The document provides prompts for students to imagine themselves as the 7th member of the Big Hero 6 superhero team. Students are asked to:
1) Explain their inspiration for becoming the 7th member, their personality and characteristics, appearance, and study space.
2) Design two suit options for their superhero persona with special skills/weapons.
3) Create a new logo for "Big Hero 7" and merchandise representing their character.
4) Design a poster or cover promoting the new "Big Hero 7" team.
The prompts encourage students to be creative, think critically, organize their ideas, and do research to complete the assigned art and design tasks.
The document provides an overview and guide to using Pinterest, including what Pinterest is, why users join Pinterest, how to set up a Pinterest page and boards, how to add pins to boards from images or links, how to edit and rearrange boards, find and invite friends, and tips for adding video pins from YouTube by copying links. It encourages checking out more video guides on using Pinterest from the @myvideoshorts account.
Copying the identity of one phone or SIM to another phone or SIM is known as sim or mobile phone cloning.
The bill for usage goes to legitimate subscriber.
An illumination model, also called a lighting model and sometimes referred to as a shading model, is used to calculate the intensity of light that we should see at a given point on the surface of an object.
Surface rendering means a procedure for applying a lighting model to obtain pixel intensities for all the projected surface positions in a scene.
A surface-rendering algorithm uses the intensity calculations from an illumination model to determine the light intensity for all projected pixel positions for the various surfaces in a scene.
Surface rendering can be performed by applying the illumination model to every visible surface point.
This slide describe the techniques of digital modulation and Bandwidth Efficiency:
The first null bandwidth of M-ary PSK signals decrease as M increases while Rb is held constant.
Therefore, as the value of M increases, the bandwidth efficiency also increases.
1. Digital modulation techniques are used to modulate digital information so that it can be transmitted via different mediums. Common digital modulation methods include binary amplitude shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK).
2. FSK conveys information by changing the instantaneous frequency of a carrier wave. It is less susceptible to errors than ASK but has a larger spectrum bandwidth. PSK varies the phase of the transmitted signal. BPSK uses two phases while QPSK uses four phases.
3. The performance of digital modulation techniques can be compared using the energy per bit to noise power spectral density ratio (Eb/N0). Lower Eb/N0 values
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Lies, Damned Lies and Startups - Tara HuntStartupfest
This document discusses common lies and misconceptions about startups. It notes that starting a company is incredibly difficult, challenging, and will involve long hours, rejection, low pay, and self-doubt. Founders are not truly their own bosses, as success depends on finding product-market fit before running out of funding. Raising money does not guarantee success and the startup world is not purely meritocratic. True entrepreneurs are driven by passion, not just money or fame, and their work moves innovation forward despite facing an uphill and uncertain path. Overall, the document aims to prepare new founders for the realities of starting a company in a realistic yet still optimistic tone.
The document provides prompts for students to imagine themselves as the 7th member of the Big Hero 6 superhero team. Students are asked to:
1) Explain their inspiration for becoming the 7th member, their personality and characteristics, appearance, and study space.
2) Design two suit options for their superhero persona with special skills/weapons.
3) Create a new logo for "Big Hero 7" and merchandise representing their character.
4) Design a poster or cover promoting the new "Big Hero 7" team.
The prompts encourage students to be creative, think critically, organize their ideas, and do research to complete the assigned art and design tasks.
The document provides an overview and guide to using Pinterest, including what Pinterest is, why users join Pinterest, how to set up a Pinterest page and boards, how to add pins to boards from images or links, how to edit and rearrange boards, find and invite friends, and tips for adding video pins from YouTube by copying links. It encourages checking out more video guides on using Pinterest from the @myvideoshorts account.
Copying the identity of one phone or SIM to another phone or SIM is known as sim or mobile phone cloning.
The bill for usage goes to legitimate subscriber.
An illumination model, also called a lighting model and sometimes referred to as a shading model, is used to calculate the intensity of light that we should see at a given point on the surface of an object.
Surface rendering means a procedure for applying a lighting model to obtain pixel intensities for all the projected surface positions in a scene.
