[{"name":"网络与信息安全","count":396,"id":1},{"name":"Network and Information Security","count":379,"id":2},{"name":"研究与分析","count":347,"id":3},{"name":"软件设计与开发","count":313,"id":4},{"name":"计算机教学","count":287,"id":5},{"name":"Artificial Intelligence and Algorithm Research","count":266,"id":6},{"name":"Study and Analysis","count":234,"id":7},{"name":"Software Design and Development","count":231,"id":8},{"name":"人工智能与算法研究","count":219,"id":9},{"name":"Research for Computer Teaching","count":216,"id":10},{"name":"数据库与软件技术","count":209,"id":11},{"name":"通信技术与硬件设计","count":188,"id":12},{"name":"Communication Technology and Hardware Design","count":159,"id":13},{"name":"人工智能与算法分析","count":157,"id":14},{"name":"图形图像识别处理技术","count":156,"id":15},{"name":"Database and Software Technology","count":148,"id":16},{"name":"程序设计与信息系统","count":141,"id":17},{"name":"数据库与信息处理","count":137,"id":18},{"name":"Database and Information Processing","count":122,"id":19},{"name":"图形图像与信息处理","count":121,"id":20},{"name":"Graphic, Image Recognition and Processing Techenology","count":91,"id":21},{"name":"计算机仿真","count":89,"id":22},{"name":"Computer Simulation","count":82,"id":23},{"name":"Artificial Intelligence and Algorithm Analysis","count":64,"id":24},{"name":"开发与设计","count":62,"id":25},{"name":"Processing of Graphics, Image and Information","count":52,"id":26},{"name":"Processing of Graphics,Image and Information","count":48,"id":27},{"name":"网络与通信","count":48,"id":28},{"name":"信息处理与计算机应用","count":44,"id":29},{"name":"数据库与信息系统","count":42,"id":30},{"name":"网络与安全","count":31,"id":31},{"name":"金融天地","count":29,"id":32},{"name":"计算机应用","count":26,"id":33},{"name":"Computer Teaching","count":25,"id":34},{"name":"Graphic,Image Recognition and Processing Techenology","count":18,"id":35},{"name":"人工智能","count":18,"id":36},{"name":"software design and development","count":15,"id":37},{"name":"数据库技术","count":15,"id":38},{"name":"算法研究","count":15,"id":39},{"name":"多媒体技术","count":13,"id":40},{"name":"计算机仿真技术","count":13,"id":41},{"name":"Graphic, Image Recognition and Processing Techenol","count":10,"id":42},{"name":"网络安全与通信","count":10,"id":43},{"name":"综述","count":9,"id":44},{"name":"程序设计","count":8,"id":45},{"name":"Database and software Technology","count":7,"id":46},{"name":"Graphic Image Recognition and Processing Techenolo","count":7,"id":47},{"name":"IC卡技术","count":7,"id":48},{"name":"信息系统与程序设计","count":7,"id":49},{"name":"网络与通讯","count":7,"id":50},{"name":"Graphic,Image Recognition and Processing Techenolo","count":6,"id":51},{"name":"分析与研究","count":6,"id":52},{"name":"教学研究与交流","count":6,"id":53},{"name":"Computer Simulation Technology","count":5,"id":54},{"name":"经验交流","count":5,"id":55},{"name":"Graphic, Image Recognition and Processing Technology","count":4,"id":56},{"name":"IC卡应用","count":4,"id":57},{"name":"Processing of Graphics ,Image and Information","count":4,"id":58},{"name":"人工智能和算法研究","count":4,"id":59},{"name":"数据库","count":4,"id":60},{"name":"Data and Software Technology","count":3,"id":61},{"name":"Graphic Image Recognition and Processing Techenology","count":3,"id":62},{"name":"Net and Information Security","count":3,"id":63},{"name":"图像处理与计算机应用","count":3,"id":64},{"name":"研究与贫析","count":3,"id":65},{"name":"Artificial Intelligence and Alogrithm Research","count":2,"id":66},{"name":"Artificial Intelligence and algorithm Research","count":2,"id":67},{"name":"Database and I nformation Processing","count":2,"id":68},{"name":"Graphic,Image Recognition and Processing Technolog","count":2,"id":69},{"name":"Graphic,Image Recognition and Processing Technology","count":2,"id":70},{"name":"Image recognition processing technology","count":2,"id":71},{"name":"图像处理","count":2,"id":72},{"name":"图象处理","count":2,"id":73},{"name":"网络技术","count":2,"id":74},{"name":"Multimedia Technology and Application","count":1,"id":75},{"name":"多媒体技术与应用","count":1,"id":76},{"name":"多媒本技术","count":1,"id":77},{"name":"软件工程","count":1,"id":78},{"name":"通讯技术","count":1,"id":79}]