Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the past literature that support this view. Additionally, it is suggested to expand the use of marketing in music technique into to the marketing in art. It is concluded that the stealth marketing is a tool that could be added to the promotion mix elements. Lastly, a position for stealth marketing is proposed within mix marketing structure.
The present work involved two steps: the first step include Mannich reaction was carried out on 2- mercaptobenzimidazole using formaldehyde and different secondary amine or amide to gives the compounds(2-16). The secnd step include preparation of (Ethylbenzimidazoly-2-mercaptoacetate)(17) from the reaction of 2- mercaptobenzimidazole with ethylchloroacetate than prepared hydrazide derivative[18]from reaction of compound(17) with hydrazinehydrate. Followed Preparation of shiff bases(19-24) and there reaction with mercaptoacetic acid to give a new compounds containing thiazolidinderivetives(25-30).Structure confirmation of all prepared compound were proved using FTIR and element analysis (C.H.N.S) and mesurmentedmelting poi
... Show MoreThe research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticit
... Show MoreThe study showed that there are (28) plant families present in Al-Razzaza Lake. The families are (Amaranthaceae, Amaryllidaceae, Aizoaceae, Apiaceae, Apocynaceae, Asteraceae, Brassicaceae, Boraginaceae, Capparaceae, Caryophyllaceae, Cistaceae, Colchicaceae, Convolvulaceae, Cynomoriaceae, Fabaceae, Frankeniaceae, Lamiaceae, Liliaceae, Malvaceae, Orobanchaceae, Plantaginaceae, Poaceae, Polygonaceae, Ranunculaceae, Solanaceae, Tamaricaceae,Typhaceae, Zygophyllaceae). Asteraceae family is the largest number of species found in abundance in this lake, followed by the Fabaceae family.
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe present study aims at examining quantitatively the morphometric characteristics of Iziana Valley basin that is located in the northern part of Iraq; particularly in south of Erbil Governorate. This basin is considered one of the small sub-basins where its valleys run on formations of the Triple and Quadrant Ages, which are represented by the Bay Hassan formations, and the sediments and mixed sediments of the cliffs, respectively. The area of the Iziana basin amounts to (36.39 km2) whereas the percentage of its rotation reaches (0.17); a low percentage, which indicates that the basin diverges from the circular to the rectangular shape. The value of the elongation ratio of the basin reaches (0.38) while the terrain rat
... Show MoreSolar energy is the most abundant renewable energy source. This energy can be converted directly into electricity using solar panels. The fixed tilt solar panels are the most practical and the most widely installed throughout the world. Optimum tilt angle calculation has the advantage that it does not use expensive solar trackers. This research calculates the seasonal optimum tilt angle of solar panels for 17 cities in Iraq and 83 cities in 83 countries distributed around the world. Solar Panel Angle Calculator program was used in calculating the optimum tilt angles from vertical. The optimum tilt angle varies between 6° and 112° throughout the year. This angle for winter, spring/ autumn and summer seasons are found to be between
... Show MoreThis research was carried out to reveal the the technique of the recitation in this story including a preface, introduction, two chapters and the conclusion. the introduction consisted of the problem, significance , purpose and limitations of research. The preface included two paragraphs. The first included a meta-recitation of terminology and semantic. The second paragraph devoted to show the cultural identity of Hussein Rahim. The first chapter aimed to reveal the reality and the imaginary in the story of Na'lat Al Hakawaty (storyteller's curse). The second chapter aimed to study the strange arguments in the story. The research concluded the conclusion by presenting the results for attaching them with the margins, and the references
... Show More