[{"name":"计算机软件及应用","count":667,"id":1},{"name":"控制系统与自动化装置","count":453,"id":2},{"name":"自控理论及应用","count":438,"id":3},{"name":"Computer Software and Application","count":433,"id":4},{"name":"Theory and Application of Automation Control","count":375,"id":5},{"name":"Automation Control System and Apparatus","count":329,"id":6},{"name":"算法分析与研究","count":278,"id":7},{"name":"图形图像技术","count":221,"id":8},{"name":"Algorithm Research and Analyse","count":205,"id":9},{"name":"Image Technology","count":204,"id":10},{"name":"Computer Software Application","count":141,"id":11},{"name":"计算机应用","count":95,"id":12},{"name":"计算机软件","count":59,"id":13},{"name":"Electric Power Automation and Application","count":56,"id":14},{"name":"信息安全技术","count":55,"id":15},{"name":"Control System and Automation Device","count":53,"id":16},{"name":"Algorithm Research and Analysis","count":52,"id":17},{"name":"【计算机软件及应用】","count":49,"id":18},{"name":"【控制系统与自动化装置】","count":39,"id":19},{"name":"算法研究","count":39,"id":20},{"name":"控制理论及应用","count":34,"id":21},{"name":"电力自动化及其应用","count":32,"id":22},{"name":"电力自动化及应用","count":32,"id":23},{"name":"算法研究与分析","count":31,"id":24},{"name":"Information Security Technology","count":30,"id":25},{"name":"【算法分析与研究】","count":30,"id":26},{"name":"【自控理论及应用】","count":30,"id":27},{"name":"Algorithm Analysis and Research","count":23,"id":28},{"name":"其它","count":23,"id":29},{"name":"【图形图像技术】","count":22,"id":30},{"name":"自动控制理论及应用","count":22,"id":31},{"name":"自动控制理论及其应用","count":19,"id":32},{"name":"控制系统及自动化装置","count":17,"id":33},{"name":"自控理论与应用","count":17,"id":34},{"name":"自控系统设计与应用","count":16,"id":35},{"name":"Information Safety Technology","count":15,"id":36},{"name":"计算机在气象系统的应用","count":13,"id":37},{"name":"计算机软件技术及应用","count":13,"id":38},{"name":"信息安全技术及应用","count":12,"id":39},{"name":"计算机应用及软件","count":12,"id":40},{"name":"计算机网络","count":12,"id":41},{"name":"工业控制及自动化","count":11,"id":42},{"name":"自控系统及自动化装置","count":11,"id":43},{"name":"计算机软件与应用","count":11,"id":44},{"name":"软件分析与设计","count":11,"id":45},{"name":"控制系统及装置","count":10,"id":46},{"name":"故障诊断","count":10,"id":47},{"name":"算法研究及分析","count":10,"id":48},{"name":"自控系统与自动化装置","count":10,"id":49},{"name":"Automation Control system and Apparatus","count":9,"id":50},{"name":"Computer Network and Communication","count":9,"id":51},{"name":"系统分析与设计","count":9,"id":52},{"name":"Computer Application of Meteorological System","count":8,"id":53},{"name":"Electric Power Automation Application","count":8,"id":54},{"name":"Theory and Application of Autonation Control","count":8,"id":55},{"name":"自控理及应用","count":8,"id":56},{"name":"自控系统与装置","count":8,"id":57},{"name":"自控设备与自动化装置","count":8,"id":58},{"name":"计算机仿真技术","count":8,"id":59},{"name":"Cloud Technology and Big Data Application","count":7,"id":60},{"name":"Computor Software Application","count":7,"id":61},{"name":"Theory and ApplIcation of Automation Control","count":7,"id":62},{"name":"云技术及大数据应用","count":7,"id":63},{"name":"智能控制","count":7,"id":64},{"name":"安全与保密技术","count":6,"id":65},{"name":"控制系统与自动化装","count":6,"id":66},{"name":"网络技术及应用","count":6,"id":67},{"name":"计算机科学理论","count":6,"id":68},{"name":"Computer Application of Meterorological System","count":5,"id":69},{"name":"ERP系统与数据库技术","count":5,"id":70},{"name":"Information Security technology","count":5,"id":71},{"name":"故障诊断及控制","count":5,"id":72},{"name":"综述","count":5,"id":73},{"name":"自动控制系统与方法","count":5,"id":74},{"name":"自控理论","count":5,"id":75},{"name":"自控设计与应用","count":5,"id":76},{"name":"计算机网络与通信","count":5,"id":77},{"name":"计算机网络与通讯","count":5,"id":78},{"name":"Image Tehnology","count":4,"id":79},{"name":"Information Safety","count":4,"id":80},{"name":"【管理与信息系统】","count":4,"id":81},{"name":"信息系统","count":4,"id":82},{"name":"控制理论及其应用","count":4,"id":83},{"name":"数据库与图像技术","count":4,"id":84},{"name":"机器人研究","count":4,"id":85},{"name":"算法分析与设计","count":4,"id":86},{"name":"算法设计与分析","count":4,"id":87},{"name":"计算机仿真","count":4,"id":88},{"name":"计算机网络与通信技术","count":4,"id":89},{"name":"Algorithm Research nad Analyse","count":3,"id":90},{"name":"Information Safety Techology","count":3,"id":91},{"name":"Information Security and Image Technology","count":3,"id":92},{"name":"【信息安全技术】","count":3,"id":93},{"name":"信息安全","count":3,"id":94},{"name":"信息安全与图形图像技术","count":3,"id":95},{"name":"安全技术","count":3,"id":96},{"name":"安全技术与故障诊断","count":3,"id":97},{"name":"网格技术","count":3,"id":98},{"name":"计算研究","count":3,"id":99},{"name":"Information Safety technology","count":2,"id":100},{"name":"Robot Application","count":2,"id":101},{"name":"人工智能","count":2,"id":102},{"name":"信息安全·故障诊断","count":2,"id":103},{"name":"图形图象技术","count":2,"id":104},{"name":"应用实例","count":2,"id":105},{"name":"数据库技术","count":2,"id":106},{"name":"机器人与应用","count":2,"id":107},{"name":"神经网络","count":2,"id":108},{"name":"计算机辅助设计","count":2,"id":109},{"name":"软件工程与数据库应用","count":2,"id":110},{"name":"Image Tachnology","count":1,"id":111},{"name":"Summary and comment","count":1,"id":112},{"name":"书评","count":1,"id":113},{"name":"动态信息","count":1,"id":114},{"name":"智能仪器仪表","count":1,"id":115},{"name":"校园网设计","count":1,"id":116},{"name":"综 述","count":1,"id":117}]