[1]章煌创,赵海英,高 伟,等.一种面向人工智能竞赛平台的权限架构构建方法[J].计算机技术与发展,2023,33(10):47-50.[doi:10. 3969 / j. issn. 1673-629X. 2023. 10. 008]
 ZHANG Huang-chuang,ZHAO Hai-ying,GAO Wei,et al.A Permission Architecture Construction Method for Artificial Intelligence Competition Platform[J].,2023,33(10):47-50.[doi:10. 3969 / j. issn. 1673-629X. 2023. 10. 008]
点击复制

一种面向人工智能竞赛平台的权限架构构建方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
33
期数:
2023年10期
页码:
47-50
栏目:
软件技术与工程
出版日期:
2023-10-10

文章信息/Info

Title:
A Permission Architecture Construction Method for Artificial Intelligence Competition Platform
文章编号:
1673-629X(2023)10-0047-04
作者:
章煌创12 赵海英2 高 伟12 张瑞喆2 李 宏1
1. 北京大学深圳研究生院 信息工程学院,广东 深圳 518055;
2. 鹏城实验室,广东 深圳 518056
Author(s):
ZHANG Huang-chuang12 ZHAO Hai-ying2 GAO Wei12 ZHANG Rui-zhe2 LI Hong1
1. School of Electronic and Computer Engineering,Peking University Shenzhen Graduate School,Shenzhen 518055,China;
2. Pengcheng Laboratory,Shenzhen 518056,China
关键词:
竞赛平台权限架构人工智能协作平台
Keywords:
competition platformpermissionsarchitectureartificial intelligencecollaboration platform
分类号:
TP39
DOI:
10. 3969 / j. issn. 1673-629X. 2023. 10. 008
摘要:
随着人工智能的发展,通过人工智能竞赛促进产学研结合,已经成为了人工智能发展的一种方式。 人工智能相关在线竞赛平台面向大众,通过在实际应用中抽象出与之密
切相关的任务,并提供现实应用中的大量真实数据,设置竞赛题目。 这种竞赛活动能够鼓励科研工作者将前沿的科研技术落地到实际应用当中,从而促进科研与生产力之
间的良性循环。 同时活动加强了科研工作者之间的学术交流,对技术创新和交叉学科有巨大的激励作用。 针对传统人工管理方法在竞赛平台管理上存在因工作量大而效率低、易出错等缺陷,该文提出了一种面向人工智能竞赛平台的权限架构构建方法来解决该痛点问题。 该权限架构满足了人工智能竞赛中各个身份的分工需求,且能够在竞赛平台中通过编程逻辑实现,使得整个竞赛平台的各个环节的管理,以及竞赛的展开,都达到了规范化和透明化,能为人工智能竞赛的参与各方提供更好的管理体验,优化人机交互过程,节约项目管理成本,提高了工作效率。
Abstract:
With the development of artificial intelligence,promoting the combination of industry,academia and research through artificial intelligence competitions has?
become a way of artificial intelligence development. Online competition platforms related to artificial intelligence are open to the general public and set up?
competition questions by abstracting closely related tasks in real applications andproviding a large amount of real data from real applications. Such competitions encourage researchers to implement cutting-edgetechnologies into real-world applications,thus fostering a virtuous circle between research and productivity.?
It also enhances academic exchange between researchers and is a great incentive for technological innovation and cross-discipline. To address the shortcomings oftraditional manual management methods in competition platform management such as low efficiency and error - prone due to highworkload,we propose a?
permission architecture construction method for AI competition platform to solve the pain points. The permissionarchitecture satisfies the division of labor needs of each identity in the AI competition and can be implemented in the competition platformthrough programming logic. This allows the management of all aspects of the competition platform and the unfolding of the competitionto be standardized and transparent. Therefore,it can provide a better management experience for all parties involved in AI competitions,optimize the human-computer interaction process,save project management costs,and improve work efficiency.

相似文献/References:

[1]路川 胡欣杰 纪锋.基于角色访问控制的协同办公系统设计与实现[J].计算机技术与发展,2010,(03):230.
 LU Chuan,HU Xin-jie,JI Feng.Design and Implementation for Cooperation Office System Based on Role- Based Access Control[J].,2010,(10):230.
[2]宋杰 党李成 郭振朝 赵萌.Android OS手机平台的安全机制分析和应用研究[J].计算机技术与发展,2010,(06):152.
 SONG Jie,DANG Li-cheng,GUO Zhen-chao,et al.The Security Mechanism Analysis and Applied Research of Android OS Mobile Platform[J].,2010,(10):152.
[3]张海鑫 程丽红 李顺东.数字版权管理系统中的使用控制模型[J].计算机技术与发展,2009,(12):135.
 ZHANG Hai-xin,CHENG Li-hong,LI Shun-dong.Usage Control Model for Digital Right Management[J].,2009,(10):135.
[4]杜诗军 王瑞民 周清雷.RBAC在网络管理上的应用[J].计算机技术与发展,2007,(03):166.
 DU Shi-jun,WANG Rui-min,ZHOU Qing-lei.Application of RBAC to Administration of Networks[J].,2007,(10):166.
[5]陈怡 耿国华 李喆.动态访问控制技术的研究与应用[J].计算机技术与发展,2006,(02):223.
 CHEN Yi,GENG Guo-hua,LI Zhe.Research and Application of Dynamic Access Controls[J].,2006,(10):223.
[6]竹勇 叶水生.Oracle9i数据库的安全管理机制[J].计算机技术与发展,2006,(06):142.
 ZHU Yong,YE Shui-sheng.Secure Management Mechanism of Oracle9i DBMS[J].,2006,(10):142.
[7]李向 郭晓兰 严烨.基于角色的Web系统安全策略研究[J].计算机技术与发展,2006,(10):155.
 LI Xiang,GUO Xiao-lan,YAN Ye.Research on the Role- Based Web Security[J].,2006,(10):155.
[8]游强华 袁道华 朱国云 甘寿全 曾祥洪.基于Struts框架的Web系统的角色权限验证[J].计算机技术与发展,2006,(12):227.
 YOU Qiang-hua,YUAN Dao-hua,ZHU Guo-yun,et al.Web System's Authorization Validation Based on Struts Frame[J].,2006,(10):227.
[9]黄静 陈震 危水根 王凌.RBAC模型在B/S医院信息系统中的应用[J].计算机技术与发展,2011,(06):246.
 HUANG Jing,CHEN Zhen,WEI Shui-gen,et al.Application of Role-Based Access Control Model in B/S Hospital Information System[J].,2011,(10):246.
[10]郑丽娟,李仲秋,任永昌.Oracle与SQL Server基于角色访问控制对比分析[J].计算机技术与发展,2013,(05):104.
 ZHENG Li-juan,LI Zhong-qiu,REN Yong-chang.Role-based Access Control Comparative Analysis on Oracle and SQL Server[J].,2013,(10):104.

更新日期/Last Update: 2023-10-10