[{"name":"人工智能与算法研究","count":2064,"id":1},{"name":"计算机网络与信息安全","count":1585,"id":2},{"name":"Computer Network and Information Security","count":1472,"id":3},{"name":"图形与图像技术","count":1114,"id":4},{"name":"Artificial Intelligence and Algorithms Research","count":976,"id":5},{"name":"Computer Software and Database Research","count":914,"id":6},{"name":"计算机软件与数据库研究","count":909,"id":7},{"name":"Graphics and Image Technology","count":666,"id":8},{"name":"Artificial Intelligence and Algorithm Research","count":577,"id":9},{"name":"软件与数据库技术","count":334,"id":10},{"name":"Software and Database Technology","count":266,"id":11},{"name":"计算机软件与数据库技术","count":245,"id":12},{"name":"Computer Software and Database Technology","count":226,"id":13},{"name":"Image and Graphics Technology","count":211,"id":14},{"name":"Computer Network and Communication Technology","count":201,"id":15},{"name":"计算机网络与通信技术","count":200,"id":16},{"name":"其它","count":181,"id":17},{"name":"网络与信息安全","count":179,"id":18},{"name":"图形、图像及其它","count":150,"id":19},{"name":"算法研究","count":150,"id":20},{"name":"计算机软件与数据库","count":142,"id":21},{"name":"计算机网络研究","count":130,"id":22},{"name":"Computer Software and Database","count":124,"id":23},{"name":"Other","count":117,"id":24},{"name":"Network and Information Security","count":110,"id":25},{"name":"Computer Network Research","count":102,"id":26},{"name":"Computer Network and Communication","count":97,"id":27},{"name":"Graphic and Image Technology","count":95,"id":28},{"name":"Others","count":90,"id":29},{"name":"计算机网络与通信","count":90,"id":30},{"name":"Computer Architecture and Other","count":82,"id":31},{"name":"Image、Graphics and Other","count":80,"id":32},{"name":"其他","count":79,"id":33},{"name":"Artificial Intelligent and Algorithms Research","count":73,"id":34},{"name":"Artifical Intelligence and Algorithms Research","count":72,"id":35},{"name":"计算机体系结构及其它","count":68,"id":36},{"name":"Algorithm Research","count":66,"id":37},{"name":"Aritificial Intelligence and Algorithms Research","count":66,"id":38},{"name":"Image,Graphics Technology","count":60,"id":39},{"name":"Image,Graphics and Other","count":60,"id":40},{"name":"图形、图像与其它","count":57,"id":41},{"name":"信息安全与算法研究","count":55,"id":42},{"name":"图形、图像技术与其它","count":53,"id":43},{"name":"信息安全与其它","count":48,"id":44},{"name":"Information Security and Algorithm Research","count":47,"id":45},{"name":"计算机体系结构与算法研究","count":44,"id":46},{"name":"Artificial Intelligence and Algorithm","count":43,"id":47},{"name":"Computer Architecture","count":43,"id":48},{"name":"信息安全","count":42,"id":49},{"name":"Graph and Image Technology","count":41,"id":50},{"name":"Computer Architecture and Information Security","count":40,"id":51},{"name":"计算机体系结构与信息安全","count":40,"id":52},{"name":"Artificial Intelligent and Algorithm Research","count":38,"id":53},{"name":"Computer Architecture Research","count":38,"id":54},{"name":"Computer Architecture and Algorithm Research","count":38,"id":55},{"name":"计算机体系结构与其它","count":38,"id":56},{"name":"图形、图像与算法研究","count":34,"id":57},{"name":"目次","count":34,"id":58},{"name":"Aritifical Intelligence and Algorithms Research","count":33,"id":59},{"name":"计算机体系结构研究","count":33,"id":60},{"name":"Artificial Intelligence and Algorithms","count":31,"id":61},{"name":"Image and Graphics Research","count":30,"id":62},{"name":"人工智能与算法","count":29,"id":63},{"name":"图形与图像技术及其他","count":29,"id":64},{"name":"计算机体系结构","count":29,"id":65},{"name":"软件与数据库研究","count":29,"id":66},{"name":"图形与图像研究","count":28,"id":67},{"name":"Information Security","count":27,"id":68},{"name":"人工智能与其它","count":27,"id":69},{"name":"图形与图像处理","count":26,"id":70},{"name":"Information Security and