\u00a0 \u00a0 Business Analytics<br \/>\n&#8211;\u00a0 \u00a0 Customer Analytics<br \/>\n&#8211;\u00a0 \u00a0 Financial Analytics<br \/>\n&#8211;\u00a0 \u00a0 Bioinformatics<br \/>\n&#8211;\u00a0 \u00a0 Talent Analytics<br \/>\n&#8211;\u00a0 \u00a0 Information Analytics<br \/>\n&#8211;\u00a0 \u00a0 Marketing Analytics<br \/>\n&#8211;\u00a0 \u00a0 BI and Analytics in Intelligence and Security Informatics<br \/>\n&#8211;\u00a0 \u00a0 Predictive analytics and knowledge management approaches<br \/>\n&#8211;\u00a0 \u00a0 Big data solutions and applications<br \/>\n&#8211;\u00a0 \u00a0 Social media intelligence and analytics<br \/>\n&#8211;\u00a0 \u00a0 Business Intelligence Systems Implementation<br \/>\n&#8211;\u00a0 \u00a0 Business Intelligence, Analytics in Healthcare<br \/>\n&#8211;\u00a0 \u00a0 Business Intelligence for Organizational Performance Management<br \/>\n&#8211;\u00a0 \u00a0 Predictive Analytics: Definition, Implementation, and Usage<\/h4>\n<h4><\/h4>\n<h4><span style=\"color: #333399;\"><strong>4. Internet of Things (IoT)<\/strong><\/span><\/h4>\n<h4><em><strong>Track Chair:<\/strong><\/em><\/h4>\n<ol>\n<li><strong><span style=\"color: #333399;\">Wesam\u00a0Ashour<\/span><\/strong>,\u00a0<em>Islamic Univesity of Gaza<\/em>,\u00a0Palestine<\/li>\n<\/ol>\n<h4><em><strong>Topics:<\/strong><\/em><\/h4>\n<h4>&#8211;\u00a0 \u00a0 Web Technologies for the IoT<br \/>\n&#8211;\u00a0 \u00a0 Real World Applications of IoT technology<br \/>\n&#8211;\u00a0 \u00a0 Internet of Things Architecture<br \/>\n&#8211;\u00a0 \u00a0 Social Acceptance of IoT Systems<br \/>\n&#8211;\u00a0 \u00a0 Smart Home<br \/>\n&#8211;\u00a0 \u00a0 Smart Cities<br \/>\n&#8211;\u00a0 \u00a0 IoT for healthcare<br \/>\n&#8211;\u00a0 \u00a0 IoT security<br \/>\n&#8211;\u00a0 \u00a0 IoT Data Analytics<\/h4>\n<p>&nbsp;<\/p>\n<h4><span style=\"color: #333399;\"><strong>5. Intelligent Communication Systems\u00a0<\/strong><\/span><\/h4>\n<h4><em><strong>Track Co-Chairs:\u00a0<\/strong><\/em><\/h4>\n<ol>\n<li><span style=\"color: #333399;\"><strong>Ahmed Al-Saman<\/strong><\/span>,\u00a0<em>Universiti Teknologi Malaysia,\u00a0<\/em>Malaysia<\/li>\n<li><span style=\"color: #333399;\"><strong>Redhwan Q Shaddad<\/strong><\/span><em>,\u00a0Taiz University,\u00a0<\/em>Yemen<\/li>\n<li><span style=\"color: #333399;\"><strong>Tawfik Al-Hadhrami<\/strong><\/span>, <em>Nottingham Trent University<\/em>, UK<\/li>\n<\/ol>\n<h4><strong><em>Topics:<\/em> <\/strong><\/h4>\n<h4><strong>\u2013\u00a0\u00a0 \u00a0 \u00a0\u00a0<\/strong>Computer Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Communications<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Mobile Computing<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wireless Sensor Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networked Systems<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networks Architecture<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networks Operations and Management<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networks Analyzing &amp; Programming<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 LAN &amp; WAN Technologies<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Internet Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Future