A surface-rendering algorithm uses the intensity calculations from an illumination model to determine the light intensity for all projected pixel positions for the various surfaces in a scene.
Surface rendering can be performed by applying the illumination model to every visible surface point.
This slide describe the techniques of digital modulation and Bandwidth Efficiency:
The first null bandwidth of M-ary PSK signals decrease as M increases while Rb is held constant.
Therefore, as the value of M increases, the bandwidth efficiency also increases.
1. Digital modulation techniques are used to modulate digital information so that it can be transmitted via different mediums. Common digital modulation methods include binary amplitude shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK).
2. FSK conveys information by changing the instantaneous frequency of a carrier wave. It is less susceptible to errors than ASK but has a larger spectrum bandwidth. PSK varies the phase of the transmitted signal. BPSK uses two phases while QPSK uses four phases.
3. The performance of digital modulation techniques can be compared using the energy per bit to noise power spectral density ratio (Eb/N0). Lower Eb/N0 values
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Lies, Damned Lies and Startups - Tara HuntStartupfest
This document discusses common lies and misconceptions about startups. It notes that starting a company is incredibly difficult, challenging, and will involve long hours, rejection, low pay, and self-doubt. Founders are not truly their own bosses, as success depends on finding product-market fit before running out of funding. Raising money does not guarantee success and the startup world is not purely meritocratic. True entrepreneurs are driven by passion, not just money or fame, and their work moves innovation forward despite facing an uphill and uncertain path. Overall, the document aims to prepare new founders for the realities of starting a company in a realistic yet still optimistic tone.
Lies, Damned Lies and Startups - Tara HuntStartupfest
This document discusses common lies and misconceptions about startups. It notes that starting a company is incredibly difficult, founders will face constant rejection and doubts, and success is not guaranteed even if all the right steps are taken. While raising money may seem like a measure of success, the real goal is to find product-market fit before funds run out. The startup world is also not truly a meritocracy, as many talented founders fail due to lack of resources. The document encourages entrepreneurs to remain determined despite the challenges.
Creating Mass Audiences, How to Reach 30 Million People!Affiliate Summit
This presentation is from Affiliate Summit East 2013 (August 18-20, 2013) in Philadelphia, PA). Session Description: How to drive 30 million people to your ideas, products and services by building your own mass audience, through the power of collaboration, mass media and partnerships. You can do this too.
This document contains the notes from a presentation given by Brian Housand on curiosity, creativity, critical thinking and problem solving. Some of the key points include:
- Curiosity is the root of creativity and helps lead people down new paths. IQ is related to curiosity and effort.
- Thinking like a child by maintaining a sense of wonder can help solve problems.
- Creating experiences through storytelling can heighten anticipation, stimulate interest and deepen understanding.
- Developing critical thinking skills involves questioning information sources, considering biases and supporting evidence.
- Approaching problems from defining the problem to generating and evaluating solutions helps move from stuck to solutions.
Einstein provided many insightful lessons throughout his life. Some of the key lessons highlighted in this document include pursuing your curiosity passionately, persevering through challenges, and focusing one's energy on the present moment. The document also emphasizes living in the present, creating value for others rather than solely pursuing success, and gaining knowledge through real-world experience rather than just information. Overall, the document advises learning the rules of the game you are playing and then striving to play better than anyone else.
This document discusses various topics around creative, innovative, integrative, and futuristic thinking. It provides examples to encourage thinking differently such as inventing a mobile clinic, swimming like a dolphin, or a folding bicycle. It emphasizes that all work is the same except one's approach and encourages asking questions from different perspectives to avoid becoming like dinosaurs who think in only one way.
My Senior Presentation at Tufts University: reflection on my own exploration of boundaries, failures & lessons learned along the way. Ended with the most important question every person should ask. ;-)
Pitch and Networking Workshop Startup Weekend KosiceCan Ertugrul
This document provides an overview of pitching fundamentals, slide preparation, and an investor's perspective on pitches. For pitching fundamentals, it discusses that a pitch should get the audience's attention and focus on their needs rather than your own. When preparing slides, the presentation should start with thorough preparation, focus on the audience, and go through a process of drafting, refining, and designing. From an investor's perspective, the key factors they consider are the value of the product or service, competition in the market, traction or proof of concept, the capabilities of the founding team, and potential return on investment versus risk. The document concludes with tips for effective networking.
