To cite the short stories of Kathrine Mansfield, all contain characters who are
revealed through their own thoughts. In her stories, the world is always seen through
the eyes of her characters in the form of points of view presented to the readers
through the characters' minds. This way of revealing characters and figuring out the
world, through the presentation of the characters' thoughts, is linked to the 'stream of
consciousness.' Kathrine Mansfield has been compared with Virginia Woolf in
particular in that both writers used the thoughts and the points of view of their
characters as material for their work through the stream of consciousness.
According to Leech and Short (1981), there are five linguistic techniques
available for the narrator to present his/ her characters' thoughts through. These are
the direct thought, the free direct thought, indirect thought, free indirect thought and
narrative report of thought act. The narrator is free to use any, some or all of these
techniques to inform the reader of what is going in the characters' minds to make him/
her aware of certain points of view.
The present paper attempts to present full exposition of the five techniques of
thought presentation mentioned above. This exposition is presented in the first section
of the paper. The paper mainly aims at making a stylistic analysis of thought
presentation by the five techniques in Mansfield's short stories. The analysis is done
by investigating and examining the corpus which consists of thirteen short stories
chosen randomly. The results of the analysis are presented through certain
conclusions supported by statistics and examples which are quoted extracts chosen
from the stories analysed. Almost each extract is accompanied by brief explanation of
part of the plot which the extract is concerned with. The brief explanation helps the
reader to comprehend both the extract and the conclusion arrived at.
The paper is of a linguistic value and a literary value. The linguistic value lies
in the full exposition of the five techniques of thought presentation and their
application on the literary corpus. A linguist can follow the same steps and apply the
five techniques on other literary works, whether short stories or novels. The literary
value lies in the analysis of the presentation of thought in a literary work (Mansfield's
short stories) since there is a close link between the presentation of thought and the
stream of consciousness which is a common technique of writing in many narrative
works.
In Iraq, because of the dramatic turnovers facing the country for three decades, pharmacists continue to experience significant professional challenges in both the public and private sectors. The present study aimed to explore the professional challenges and obstacles facing Iraqi pharmacists working in public hospitals. This qualitative study included face-to-face semi-structured interviews with open-ended questions with hospital pharmacists. The participants were selected purposefully (with ≥ 3 years of experience) to work at governmental hospitals in Karbala province between December 2022 and April 2023. The audio-recording interviews were scripted. Thematic analyses were used to generate themes and subthemes from the interview
... Show MoreThis study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security is
... Show MoreModern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented. The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.
... Show MoreConfocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and e
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MorePurpose: To compare the antibacterial-enhancing efficacy of aloe vera and honey in salicylic acid topical formulations against acne. Method: Six formulations containing 5 % salicylic acid were developed as creams and gels as follows: Formulations S, V and H were creams containing salicylic acid alone (S), salicylic acid with 28 % aloe vera (V), and salicylic acid with 10 % honey (H). Formulations J, M, and B were gels containing salicylic acid alone (J), salicylic acid with aloe vera 20 % (M) and salicylic acid with 12 % honey (B). Each formula was evaluated for colour, odour, pH, viscosity, spreadability, and stability under different temperatures (25, 30, and 60oC) and times (1 hour, 1 day, and 1 week). Furthermore, antibacterial
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show More