[{"name":"网络与信息安全","count":377,"id":1},{"name":"Network and Information Security","count":360,"id":2},{"name":"研究与分析","count":343,"id":3},{"name":"计算机教学","count":250,"id":4},{"name":"Artificial Intelligence and Algorithm Research","count":247,"id":5},{"name":"软件设计与开发","count":241,"id":6},{"name":"Study and Analysis","count":230,"id":7},{"name":"人工智能与算法研究","count":219,"id":8},{"name":"数据库与软件技术","count":209,"id":9},{"name":"Research for Computer Teaching","count":204,"id":10},{"name":"通信技术与硬件设计","count":186,"id":11},{"name":"Software Design and Development","count":159,"id":12},{"name":"Communication Technology and Hardware Design","count":157,"id":13},{"name":"Database and Software Technology","count":148,"id":14},{"name":"图形图像识别处理技术","count":148,"id":15},{"name":"程序设计与信息系统","count":141,"id":16},{"name":"数据库与信息处理","count":134,"id":17},{"name":"图形图像与信息处理","count":121,"id":18},{"name":"Database and Information Processing","count":119,"id":19},{"name":"Graphic, Image Recognition and Processing Techenology","count":87,"id":20},{"name":"计算机仿真","count":87,"id":21},{"name":"Computer Simulation","count":80,"id":22},{"name":"人工智能与算法分析","count":74,"id":23},{"name":"开发与设计","count":62,"id":24},{"name":"Processing of Graphics, Image and Information","count":52,"id":25},{"name":"Processing of Graphics,Image and Information","count":48,"id":26},{"name":"网络与通信","count":48,"id":27},{"name":"信息处理与计算机应用","count":44,"id":28},{"name":"数据库与信息系统","count":42,"id":29},{"name":"网络与安全","count":31,"id":30},{"name":"金融天地","count":29,"id":31},{"name":"计算机应用","count":26,"id":32},{"name":"Graphic,Image Recognition and Processing Techenology","count":18,"id":33},{"name":"人工智能","count":18,"id":34},{"name":"software design and development","count":15,"id":35},{"name":"数据库技术","count":15,"id":36},{"name":"算法研究","count":15,"id":37},{"name":"多媒体技术","count":13,"id":38},{"name":"计算机仿真技术","count":13,"id":39},{"name":"Graphic, Image Recognition and Processing Techenol","count":10,"id":40},{"name":"网络安全与通信","count":10,"id":41},{"name":"综述","count":9,"id":42},{"name":"程序设计","count":8,"id":43},{"name":"Database and software Technology","count":7,"id":44},{"name":"Graphic Image Recognition and Processing Techenolo","count":7,"id":45},{"name":"IC卡技术","count":7,"id":46},{"name":"信息系统与程序设计","count":7,"id":47},{"name":"网络与通讯","count":7,"id":48},{"name":"Graphic,Image Recognition and Processing Techenolo","count":6,"id":49},{"name":"分析与研究","count":6,"id":50},{"name":"教学研究与交流","count":6,"id":51},{"name":"Computer Simulation Technology","count":5,"id":52},{"name":"经验交流","count":5,"id":53},{"name":"IC卡应用","count":4,"id":54},{"name":"Processing of Graphics ,Image and Information","count":4,"id":55},{"name":"人工智能和算法研究","count":4,"id":56},{"name":"数据库","count":4,"id":57},{"name":"Data and Software Technology","count":3,"id":58},{"name":"Graphic Image Recognition and Processing Techenology","count":3,"id":59},{"name":"Net and Information Security","count":3,"id":60},{"name":"图像处理与计算机应用","count":3,"id":61},{"name":"研究与贫析","count":3,"id":62},{"name":"Artificial Intelligence and Alogrithm Research","count":2,"id":63},{"name":"Artificial Intelligence and algorithm Research","count":2,"id":64},{"name":"Database and I nformation Processing","count":2,"id":65},{"name":"Graphic,Image Recognition and Processing Technolog","count":2,"id":66},{"name":"Graphic,Image Recognition and Processing Technology","count":2,"id":67},{"name":"Image recognition processing technology","count":2,"id":68},{"name":"图像处理","count":2,"id":69},{"name":"图象处理","count":2,"id":70},{"name":"网络技术","count":2,"id":71},{"name":"Multimedia Technology and Application","count":1,"id":72},{"name":"多媒体技术与应用","count":1,"id":73},{"name":"多媒本技术","count":1,"id":74},{"name":"软件工程","count":1,"id":75},{"name":"通讯技术","count":1,"id":76}]