文档库 最新最全的文档下载
当前位置:文档库 › A MULTI-PURPOSE OFF-LINE PATH PLANNER BASED ON AN A SEARCH ALGORITHM

A MULTI-PURPOSE OFF-LINE PATH PLANNER BASED ON AN A SEARCH ALGORITHM

A MULTI-PURPOSE OFF-LINE PATH PLANNER BASED ON AN A  SEARCH ALGORITHM
A MULTI-PURPOSE OFF-LINE PATH PLANNER BASED ON AN A  SEARCH ALGORITHM

1

Proceedings of

The 1996 ASME Design Engineering Technical Conferences and

Computers in Engineering Conference August 18-22, 1996, Irvine, California

96-DETC/MECH-1134

A MULTI-PURPOSE OFF-LINE PATH PLANNER BASED ON AN A* SEARCH ALGORITHM

Arturo L. Rankin and Carl D. Crane III

Center for Intelligent Machines and Robotics

300 MEB, University of Florida Gainesville, Florida, 32611, U.S.A.

ph: (352) 392-0814 fax: (352) 392-1071 email: alr@https://www.wendangku.net/doc/7816912839.html,

ABSTRACT

Efficient navigation of an autonomous mobile robot through a majority of which search for shortest euclidean-distance paths for well-defined environment requires the ability of the robot to plan robots free of nonholonomic constraints. For a broad overview of paths. An efficient and reliable planar off-line path planner has been path planning for robots see (Latombe, 1990). Deo and Pang developed that is based on the A* search method. Using this (1984) classify 79 shortest-path algorithms according to problem method, two types of planning are accomplished. The first uses a type, input type, and the technique used to solve the problem. The map of all known obstacles to determine the shortest-distance path most popular shortest-path algorithms used for off-line path from a start to goal configuration. The second determines the planning are the classic graph searching methods, such as, Dijkstra's shortest path along a network of predefined roads. For the most algorithm (Dijkstra, 1959) and the A* search method (Hart et al.,complicated environment of obstacles and roads, a near-optimal 1968, Nilsson, 1971). These methods usually involve the searching piecewise-linear path is found within a few seconds. The planner of a visibility graph (Jarvis, 1983, Lozano-Perez and Wesley, 1979)can generate paths for robots capable of rotation about a point as or a tangent graph (Lui and Arimoto, 1991).

well as car-like robots that have a minimum turning radius. For car-Some algorithms (Brooks, 1983, Donald, 1984) search a set of like robots, the planner can generate forward and reverse paths.curves that are, in general, equidistant from obstacles. Others divide This software is currently implemented on a computer controlled the work space into grid cells (Grevera, 1988, Jarvis, 1985,Kawasaki Mule 500 all-terrain vehicle and a computer controlled Verbeek et al., 1986) and search for the shortest cell-to-cell path.John Deere 690 excavator.

Nonholonomic path planning methods (Barraquand and Latombe,INTRODUCTION

The purpose of a path planner is to obtain a sequence of This paper describes the implementation of an A* search recommended moves that will direct a robot from a specified initial algorithm used for two types of path planning for autonomous configuration to a specified goal configuration in a manner, so as, to mobile robots. The first uses a map of all known obstacles to avoid contact with all known obstacles. The sequence of moves determine the shortest collision-free path from a start configuration recommended by a path planner defines a path guaranteed to exist to goal configuration. The second determines the shortest path in free-space.

along a network of predefined roads, where a road is a preferred If the environment is largely static and well defined, and the travel path. The planner can generate paths for nonholonomic only constraint on the vehicle is that it does not collide with (steered-wheeled) vehicles and vehicles capable of rotation about a obstacles, the motion planning problem can be divided into two point (differential-drive and omnidirectional). For nonholonomic phases: finding a collision-free path and executing the collision-free robots, the planner can generate forward and reverse paths.

path. The initial phase is often called off-line path planning.

The literature is replete of off-line path planning algorithms, the 1989, Pin and Vasseur, 1990) search for paths for car-like robot vehicles. A few methods (Krogh and Thorpe, 1986, Warren, 1989)use artificial potential fields for off-line path planning.

2

The major contributions of this paper are the technique used to graph of nodes. This is accomplished by generating a configuration generate paths for nonholonomic vehicles, the ability to use the space (Lozano-Perez and Wesley, 1979). Configuration space is the obstacle-avoiding planner for a wide range of mobile robots space in which the robot is represented as a point. The obstacles are (steered-wheeled, differential-drive, or omnidirectional), the mapped into this space by "growing" or expanding their boundaries,application of an A* search to accomplish two types of path and the work-space boundary is mapped into this space by dilating planning, and the laying of the foundation for the merging of the two its sides. The robot vehicle is symbolically shrunk down to a path planners into one multi-purpose path planner.

reference point by expanding all the obstacles and dilating the work-The output of the A* search is a set of via-points that define the space boundary by a scaling width, r , that accounts for the physical shortest path when they are connected by line segments. The extent of the robot vehicle. The task is then to find a safe path for a planner can be divided into four parts: defining a map of the point rather than a polygon.

environment, the creation of configuration space, the creation of The ability of the robot to get around the side of a known pseudo-obstacles, and the search algorithm.

obstacle depends to a large extent on the scaling width. For a DEFINING THE ENVIRONMENT

The site of operation is assumed to contain some regions where would allow corner points to barely touch the vehicle upon planning the robot vehicle is prohibited from operating. Obstacles are a path. The addition of a constant provides a safety factor.

represented as polygons for which the position of each vertex is The selection of r for a steered-wheeled vehicle is somewhat known. An obstacle is any region of space that we require the more complex. The scaling width is chosen based on the worst-case vehicle to avoid. Notice that obstacles can be subterranean or sub-corner clearance (cc). The path found by the search algorithm is planar, such as, craters, ditches, and valleys, or above surface, such then actually a lane of the width two times the scaling width. By as, debris, other vehicles, buildings, trees, telephone poles, and including a safety margin in the scaling width, a certain amount of equipment.

tracking and positioning error in path following is explicitly allowed A map of the environment, stored in a data file, contains known for.

obstacle data, work-space boundary points, the vehicle's dimensions The inner angle at each convex vertex of the polygonal and minimum turning radius, and points that define the center of obstacles is required to be 90E or more. Under the assumption that each road. Circular obstacles are represented by N-sided polygons.the turns from one lane to another can be approximated by a circular The boundary polygon and the obstacle polygons can be either arc, the corner clearance can be calculated as:

convex or concave. As a preprocessing step, this data is read by the cc = omroc - (omroc - r )/sin 1 - vwidth/2.0,

planner, and a map of the environment is stored in memory.

where omroc is the operational minimum radius of curvature, vwidth CREATION OF CONFIGURATION SPACE

An A* search requires the reduction of the environment to a

straddles one side of an obstacle and makes a 90E turn onto a lane

s differential-drive vehicle, a rule of thumb is to choose r to be s greater than one-half the diameter of the smallest circle that encompasses the robot vehicle. A one-half diameter expansion s s is the vehicle width, and 1 is half of the inner angle at the vertex in question (Figure 1).

The worst-case corner clearance occurs when the vehicle

3

straddling another side of the same obstacle. Table 1 illustrates the worst-case corner clearance for several different values of the scaling width, r.s

Table 1. Estimating Corner Clearance

vehicle scale OMROC lane clearance width (ft)width (ft)(ft)width (ft)(ft)4.0 6.012.512.0 1.314.07.012.514.0 2.724.0

7.7

12.5

15.4

2.93

The first row of Table 1 shows that if r is chosen to be 1.5s times the vehicle width, there will exist a lane having at least a width of 12 feet from the start position to the goal position, centered on the path that is produced by the search algorithm, and guaranteed to be in free space. Figure 2 illustrates that the width of the lane about the path found by the planner will be, at minimum, two times the scaling width.

An additional restriction is made when planning paths for steered-wheeled vehicles. The length of each polygon side must be greater than or equal to "minlen", given by the equation:

minlen = (omroc - r ) [csc " + csc " ],

s 12where the angles " and " are one-half the inner angles for the 12vertices on the ends of the side in question. This protects against planning paths that contain u-turn type turns that do not respect the vehicle's minimum radius of curvature constraint.

CREATION OF PSEUDO-OBSTACLES

Greater care is necessary for determining an optimal path for a steered-wheeled vehicle than a differential-drive vehicle. A piecewise-linear path would suffice as a feasible path for a differential-drive vehicle. A steered-wheeled vehicle, however,requires lanes wide enough to ensure that turning onto other lanes can be accomplished without invading forbidden space.

The same search algorithm is used to determine the optimal path for the different types of robot vehicles. There is one difference, however, in the way the environment is set up for a steered-wheeled robot than for a differential-drive robot. When a search is going to be made for a steered-wheeled robot, pseudo-obstacles are defined around the start and goal positions.

Pseudo-obstacles are fictitious obstacles introduced in a region to ensure that kinematic constraints are not violated in that region by the search algorithm in determining an optimal path. As an example, consider two points, A and B, that are separated by 50 feet and lie in an obstacle-free environment. The goal position B is due east of the start position A. The vehicle is positioned at A, but is

oriented due north. The path planner is asked to find the shortest path for the vehicle from A to B. A straight-line path would suffice for a differential-drive vehicle, as the vehicle would need only to rotate about A until oriented eastward and then execute the path.For a steered-wheeled robot, however, the width of the lane would have to be at least two times the vehicle's minimum radius of curvature for the straight-line path to be feasible. Pseudo-obstacles eliminate the need for such an exorbitant scaling width.

Figure 3 illustrates a pseudo-obstacle placed at the start position A. The start pseudo-obstacle is oriented so that the line segments AD coincides with the start orientation of the vehicle.Line segment AD is checked to see if it lies in free space. If so, then D, the pseudo-start position, becomes the point at which the search algorithm begins its search. The rectangular region bounded by EFGH is treated as forbidden space. The pseudo-start point is placed an infinitesimal distance outside the rectangular region EFGH.