Other","count":25,"id":71},{"name":"Software and Database Research","count":25,"id":72},{"name":"图形与图像技术研究","count":25,"id":73},{"name":"Image、Graphics Technology and Other","count":24,"id":74},{"name":"Network Technology and Information Security","count":24,"id":75},{"name":"网络技术与信息安全","count":24,"id":76},{"name":"Computer Network and Communication Research","count":23,"id":77},{"name":"Computer Network and Communication Technology Rese","count":23,"id":78},{"name":"算法研究与图形图像技术","count":23,"id":79},{"name":"计算机网络与通信技术研究","count":23,"id":80},{"name":"计算机网络与通信研究","count":23,"id":81},{"name":"Software and Database","count":22,"id":82},{"name":"数据库与数据挖掘","count":22,"id":83},{"name":"Image,Graphics Technology and others","count":21,"id":84},{"name":"Image,Graphics and other","count":21,"id":85},{"name":"Software Technology and Others","count":21,"id":86},{"name":"图形与图像","count":21,"id":87},{"name":"数据挖掘与软件技术","count":21,"id":88},{"name":"软件技术与其它","count":21,"id":89},{"name":"Intelligent and Algorithm","count":20,"id":90},{"name":"图形、图像及其他","count":20,"id":91},{"name":"图形与图像技术研究及其它","count":20,"id":92},{"name":"Algorithm Research and Others","count":19,"id":93},{"name":"Aritifica l Intellige nce and Algori thms Research","count":19,"id":94},{"name":"Computer Nework Research","count":19,"id":95},{"name":"Service Computing and Database Technology Research","count":19,"id":96},{"name":"服务计算与数据库技术研究","count":19,"id":97},{"name":"计算机体系结构及其他","count":19,"id":98},{"name":"计算机网络","count":19,"id":99},{"name":"Computer Network Technology and Information Security","count":18,"id":100},{"name":"Image and Graphics","count":18,"id":101},{"name":"Intelligent and Algorithms Research","count":18,"id":102},{"name":"算法研究及其它","count":18,"id":103},{"name":"网络与网格技术研究","count":18,"id":104},{"name":"计算机算法研究","count":18,"id":105},{"name":"计算机网络、通信与数据安全","count":18,"id":106},{"name":"计算机网络技术","count":18,"id":107},{"name":"计算机网络技术与信息安全","count":18,"id":108},{"name":"Algorithm Research and Other","count":17,"id":109},{"name":"Computer Information Security","count":17,"id":110},{"name":"Computer Network and Information Accurity","count":17,"id":111},{"name":"Computer Network and Information SecurityComputer ","count":17,"id":112},{"name":"计算机信息安全","count":17,"id":113},{"name":"Artificial Intelligent and algorithms Research","count":16,"id":114},{"name":"Artifical Intelligent and Algorithms Research","count":15,"id":115},{"name":"Graphics,Image Technology and Other","count":15,"id":116},{"name":"计算机网络技术与数据安全","count":15,"id":117},{"name":"Artificial Intelligence and Graphic and Image Tech","count":14,"id":118},{"name":"Computer Architectare and Others","count":14,"id":119},{"name":"Computer Architecture and other","count":14,"id":120},{"name":"Computer Network and Information Secuiry","count":14,"id":121},{"name":"Data Mining and Software Technology","count":14,"id":122},{"name":"人工智能","count":14,"id":123},{"name":"人工智能与图形、图像技术","count":14,"id":124},{"name":"图形、图像与自然语言处理","count":14,"id":125},{"name":"算法研究与人工智能","count":14,"id":126},{"name":"网络与多媒体","count":14,"id":127},{"name":"Algorithm Research and Graphic、Image Technology","count":13,"id":128},{"name":"Algorithm Research and Image Graphic","count":13,"id":129},{"name":"Algorithm Theory Research and Others","count":13,"id":130},{"name":"Artificial Intelligence and Algorithm Rest","count":13,"id":131},{"name":"Computer Architecture and Algorithm Rescarch","count":13,"id":132},{"name":"Computer Gaphics and Images and Algorithm Research","count":13,"id":133},{"name":"Computer Network and Information Security Research","count":13,"id":134},{"name":"Graphics、Image Technology and Others","count":13,"id":135},{"name":"Graphic、Image and