Internet Engineering<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Network issues in quantum technologies<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Industrial Computer Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Networked Control Systems<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Green Networking<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ad hoc and Sensor Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vehicular Networks<br \/>\n\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud Networking and Services<\/h4>\n<h4><\/h4>\n<h4><span style=\"color: #333399;\"><strong>6.\u00a0 Advances in Information Security<\/strong><\/span><\/h4>\n<h4><em><strong>Track Co-Chairs:<\/strong><\/em><\/h4>\n<ol>\n<li><span style=\"color: #333399;\"><strong>Bassam Altamimi<\/strong><\/span>,\u00a0<em>Taibah University, <\/em>KSA<\/li>\n<li><span style=\"color: #333399;\"><strong>Fuad Abdulgaleel<\/strong><\/span>,\u00a0<em>Universiti Teknologi Malaysia,\u00a0<\/em>Malaysia<\/li>\n<li><span style=\"color: #333399;\"><strong>Murad Rassam<\/strong><\/span>,\u00a0<em>Taiz University,<\/em>\u00a0Yemen<\/li>\n<\/ol>\n<h4><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 \u00a0Access control<br \/>\n\u2013\u00a0 \u00a0 \u00a0Applied cryptography<br \/>\n\u2013\u00a0 \u00a0 \u00a0Authentication and authorization<br \/>\n\u2013\u00a0 \u00a0 \u00a0Biometric security<br \/>\n\u2013\u00a0 \u00a0 \u00a0Data and system integrity<br \/>\n\u2013\u00a0 \u00a0 \u00a0Database security<br \/>\n\u2013\u00a0 \u00a0 \u00a0Distributed systems security<br \/>\n\u2013\u00a0 \u00a0 \u00a0Grid security<br \/>\n\u2013\u00a0 \u00a0 \u00a0Information hiding and watermarking<br \/>\n\u2013\u00a0 \u00a0 \u00a0Intrusion detection<br \/>\n\u2013\u00a0 \u00a0 \u00a0Key management and key recovery<br \/>\n\u2013\u00a0 \u00a0 \u00a0Network security<br \/>\n\u2013\u00a0 \u00a0 \u00a0Security for mobile computing<br \/>\n\u2013\u00a0 \u00a0 \u00a0Trusted computing<br \/>\n\u2013\u00a0 \u00a0 \u00a0Data and Network Security &amp; Safety<br \/>\n\u2013\u00a0 \u00a0 \u00a0Cryptographic Applications for Networks<\/h4>\n<h4><\/h4>\n<h4><span style=\"color: #333399;\"><strong>7. Computational Vision and Robotics Technology<\/strong><\/span><\/h4>\n<h4><em><strong>Track Co-Chairs:<\/strong><\/em><\/h4>\n<ol>\n<li><span style=\"color: #333399;\"><strong>Qais Alnuzaili<\/strong><\/span><em>,\u00a0Universiti Teknologi Malaysia,\u00a0<\/em>Malaysia<\/li>\n<li><span style=\"color: #333399;\"><strong>Taha Hussein<\/strong><\/span><em>,\u00a0Universiti Malaysia Pahang,\u00a0<\/em>Malaysia<\/li>\n<\/ol>\n<h4><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 \u00a0Computer vision, AI applications<br \/>\n\u2013\u00a0 \u00a0 \u00a0Computer games and animation<br \/>\n\u2013\u00a0 \u00a0 \u00a0Computational geometry<br \/>\n\u2013\u00a0 \u00a0 \u00a0Shape\/range\/motion analysis<br \/>\n\u2013\u00a0 \u00a0 \u00a0Signal\/image processing<br \/>\n\u2013\u00a0 \u00a0 \u00a0Image matching, medical imaging<br \/>\n\u2013\u00a0 \u00a0 \u00a0Pattern\/face recognition<br \/>\n\u2013\u00a0 \u00a0 \u00a0Architecture, languages<br \/>\n\u2013\u00a0 \u00a0 \u00a0Parallel computer vision<br \/>\n\u2013\u00a0 \u00a0 \u00a0Interactive