By using pseudo-obstacles at the start position and the goal position, the path found is guaranteed not to contain any turns less than 90E , where a path angle is the inner angle between two path segments. The line segment EH is four times the vehicle's minimum turning radius, and the line segment HG is two times the vehicle's minimum turning radius. ADHG and ADEF are both feasible paths.

The goal pseudo-obstacle acts as a one-car garage in that it ensures that the vehicle arrives at the goal position at the desired orientation. Further, the pseudo-obstacles ensure that the initial and final turns in the planned path respect the minimum turning radius associated with the vehicle. In planning a forward path, the start pseudo-obstacle orientation coincides with the vehicle's initial heading and, the goal pseudo-obstacle orientation is rotated 180E from the vehicle's goal heading. A reverse path for a steered-wheeled robot can be planned by simply rotating these fictitious obstacles 180E .

THE A* SEARCH ALGORITHM

The A* search algorithm described in this paper is used to generate shortest-distance collision-free paths in environments containing polygonal obstacles and shortest road routes along a network of predefined roads or preferred paths. The same algorithm is used for both types of off-line path planning. The factor that distinguishes what type of path is planned by the A* search is the predefined graph of nodes that is used during a search.

This section of the paper provides a general description of A* search algorithms and discusses an implementation for collision-free path planning and shortest road route planning.

General Description of an A* Search

The search algorithm is required to produce the shortest-distance path (SDP) from the start configuration to the goal configuration. The problem of determining the SDP can be reduced to finding the shortest path through an undirected graph. The most common graph used is a visibility (or adjacency) graph. A visibility graph can be viewed as a two dimensional symmetric matrix A, where the element A[i,j] contains the cost of traveling from node i to node j. This cost is usually a distance but it can include other factors, such as a terrain weight.

Off-line path planning problems have traditionally been approached using either the "mathematical approach" or the "heuristic approach". The mathematical approach is most concerned with determining an exact solution. Typically, these algorithms will examine each node of a graph in an ordered fashion. The heuristic approach uses known information about the problem's domain to develop algorithms that are computationally efficient. Typically, a search that uses a heuristic approach does not require the examination of every node in the graph. An exact solution, however, is not guaranteed by a heuristic search.

An A* search algorithm is a conglomerate of the two approaches described above. Information from the problem's domain is strategically incorporated into a formal mathematical approach to reduce the computation time, while yet guaranteeing to find the minimum cost path, if a path exists. Thus, although an A* search uses a heuristic, it is said to be algorithmic.

An A* search algorithm is optimal in the sense that it requires the examination of the smallest number of nodes in determining the minimum cost path. The output of an A* search is a set of via-points which represents a subset of the nodes in the searched graph. The SDP is obtained by connecting the via-points with line segments.

The algorithm A* is considered a family of algorithms. The choice of the heuristic h determines the family to which the algorithm belongs. At any given intermediate point during a search, several incomplete paths may exist. The incomplete path chosen to expand upon is the one with the lowest current estimate of the total

path length, where the total path length is the sum of the distance already traveled (backward cost) and an estimate h of the distance remaining (forward cost) to the goal.

The heuristic h can range from zero to the straight-line distance (as used in this implementation) for a SDP problem. The more accurate the estimate of remaining distance, the faster the algorithm will find the shortest-distance path. As long as the heuristic does not over-estimate remaining distance, the optimal path is guaranteed to be found.

Implementation of the A* Search

All nodes in the graph are numbered sequentially, starting with the start position. All obstacles, including pseudo-obstacles, are numbered in a clockwise fashion. If the path is required to remain within a specified work-space boundary, the boundary vertices are numbered as well. The last node N to be numbered is the goal node.

The task is to find the SDP from node 0 to node N.

Two linked-lists are maintained during the search: an open list (O) and a closed list (C). The elements placed in each list contain information, such as, the previous node i, the current node j, the backward cost (BC) from node 0 to node j, and an estimate of the total cost (TC) from node 0 to node N. This estimate is the sum of the backward cost and the heuristic estimate of the forward cost from node j to node N. Node i indicates how node j was reached.

The closed list is an ordered list, arranged on the basis of the total cost in each element in the list. The closed list is sorted from smallest to largest total cost. For each path segment investigated during the search, an element is placed in the closed list. Elements are sequentially removed from the top of the closed list and placed at the top of the open list until either an element is found in which j=N, i.e., the current node is the goal node, or the closed list is empty. If the goal node can be reached, the SDP can be constructed from the final open list.

A path segment is investigated during a search by "expanding"

on a node. To expand on a node i means to find all nodes j visible to node i that have not previously been expanded on, and place an element in the sorted closed list that specifies an estimate of total distance to the goal through each visible node j. Node j is visible from node i if the line segment connecting the nodes does not intersect the bounding line segments of polygons that define exclusion zones.

Obstacle-Avoiding Path Planner

4

5

the environment.

Consider the example in Figure 4. The process begins by expanding on node 0, the start node. Nodes 1, 2, and 4 are visible from node 0. Elements for each of these nodes are placed in the closed list except for node 1 (Figure 5), since node 1 does not represent a tangent point. The first element in the closed list indicates that in moving from node 0 to node 2, the distance thus far traveled is 4.47. It is estimated that 8.59 is the total distance that needs to be traveled along this route to reach the goal node. The results of expansion #1 suggests that it will be shorter to take a route through node 2 than through node 4.

Next, the top element in the closed list is placed at the top of the open list. The search is to continue from node 2. The visible nodes from node 2 are 0, 1, 3, and 5. Node 0 is not considered since it has already been expanded on.

In expansion #2, elements for nodes 1, 3, and 5 are added to the closed list. The top element of the closed list is again transferred to the top of the open list. Since node j of this element is the goal node,the search is ended. The shortest path specified by the open list is 0-2-5.

The most expensive part of the search procedure is determining the visible nodes from a specific node. If the robot is differential drive or omnidirectional and the environment is not likely to change,then visibility can be established prior to searching for shortest paths by generating a visibility graph (VGRAPH) as a preprocessing step.Otherwise, visibility is determined when needed.

A visibility graph indicates where straight-line travel between nodes is possible. Figure 6 shows the visibility graph for the environment in Figure 4. A VGRAPH is a two dimensional symmetric matrix stored as a lower-triangular, nondiagonal,dynamically allocated two dimensional array, within which a 1indicates truth or visibility and a 0 indicates that visibility between the two nodes in question is blocked. Once the graph is established,a search can approve a candidate move by simply reading the appropriate element of the visibility matrix.

When determining visibility as needed, the line segment from the current node to each candidate node must be checked for intersection with the sides of all obstacles and the work-space boundary until an intersection is found, or until all sides have been considered. If j is visible from i , it is trivial to determine the euclidean distance between the two nodes. Otherwise, the distance between the nodes is an extremely large number that symbolizes infinity. While it is traditional for a visibility graph to store the

6

distances between nodes, here integers are used to indicate visibility search. If the specified start or goal position is not in free to conserve computing memory.

space, an appropriate error message is returned.

The best way to increase the efficiency of an A* search where visibility is determined as needed is to reduce the number of nodes that have to be checked for visibility during a search. Several steps have been taken to improve the efficiency of this type of A* search:

a.If the user has specified that the path to be planned must remain inside the user-defined work-space boundary, then all convex boundary vertices are tagged as a preprocessing step to indicate they are not candidate move-to nodes during a search.Node h in Figure 7 is a convex boundary vertex. The shortest path will never require you to go into one of these corners along the way.

b.All concave obstacle vertices are tagged as a preprocessing step to indicate they are not candidate move-to nodes during a search. Node f in Figure 7 is a concave obstacle vertex. The shortest path will never require you to go into a "nook" along the way. This step allows obstacles to contain convex and concave vertices.

c.An array containing all the nodes keeps track of which nodes have been expanded on. It would be wasteful to expand on the same node more than once.

d.All nonpseudo-obstacle and boundary nodes in the graph are tagged as a preprocessing step to indicate whether they are in free space or in forbidden spac

e. Pseudo-obstacles are expanded and their nodes are tagged as the first step during each search. Then, all other nodes are checked to see if any lie within the pseudo-obstacles. This allows obstacles to intersect.All nodes tagged as in forbidden space are not used within a

e.The algorithm may or may not consider backward moves (see Figure 7). In environments that are not obstacle dense,backward moves may be ignored. When the angle 1 between the vector from the current node a to the goal node g and the vector from the current node to a candidate node b exceeds some critical angle, the candidate node is not considered.When backward moves are ignored, however, the path found is not guaranteed to be the SDP.

f.If a node on an expanded obstacle is not a tangent node with respect to the current node, it is not considered. In Figure 7, nodes d and e are tangent nodes with respect to node a , but node c is not.

7

Figure 10. Computer controlled Kawasaki Mule all-terrain vehicle.

Figure 11. Computer controlled John Deere excavator.

g.During a search, the visibility of a candidate point is road number of -1, which serves as a flag that this element and all checked against an obstacle only if the vector from the connections to the node represented by this element should be candidate node to the current node is bounded by the vectors removed immediately after a search, as this node is valid for only a from the candidate node to the tangent nodes on the obstacle.subset of off-road points, i.e., those points that lie on the line defined In Figure 8, vector a is not bounded by the tangent vectors to the obstacle A (vectors b and c ). It is not necessary, therefore,to check to see if each line segment of obstacle A intersects the line segment from the current node to the candidate node.

Roads Path Planner

For the roads planner, a partial visibility or adjacency list is generated as a preprocessing step. In Figure 9, two roads are defined by a set of two center points each, (1,2) and (3,4). Each node in the graph is represented by an element in the horizontal (major) linked-list. An element for each intersection point is added to the end of the adjacency list just prior to a search. Intersection elements are arbitrarily given a road number of 0. In Figure 9, the two roads intersect at the point labeled node 5.

The minor elements under a major element indicates which nodes can be reached from the node represented by the major element. For example, the adjacency list shows that nodes 2 and 5can be reached from node 1. It is said that a connection exists between nodes 1 and 2 and nodes 1 and 5.

