{"623781":{"#nid":"623781","#data":{"uid":"34540","author":"Kristen Perez","created_gmt":"2019-07-29 20:29:21","changed_gmt":"2019-07-29 20:29:21","title":"MLsploit","body":[],"image":{"alt":"A diagram showing how MLsploit feeds algorithms through its framework","view":{"#theme":"field","#title":"Image","#label_display":"hidden","#view_mode":"image_740","#language":"en","#field_name":"field_image","#field_type":"image","#field_translatable":false,"#entity_type":"media","#bundle":"image","#object":{},"#items":{},"#formatter":"image","#is_multiple":false,"#third_party_settings":[],"0":{"#theme":"image_formatter","#item":{},"#item_attributes":[],"#image_style":"large","#url":null,"#cache":{"tags":["config:image.style.large","file:237584"],"contexts":[],"max-age":-1}},"#cache":{"contexts":[],"tags":[],"max-age":-1},"#weight":0},"file":{"fid":"237584","name":"Screen Shot 2019-07-22 at 5.16.18 PM.png","path":"\/sites\/default\/files\/images\/Screen%20Shot%202019-07-22%20at%205.16.18%20PM.png","fullpath":"\/var\/www\/html\/files\/public\/images\/Screen Shot 2019-07-22 at 5.16.18 PM.png","mime":"image\/png","size":65861}},"groups":[{"id":"47223","name":"College of Computing"},{"id":"431631","name":"OMS"},{"id":"50877","name":"School of Computational Science and Engineering"}],"keywords":[{"id":"181831","name":"MLsploit"}]}}}