computational models<br \/>\n\u2013\u00a0 \u00a0 \u00a0Biological vision, alternative eyes<br \/>\n\u2013\u00a0 \u00a0 \u00a0Renewable Energy and Sustainability<\/h4>\n<h4><\/h4>\n<h4><span style=\"color: #333399;\"><strong>8. Software Engineering<\/strong><\/span><\/h4>\n<h4><em><strong>Track Co-Chairs:<\/strong><\/em><\/h4>\n<ol>\n<li><span style=\"color: #333399;\"><strong>Abdulbasit Darem<\/strong><\/span>,\u00a0<em>Mysore University,<\/em>\u00a0India<\/li>\n<li><span style=\"color: #333399;\"><strong>Thabit Sabbah<\/strong><\/span><em>,\u00a0Al-Quds Open University,\u00a0<\/em>Palestine<\/li>\n<\/ol>\n<h4><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 \u00a0Development Environments and Tools<br \/>\n\u2013\u00a0 \u00a0 \u00a0Programming languages, Hybrid and Native applications<br \/>\n\u2013\u00a0 \u00a0 \u00a0Agile or Model driven development<br \/>\n\u2013\u00a0 \u00a0 \u00a0Energy Efficient, resource aware development<br \/>\n\u2013\u00a0 \u00a0 \u00a0Testing, Maintenance, Debugging techniques and tools<br \/>\n\u2013\u00a0 \u00a0 \u00a0Analysis and Re-engineering of Mobile Apps<br \/>\n\u2013\u00a0 \u00a0 \u00a0Cloud support and scalability<br \/>\n\u2013\u00a0 \u00a0 \u00a0Empirical studies, Industry experiences<br \/>\n\u2013\u00a0 \u00a0 \u00a0Static and Dynamic Analysis<br \/>\n\u2013\u00a0 \u00a0 \u00a0User experience and New input devices<br \/>\n\u2013\u00a0 \u00a0 Applications of Mobile Apps<\/h4>\n<h4><\/h4>\n<h4><span style=\"color: #333399;\"><strong>9. Multimedia Applications and Services<\/strong><\/span><\/h4>\n<h4><em><strong>Track Co-Chairs:<\/strong><\/em><\/h4>\n<ol>\n<li><span style=\"color: #333399;\"><strong>Nasrin Makbol<\/strong><\/span>,\u00a0<em>Universiti Science Malaysia,<\/em>\u00a0Malaysia<\/li>\n<li><span style=\"color: #333399;\"><strong>Taha Hussein<\/strong><\/span><em>,\u00a0Universiti Malaysia Pahang,\u00a0<\/em>Malaysia<\/li>\n<\/ol>\n<h4><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 \u00a0Media Representation and Algorithms<br \/>\n\u2013\u00a0 \u00a0 \u00a0Audio, Image, Video Processing, Coding and Compression<br \/>\n\u2013\u00a0 \u00a0 \u00a0Multimedia Sensors and Interaction Modes<br \/>\n\u2013\u00a0 \u00a0 \u00a0Multimedia Privacy, Security and Content Protection<br \/>\n\u2013\u00a0 \u00a0 \u00a0Multimedia Standards and Related Issues<br \/>\n\u2013\u00a0 \u00a0 \u00a0Advances in Multimedia Networking and Streaming<br \/>\n\u2013\u00a0 \u00a0 \u00a0Multimedia Databases, Content Delivery and Transport<br \/>\n\u2013\u00a0 \u00a0 \u00a0Wireless and Mobile Multimedia Networking<\/h4>\n<h4><\/h4>\n<h4><span style=\"color: #333399;\"><strong>10. Information Systems<\/strong><\/span><\/h4>\n<h4><em><strong>Track Co-Chairs:<\/strong><\/em><\/h4>\n<ol>\n<li><strong><span style=\"color: #333399;\">Ali Al-Awadhi<\/span>\u00a0<\/strong>,\u00a0<em>Lincoln University College,<\/em>\u00a0Malaysia<\/li>\n<li><span style=\"color: #333399;\"><strong>Ali Balaid<\/strong><\/span>,\u00a0<em>Universiti Teknologi Malaysia,\u00a0<\/em>Malaysia<\/li>\n<li><span style=\"color: #333399;\"><strong>Fathey Mohammed<\/strong><\/span>,\u00a0<em>Taiz University,\u00a0<\/em>Yemen<\/li>\n<\/ol>\n<h4><em><strong>Topics:<\/strong><\/em><br \/>\n\u2013\u00a0 \u00a0 \u00a0Knowledge management, decision making and big data<br \/>\n\u2013\u00a0 \u00a0 \u00a0Enterprise systems, processes, modelling and management<br \/>\n\u2013\u00a0 \u00a0 \u00a0Diversity, inclusion and cross cultural issues<br \/>\n\u2013\u00a0 \u00a0 \u00a0HCI, the user experience and human centred IS<br \/>\n\u2013\u00a0 \u00a0 \u00a0Health Informatics<br \/>\n\u2013\u00a0 \u00a0 \u00a0IS innovation, strategy and IT governance<br \/>\n\u2013\u00a0 \u00a0 \u00a0IS development, design and project management<br \/>\n\u2013\u00a0 \u00a0 \u00a0IS education, training and learning technologies<br \/>\n\u2013\u00a0 \u00a0 \u00a0IS in emergencies and responsive systems<br \/>\n\u2013\u00a0 \u00a0 \u00a0IS research, theory, philosophy and methods<br \/>\n\u2013\u00a0 \u00a0 \u00a0Social media and related technologies<br \/>\n\u2013\u00a0 \u00a0 \u00a0Green IS and sustainability<\/h4>\n<h4><span style=\"color: #333399;\"><strong>\u00a011.\u00a0<strong>Information Technology and Education<\/strong><\/strong><\/span><\/h4>\n<h4><em><strong>Track Co-Chairs:<\/strong><\/em><\/h4>\n<ol>\n<li><span style=\"color: #333399;\"><strong>Nadhmi Gazem<\/strong><\/span>,\u00a0<em>Universiti Teknologi Malaysia,\u00a0<\/em>Malaysia<\/li>\n<li><span style=\"color: #333399;\"><strong>Yahya M. Al-dheleai<\/strong><\/span><em>,\u00a0Universiti Teknologi Malaysia,\u00a0<\/em>Malaysia<\/li>\n<\/ol>\n<h4><em><strong>Topics:<\/strong><\/em><br \/>\n&#8211; Advanced Technology in Education and Learning<br \/>\n&#8211; Artificial Intelligence for e-Learning<br \/>\n&#8211; Computer Supported Collaborative Learning (CSCL)<br \/>\n&#8211; Digital Game-based Learning<br \/>\n&#8211; E-learning and Distance Education<br \/>\n&#8211; Innovative Teaching and Learning Technologies<br \/>\n&#8211; Education Simulation<br \/>\n&#8211; Mobile Learning<br \/>\n&#8211; Multi-agent e-learning Systems<br \/>\n&#8211; Technology-based Blended, Distance and Open Education<br \/>\n&#8211; Ubiquitous Computing for Learning<br \/>\n&#8211; Policies on Technology-based Education<\/h4>\n","protected":false},"excerpt":{"rendered":"<p>IRICT 2018 Tracks The topics are included below, but not limited to: \u00a0 1. Artificial Intelligence and Soft Computing Track Co-Chairs: Abdulrahman Alsewari,\u00a0Universiti Malaysia Pahang,\u00a0Malaysia Abdulrazak Alhababi,\u00a0UNIMAS,\u00a0Malaysia Ashraf Osman,\u00a0Alzaiem Alazhari University,\u00a0Sudan Topics: &#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Natural Language Processing &#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Fuzzy Logic &#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <a href=\"https:\/\/irict.co\/?page_id=42\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-42","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/pages\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/irict.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=42"}],"version-history":[{"count":38,"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/pages\/42\/revisions"}],"predecessor-version":[{"id":1169,"href":"https:\/\/irict.co\/index.php?rest_route=\/wp\/v2\/pages\/42\/revisions\/1169"}],"wp:attachment":[{"href":"https:\/\/irict.co\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}