Every startup begins with an idea. This is a talk on how to come up with startup ideas and how to use validation to pick the ones worth working on. It's based on the book "Hello, Startup" (http://www.hello-startup.net/). You can find the video of the talk here: https://www.youtube.com/watch?v=GkmiE8d_5Pw
This document provides tips for generating new business ideas by feeding your creative mind fresh experiences, environments, questions, expectations, and skills. It discusses how idea blocks can arise from a lack of fresh inputs and bad habits like excessive TV, lack of exercise, never being alone, not writing ideas down, and more. The document recommends proactive strategies to avoid blocks, such as quiet thinking time each morning, meeting with like-minded people weekly, taking walks without your phone, getting enough sleep, taking online courses in new topics, and feeding your mind fresh content. The overall message is that introducing fresh inputs keeps your creative thinking unblocked.
The document discusses different types of self-confidence: low self-confidence, optimal self-confidence, and overconfidence. Low self-confidence involves staying in one's comfort zone and fearing failure. Optimal self-confidence comes from knowing one's strengths and weaknesses and applying skills successfully. Overconfidence makes one egotistical and irritating by bragging excessively about abilities. The document advocates developing optimal self-confidence through gaining experience and knowing one's limits.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
Mobile computing allows users to access network services and computational resources from anywhere using portable devices like laptops, smartphones, and tablets. It is defined as computing using portable devices that maintain network connectivity while on the move. Mobile computing faces challenges like low bandwidth, disconnection, and security risks compared to wired networks. Future advancements may include increased use of artificial intelligence and integrated circuits to develop more compact devices with faster processors. Mobile computing has transitioned through generations from 1G analog cellular to 2G digital cellular to 3G broadband cellular and beyond to 4G and 5G.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
These slides describes the various aspects of trademark such as registration ,opposition , duration etc.
A trade mark (popularly known as brand name) in layman’s language is a visual symbol which may be a word, signature, name, device, label, numerals or combination of colors used by one undertaking on goods or services or other articles of commerce to distinguish it from other similar goods or services originating from a different undertaking.
These slides describes various aspects of e-commerce such as electronic payments, payment gateways, e-cash, e-wallets , electronic data interchange, virtual organisation, e-governance etc.
This presentation is all about GSM (Global System for mobile Communication). All components, entities ,architecture ,advantages of GSM, future of GSM was the main focus.
Call routing for incoming and outgoing call is also included in the presentation.
A frequently used class of objects are the quadric surfaces, which are described with second-degree equations (quadratics). They include spheres, ellipsoids, tori, paraboloids, and hyperboloids.
Quadric surfaces, particularly spheres and ellipsoids, are common elements of graphics scenes
The document provides an overview of fundamentals of computers including:
- What a computer is and its basic components like hardware, software, input, output, and processing.
- The five generations of computers distinguished by their circuitry and technology used.
- Different types of computers classified by their capabilities, size, users, and speed such as microcomputers, minicomputers, mainframes, and supercomputers.
- Key components of a computer system including input, output, memory, processing units, and the motherboard.
- An introduction to operating systems, their types, examples like DOS, UNIX, and components like the kernel, service layer, and shell.
Computer , Internet and physical security.Ankur Kumar
It refers to protection of a computer and the information stored in it, from the unauthorised users.
Computer security is a branch of computer technology known as information security as applied to computers and networks.
Termes - Termite inspired robots that can build for us.Ankur Kumar
Human construction projects are generally centrally planned.
People in leadership roles supervise how everything is put together, and builders aware of the overall progress.
But termites and other animals go about building in a different way, working independently
Identify those parts of a scene that are visible from a chosen viewing position.
Visible-surface detection algorithms are broadly classified according to whether
they deal with object definitions directly or with their projected images.
These two approaches are called object-space methods and image-space methods, respectively
An object-space method compares
objects and parts of objects to each other within the scene definition to determine which surfaces, as a whole, we should label as visible.
