{"id":"https://openalex.org/W2912888217","doi":"https://doi.org/10.1145/3385209","title":"Proceedings of the 2020 5th International Conference on Intelligent Information Technology","display_name":"Proceedings of the 2020 5th International Conference on Intelligent Information Technology","publication_year":2020,"publication_date":"2020-02-19","ids":{"openalex":"https://openalex.org/W2912888217","doi":"https://doi.org/10.1145/3385209","mag":"2912888217"},"language":"en","primary_location":{"id":"doi:10.1145/3385209","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3385209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11396","display_name":"Artificial Intelligence in Healthcare","score":0.2605000138282776,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T11396","display_name":"Artificial Intelligence in Healthcare","score":0.2605000138282776,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.7613139748573303},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6810611486434937},{"id":"https://openalex.org/keywords/inclusion","display_name":"Inclusion (mineral)","score":0.5580066442489624},{"id":"https://openalex.org/keywords/information-technology","display_name":"Information technology","score":0.44476518034935},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4359573423862457},{"id":"https://openalex.org/keywords/library-science","display_name":"Library science","score":0.3238763213157654},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16134601831436157},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.07455173134803772}],"concepts":[{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.7613139748573303},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6810611486434937},{"id":"https://openalex.org/C109359841","wikidata":"https://www.wikidata.org/wiki/Q728944","display_name":"Inclusion (mineral)","level":2,"score":0.5580066442489624},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.44476518034935},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4359573423862457},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.3238763213157654},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16134601831436157},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.07455173134803772},{"id":"https://openalex.org/C107993555","wikidata":"https://www.wikidata.org/wiki/Q1662673","display_name":"Gender studies","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3385209","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3385209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4387426029","https://openalex.org/W4254162896","https://openalex.org/W4388792380","https://openalex.org/W1477999932","https://openalex.org/W4386731653","https://openalex.org/W2376001620","https://openalex.org/W2925303117","https://openalex.org/W3167529338","https://openalex.org/W4285219045","https://openalex.org/W3185553570"],"abstract_inverted_index":{"We":[0,53],"received":[1],"a":[2],"large":[3],"and":[4,17,37,41,45,48,51],"diverse":[5],"papers":[6,25],"from":[7],"all":[8,62],"corners":[9],"the":[10,20],"world":[11],"to":[12,56,60],"be":[13],"considered":[14],"for":[15,64],"presentation":[16],"inclusion":[18],"in":[19,28,67],"conference":[21],"proceedings.":[22],"All":[23],"accepted":[24],"were":[26],"presented":[27],"4":[29],"sessions":[30],"with":[31],"topics":[32],"on":[33],"Advanced":[34],"Information":[35,39,46],"Technology":[36],"Application,":[38],"Network":[40],"System":[42],"Security,":[43],"Computer":[44],"Engineering,":[47],"Image":[49],"Analysis":[50],"Processing.":[52],"would":[54],"like":[55],"take":[57],"this":[58,68],"opportunity":[59],"thank":[61],"presenters":[63],"their":[65],"participation":[66],"conference.":[69]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
