Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the past literature that support this view. Additionally, it is suggested to expand the use of marketing in music technique into to the marketing in art. It is concluded that the stealth marketing is a tool that could be added to the promotion mix elements. Lastly, a position for stealth marketing is proposed within mix marketing structure.
In this paper, first we refom1Ulated the finite element model
(FEM) into a neural network structure using a simple two - dimensional problem. The structure of this neural network is described
, followed by its application to solving the forward and inverse problems. This model is then extended to the general case and the advantages and di sadvantages of this approach are descri bed along with an analysis of the sensi tivity of
... Show MoreRecently, increasing material prices coupled with more acute environmental awareness and the implementation of regulation has driven a strong movement toward the adoption of sustainable construction technology. In the pavement industry, using low temperature asphalt mixes and recycled concrete aggregate are viewed as effective engineering solutions to address the challenges posed by climate change and sustainable development. However, to date, no research has investigated these two factors simultaneously for pavement material. This paper reports on initial work which attempts to address this shortcoming. At first, a novel treatment method is used to improve the quality of recycled concrete coarse aggregates. Thereafter, the treated recycled
... Show MoreWe are, today, facing a torrent of information, ideas, images and videos due to advances of communication technology and electronic publishing. In addition to the proliferation of social networking sites that allow individuals to use them and participate in their channels without any restrictions limiting their freedom in publishing. Due to these sites many terms have emerged like alternative media which use internet and its various techniques to serve its objectives notably the freedom of expression without restrictions. This research studies the phenomenon of interactive media i.e. alternative media through Facebook along with the freedom that makes it spreading in the society and the relation of individual freedom with social diversit
... Show More
It is easy to talk about democracy, but it is difficult to practice. We talk about postmodernism, but difficult to be embodied in the ground. Yet, the age of democracy and modernity at the same time prompted the researcher to try to find a media concept for it. It does not mean that this concept has not yet formed. But the rooting of democracy and the approaching of states and groups towards it, made it necessary to by studied again.
The relationship between democracy and the media has made them look like one concept. The existence of one is linked to the existence of the other. The reality is only a linguistic formulation, but the social and cultural aspect is related to democracy origin
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreMosquitoes play a serious role on public health transmitting several dangerous diseases such as malaria, filariasis and Encephalitis. So it consider as a vector diseases. Therefor it is important to control its spread using ecology friend’s factors like bacteria Bacillus thuringiensis var. israelensis and fungi Beauveria bassiana. Results revealed that the direct effect of Bacillus thuringiensis on the larvae led to the high mortality (100%) during 3 days while Beauveria bassiana have a cumulative effect on the Mosquito stage lifecycle; 7.3 X 104 more significant effect in the first day but there was no significant in the other days of treatment. In the end period of lifecycle there was no adult emergence and the adult which emergence up
... Show MoreAim and Objectives: The objective of this study was to illustrate the link between periodontitis (PO) and endothelial dysfunction in hypertensive patients. Materials and Methods: This cross‑sectional study involved 53 hypertensive patients with or without PO compared with 28 healthy controls. On the basis of the study protocol, the participants were divided into three groups: Group (1): 24 patients with hypertension only, Group (2): 29 patients with hypertension and PO, and Group (3): 28 healthy controls. Lipid profile, endothelin‑1 (ET‑1), and high‑sensitivity C‑reactive protein (hs‑CRP) were measured. Blood pressure and body mass index (BMI) were evaluated. Diagnostic criteria of severe PO periodontal indices including plaque
... Show More