{"@context":{"ns0":"https://w3id.org/seo#","rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","owl":"http://www.w3.org/2002/07/owl#","rdfs":"http://www.w3.org/2000/01/rdf-schema#","metadata":"http://data.bioontology.org/metadata/","metadata_def":"http://data.bioontology.org/metadata/def/"},"@graph":[{"@id":"ns0:ResearchField","@type":"owl:Class","rdfs:subClassOf":{"@id":"owl:Thing"},"rdfs:comment":{"@language":"en","@value":"Area of interest."},"rdfs:label":{"@language":"en","@value":"Research field"},"metadata:prefixIRI":"seo:ResearchField","metadata:def/prefLabel":{"@language":"en","@value":"Research field"},"metadata:def/mappingLoom":"researchfield","metadata:def/mappingSameURI":{"@id":"ns0:ResearchField"}},{"@id":"ns0:ArtificialIntelligence","@type":"ns0:ResearchField"},{"@id":"ns0:ComputerSystemsOrganization","@type":"ns0:ResearchField"},{"@id":"ns0:HumanCenteredComputing","@type":"ns0:ResearchField"},{"@id":"ns0:InformationSystems","@type":"ns0:ResearchField"},{"@id":"ns0:SecurityAndPrivacy","@type":"ns0:ResearchField"},{"@id":"ns0:SoftwareEngineering","@type":"ns0:ResearchField"},{"@id":"ns0:TheoryOfComputations","@type":"ns0:ResearchField"},{"@id":"ns0:WorldWideWeb","@type":"ns0:ResearchField"}]}
{"@context":{"ns0":"https://w3id.org/seo#","rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","owl":"http://www.w3.org/2002/07/owl#","rdfs":"http://www.w3.org/2000/01/rdf-schema#","metadata":"http://data.bioontology.org/metadata/","metadata_def":"http://data.bioontology.org/metadata/def/"},"@graph":[{"@id":"ns0:ResearchField","@type":"owl:Class","rdfs:subClassOf":{"@id":"owl:Thing"},"rdfs:comment":{"@language":"en","@value":"Area of interest."},"rdfs:label":{"@language":"en","@value":"Research field"},"metadata:prefixIRI":"seo:ResearchField","metadata:def/prefLabel":{"@language":"en","@value":"Research field"},"metadata:def/mappingLoom":"researchfield","metadata:def/mappingSameURI":{"@id":"ns0:ResearchField"}},{"@id":"ns0:ArtificialIntelligence","@type":"ns0:ResearchField"},{"@id":"ns0:ComputerSystemsOrganization","@type":"ns0:ResearchField"},{"@id":"ns0:HumanCenteredComputing","@type":"ns0:ResearchField"},{"@id":"ns0:InformationSystems","@type":"ns0:ResearchField"},{"@id":"ns0:SecurityAndPrivacy","@type":"ns0:ResearchField"},{"@id":"ns0:SoftwareEngineering","@type":"ns0:ResearchField"},{"@id":"ns0:TheoryOfComputations","@type":"ns0:ResearchField"},{"@id":"ns0:WorldWideWeb","@type":"ns0:ResearchField"}]}