[{"name":"COMPUTERS AND MICROELECTRONICS","count":397,"id":1},{"name":"SIGNAL PROCESSING","count":295,"id":2},{"name":"TELECOMMUNICATIONS","count":171,"id":3},{"name":"MICROWAVE AND ELECTRONIC SYSTEM ENGINEERING","count":87,"id":4},{"name":"ARTIFICIAL INTELLIGENCE","count":41,"id":5},{"name":"INFORMATION SECURITY AND CRYPTOLOGY","count":38,"id":6},{"name":"CIRCUITS AND SYSTEMS","count":28,"id":7},{"name":"COMPUTER AND MICROELECTRONICS","count":26,"id":8},{"name":"ARTICLES","count":21,"id":9},{"name":"IMAGE AND SIGNAL PROCESSING","count":18,"id":10},{"name":"ELECTROMAGNETICS AND MICROWAVE","count":17,"id":11},{"name":"TELECOMMUNICATION","count":17,"id":12},{"name":"REVIEW","count":16,"id":13},{"name":"COMMUNICATIONS AND NETWORKING","count":14,"id":14},{"name":"COMMUNICATIONS","count":12,"id":15},{"name":"30TH ANNIVERSARY SPECIAL ISSUE","count":9,"id":16},{"name":"SPECIAL FOCUS: QUANTUM COMMUNICATION","count":9,"id":17},{"name":"SPECIAL FOCUS: THEORY OF CHARACTERISTIC MODES AND NEW APPLICATIONS IN ELECTROMAGNETICS","count":9,"id":18},{"name":"SPECIAL FOCUS: VISUAL ANALYTICS","count":9,"id":19},{"name":"SIGNAL PROCESSING AND BIOINFOMATICS","count":8,"id":20},{"name":"MICROELECTRONICS AND ANTENNAS","count":7,"id":21},{"name":"Research Paper","count":7,"id":22},{"name":"SPECIAL FOCUS: ARTIFICIAL INTELLIGENCE EMPOWERED TECHNOLOGIES IN RAILWAY SYSTEMS","count":7,"id":23},{"name":"SPECIAL FOCUS: ENABLING TECHNOLOGIES FOR VEHICLE-TO-EVERYTHING COMMUNICATIONS TOWARDS 6G ERA","count":7,"id":24},{"name":"COMPUTER NETWORKS AND ARTIFICIAL INTELLIGENCE","count":6,"id":25},{"name":"SPECIAL FOCUS: ARTIFICIAL INTELLIGENCE AND ROBOT SYSTEMS","count":6,"id":26},{"name":"SPECIAL FOCUS: ELECTROMAGNETIC PROTECTION & GNSS FOR RAILWAY APPLICATIONS","count":6,"id":27},{"name":"SPECIAL FOCUS: UNMANNED AERIAL VEHICLES (UAVS) COMMUNICATION NETWORKS","count":6,"id":28},{"name":"COMPUTING SCIENCE AND SOFTWARE ENGINEERING","count":5,"id":29},{"name":"IMAGE PROCESSING","count":5,"id":30},{"name":"SPECIAL FOCUS: DATA-DRIVEN INDUSTRIAL INTELLIGENCE","count":5,"id":31},{"name":"SPECIAL FOCUS: NEURAL COGNITIVE COMPUTATION AND CYBORG INTELLIGENT SYSTEMS","count":5,"id":32},{"name":"SPECIAL FOCUS: NEXT GENERATION OF DEEP LEARNING","count":5,"id":33},{"name":"INFOMATION SECURITY","count":4,"id":34},{"name":"INTERNET OF THINGS AND AUTOMATIC CONTROL","count":4,"id":35},{"name":"INTERNET OF THINGS AND SOFTWARE ENGINEERING","count":4,"id":36},{"name":"Review","count":4,"id":37},{"name":"SPECIAL FOCUS: BIOINFORMATICS AND HEALTH INFORMATICS","count":4,"id":38},{"name":"AUTOMATION AND CONTROL SYSTEMS","count":3,"id":39},{"name":"BIOMEDICAL AND HEALTH INFORMATICS","count":3,"id":40},{"name":"COMPUTER HARDWARE AND SOFTWARE","count":3,"id":41},{"name":"INFORMATION SECURITY","count":1,"id":42},{"name":"PERSPECTIVE","count":1,"id":43},{"name":"PREFACE","count":1,"id":44}]