Other","count":13,"id":136},{"name":"Image, Graphic and Algorithms Research","count":13,"id":137},{"name":"Information Security Technology","count":13,"id":138},{"name":"Software Technology and Algorithm Rescurch","count":13,"id":139},{"name":"信息安全技术","count":13,"id":140},{"name":"数据挖掘与数据库技术","count":13,"id":141},{"name":"算法理论研究及其它","count":13,"id":142},{"name":"算法研究与图形图像","count":13,"id":143},{"name":"计算机网络与信息安全研究","count":13,"id":144},{"name":"计算机网络与通讯技术","count":13,"id":145},{"name":"软件技术与算法研究","count":13,"id":146},{"name":"Algorithm Research and Information Security","count":12,"id":147},{"name":"Architecture Intelligence and Algorithm Research","count":12,"id":148},{"name":"Artifical Intelligence and Other","count":12,"id":149},{"name":"Artificial Intell:Gence and Algorithm Research","count":12,"id":150},{"name":"Artificial Intelligence and Other","count":12,"id":151},{"name":"Artificial Intelligent and Information Security","count":12,"id":152},{"name":"Computer Network Information Security","count":12,"id":153},{"name":"Computer Network Technology Research","count":12,"id":154},{"name":"Computer Software and Database Research ","count":12,"id":155},{"name":"Image, Graphics Technology Research","count":12,"id":156},{"name":"Information Security and Computer Network","count":12,"id":157},{"name":"Network、Communication and Information Security","count":12,"id":158},{"name":"人工智能与信息安全","count":12,"id":159},{"name":"体系结构及其它","count":12,"id":160},{"name":"信息安全与计算机网络","count":12,"id":161},{"name":"算法理论研究","count":12,"id":162},{"name":"算法研究与信息安全","count":12,"id":163},{"name":"算法研究与其它","count":12,"id":164},{"name":"网络、通信与信息安全","count":12,"id":165},{"name":"网络与通信技术研究","count":12,"id":166},{"name":"计算机网络技术研究","count":12,"id":167},{"name":"Algorithms Research and othor","count":11,"id":168},{"name":"Architecture and Other","count":11,"id":169},{"name":"Artificial Intellignece and Algorithms Research","count":11,"id":170},{"name":"Computer Network and Comnucnication Technology","count":11,"id":171},{"name":"Computer Network and Security","count":11,"id":172},{"name":"Gomputer Architecture, Image and Graphics","count":11,"id":173},{"name":"Graphic and Image Technology and Other","count":11,"id":174},{"name":"Graphics,Image Technology and Others","count":11,"id":175},{"name":"Graphic、Image Technology Other","count":11,"id":176},{"name":"Information Security and Others","count":11,"id":177},{"name":"Software Technology","count":11,"id":178},{"name":"人工智能与算法理论","count":11,"id":179},{"name":"图形、图像技术及其它","count":11,"id":180},{"name":"图形与图像技术及其它","count":11,"id":181},{"name":"图形与图像技术研究及其他","count":11,"id":182},{"name":"算法理论与人工智能研究","count":11,"id":183},{"name":"网络与计算机安全","count":11,"id":184},{"name":"计算机体系结构与图形图象","count":11,"id":185},{"name":"计算机系统结构与算法理论","count":11,"id":186},{"name":"软件技术","count":11,"id":187},{"name":"Algorithms Research and Graphic、Image Technology","count":10,"id":188},{"name":"Computer Algorithms","count":10,"id":189},{"name":"Computer Architecture and Others","count":10,"id":190},{"name":"Computer Network and Information","count":10,"id":191},{"name":"Computer Softward and Database Research","count":10,"id":192},{"name":"Computer Software and Database Technology Research","count":10,"id":193},{"name":"Computer System Architecture and Others","count":10,"id":194},{"name":"Data Mining and Others","count":10,"id":195},{"name":"Graphic Image Technology and other","count":10,"id":196},{"name":"Graphics、Image Technology and Other","count":10,"id":197},{"name":"Hardware Technology and Other","count":10,"id":198},{"name":"Image and Graphic Technology","count":10,"id":199},{"name":"Image,graphics Technology and Other","count":10,"id":200}]