In an image-space algorithm, visibility is decided point by point at each pixel position on the projection plane.
The location of a mobile telephone can be accurately tracked even in the NLOS environment, by using more accurate tracking curves connecting the intersection points among circles with the radii being the distances between corresponding BSs and the mobile telephone in a cellular mobile communication system.
Lies, Damned Lies and Startups - Tara HuntStartupfest
This document discusses common lies and misconceptions about startups. It notes that starting a company is incredibly difficult, founders will face constant rejection and doubts, and success is not guaranteed even if all the right steps are taken. While raising money may seem like a measure of success, the real goal is to find product-market fit before funds run out. The startup world is also not truly a meritocracy, as many talented founders fail due to lack of resources. The document encourages entrepreneurs to remain determined despite the challenges.
Creating Mass Audiences, How to Reach 30 Million People!Affiliate Summit
This presentation is from Affiliate Summit East 2013 (August 18-20, 2013) in Philadelphia, PA). Session Description: How to drive 30 million people to your ideas, products and services by building your own mass audience, through the power of collaboration, mass media and partnerships. You can do this too.
This document contains the notes from a presentation given by Brian Housand on curiosity, creativity, critical thinking and problem solving. Some of the key points include:
- Curiosity is the root of creativity and helps lead people down new paths. IQ is related to curiosity and effort.
- Thinking like a child by maintaining a sense of wonder can help solve problems.
- Creating experiences through storytelling can heighten anticipation, stimulate interest and deepen understanding.
- Developing critical thinking skills involves questioning information sources, considering biases and supporting evidence.
- Approaching problems from defining the problem to generating and evaluating solutions helps move from stuck to solutions.
Einstein provided many insightful lessons throughout his life. Some of the key lessons highlighted in this document include pursuing your curiosity passionately, persevering through challenges, and focusing one's energy on the present moment. The document also emphasizes living in the present, creating value for others rather than solely pursuing success, and gaining knowledge through real-world experience rather than just information. Overall, the document advises learning the rules of the game you are playing and then striving to play better than anyone else.
This document discusses various topics around creative, innovative, integrative, and futuristic thinking. It provides examples to encourage thinking differently such as inventing a mobile clinic, swimming like a dolphin, or a folding bicycle. It emphasizes that all work is the same except one's approach and encourages asking questions from different perspectives to avoid becoming like dinosaurs who think in only one way.
My Senior Presentation at Tufts University: reflection on my own exploration of boundaries, failures & lessons learned along the way. Ended with the most important question every person should ask. ;-)
Pitch and Networking Workshop Startup Weekend KosiceCan Ertugrul
This document provides an overview of pitching fundamentals, slide preparation, and an investor's perspective on pitches. For pitching fundamentals, it discusses that a pitch should get the audience's attention and focus on their needs rather than your own. When preparing slides, the presentation should start with thorough preparation, focus on the audience, and go through a process of drafting, refining, and designing. From an investor's perspective, the key factors they consider are the value of the product or service, competition in the market, traction or proof of concept, the capabilities of the founding team, and potential return on investment versus risk. The document concludes with tips for effective networking.
Every startup begins with an idea. This is a talk on how to come up with startup ideas and how to use validation to pick the ones worth working on. It's based on the book "Hello, Startup" (http://www.hello-startup.net/). You can find the video of the talk here: https://www.youtube.com/watch?v=GkmiE8d_5Pw
This document provides tips for generating new business ideas by feeding your creative mind fresh experiences, environments, questions, expectations, and skills. It discusses how idea blocks can arise from a lack of fresh inputs and bad habits like excessive TV, lack of exercise, never being alone, not writing ideas down, and more. The document recommends proactive strategies to avoid blocks, such as quiet thinking time each morning, meeting with like-minded people weekly, taking walks without your phone, getting enough sleep, taking online courses in new topics, and feeding your mind fresh content. The overall message is that introducing fresh inputs keeps your creative thinking unblocked.