The specified start and goal positions are not required to lie on the network of predefined roads. Simply making a connection to the nearest road node from an off-road point, however, will not suffice for finding the SDP since the total path length is dependant on the on-road path length as well as the lengths of as much as two off-road connections. Connections are made from an off-road point to the closest point on each road and temporarily added to the adjacency list.

When the closest point on a road is not a point that is already in the adjacency list, a new temporary element is added to the end of

the adjacency list to represent this point. This element is given a by the off-road connection but within the outer work-space boundary.

A search is conducted from node s to node g, the start and goal points as shown in Figure 9. The length of off-road connections are weighted by a factor of two. The net effect is that it costs twice as much to travel off-road than it does to travel on-road. The algorithm works to force a path towards on-road travel. All off-road connections are checked to determine if they are collision-free.

Constructing the Optimal Path

At every intermediate stage during a search, several candidate paths may exist. Expansion occurs at the node at the end of the path that is estimated to yield the SDP. Once a search has been successful, the final open list will contain not only the SDP but the other uncompleted candidate paths. The SDP must be extracted from this list containing extraneous information.

The SDP from node 0 to node N can be described by the ordered set of nodes p[i], for i=1...n, where p[1]=0, and p[n]=N.Recall that the nodes 0 and N represent the start and goal positions respectively. The entire set p[i] can be constructed from the final open list when a search has been successful. There is one basic rule that must be followed in extracting the optimal path from the final open list, however.

Given a node y known to exist along the optimal path,the node x from which y is reached can be determined by moving down the open list until the level closest to the bottom that contains y as the current node entry

start point

goal point

start goal point

point

8

Figure 12. Example shortest-distance collision-free path.

Figure 13. Example path along a network of roads.

is reached. The node in the corresponding previous node entry is x.

The node at the top of the final open list yields the last two not required.

nodes in the optimal path, i.e. ...p[n-1] and p[n]. The rest of the optimal path can be extracted by continuously working backwards from the node p[i] at the left of the partially specified path p. The steps are as follows:

1. Let y=the node to the left of the partially specified path.

2. The node x from which y is reached can be found by each new vertex, and determining which vertices can be used in a applying the given rule. Insert this node at the left of the search. The nodes that can not be used in a search are nodes that lie partially specified path.

outside the work-space boundary, nodes that lie inside one or more 3. Repeat steps 1 and 2 until the inserted node x=0.

convex nodes on the dilated work-space boundary.

RESULTS AND CONCLUSIONS

An off-line path planner based on the A* search method was weighting all off-road distances by a scaling factor. The scaling developed on a Silicon Graphics workstation using the C factor times the euclidean distance of an off-road path segment programming language and is currently implemented on a computer yields the cost of traveling on the off-road path segment.

controlled Kawasaki Mule all-terrain vehicle (Figure 10) and a The obstacle-avoiding planner takes less than 7 seconds to plan computer controlled John Deere excavator (Figure 11). Two types a path in the same environment. The reason the obstacle-avoiding of path planning can be accomplished using this algorithm: the planner takes longer to plan a path than the roads planner is because planning of shortest routes along a network of predefined roads the obstacle-avoiding planner determines visibility as needed.(Figure 12) and the planning of shortest-distance collision-free paths Determining visibility as needed eliminates the need for N memory in an environment where the locations of obstacles are known locations, where N is the number of obstacle and boundary nodes in (Figure 13). On the vehicles, the path planner runs on a VME the graph.

computer, operating under the VxWorks operating system.

The obstacle-avoiding path planner returns a status that The use of pseudo-obstacles at the start and goal position indicates the SDP was found or the reason why a path was not enables the planning of forward and reverse paths for steered-found. The error-related status messages are:

wheeled vehicles which contain a minimum turning radius. Pseudo- 1. The start position is not in free space.obstacles ensure that the initial and final turns in a path are feasible,

2. The goal position is not in free space.and that the last leg of a path coincides with the goal heading. For differential-drive or omnidirectional vehicles, pseudo-obstacles are For an environment that contains 90 center-line road points and 170 obstacle and work-space boundary points, the entire preprocessing stage takes less than 5 seconds when running on the on-board computer. The preprocessing stage includes determining the intersection points for the set of roads and establishing an adjacency list for road points, expanding all obstacle polygons and dilating the boundary polygon by a scaling width and numbering expanded obstacles, concave nodes on expanded obstacles, and Planning road paths is virtually instantaneous. Road paths can be planned from and to points that do not lie on roads. Start and goal points are forced to be connected with a nearby road by 2

3. A path could not be found.Dijkstra, E. W., 1959, "A Note on Two Problems in Connexion with

4. The start heading is blocked by an obstacle or the boundary.

5. The goal heading can not be achieved.

Errors concerning the start and goal heading apply to only steered-wheeled vehicles. A start or goal position is reported to be in forbidden space if it lies outside the work-space boundary or inside an expanded obstacle. A path can not be found when an obstacle, or a set of intersecting obstacles, divide the work space into two regions, one containing the start position and the other containing the goal position. An option exists to allow the planning of paths out of obstacles but never into one.

The planner has proven to be robust and efficient in environments where obstacles are not clustered or exorbitant. The execution time for a search increases exponentially with each additional node to the graph. In obstacle dense environments, overestimating the size of obstacles can lead to significantly longer paths than required or no acceptable path at all. Overestimating the size of obstacles by adding a highly subjective safety factor to the scaling width (as well as modeling circular obstacles as polygons) can close off passage-ways that may have been acceptable. FUTURE WORK

In the future, the roads path planner and the obstacle-avoiding path planner will be merged into one planner. This will eliminate the scenario where the planned path has segments that run nearly parallel to a nearby road. Different shaped start and goal pseudo-obstacles will be experimented with in an effort to allow paths planned for car-like robots to contain a combination of forward and reverse maneuvers.

ACKNOWLEDGEMENTS

The authors wishes to thank Wright Laboratories, Tyndall Air Force Base, Florida, for funding this work.

REFERENCES

Barraquand, J. and Latombe, J., 1989, "On Nonholonomic Mobile Robots and Optimal Maneuvering," Proceedings, IEEE Intern. Symp. on Intelligent Control, Albany, NY, pp. 1-8.

Brooks, R. A., 1983, "Solving the Find-Path Problem by Good Representation of Free Space," IEEE Trans. Syst. Man, Cybernet., Vol. SMC-13, No. 2, pp. 190-197.

Deo, N. and Pang, C., 1984, "Shortest-Path Algorithms: Taxonomy and Annotation," Networks, Vol. 1, pp. 275-323.

Graphs," Numerische Mathematik, Vol. 1, pp. 269-271.

Donald, B. R., 1984, "Motion Planning with Six Degrees of Freedom," Technical Report AIM-791, MIT Artifical Intelligence Laboratory, Cambridge, MA.

Grevera, G. J. and Meystel, A., 1988, "Searching for an Optimal Path Through Pasadena," Proceedings, IEEE Intern. Symp. on Intelligent Control, Arlington, VA, pp. 308-319.

Hart, P. E., Nilsson, N. J., and Raphael, B., 1968, "A Formal Basis for the Heuristic Determination of Minimum Cost Paths," IEEE Trans. Syst. Sci. Cybernet., Vol. SSC-4, No. 2, pp. 100-107.

Jarvis, R. A., 1983, "Growing Polyhedral Obstacles for Planning Collision-Free Paths," The Australian Computer Journal, Vol. 15, No. 3, pp. 103-111.

Jarvis, R. A., 1985, "Collision-Free Trajectory Planning using Distance Transforms," Mechanical Engineering Transactions of the Institution of Engineers, Australia, Vol. ME10, No. 3, pp. 187-191.

Krogh, B. H. and Thorpe, C. E., 1986, "Integrated Path Planning and Dynamic Steering Control for Autonomous Vehicles,"

Proceedings, IEEE Int. Conf. Robotics Automat., San Francisco, CA, pp. 1664-1669.

Latombe, J., 1990, Robot Motion Planning, Kluwer Academic Publishers, Boston.

Liu, Y. and Arimoto, S., 1991, "Proposal of Tangent Graph and Extended Tangent Graph for Path Planning of Mobile Robots,"

Proceedings, IEEE Int. Conf. Robotics Automat., Sacramento, CA, pp. 312-317.

Lozano-Perez, T. and Wesley, M. A., 1979, "An Algorithm for Planning Collision-Free Paths Among Polyhedral Obstacles,"

Commun. ACM, Vol. 22, No. 10, pp. 560-570.

Nilsson, N. J., 1971, Problem-Solving Methods in Artificial Intelligence, McGraw-Hill, New York.

Pin, F. G. and Vasseur, H. A., 1990, "Autonomous Trajectory Generation for Mobile Robots with Non-holonomic and Steering Angle Constraints," IEEE International Workshop on Intelligent Motion Control, Bogazici University, Istanbul , pp. 295-299.

Verbeek, P. W., Dorst, L., Verwer, B. J. H., and Groen, F. C. A., 1986, "Collision Avoidance and Path Finding Through Constrained

9

Distance Transformation in Robot State Space," Proceedings, Intern. Conf. on Intelligent Autonomous Systems, Amsterdam, pp. 627-634.

Warren, C. W., 1989, "Global Path Planning using Artificial Potential Fields," Proceedings, IEEE Int. Conf. Robotics Automat., Scottsdale, AZ, pp. 316-321.

