Research on Basketball Teaching Method Based on the Dynamic Access Control Model of SOA

Article Preview

Abstract:

With the development of computer information science and technology, mode controlled by dynamic access and feedback can adjust the effect of physical education and sports teaching process. Basketball elective course is one of the favorite sport programs of many students in college. The game teaching is a new teaching model which not only breaks the traditional boring teaching method but also uses race in teaching and training process. It not only can mobilize the students' interest and enthusiasm for learning but also can improve the efficiency of the students. The dynamic SOA access model is an architecture model facing to service. Through SOA access control model, teachers and students can do a good interactive teaching and can communicate with each other about the teaching method and process timely and can review the effectiveness of teaching. Based on this, the paper designs and develops a new SOA-ARBA dynamic access control model and combines it with basketball sports teaching process. It also designs and evaluates teaching effect evaluation method of basketball teaching method and gets comparison chart of learning interest and achievement of game teaching method.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 791-793)

Pages:

1445-1449

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Kai Chen, Bo Lang. Access control method based on attribute facing to hierarchical resources [J]. Computer Engineering, 2010, 36 (7): 132-135.

Google Scholar

[2] Zhuangye Liu, Zheng Yao. Research on a number of key issues of service-oriented architecture [J1 Computer Engineering and Design, 2010, 30(03): 600-604.

Google Scholar

[3] Haijuan Zhang, Zhengfang Fu, Qin Luo, Qian Wu. Research and implementation of mandatory access control model [J] Computer Engineering and Design, 2011, 29(03): 595-597.

Google Scholar

[4] Wang Chen, Zhongxue Li, Maojun Zhang. Research on unify models of role access control and mandatory access control. Small and micro-computer systems, 2008, (03): 21-34.

Google Scholar

[5] Zhiwen Zou, Changqian Chen, Shiguang Ju. Research on role access control with spatial characteristic[J]. Computer Science, 2010 (01): 32-34.

DOI: 10.1109/isise.2008.183

Google Scholar

[6] Jun Zhu, Yong Tang. Research on CSCW system access control technology based on role and task [J]. Computer Science, 2010, 37(07): 130-133.

Google Scholar

[7] Tianyi Yang, Honglin Dong, Qin Huang, Yiliang Liu. Workflow dynamic authorization model controlled by application role and task access [J]. Journal of Computer Applications, 2010(04): 34-35.

Google Scholar

[8] Xiaoning Ma, Zhiyong Feng, Chao Xu. Access control based on trust in Web service [J]. Computer Engineering, 2010(03): 21-23.

Google Scholar

[9] Hegang Fu, Jian Wang. Web service attribute access control model combined with consultative mechanism [J]. Computer Engineering, 2010, 36 (04): 144-146.

Google Scholar

[10] Ling Yu, Shuyu Chen. Access control model based on property automatically merge in the service grid [J]. Mini-Micro Systems, 2010, (08): 112-114.

Google Scholar

[11] Xiaofeng Li, Dengguo Feng, Zhaowu Chen. Zihe Fang. Access control model based on attribute [J]. Communications, 2011, 29 (04): 91-98.

Google Scholar

[12] Jiang Zhong, Sujuan Hou. Universal access control framework based on property in the open network environment [J]. Journal of Computer Applications, 2010, 30(10): 2633-2636.

DOI: 10.3724/sp.j.1087.2010.02632

Google Scholar