The document discusses different types of self-confidence: low self-confidence, optimal self-confidence, and overconfidence. Low self-confidence involves staying in one's comfort zone and fearing failure. Optimal self-confidence comes from knowing one's strengths and weaknesses and applying skills successfully. Overconfidence makes one egotistical and irritating by bragging excessively about abilities. The document advocates developing optimal self-confidence through gaining experience and knowing one's limits.
These ppt are the part 2 of mobile computing concepts. These ppt defines the following things
Wireless Networking
Wireless LAN Overview: IEEE 802.11
Wireless applications
Data Broadcasting
Bluetooth
TCP over wireless
Mobile IP
WAP: Architecture, protocol stack, application
environment, applications.
Mobile computing allows users to access network services and computational resources from anywhere using portable devices like laptops, smartphones, and tablets. It is defined as computing using portable devices that maintain network connectivity while on the move. Mobile computing faces challenges like low bandwidth, disconnection, and security risks compared to wired networks. Future advancements may include increased use of artificial intelligence and integrated circuits to develop more compact devices with faster processors. Mobile computing has transitioned through generations from 1G analog cellular to 2G digital cellular to 3G broadband cellular and beyond to 4G and 5G.
Although the OSI reference model is universally recognized, the historical and technical open standard of the Internet is Transmission Control Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make data communication possible between any two computers, anywhere in the world, at nearly the speed of light.
These slides describes the various aspects of trademark such as registration ,opposition , duration etc.
A trade mark (popularly known as brand name) in layman’s language is a visual symbol which may be a word, signature, name, device, label, numerals or combination of colors used by one undertaking on goods or services or other articles of commerce to distinguish it from other similar goods or services originating from a different undertaking.
These slides describes various aspects of e-commerce such as electronic payments, payment gateways, e-cash, e-wallets , electronic data interchange, virtual organisation, e-governance etc.
This presentation is all about GSM (Global System for mobile Communication). All components, entities ,architecture ,advantages of GSM, future of GSM was the main focus.
Call routing for incoming and outgoing call is also included in the presentation.
A frequently used class of objects are the quadric surfaces, which are described with second-degree equations (quadratics). They include spheres, ellipsoids, tori, paraboloids, and hyperboloids.
Quadric surfaces, particularly spheres and ellipsoids, are common elements of graphics scenes
The document provides an overview of fundamentals of computers including:
- What a computer is and its basic components like hardware, software, input, output, and processing.
- The five generations of computers distinguished by their circuitry and technology used.
- Different types of computers classified by their capabilities, size, users, and speed such as microcomputers, minicomputers, mainframes, and supercomputers.
- Key components of a computer system including input, output, memory, processing units, and the motherboard.
- An introduction to operating systems, their types, examples like DOS, UNIX, and components like the kernel, service layer, and shell.
Computer , Internet and physical security.Ankur Kumar
It refers to protection of a computer and the information stored in it, from the unauthorised users.
Computer security is a branch of computer technology known as information security as applied to computers and networks.
Termes - Termite inspired robots that can build for us.Ankur Kumar
Human construction projects are generally centrally planned.
People in leadership roles supervise how everything is put together, and builders aware of the overall progress.
But termites and other animals go about building in a different way, working independently
Identify those parts of a scene that are visible from a chosen viewing position.
Visible-surface detection algorithms are broadly classified according to whether
they deal with object definitions directly or with their projected images.
These two approaches are called object-space methods and image-space methods, respectively
An object-space method compares
objects and parts of objects to each other within the scene definition to determine which surfaces, as a whole, we should label as visible.
In an image-space algorithm, visibility is decided point by point at each pixel position on the projection plane.
The location of a mobile telephone can be accurately tracked even in the NLOS environment, by using more accurate tracking curves connecting the intersection points among circles with the radii being the distances between corresponding BSs and the mobile telephone in a cellular mobile communication system.
Tracking and positioning_of_mobile_systems_in_telecom_networkAnkur Kumar
Location of a mobile telephone can be accurately tracked even in the multi-path fading and the NLOS environment, by using more accurate tracking curves connecting the intersection points among circles.
Describes about accurate positioning of mobile telephones, which can be used for several applications.