10

赏析艺术手法(解析版)

赏析艺术手法——技巧运用与语言艺术 一、阅读下面的文字,完成1~4题。(25分) 赤之茧 [日]安部公房 日暮时分,人们赶回自己的居所,而我却无家可归,只好继续在房子与房子间狭窄的夹道中漫无目的地往前走。街上房屋鳞次栉比,却没有一个容许我栖身的地方,这到底为什么呢?……我又开始念叨着这个早已重复了千遍万遍的疑问。 靠着电线杆,我发现旁边有一截被人落下的绳子。我突然产生了上吊自尽的想法。绳子斜着眼睛盯着我的脖子,一边说道:兄弟,休息吧!的确,我也想休息啊,但是却不能休息。因为我还没找到能够让自己满意的,我之所以没有家的缘由。 夜幕每天都会降临,人们每天都会休息,为了休息就必须有一个家。看来我应该也有一个家才对。猛地,我发现自己也许从根本上误解了什么。说不定我不是没有家,而仅仅只是忘记了拥有家这个事实而已。没错,就是这样。比如……我在偶然路过的一座房子前停下了脚步。很可能这里就是我的家,我心里想着。于是,我鼓起了勇气,走,去敲门——半开着的窗户里探出了一张亲切的女人的笑脸。希望的微风涌进我的胸膛,我的心脏化作一面舒展着的旗帜在风中飘扬。我也堆起笑容,绅士般地点点头。 “对不起,请问,这里是我的家吗?” 那女人转瞬间板起了脸:“啊?你是谁?” 我莫名其妙地语塞起来,不知道该如何向她说明。我是谁?在此时此刻这只是一个无关紧要的问题。可是,怎样才能让她明白这一点呢?我有点自暴自弃了。 “不管怎样,如果你认为这里不是我的家,请拿出证据来。” “啊……”女人脸上流露出恐惧的神色,这让我感到有些恼火。 “没有证据的话,就可以看成是我的家了。” “可,这是我的家啊!” “那又怎样?是你的家,不见得就不是我的家,是吧?” 代替回答的是女人冷若冰霜的面孔和随即关闭的窗户。啊,这就是女人笑靥的真实面目。难道某种东西属于他人,就不能同时地为我所有吗?从刚才那个女人表情的转变之中,我已经充分地感受到这一荒谬论调的本质。 但是,为什么一切都是别人的,而不是我的呢?哪怕至少有一个既不是我的,也不是别人的东西也好啊!我时常会产生一种错觉,觉得施工现场和材料堆置场的水泥管就是我的家。但那也正逐渐地成为他人的所有物,最终完全地被占有,从我的眼前消失,丝毫没有顾及我个人的感受与意愿……或者说,在他人干涉下,那些水泥管彻底地转变为与我的家没有任何关系的事物。 那么,公园的长椅呢?当然很棒。如果那里真的是我的家,如果没有人拿着棍棒赶我走的话……没错,长椅是大家的东西,而不是某一个人的东西,可是他却对我这样说道:“喂,起来!长椅是大家的东西,而不是某一个人的东西,更不可能是你的东西。” 日暮时分,我不停地往前走。房屋……不曾消失,不曾改变,伫立在地面之上纹丝不动的家家户户。在那之间是一条不断变化着的没有固定形状的裂隙——夹道。我不停地往前走。我还没有理解自己之所以没有家的缘由,因此我还不能把自己吊死。 啊!是什么东西缠住了我的脚?若是吊颈的绳子,请不要这么心急地催促我嘛!不,好像是具有粘性的丝线。捏着线头拽过来一看,线的另一端在鞋子的破洞里,随着我的扯动一点一点地往外冒。这玩艺真奇妙!在好奇心的驱使下,我用上双手不断地把丝线拉出来。紧接着,更加奇妙的事情发生了——我的身体渐渐地偏向一侧,无法与地面保持垂直的状态了。

广外研究生翻译作业附译文

广外研究生翻译作业附译文

07级研究生翻译作业(汉译英) 尺素寸心(节选) 余光中 回信,固然可畏,不回信,也绝非什么乐事。书架上经常叠着百多封未回之信,“债龄”或长或短,长的甚至一年以上,那样的压力,也绝非一个普通的罪徒所能负担的。一叠未回的信,就像一群不散的阴魂,在我罪深孽重的心底幢幢作祟。理论上说来,这些信当然是要回的。我可以坦然向天发誓,在我清醒的时刻,我绝未存心不回人信。问题出在技术上。给我一整个夏夜的空闲,我该先回一年半前的那封信呢,还是七个月前的这封信?隔了这么久,恐怕连谢罪自谴的有效期也早过了吧。在朋友的心目中,

你早已沦为不值得计较的妄人。“莫名其妙!” 是你在江湖上一致的评语。 其实,即使终于鼓起全部的道德勇气,坐在桌前,准备偿付信债于万一,也不是轻易能如愿的。七零八落的新简旧信,漫无规则地充塞在书架上,抽屉里,有的回过,有的未回,“只在此山中,云深不知处”,要找到你决心要回的那一封,耗费的时间和精力,往往数倍于回信本身。再想象朋友接信时的表情,不是喜出望外,而是余怒重炽,你那一点决心就整个崩溃了。你的债,永无清偿之日。不回信,绝不等于忘了朋友,正如世上绝无忘了债主的负债人。在你惶恐的深处,恶魇的尽头,隐隐约约,永远潜伏着这位朋友的怒眉和冷眼,不,你永远忘不了他。你真

正忘掉的,而且忘得那么心安理得,是那些已经得到你回信的朋友。 我的译文: An Excerpt from Unanswered Letters vs Unbounded Friendship By Yu Guangzhong Answering letters does make me flinch; however, not answering them allows me no release at all. Dozens of unanswered letters pile up on my bookshelf, like a sum of debt waiting to be paid. Some have been waiting there for over one year, while some have newly arrived. The pressure from paying off that debt is far beyond what a junior debtor can endure. The stack of unanswered letters are, like

天地伟业网络视频服务器故障快速排查手册

天地伟业网络视频服务器故障快速排查手册 首先感谢您选用天地伟业网络视频产品,在使用之前,请详细阅读网络视频服务器使用说明书,熟悉产品使用方法,如果遇到问题可以按照以下方法进行故障排查。 为保证系统得正常运行,我们必须保证机器达到如下要求: 说明: 现场机器最好达到建议PC的配置,并安装相应硬件最新的驱动,此配置能满足16画面显示的要求,配置越高机器运行越流畅。 1.故障现象: IP搜索器搜索不到服务器 排查步骤: 1.确认网络视频服务器是否正常上电,主机网卡及驱动是否正常,网线是否做的没问题,网络拓扑连接是否通畅; 2.直接用交叉网线直接连接主机和网络视频服务器,如仍不通,给服务器复位再测试; 3.如有备件主机和网络视频服务器都做可更换测试; 4.如仍有问题请与我们联系; 2. 故障现象: IP搜索器能够正常搜索到服务器,但是IE不能正常连接视频 排查步骤: 1.确认主机IP地址和网络视频服务器地址设置在同一网段内,如不在同一网段改为同一网段; 注意:如在不同网段必须保证此两个网段做了路由; 2.确认IE的版本,建议安装IE6.0; 3.确认正常安装显卡驱动和DirectX,建议安装最新的显卡驱动和DirectX; 4.确认开启ActiveX相关插件; 5.暂时关闭杀毒软件自带防火墙测试;如是XP系统,暂时关闭系统自带防火墙; 6.删除之前曾经连接时下载的控件,重新连接测试; 7.更换主机测试; 8.如仍然有问题,请与我们联系; 3. 故障现象: 如果IE连接视频正常,但是软件连接视频不正常 排查步骤: 1.确认软件版本是否正确;如果版本不正确,重新安装正确的版本软件; 2.确认软件中“服务器编辑信息”的“IP地址”和“服务器类型”的正确;在局域望网建议采用“主码流+UDP”方式,广域网建议采用“副码流+TCP”方式; 3.确认在软件的主界面连接了视频; 4.重启软件连接;

古典诗词鉴赏表现手法练习题

古典诗词鉴赏表现手法练习题

————————————————————————————————作者: ————————————————————————————————日期: ?

古典诗词鉴赏表现手法练习题 一、阅读诗歌完成后面的题目。(7分) 念奴娇 黄庭坚① 八月十七日,同诸生步自永安城楼,过张宽夫园待月。偶有名酒,因以金荷②酌众客。客有孙彦立,善吹笛。援笔作乐府长短句,文不加点。 断虹霁雨,净秋空,山染修眉新绿。桂影③扶疏,谁便道,今夕清辉不足?万里青天,姮娥何处?驾此一轮玉。寒光零落,为谁偏照醽醁④? 年少从我追游,晚凉幽径,绕张园森木。共倒金荷,家万里,难得尊前相属。老子⑤平生,江南江北,最爱临风笛。孙郎微笑,坐来声喷霜竹⑥。 [注释]①黄庭坚(1045-1105),字鲁直,自号山谷道人。诗与苏轼并称“苏黄”,词与秦观齐名。但多次遭贬,最后死于西南贬所。②金荷:以金制成的荷叶杯。 ③桂影:相传月中有桂树,因称月中阴影为桂影。④醽醁(línglù):酒名。⑤老子:作者自指。⑥霜竹:指笛子。 (1)本词上阙先描写断虹高挂,秋空明净,山染新绿,后想象嫦娥驾月,这是采用了____表现手法。(2分) (2)《宋史》记载“庭坚泊然不以迁谪介意”,这首词正是他豪迈乐观精神的生动写照。请结合全词分析作者是如何表现这种情怀的。(5分) 二、阅读下面一首唐诗,然后回答问题。(8分) 对雪 杜甫 战哭多新鬼,愁吟独老翁。乱云低薄暮,急雪舞回风。 瓢弃樽无绿,炉存火似红。数州消息断,愁坐正书空①。 [注]①原指晋人殷浩忧愁无聊,用手在空中划字。 (1)此诗为《春望》同一时期的作品,从全诗看,说说本诗的主旨。(4分) (2)读第二、三两联,任选一联,分析作者通过怎样的艺术手法,表达了什么样的感情?(4分) 三、阅读下面的唐诗,按照要求,完成赏析。(5分)

初中语文 古文赏析 杜甫《秋兴八首(其一)》赏析(王达津)

