[{"name":"CONTROL THEORY AND APPLICATION","count":548,"id":1},{"name":"SYSTEMS ENGINEERING","count":505,"id":2},{"name":"ELECTRONICS TECHNOLOGY","count":449,"id":3},{"name":"SOFTWARE ALGORITHM AND SIMULATION","count":294,"id":4},{"name":"DEFENCE ELECTRONICS TECHNOLOGY","count":224,"id":5},{"name":"ELECTRONIC TECHNOLOGY","count":184,"id":6},{"name":"RELIABILITY","count":109,"id":7},{"name":"DEFENCE ELECTRONIC TECHNOLOGY","count":36,"id":8},{"name":"COMPUTER DEVELOPMENT AND APPLICATION","count":35,"id":9},{"name":"ELECTRONICS","count":32,"id":10},{"name":"CONTROL THEORY AND PRACTICE","count":25,"id":11},{"name":"SPECIAL SECTION ON FAULT DETECTION,DIAGNOSIS AND T","count":19,"id":12},{"name":"COMPUTER DEVELOPMENT AND PRACTICE","count":9,"id":13},{"name":"MILITARY SYSTEM ANALYSIS","count":9,"id":14},{"name":"INTELLIGENT OPTIMIZATION AND SCHEDULING","count":8,"id":15},{"name":"MILITARY SYSTEMS ANALYSIS","count":7,"id":16},{"name":"ADVANCED RADAR IMAGING AND INTELLIGENT PROCESSING","count":6,"id":17},{"name":"AUTONOMOUS DECISION AND COOPERATIVE CONTROL OF UAV SWARMS","count":6,"id":18},{"name":"CLOUD CONTROL SYSTEMS","count":6,"id":19},{"name":"COMPLEX SYSTEMS THEORY AND PRACTICE","count":6,"id":20},{"name":"ELECTRONICS TTECHNOLOGY","count":6,"id":21},{"name":"HIGH-DIMENSIONAL SIGNAL PROCESSING","count":6,"id":22},{"name":"NEW DEVELOPMENTS ON FDD AND FTC TECHNIQUES","count":6,"id":23},{"name":"RADAR DETECTION AND INTERFERENCE SUPPRESSION","count":6,"id":24},{"name":"RADAR DIFFERENTIAL INTERFEROMETRY TECHNIQUES AND APPLICATIONS","count":6,"id":25},{"name":"REMOTE SENSING","count":6,"id":26},{"name":"SENSOR ARRAY SIGNAL PROCESSING AND ITS APPLICATIONS IN 5G/6G","count":6,"id":27},{"name":"EMERGING DEVELOPMENTS ON SPACE-TEERRESTRIAL INTEGRATED NETWORK AND RELATED KEY TECHNOLOGIES","count":5,"id":28},{"name":"COMPUTER DEVELOPMENT AND APPLOICATION","count":3,"id":29},{"name":"CONTROL THEORYAND APPLICATION","count":3,"id":30},{"name":"DEFENCE ELECTRONICS","count":3,"id":31},{"name":"ELECTRONICS TECHNOLIGY","count":3,"id":32},{"name":"PRACTICE TECHNOLOGY","count":3,"id":33},{"name":"SOFFTWARE,ALGORITHM AND SIMULATION","count":3,"id":34},{"name":"SOFTWARE,ALGORITHM AND SIMULATION","count":3,"id":35},{"name":"SOFTWARE,ALGORITHM AND SIMLATION","count":3,"id":36},{"name":"SYSTEM ENGINEERING","count":3,"id":37},{"name":"CONYROL THEORY AND PRACTICE","count":2,"id":38},{"name":"DEFENCE ELECRONIC TECHNOLOGY","count":2,"id":39},{"name":"RELIABILTY","count":2,"id":40},{"name":"RELLABILITY","count":2,"id":41},{"name":"SOFTWARE AND ALGORITHM","count":2,"id":42},{"name":"KNOW LEDGE AND DEVELOPMENT","count":1,"id":43}]