The important considerations to be undertaken while selecting a location based technology are location accuracy, implementation cost, reliability, increasing functionality.
Care Instructions for Activewear & Swim Suits.pdfsundazesurf80
SunDaze Surf offers top swimwear tips: choose high-quality, UV-protective fabrics to shield your skin. Opt for secure fits that withstand waves and active movement. Bright colors enhance visibility, while adjustable straps ensure comfort. Prioritize styles with good support, like racerbacks or underwire tops, for active beach days. Always rinse swimwear after use to maintain fabric integrity.
Biography and career history of Bruno AmezcuaBruno Amezcua
Bruno Amezcua's entry into the film and visual arts world seemed predestined. His grandfather, a distinguished film editor from the 1950s through the 1970s, profoundly influenced him. This familial mentorship early on exposed him to the nuances of film production and a broad array of fine arts, igniting a lifelong passion for narrative creation. Over 15 years, Bruno has engaged in diverse projects showcasing his dedication to the arts.
The Fascinating World of Bats: Unveiling the Secrets of the Nightthomasard1122
The Fascinating World of Bats: Unveiling the Secrets of the Night
Bats, the mysterious creatures of the night, have long been a source of fascination and fear for humans. With their eerie squeaks and fluttering wings, they have captured our imagination and sparked our curiosity. Yet, beyond the myths and legends, bats are fascinating creatures that play a vital role in our ecosystem.
There are over 1,300 species of bats, ranging from the tiny Kitti's hog-nosed bat to the majestic flying foxes. These winged mammals are found in almost every corner of the globe, from the scorching deserts to the lush rainforests. Their diversity is a testament to their adaptability and resilience.
Bats are insectivores, feeding on a vast array of insects, from mosquitoes to beetles. A single bat can consume up to 1,200 insects in an hour, making them a crucial part of our pest control system. By preying on insects that damage crops, bats save the agricultural industry billions of dollars each year.
But bats are not just useful; they are also fascinating creatures. Their ability to fly in complete darkness, using echolocation to navigate and hunt, is a remarkable feat of evolution. They are also social animals, living in colonies and communicating with each other through a complex system of calls and body language.
Despite their importance, bats face numerous threats, from habitat destruction to climate change. Many species are endangered, and conservation efforts are necessary to protect these magnificent creatures.
In conclusion, bats are more than just creatures of the night; they are a vital part of our ecosystem, playing a crucial role in maintaining the balance of nature. By learning more about these fascinating animals, we can appreciate their importance and work to protect them for generations to come. So, let us embrace the beauty and mystery of bats, and celebrate their unique place in our world.
At Affordable Garage Door Repair, we specialize in both residential and commercial garage door services, ensuring your property is secure and your doors are running smoothly.
Amid the constant barrage of distractions and dwindling motivation, self-discipline emerges as the unwavering beacon that guides individuals toward triumph. This vital quality serves as the key to unlocking one’s true potential, whether the aspiration is to attain personal goals, ascend the career ladder, or refine everyday habits.
Understanding Self-Discipline
Insanony: Watch Instagram Stories Secretly - A Complete GuideTrending Blogers
Welcome to the world of social media, where Instagram reigns supreme! Today, we're going to explore a fascinating tool called Insanony that lets you watch Instagram Stories secretly. If you've ever wanted to view someone's story without them knowing, this blog is for you. We'll delve into everything you need to know about Insanony with Trending Blogers!
MRS PUNE 2024 - WINNER AMRUTHAA UTTAM JAGDHANEDK PAGEANT
Amruthaa Uttam Jagdhane, a stunning woman from Pune, has won the esteemed title of Mrs. India 2024, which is given out by the Dk Exhibition. Her journey to this prestigious accomplishment is a confirmation of her faithful assurance, extraordinary gifts, and profound commitment to enabling women.
1. BE CREATIVE
BYANKURKUMAR
* 1 0 w a y s t o b e
c r e a t i v e .
* W h o k i l l e d y o u r
c r e a t i v e .
* H a v e F u n w h i l e d o i n g .
2. 10 ways to be creative
**************************