《秋兴八首(其一)》赏析 (王达津) 永泰元年(765)杜甫在严武死后即离开成都去渝州,6月到忠州,秋天到云安。大历元年(766)春,移居夔州,秋天寓西阁。《秋兴八首》一组诗都写于此时。这时,“安史之乱虽然结束,但在河北、山东形成了藩镇割据的局面,在剑南、山南、河南、淮南和岭南,甚至京畿之内,也时常发生节度使或军将的叛变”。加之吐蕃入侵,长安游赏之地不仅未得恢复,反而常在吐蕃的威胁之下。“剑南西川也不断受到吐蕃和南诏联军侵犯和威胁”(翦伯赞主编《中国史纲要》)。诗人当时正客居夔州,《秋兴八首》就是在这背景下写的,借以感慨今昔,怀念长安,是很著名的组诗。 这八首组诗,结构严谨,是个有机整体。第一首是统率以下七首的起兴篇章。诗的前四句先写环境,以“玉露”“枫林”“气萧森”“波浪兼天涌”“风云接地阴”点明了时地,既传神地写出了风云变幻,“萧森”骇人,寓有悲壮色彩的巫峡景观,又形象地暗示了安史之乱后藩镇割据、战乱不息的政治形势和社会黑暗,并从中流露出了一股忧国忧民的愁绪。与杜甫的《风疾舟中伏枕书怀》所写的“故国悲寒望,群云惨岁阴。……生涯相汩没,时物自萧森”的意境相类似。这四句,既是写景,又是写事,更是写情,意蕴丰富。如果说前四句是以景写情,那么下面四句便直接写情,直诉诗人之悲愁和对长安之系念了。杜甫曾在夔州两度过秋天。他的《九日》诗:“即今蓬鬓改,但愧菊花开。”又在夔州的《夜》诗中说“南菊再逢人卧病”,都可作为“丛菊”一句的参证,是说在此已见两度菊开,都流了思乡之泪。而所乘之扁舟,加之周围又传来催做“寒衣”的“砧”声,这使漂泊在外的诗人更增加思乡即系念长安的心情。诗人的思归长安之心所以如此殷切,诚然与长期客居在外有关,更是忧国忧民情怀的一种曲折表现,与前四句所写的内容相一致。

EasyDecoder视频解码管理软件V3.0T-用户使用说明.

EasyDecoder视频解码管理软件 用户使用说明

目录 目录 (2) 1.系统说明 (5) 1.1概要 (5) 1.2功能简介与特点 (5) 1.3硬件配置 (5) 1.4软件平台与运行环境 (5) 1.5术语 (5) 1.6阅读指导 (6) 2.系统安装 (6) 2.1安装软件 (6) 3.系统主界面 (7) 4.系统运行操作 (7) 4.1进入系统/退出系统 (7) 进入系统 (8) 退出系统 (8) 4.2系统初始化 (8) 4.2.1服务器设置 (9) 4.2.1.1添加服务器 (9) 4.2.1.2智能添加服务器 (10) 4.2.1.3删除服务器 (11) 4.2.1.4修改服务器 (12) 4.2.1.5批量修改服务器 (14) 4.2.1.6反选功能 (14) 4.2.1.7检索服务器 (14) 4.2.1.8修改通道信息 (15) 4.2.2监控点管理 (15)

4.2.3解码器设置 (16) 4.2.3.1手动添加 (16) 4.2.3.2智能添加 (17) 4.2.3.3删除解码器 (17) 4.2.3.4修改解码器名称 (17) 4.2.3.5连接解码器 (18) 4.2.3.6断开解码器 (18) 4.2.3.7解码器设置 (18) 4.2.3.7.1网络设置 (19) 4.2.3.7.2DNS设置 (19) 4.2.3.7.3解码器参数设置 (20) 4.2.3.7.3.1485设置 (20) 4.2.3.7.3.2协议设置 (21) 4.2.3.7.4LOGO设置 (21) 4.2.3.7.5报警设置 (21) 4.2.4联机切换设置 (22) 4.2.4.1添加切换序列 (22) 4.2.4.2删除切换序列 (23) 4.2.4.3连接监控点 (23) 4.2.4.4停止预览 (24) 4.2.4.5打开/关闭音频 (24) 4.2.4.6开始/关闭对讲 (24) 4.2.4.7设备控制 (25) 4.2.4.8开始/停止切换 (26) 4.2.4.9显示模式设置 (26) 4.2.4.10其他 (26) 4.2.4.10.1切换不在线跳过显示 (26)

红楼梦艺术手法赏析

浅谈《红楼梦》艺术手法 《红楼梦》就是一部寄托深意、“字字瞧来皆就是血,十年辛苦不寻常”的绝世佳作。它就是中国古代现实主义艺术创作的高峰。它具有极高的艺术造诣与很高的美学价值。它就是一个封建社会、封建制度从发展到衰亡的过程的缩影,以小说的形式、以家庭为背景,向我们展现了清朝社退出历史舞台的过程。 《红楼梦》不仅在小说背景方面有特殊的构思,在小说艺术手法上面更就是独具一格,达到了古代现实主义小说艺术的高峰,具有了相当的美学价值。下面,我就我个人对《红楼梦》的阅读经历,对其艺术表现手法浅谈一二。 一、《红楼梦》的人物塑造艺术 这部小说中人物的塑造,曹雪芹完美地做到了在同一阶级中塑造众多鲜明生动的艺术形象。《红楼梦》中的人物非常之多,且不说人物本身千差万别的,单就是本身思想性格及身份地位类似却又处处不同的形象就有很多为众人所熟知。在这众多的人物中。有的就是官僚贵族的当权者,有的就是锦衣玉食的公子王孙,有的就是年轻貌美的大家姊妹,有的就是经受豪宅欺凌的丫头仆役,这些人,同一类人大都有着相似的出身经历或者身份地位,但曹雪芹却同中求异,采用了一些很特殊的对比手法,使得那些易被人混淆的形象表现出了巨大的差异,从而使读者毫无类同之感。 比如,《红楼梦》中著名的两位名门千金小姐,薛宝钗与林黛玉。她俩的出身与学识教养基本类似,都有沉鱼落雁之貌,都有出口成章之才。这样的两个人物形象,按理说很难区分。然而在《红楼梦》中,显然她俩就是截然不同的两个对立形象。曹雪芹通过对她们的言谈举止、行为动作、思想风格的刻画,表现了这两个形象内在的迥异。这种迥异在宝钗与黛玉对宝玉的爱情上体现的尤为明显。黛玉对于宝玉,就是一片纯真的爱情,她通过“题帕诗”向宝玉倾吐爱情,含蓄而明心。而宝钗,却就是因宝玉就是贾府的宠儿而爱上宝玉,这种爱带有一定的功利性,为了未来的地位,她的爱谨慎而谋世。再者,在处世为人方面,黛玉高洁,自尊,从不轻易迎合世俗,无论就是对至高无上的贾母,还就是对管家少妇王熙凤。而宝钗,她拥有大家闺秀的气质与背后厚实的家庭财富,凭借她的乖巧伶俐讨得了贾母的欢心。一个天真敏锐,一个沽名钓誉,这就就是钗黛之别。 作者通一系列相同事件中钗黛的不同言行,塑造了她俩迥异的性格特点,使得小说中的这两个人物特点鲜明突出。这样的例子还有一大批,如迎春与探春,尤氏姊妹等。小说中,作者以特殊复杂的对比手法,同中求异,重复中求不重复,塑造了一大批外部相似却实质迥异的人物形象,达到了强烈的艺术效果。 另外,在人物塑造中,曹雪芹没有采用中国古典小说惯用的人物主导性格的手法,她对于人物形象的表现,并不就是从个人好恶出发,随意将某个人写成好人,

《秋兴八首(其一)》诗歌鉴赏

秋兴八首·其一 玉露凋伤枫树林,巫山巫峡气萧森。 江间波浪兼天涌,塞上风云接地阴。 丛菊两开他日泪,孤舟一系故园心。 寒衣处处催刀尺,白帝城高急暮砧。 注释 1.这是八首中的第一首,写夔州一带的秋景,寄寓诗人自伤漂泊、思念故园的心情。玉露:秋天的霜露,因其白,故以玉喻之。凋伤:使草木凋落衰败。 2.巫山巫峡:即指夔州(今奉节)一带的长江和峡谷。萧森:萧瑟阴森。 3.兼天涌:波浪滔天。 4.塞上:指巫山。接地阴:风云盖地。"接地"又作"匝地"。 5.丛菊两开:杜甫去年秋天在云安,今年秋天在夔州,从离开成都算起,已历两秋,故云"两开"。"开"字双关,一谓菊花开,又言泪眼开。他日:往日,指多年来的艰难岁月。 6.故园,此处当指长安。 7.催刀尺:指赶裁冬衣。"处处催",见得家家如此。 8.白帝城,即今奉节城,在瞿塘峡上口北岸的山上,与夔门隔岸相对。急暮砧:黄昏时急促的捣衣声。砧:捣衣石。 9.急暮砧:黄昏时急促的捣衣声。砧,捣衣石。 译文 枫树在深秋露水的侵蚀下逐渐凋零、残伤,巫山和巫峡也笼罩在萧瑟阴森的迷雾中。巫峡里面波浪滔天,上空的乌云则像是要压到地面上来似的,天地一片阴沉。花开花落已两载,看着盛开的花,想到两年未曾回家,就不免伤心落泪。小船还系在岸边,虽然我不能东归,飘零在外的我,心却长系故园。又在赶制冬天御寒的衣服了,白帝城上捣制寒衣的砧声一阵紧似一阵。看来又一年过去了,我对故乡的思念也愈加凝重,愈加深沉…… 赏析 秋兴者,遇秋而遣兴也,感秋生情之意。《秋兴八首》是杜甫晚年为逃避战乱而寄居夔州时的代表作品,作于大历元年(公元766年),时诗人56岁。全诗八首蝉联,前呼后应,脉络贯通,组织严密,既是一组完美的组诗,而又各篇各有所侧重。每篇都是可以独立的七言律诗。王船山在《唐诗评选·卷四》中说:“八首如正变七音,旋相为宫而自成一章,或为割裂,则神态尽失矣。” 八首之中,第一首总起,统帅后面七篇。前三首写夔州秋景,感慨不得志的平生,第四首为前后过渡之枢纽,后四首写所思之长安,抒发“处江湖远则忧其君”的情愫。声身居巫峡而心系长安就是这组诗的主要内容和线索。 全诗以“秋”作为统帅,写暮年飘泊、老病交加、羁旅江湖,面对满目萧瑟的秋景而引起的国家兴衰、身世蹉跎的感慨;写长安盛世的回忆,今昔对比所引起的哀伤;写关注国家的命运、目睹国家残破而不能有所为、只能遥忆京华的忧愁抑郁。 全诗于凄清哀怨中,具沉雄博丽的意境。格律精工,词彩华茂,沉郁顿挫,悲壮凄凉意境深宏,读来令人荡气回肠,最典型地表现了杜律的特有风格,有很高的艺术成就。

