{"id":"https://openalex.org/W2997085443","doi":"https://doi.org/10.1109/icis46139.2019.8940236","title":"Design of Repositories of GitHub Recommendation System Based on Ternary Closure and HITS Algorithm","display_name":"Design of Repositories of GitHub Recommendation System Based on Ternary Closure and HITS Algorithm","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2997085443","doi":"https://doi.org/10.1109/icis46139.2019.8940236","mag":"2997085443"},"language":"en","primary_location":{"id":"doi:10.1109/icis46139.2019.8940236","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icis46139.2019.8940236","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101085871","display_name":"Xia Han","orcid":"https://orcid.org/0009-0000-1870-7491"},"institutions":[{"id":"https://openalex.org/I75689368","display_name":"Communication University of China","ror":"https://ror.org/04facbs33","country_code":"CN","type":"education","lineage":["https://openalex.org/I75689368"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Han Xia","raw_affiliation_strings":["School of Computer Science and Cybersecurity, Communication University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cybersecurity, Communication University of China, Beijing, China","institution_ids":["https://openalex.org/I75689368"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041669276","display_name":"Chun-Fang Li","orcid":"https://orcid.org/0000-0001-6897-8097"},"institutions":[{"id":"https://openalex.org/I75689368","display_name":"Communication University of China","ror":"https://ror.org/04facbs33","country_code":"CN","type":"education","lineage":["https://openalex.org/I75689368"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunfang Li","raw_affiliation_strings":["School of Computer Science and Cybersecurity, Communication University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cybersecurity, Communication University of China, Beijing, China","institution_ids":["https://openalex.org/I75689368"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102187130","display_name":"Minyong Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I75689368","display_name":"Communication University of China","ror":"https://ror.org/04facbs33","country_code":"CN","type":"education","lineage":["https://openalex.org/I75689368"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minyong Shi","raw_affiliation_strings":["School of Computer Science and Cybersecurity, Communication University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cybersecurity, Communication University of China, Beijing, China","institution_ids":["https://openalex.org/I75689368"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101085871"],"corresponding_institution_ids":["https://openalex.org/I75689368"],"apc_list":null,"apc_paid":null,"fwci":0.287,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.56947075,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9807999730110168,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7951244711875916},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.7333750128746033},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7293076515197754},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6616207957267761},{"id":"https://openalex.org/keywords/closure","display_name":"Closure (psychology)","score":0.5969545841217041},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5774581432342529},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5038482546806335},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4728158712387085},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4619015157222748},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.44278356432914734},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.14964288473129272}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7951244711875916},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.7333750128746033},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7293076515197754},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6616207957267761},{"id":"https://openalex.org/C146834321","wikidata":"https://www.wikidata.org/wiki/Q2979672","display_name":"Closure (psychology)","level":2,"score":0.5969545841217041},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5774581432342529},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5038482546806335},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4728158712387085},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4619015157222748},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.44278356432914734},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.14964288473129272},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C34447519","wikidata":"https://www.wikidata.org/wiki/Q179522","display_name":"Market economy","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icis46139.2019.8940236","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icis46139.2019.8940236","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACIS 18th International Conference on Computer and Information Science (ICIS)","raw_type":"proceedings-article"},{"id":"mag:3043345080","is_oa":false,"landing_page_url":"https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=202002288010494867","pdf_url":null,"source":{"id":"https://openalex.org/S4306512817","display_name":"IEEE Conference Proceedings","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEEE Conference Proceedings","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2107933610"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2518037665","https://openalex.org/W2348524959","https://openalex.org/W2477036161","https://openalex.org/W2368049389","https://openalex.org/W2384861574","https://openalex.org/W4294565801","https://openalex.org/W2170801710","https://openalex.org/W2952704802","https://openalex.org/W3081644756"],"abstract_inverted_index":{"Nowadays,":[0],"complex":[1],"networks":[2],"are":[3,145],"widely":[4],"used":[5,22],"in":[6,124],"various":[7],"fields.":[8],"As":[9],"a":[10,53,59],"hosting":[11,55],"platform":[12,62],"for":[13,63,92],"open":[14],"source":[15],"and":[16,27,35,48,69,71,80,102,141],"proprietary":[17],"software":[18],"projects,":[19],"GitHub":[20,49],"is":[21,50,156],"by":[23],"many":[24],"Internet":[25,34,64],"companies":[26],"programmers.":[28],"With":[29],"the":[30,33,36,40,42,81,113,118,125,132,135,142,149,154],"popularity":[31],"of":[32,39,44,78,83,120,127,153],"rapid":[37],"development":[38],"Internet,":[41],"number":[43,82],"users":[45,79,93,103,160],"has":[46],"exploded,":[47],"not":[51],"only":[52],"code":[54,84,96],"platform,":[56],"but":[57],"also":[58,87],"social":[60,128],"networking":[61],"practitioners":[65],"to":[66,94,110,131,148],"obtain":[67],"information":[68],"knowledge,":[70],"even":[72],"make":[73],"friends.":[74],"The":[75],"sheer":[76],"volume":[77],"repositories":[85,136],"have":[86],"made":[88],"it":[89],"increasingly":[90],"difficult":[91],"find":[95],"libraries":[97],"that":[98,137],"match":[99],"their":[100,106],"interests":[101],"who":[104],"share":[105],"interests.":[107],"In":[108],"order":[109],"effectively":[111],"solve":[112],"above":[114],"problems,":[115],"based":[116],"on":[117],"theory":[119,126],"ternary":[121],"closure":[122],"relations":[123],"relations,":[129],"according":[130],"HITS":[133],"algorithm,":[134],"may":[138],"be":[139],"interested":[140],"like-minded":[143],"friends":[144],"respectively":[146],"recommended":[147],"users.":[150],"Another":[151],"aspect":[152],"system":[155],"data":[157],"visualization,":[158],"where":[159],"can":[161],"intuitively":[162],"get":[163],"recommendations.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