人教版七年级下册古诗及译文赏析

1 / 12 第一首: 山中杂诗年代:南北朝作者:xx 山际见来烟,竹中窥落日。 鸟向檐上飞,云从窗里出。 译文: 山峰上缭绕着阵阵的岚气云烟竹林的缝隙里洒落下夕阳的余晖 鸟儿欢快地在屋檐上飞来飞去白白的云儿竟然从窗户里飘了出来。 赏析: 诗歌描写的是诗人住在山中的有趣生活:山峰环绕,竹木茂盛,鸟在人家的房檐上飞,云彩竟然从窗里飘出来。此幽居荡尽了人间的尘滓,随意而传神地表达了诗人惬意闲适的心情。 全诗不过短短四句,一句一景,然句句不离“山中”的主题。烟岚弥漫着山谷,在山峰间飘来荡去,这正是幽静深邃的山中所常见的现象。落日西沉,只能在竹林的间隙中窥见其脉脉的斜晖,由此可见竹林的茂密青葱,山间的幽趣在首两句中已曲曲传出。屋檐上的飞鸟来来往往,白云穿窗而过,都说明诗人所居之处地势高峻,而且在茂林修竹之中,群鸟时时栖息于其檐前屋后,体现了山居的清静超脱,远离尘嚣。 第二首:xxxxxx 独坐幽篁里,弹琴复长啸。

xx人不知,明月来相照。 注释 1.幽篁:幽是深的意思,篁是竹林。 2.啸:嘬口发出长而清脆的声音,类似于打口哨 2 / 12 3.xx:指“幽篁”。 4.相照:与“独坐”相应,意思是说,独坐幽篁,无人相伴,唯有明月似解人意,偏来相照。 译文: 独自坐在幽深的竹林里,一边弹着琴一边又长啸。深深的山林中无人知晓,皎洁的月亮从空中映照。 鉴赏: 这是一首写隐者的闲适生活情趣的诗。诗的用字造语、写景(幽篁、深林、明月),写人(独坐、弹琴、长啸)都极平淡无奇。然而它的妙处也就在于以自然平淡的笔调,描绘出清新诱人的月夜幽林的意境,融情景为一体,蕴含着一种特殊的美的艺术魅力,使其成为千古佳品。以弹琴长啸,反衬月夜竹林的幽静,以明月的光影,反衬深林的昏暗,表面看来平平淡淡,似乎信手拈来,随意写去其实却是匠心独运,妙手回天的大手笔。 这首诗同样表现了一种清静安详的境界。前两句写诗人独自一人坐在幽深茂密的竹林之中,一边弹着琴弦,一边又发出长长的啸声。其实,不论“弹琴”还是“长啸”,都体现出诗人高雅闲淡、

数字化公检法系统软件便携式标准版V7.1T_用户操作说明书(天地伟业)

数字化公检法系统软件便携 式标准版 用户操作说明书 V7.1

目录 1.审讯中心服务器系统设置说明 (1) 1.1服务器设置 (1) 1.2审讯室设置 (2) 1.3压缩预览参数设置 (3) 1.4用户管理: (4) 1.5设备管理 (8) 1.6日志及文件 (10) 1.7系统安全管理 (10) 2.审讯中心服务器使用操作说明 (11) 2.1登录 (13) 2.2视频显示区 (14) 2.3在线信息显示区 (16) 2.4功能使用 (16) 3.审讯中心服务器各种温湿度叠加器的设置和使用 (19) 3.1温湿度叠加设置方法 (19) 3.2TC-W8667测试软件 (20) 3.3TC-W8901DC (22) 3.4YL-S018SR (23) 3.5TC-H307P (31) 4.审讯终端软件操作使用说明 (33) 4.1登录主机 (33) 4.2添加案件 (34) 4.3审讯功能 (37) 4.4笔录管理 (41) 4.5案卷查询 (43) 4.6资料回放 (43) 5.数字化公检法系统软件便携式标准版安装部分 (44) 5.1卸载旧压缩卡驱程 (44) 5.2开始安装 (44) 5.3安装加密狗驱动 (45) 5.4安装专用数据库 (46) 6.故障查找与排除 (47)

1 感谢您选用我公司数字化公检法系统软件便携式标准版产品。 数字化公检法系统软件便携式标准版是根据最高检颁布的《人民检察院讯问职务犯罪嫌疑人实行全程同步录音录像系统建设规范》文件要求。通过加强计算机技术、图像数字化技术和信息技术的应用,实现司法系统对审讯室的标准化建设,利用现有的网络对审讯的讯问和询问过程进行有效的监督和管理,实现同步录音录像,提高侦查办案、协查办案的效率,加强办案、取证过程的真实性和有效性。 1. 审讯中心服务器系统设置说明 在使用数字化公检法系统软件便携式标准版前需要先初始化系统数据和配置参数,包括服务器设置、审讯室设置、指挥终端设置、压缩预览参数、用户管理、设备管理、日志文件、系统安全管理和短信设备管理。系统设置初始化后可以投入使用,进行审讯录像、电子笔录、远程指挥等操作。 在桌面上点击 图标,显示“系统设置--用户登录”界面,输入正确的用户名密码(系统默认用户名admin ,密码1111),登录系统设置软件。 1.1 服务器设置 系统设置的第一页为【服务器设置】,如下图:

常用艺术手法及鉴赏示例

诗词鉴赏常用艺术术语及鉴赏示例 江苏徐州大屯煤电公司第一中学尹国华 邮编:221611 在语文教学中一大难点就是诗词教学,现把诗词创作中常用的艺术手法及示例加以整理,以便同学们能从基本概念上掌握诗词鉴赏的第一步: 1.情景交融(也有说是一种境界,不必单独列出) 即将感情融会在特定的自然景物或生活场景中,借对景物或场景的描摹刻画来抒发感情。乍一看好象是单纯的地写景,实际上蕴涵着诗人喜怒哀乐的感情,也是一种间接而含蓄的抒情方式。 如:《江南春绝句》(杜牧)“千里莺啼绿映红,水村山郭酒旗风。南朝四百八十寺,多少楼台烟雨中。”情景交融是本诗的一大特色。全诗以明快俊俏的笔调描绘了一幅美丽的江南水乡图景。乍一看好象是单纯的地写景,实际上蕴涵着诗人喜怒哀乐的感情,尤其是后两句,委婉含蓄地寄寓了诗人对南朝统治者迷信佛教、修建佛寺的嘲讽。 2.托物言志 即吟咏具体而单一的某一物象来抒发情感。在描摹事物以尽其妙的基础上融入作者的感情,寄托作者的心志。诗人借自然界中的某物自身具有的特征,来表达某种志向或情感,诗中的物带有了人格化的色彩。 如骆宾王的《咏蝉》“西陆蝉声唱,南冠客思侵(深)。不堪玄鬓影,来对白头吟。露重飞难进,风多响易沉。无人信高洁,谁为表予心?”本诗是托物言志的名篇。作者借托两鬓乌玄高唱的秋蝉来言自己的品性高洁,说蝉因“露重”、“风多”而“飞难进”、“响易沉”,实际上是指自己环境的压力和政治上的不得意,并借此为自己辩解,蒙受了不白之冤。作者由物及人,又由人及物,蝉与诗人已浑然一体,写蝉就是写自己。 3.借古喻今(借古讽今) 这是咏史诗中常见的表现手法,借历史上的事件来讽喻当朝。 如李商隐的《贾生》:该诗截取汉文帝与贾谊之间君臣相会的一个历史场景,抓住其中最富讽刺意味的典型细节加以描写,突出贾生可悲可叹的遭遇,借古讽今,寄托作者对当朝统治者漠视民生,不能真正用才和自己怀才不遇的感慨。诗中借古喻今、以小见大,史论结合,意蕴深刻而丰富,讽刺有力,可谓咏史诗中难得的力作。 4.运用典故 古诗很讲究用典,典故是指诗文中引用的古代故事和有来历出处的词语。用典既可以使诗歌语言精练,又可以增加内容的丰富性,增加表达的生动性和含蓄性,可收到言简意丰、耐人寻味的效果。增强作品的表现力和感染力。典故有正用和反用两种,正用就是取典故的原来意义入诗文;反用就是在诗文中反用原典的意义。 如辛弃疾《水龙吟·登建康赏心亭》,本词化用了季鹰、刘备、桓温三人的典故来抒发作者思念故国故乡之情,也借典故中三人之口抒发了作者自己对南宋朝廷的愤恨和壮志难酬的悲抑之情。三个典故连用,表面是评古人,实则抒发自己对当朝者的不满和愤懑,可谓一石三鸟。而且正是这三个典故连用把作者的感情在上阙的基础上层层推进到了最高点,产生出极为强烈的感染力量,此手法运用的圆熟精到使人钦吧不已。 5.侧面描写(又叫烘托) 侧面描写就是描写对象周围的事物,使对象更鲜明、突出。 如杜甫的《江畔独步寻花》:“黄四娘家花满蹊,千朵万朵压枝低。留连戏蝶时时舞,自在娇莺恰恰啼。”本诗旨在表现花的可爱和自己心情的舒畅,但作者在三四两句却没有直接描写,而是运用了侧面描写的手法。“留连戏蝶时时舞”。“留连”是形容蝴蝶飞来飞去舍不得离开的样子。这句从侧面写出春花的鲜艳芬芳。其实诗人也被万紫千红的春花所吸引而留连忘返。第四句“自在娇莺恰恰啼”。“娇”是形容莺歌柔美圆润。“恰恰啼”是说正当诗人前来赏花时,黄莺也在鸣叫。只因为诗人内心欢愉,所以想当然地认为黄莺特意为自己歌唱。这与上句说彩蝶留连春花一样,都是移情于物的手法。由于诗人成功地运用了这一手法,使物我交融,情景相生,这首小诗读起来就更亲切有味。 6.虚实相间 文艺作品在写到较为复杂的事情时,往往采用虚实结合的写法,使作品结构更加紧凑、形象更加鲜明。在中国画的传统技法中,虚,是指图画中笔画稀疏的部分或空白的部分。它给人以想象的

翻译作业点评 what I have lived for

翻译作业点评what I have lived for 词的翻译 1.great wind的理解应结合结合上下文的语境: 风2 飓风17 狂风35 巨风9 强风8 疾风1 暴风2 烈风1 大风7 龙卷风1 强烈的风7 强劲的风3 强大的风1 猛烈的(大)风4 巨大的风1 异乎寻常的风1 微风1 轻风1 和煦的春风1 2.数字的写法套路 中文大小写壹贰叁肆伍陆柒捌玖拾一二三四五六七八九十 阿拉伯数字1. 2. 3. 4. 罗马数字大小写ⅠⅡⅢⅣⅰⅱⅲⅳ 3.词义的选择 3.1.ground 世间世上 人间尘世 现实现实世界 地上地面地球 3.2.this joy (短暂)喜悦 欢喜欢娱欢愉(的魔力)(片刻)欢乐(时光) 愉悦愉快 快乐 乐趣 (万分)狂喜 沉醉沉迷 转瞬即逝的幸福 短暂数小时 3.3.miniature 缩影缩图图像模型模式角度国度蓝图彩画影像画卷(刘洋)画面(张富强等)象征写照憧憬 缩略图小世界复制品小画像微型画/图 缩小模型微型世界/图像画像缩影天堂画卷(贺梦鸽) 微型的心理潜行者的画潜修者的画像微缩/小复制品微小的天堂 句子的翻译 1.主动句与被动句之间的转换 英教3:直译为原文被动句式9人,意译为主动句这39人。 被动句式:被…所控制3/掌控2/统治1/支配2/占据1 主动句式:三种感情支配12/统治1/贯穿/掌握/掌控7/控制5/经营/主宰2/统治/指引/影响4/

支撑/着(我的一生) 我为三种激情而生 在我的生活中起支配作用的有三种…情感 2.“的”字结构滥用 就像是一个颤抖的人站在世界的边缘上俯视着一个寒冷的深不可测的却又毫无生机的地狱般可怕。 减缓那在用颤抖的意识从世界的边缘看向寒冷的死寂的无底深渊时产生的那种可怕的孤独感。 那可怕的孤独能让一个人的意识触到冰冷的无底的绝望的深渊的边缘。 孤独——那种让人陷入冷酷的深不可测的无生命的深渊。 这种可怕的孤独感像一个意识在颤抖的人在寒冷的深不可测的且无生气的无底洞中寻找世界的边缘。 圣人和诗人所想象的神秘的微小的预示的天堂的景象。 有着厌恶的负担的无助的年迈的老人给予他们的儿子。 毫无帮助的老人是他们的儿子的沉重的负担。 对他们的儿子来说是一个讨厌/令人反感的负担的无助的老人们。 3. “是”字泛滥 最后是因为我所见过的完整的爱,是一个神秘的缩影,那是圣人和诗人们梦想中的天堂里预示的美景。这就是我所追寻的,即使它看起来似乎对人类生活很美好,但是这就是我最后能找到的。 4. 排比句怎么翻译?语序要整齐吗?要调整吗?要凌乱吗?Children…victims…helpless old people… 5. 在一个完整句中,中途随意变换主语,或舍弃不应舍弃、省略不应省略的主语 这就是我明白的哲理,并且认为它似乎对人们的生活很有好处。 6. 标点符号怎么打? 《三种激情》是选自《伯特兰·罗素自传》的一篇优秀散文。它既是作者心灵的抒发,也是生命体验的总结。作者以深刻的感悟和敏锐的目光,分析了人生中的三种激情,即对爱的渴望,对知识的追求和对人类苦难的同情。对爱的渴望,使人欣喜若狂,既能解除孤独,又能发现美好的未来。对知识的追求,使人理解人心,了解宇宙,掌握科学。爱和知识把人引向天堂般的境界,而对人类的同情之心又使人回到苦难深重的人间。作者认为这就是人生,值得为此再活一次的人生。这篇散文似乎信手拈来,但却耐人寻味。充满激情,充满感慨,充满智慧,情文并茂,逻辑性和感染力极强。 伯特兰·罗素(Bertrand Russell,1872-1970)是英国声誉卓著,影响深远的哲学家、数学家、逻辑学家和散文

天地伟业键盘说明书-5810网络键盘安装使用手册上课讲义

网络键盘安装使用手册

目录 第一章键盘简介 (1) 1.1 功能特点 (1) 1.2 产品外观 (1) 1.3 技术指标 (1) 第二章键盘安装 (2) 2.1 放置 (2) 2.2 接口 (2) 2.3 安装 (2) 第三章键盘设置 (3) 3.1 设置 (3) 3.2 键盘开机 (3) 3.3 键盘登录 (3) 3.4 设置键盘 (4) 3.4.1网络管理 (4) 3.4.2用户管理 (4) 3.4.3 密码管理 (5) 3.4.4 设备管理 (5) 3.4.5 硬件设置 (5) 3.4.6 锁定设置 (5) 3.4.7 硬件检测 (6) 3.4.8摇杆校准 (6) 第四章矩阵控制 (8) 4.1 登录矩阵 (8) 4.2 矩阵操作界面 (8) 4.3 切换操作 (9) 4.4前端控制 (10) 4.5报警控制 (10) 4.6宏操作 (10) 4.7 越权控制 (10) 4.8 码分配器设置 (10) 4.9 锁定 (11) 4.10 列表 (11) 第五章网络升级 (12)

第一章键盘简介网络键盘配合智能网络矩阵使用,功能丰富、操作简单。 1.1 功能特点 ●中文编程操作界面 ●中文硅胶按键 ●大屏幕液晶屏幕 ●详细的矩阵及前端信息 ●以太网通讯 ●二维变速摇杆 ●使用简捷方便 1.2 产品外观 1.3 技术指标 工作温度:-10℃~50℃ 工作湿度:<90% 工作电压:DC12V 功耗:4W 以太网接口:10BaseT UDP(局域网) 外形尺寸(mm):300×160×43(长×宽×高)

第二章键盘安装 2.1 放置 键盘采用工学设计,水平放置控制台面即可。 2.2 接口 网络键盘背部有两个接口:一个为电源接口,外接DC12V电源给键盘供电;另一个为RJ45网络接口,连接智能网络矩阵。 2.3 安装 标准版本的网络键盘硬件只支持控制智能网络矩阵(控制其它监控设备需要在标准版本的硬件基础上稍作调整),所以标准版网络键盘只能将当前设备选择为矩阵。用网线将矩阵接到键盘的网络接口,接上电源,即完成了键盘和矩阵的物理连接。 注:由于智能网络矩阵内置交换机单元,所以网络键盘连接智能网络矩阵采用直通线序的标准网线。

秋兴八首其一赏析

秋兴八首其一赏析 《秋兴八首》是大历元年(766)秋杜甫滞留夔州时惨淡经营的一组七言律诗。杜甫时年五十五岁。当时蜀地战乱不息,诗人晚年多病,知交零落,壮志难酬,心境非常寂寞、抑郁。当此秋风萧飒之时,不免触景生情,感发诗兴,故曰《秋兴》。这八首诗是一个完整的乐章,命意蝉联而又各首自别,时代苦难,羁旅之感,故园之思,君国之慨,杂然其中,历来被公认为杜甫抒情诗中沉实高华的艺术精品。清代黄生《杜诗说》就说:“杜公七律,当以《秋兴》为裘领,乃公一生心神结聚之所作也。”清代沈德潜《唐诗别裁集》也说:“怀乡恋阙,吊古伤今,杜老生平俱于见此。其才气之大,笔才之高,天风海涛,金钟大镛,莫能拟其所到。” 这里所选的第一首,是领起的序曲。诗人用铺天盖地的秋色将渭原秦川与巴山蜀水联结起来,寄托自己的故国之思;又用滔滔不尽的大江把今昔异代联系起来,寄寓自己抚今追昔之感。诗中那无所不在的秋色,笼罩了无限的宇宙空间;而它一年一度如期而至,又无言地昭示着自然的岁华摇落,宇宙的时光如流,人世的生命不永。 句解 玉露凋伤枫树林,巫山巫峡气萧森。 白露凋伤了漫山遍野的枫林,秋色已经很深,巫山巫峡呈现出一片萧森景象。首联开门见山,点明时节、地点,描绘出具有浓重感伤色彩的秋色、秋气,奠起全篇萧飒哀残之基。《集千家注分类杜工部诗》引刘辰翁评语说:“露曰玉露,树曰枫林,凋伤之中仍有富丽之致,自是大方家数。”叶嘉莹《杜甫秋兴八首集说》评价这一联:“气象足以笼罩,而复有开拓之余地,是绝好开端。”“玉露”,秋天的霜露,因其白,故以玉喻之。“凋伤”,草木在秋风中凋落。“巫山”,在今重庆市巫山县。“萧森”,萧瑟阴森。 江间波浪兼天涌,塞上风云接地阴。 峡中的江水波涛汹涌,波浪滔天;塞上的风云阴沉密布,仿佛和地面贴近。清代杨伦《杜诗镜铨》评论说:“波浪在地而曰兼天,风云在天而曰接地,极言阴晦萧森之状。”这就将眼前景和心中景连成一片,使人感到天上地下,处处惊涛骇浪,风云翻滚,阴晦惨淡的气氛笼罩四野,分明是阴沉压抑、动荡不安的心情和感受的写照。“江间”,即巫峡:“塞上”,即巫山。“兼”、“接”二字,写出浑莽之象。 丛菊两开他日泪,孤舟一系故园心。 秋菊两度盛开,使我再次洒下往日流过的眼泪;一叶孤舟靠岸系绳,始终都牵动着我的故园之思。这一联是全篇诗意所在。“丛菊两开”,指诗人于永泰元年(765)离开成都,原打算很快出峡,但这年留居云安,次年又留居夔州,见到丛菊开了两次,还未出峡。故对菊掉泪。“开”字双关,一谓菊花开,又言泪眼随之开。孤舟本来只能系住自己的行踪,却把诗人的思乡之心也牢牢地系住了,故见舟伤心,引出故园之思。 寒衣处处催刀尺,白帝城高急暮砧。 我清晰地听到,砧声四起,傍晚时分,在白帝城楼的高处,是那么的急促。妇女们正拿着裁尺和剪刀,为在外的亲人赶制着御寒的衣服。“催刀尺”,即催动刀尺。“白帝城”,旧址在今四川省奉节县东的白帝山上,与夔门隔岸相对。“急暮砧”,黄昏时分捣衣的砧声很紧。“砧”,捣衣石,这里借指捣衣发出的声音。古人裁衣前,先将衣料放在砧上,用杵捣软,使之平整光滑。每到秋天,家人要为远方的游子或征人制作寒衣,因此捣衣声是人间的秋声,往往会增添客子的愁绪。在这黯淡萧条的秋景和暮色中,诗人更平添了一许孤独、忧伤之感。 评解 清代浦起龙《读杜心解》说:“首章,八诗之纲领也。明写秋景,虚含兴意;实拈夔府,暗提京华。”作为八首诗的开场白,这第一首诗通过对巫山巫峡秋声秋色、秋景秋意的形象描

EasyView V4.0T使用说明书

天地伟业EASYVIEW V4.0T网络视频监控 软件使用手册 2010年3月

目录 目录 (2) 一、系统需求 (4) 1.1 安装需求 (4) 1.2 运行需求 (5) 二、EASYVIEW视频监控管理软件安装手册 (5) 2.1 软件安装 (5) 三、EASYVIEW视频监控管理软件使用手册 (5) 3. 1搜索器的使用说明 (6) 3.1.1 搜索设置IP地址 (6) 3.1.2 网络设备的搜索 (6) 3.1.3计算机网络设置 (7) 3.1.4 H系列服务器设备搜索 (7) 3. 2 视频浏览模块使用说明 (7) 3.2.1 监控软件EasyView登录系统 (7) 3.2.2 选取、退出软件功能模块 (8) 3.2.3 视频浏览模块使用说明 (9) 3.2.4系统功能模块使用说明 (11) 3.2.4.1 系统设置功能说明 (11) 3.2.4.1.1【设备管理】操作说明 (11) 3.2.4.1.2【用户管理】操作说明 (19) 3.2.4.1.3【用户权限管理】操作说明 (20) 3.2.4.1.4【图像设置】操作说明 (21) 3.2.4.1.5【报警设置】操作说明 (24) 3.2.4.1.6【报警联动】操作说明 (28) 3.2.4.1.7【视频遮挡设置】操作说明 (32) 3.2.4.1.8【日志管理】操作说明 (33) 3.2.4.1.9【切换设置】操作说明 (35) 3.2.4.1.10【域名注册信息设置】操作说明 (36) 3.2.4.2 抓怕浏览功能说明 (37) 3.2.4.3电子地图功能说明 (38) 3.2.5云镜控制模块使用说明 (39) 3.2.6 监控点列表模块使用说明 (40)

古典诗词艺术手法赏析36法(整理精校版)

古典诗词艺术手法赏析36法 作文辅导 0509 1751 古典诗词艺术手法赏析36法 1、直抒胸臆如:“黄沙百战穿金甲,不破楼兰终不还。”(《从军行》?王昌龄) 2、融情于景如:“渭城朝雨浥清尘,客舍青青柳色新。”(《送元二使安西》王维) 3、托物言志如:“千岩万壑处深山,远看方知出高处。溪涧岂能留得住,终归大海作波涛。”(《瀑布联句》?李忱)再如:“居高声自远,非是藉秋风。”(《蝉》?虞世南) 4、托物起兴如“一叫一春残,声声万古冤。”(《子规》余靖)再如“孔雀东南飞,五里一徘徊。”(《孔雀东南飞》) 5、巧用衬托如:“江雨霏霏江草齐,六朝如梦鸟空啼。无情最是台城柳,依旧烟笼十里堤。”(《台城》?韦庄);侧面烘托如:“红籍香残玉箪秋,轻解罗裳,独上兰舟。”(《一剪梅》?李清照)再如:“欲验春来多少雨,野塘漫水可回舟。”(《春雨》?周邦彦) 6、联想巧妙如“三湘衰鬓逢秋色,万里归心对月明。”(《晚次鄂州》卢纶 7、细节逼真如“有约不来过夜半,闲敲棋子落灯花。”《约客》?赵师秀 8、欲扬先抑如:“新年都未有芳华,二月初惊见草芽。白雪都嫌春色晚,故穿庭树作飞花。”(《春雪》?韩愈) 9、欲抑先扬如“宣室求贤访逐臣,贾生才调更论。可怜夜半虚前席,不问苍生问鬼神。”(《贾生》李商隐) 10、以动写静如:“空山不见人,但闻人语响。” (《鹿柴》?王维)再如:“泉声咽危石,日色冷青松。”(《过香积寺》?王维) 11、以静写动如:“人闲桂花落,夜静春山空。月出惊山鸟,时鸣春涧中。”(《鸟鸣涧》)? 王维。全诗以落花、明月、鸟鸣点染云溪山的夜景,以静写动。花落、月出、鸟鸣虽是动景,然而最终的目的是要写出山间的幽静。 12、以虚写实如:“冬前冬后几村庄,溪北溪南两履霜,树头树底孤山上。冷风来何处香?忽相逢缟袂绡裳,酒醒寒惊梦,笛凄春断肠,淡月昏黄。”(《[双调]水仙子?寻梅》乔吉) 13、以实写虚如:“问君能有几多愁,恰似一江春水向东流。” (《虞美人》?李煜)词中将抽象的“愁”化为具体可感的江水滚滚。 14、虚实相间如:“王濬楼船下益州,金陵王气黯然收。千寻铁锁沉江底,一片降幡出石头。人世几回伤往事,山形依旧枕寒流。从今四海为家日,故垒萧萧芦荻秋。”(《西塞山怀古》?刘禹锡)前四句,只一句写晋军,往下全写东吴,可实写东吴,也虚写晋军。 15、乐景写哀如:“江碧鸟逾白,山青花欲燃。今春看又过,何时是归年。”(《绝句二首》?杜甫)再如:“江上信美,终非吾土,何日是归年。”

杜甫《秋兴八首》(其三)赏析

教学反思——评杜甫《秋兴八首》(其三) 千家山郭静朝晖,日日江楼坐翠微。 信宿渔人还泛泛,清秋燕子故飞飞。 匡衡抗疏功名薄,刘向传经心事违。 同学少年多不贱,五陵裘马自轻肥。 《秋兴八首》是杜甫流寓夔州时写的组诗。这第三首通过对自己平生进行回忆反思,处处流露着志不可得的失落。 首联“千家山郭静朝晖,日日江楼坐翠微。”诗人独居寒江,遥望清早,沐浴着晨曦;黄昏,时隐时现于流岚雾霭之中的夔州城,心中生出了无限的惆怅之感,因为山城千家的宁静与祥和都是他人的,而自己却什么也没有。“日日”羁留于此,这漂泊之情便泛滥开来了…… 颔联“信宿渔人还泛泛,清秋燕子故飞飞。”与诗人一同“信宿”江面的还有渔人和燕。然而渔人信宿,因有鱼可捕,捕鱼归家家尚近;燕子低飞随季节迁徙,也是来去自由的。而诗人,遥望京华,山长水阔;病中衰朽,道阻且长。一个“故”字似乎这燕子“飞飞”是有意而为之,在故意炫耀自己的身轻、自由。实际上是诗人因囿于孤舟看灵动、自由的燕,萌生了人不如燕的慨叹。使燕这一形象人格化了。就像赵执信看山望月时所吟咏的“寒山常带斜阳色,新月偏明落叶时”一样,山带斜阳之色,月明于

落叶之时,燕低飞于清秋时节,于大自然而言,这一切并无特别之处,只因诗人观之而带有了诗人的情感,用了“常”、“偏”、“故”这饱含温情的字眼,使“寒山”、“新月”、“燕”具有了人的特点。 颈联“匡衡抗疏功名薄,刘向传经心事违。”诗人渴望着能如匡衡那般抗疏立功,赢得生前身后名,只可惜自己“功名薄”其志难抒,“立功”无望。退一步,诗人又渴望能像刘向那般潜心经学,开馆授徒,将自己“致君尧舜”、“窃比稷契”的政治理想传于后学,无奈自己却长期漂泊,居无定所,“立言”又成妄想。 尾联“同学少年多不贱,五陵裘马自轻肥。”少年时的同学,今已日益显贵,而一个“自”字,写出了曾经的同学只顾着自己骑马乘车衣轻裘,无心诗人更无心家国。我想诗人在嘲讽、埋怨那些尸位素餐的同学时,内心深处还是少不了羡慕之情的。和同学的比较,再一次刺痛了忧国忧民的诗人。这个世界没有比较就没有伤害,可是作为社会中的人都少不了比较,于是人们又创造性的提出了“比上不足比下有余”来缓解这种伤害,所以,人不能一味“比上”,因为那是痛苦的源泉;也不能一味“比下”,因为那是麻醉自我的“奶头儿”。人生需要“比上”,让自己知耻后勇,努力进取;也需要在遭遇坎坷时“比下”,让自己不至于绝望。诗人以稷契、匡衡、刘向自比,“比上”显然不足,所以诗人常常心有所郁结,常怀壮志难酬的苦闷。

相关文档
相关文档 最新文档