This slide deck is for our senior design capstone at Francis Tuttle Technology Center's Pre-Engineering Academy. It is through a course call Engineering Design and Development by Project Lead the Way. We spend an entire semester on a project and go through the engineering process. This class was amazing!! I would love to answer any questions on our presentation.
http://www.scribd.com/doc/14688569/Radio-Frequency-Identification
The goal of supply chain management is to increase organizational effectiveness through the coordination of activities among suppliers, manufacturers, distribution centers, and customers. Technology evolution in the latest years has significantly contributed towards this direction. The implementation of systems such as ERP, SAP, RFID, etc., makes the production and distribution of the products more accurate and efficient. Through technology implementation, the parties of the supply chain manage to accomplish the production and distribution of the right product, at the right time, to the right location, at the minimum cost while sustaining a certain level of quality (Ramsay, n.d.).
This paper will explain what exactly the RFID system is and how it works. Moreover, the steps a company should follow in order to effectively implement RFID technology will be discussed. The advantages and the disadvantages of this technology will also be presented. Finally, three real life case studies regarding RFID implementation will be analyzed.
RFID - Radio frequency identification Devicefaisalkhan786
RFID is a tracking device mostly used in retail products and in some countries it is also used at toll gates. This presentation tells you some basics, history of emergence of RFID and its uses.
http://www.scribd.com/doc/14688569/Radio-Frequency-Identification
The goal of supply chain management is to increase organizational effectiveness through the coordination of activities among suppliers, manufacturers, distribution centers, and customers. Technology evolution in the latest years has significantly contributed towards this direction. The implementation of systems such as ERP, SAP, RFID, etc., makes the production and distribution of the products more accurate and efficient. Through technology implementation, the parties of the supply chain manage to accomplish the production and distribution of the right product, at the right time, to the right location, at the minimum cost while sustaining a certain level of quality (Ramsay, n.d.).
This paper will explain what exactly the RFID system is and how it works. Moreover, the steps a company should follow in order to effectively implement RFID technology will be discussed. The advantages and the disadvantages of this technology will also be presented. Finally, three real life case studies regarding RFID implementation will be analyzed.
RFID - Radio frequency identification Devicefaisalkhan786
RFID is a tracking device mostly used in retail products and in some countries it is also used at toll gates. This presentation tells you some basics, history of emergence of RFID and its uses.
when people share something on internet and suddenly someone is looking for some useful information related to what he want and suddely if he see your shared information then it become communication at any location
Radio frequency identication (RFID) is a rapidly growing technology that
has the potential to make great economic impacts on many industries. While
RFID is a relatively old technology, more recent advancements in chip man-
ufacturing technology are making RFID practical for new applications and
settings. These advancements have the potential to revolutionize supply-
chain management, inventory control, and logistics
RFID technology ():
What is RFID technology?
How does RFID work?
What is its impact on the supply chain?
What will the effect of RDIF tags be on consumers? What will be the effects of RFID on different levels of Management?
My presentation explores how RFID system works and describes briefly about history of RFID, active & passive tags, modes of transmission of data and applications
when people share something on internet and suddenly someone is looking for some useful information related to what he want and suddely if he see your shared information then it become communication at any location
Radio frequency identication (RFID) is a rapidly growing technology that
has the potential to make great economic impacts on many industries. While
RFID is a relatively old technology, more recent advancements in chip man-
ufacturing technology are making RFID practical for new applications and
settings. These advancements have the potential to revolutionize supply-
chain management, inventory control, and logistics
RFID technology ():
What is RFID technology?
How does RFID work?
What is its impact on the supply chain?
What will the effect of RDIF tags be on consumers? What will be the effects of RFID on different levels of Management?
My presentation explores how RFID system works and describes briefly about history of RFID, active & passive tags, modes of transmission of data and applications
Best IEEE Projects 2017 -2018 Titles - IEEE Final Year Projects @ Brainrich T...Brainrich Technology
Project Guidance by Experienced Developers.
Provides real time training on information technology and provide projects on the following
• M.E
• M.Tech
. M.Phil
• BE/BTech (CSE & IT)
• B.Sc/ M.Sc (CSE)
• MSc (IT)
• BCA
• MCA
• Diploma Student’s.
Very Low cost….
LATEST TECHNOLOGIES USED IN OUR IEEE PROJECTS
We would be really glad to help you with your project development.
Our Service Address:
Contact : Mr.S. Sakthivel
Mobile : 9894604623
: 9965191941
Phone : 0422-4377414
Address : 6/1,Selvanayaki Complex 1st Floor, Gokhale Street, Ramnagar, Coimbatore
website : http://www.brainrichtech.com
: http://www.brainrichprojects.com
Mail : info@brainrichtech.com
: brainrichtech@gmail.com
Rfid technology next generation application solutionsashtopustech
Astopous Technologies is one of the fastest growing identification & security solutions providers .We have best & high performance active and passive RFID technology solutions,for live tracking vehicles and student care in school bus,live stock and health care people tracking ,retail and assets mgmt.
RFID Based Asset Management case storiesLeon Smiers
This presentation at Oracle Open World 2007 showcases two use scase for RFID.
I uploaded this presentation in 2016, even though RFID still is used, these use cases are perfect examples of use cases for Internet of Things.
(1) One Use case for the Container Centralen (CC), the largest pool manager of the Returnable Transport Items (RTI's) in the Netherlands
CC wanted to investigate the travel between whole store’s, distribution centers ( DC’s ) and the stores of their RTI's
Business drivers
• Theft
• Counterfeiting
• RTI distribution to protect from hoarding
• Payment based on usage model
(2) Academic Medical Centre Amsterdam (AMC)
In this case we investigate dthe disposal management, where insight was given in the usage of assets during operations of patients
Business drivers
• Lowering of costs
• Improvement of quality of operations
Real-time, Sensor-based Monitoring of Shipping Containersbenaam
This presentation describes a sensor-based solution for real-time monitoring of high-value assets in-transit so shippers can react quickly to unplanned events such as delays, cargo damage, and even thefts.
Selected as one of the best presentations at the 2012 Vail Computer Elements Workshop. For 42 years, this 4-day workshop has served leading architects of the computer industry. The agenda is 100% invited technical talks and the audience is mostly previous speakers.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
2.
Goal
◦ Attend Oklahoma State University to attain a degree in Electrical Engineering
Putnam City High School - Grad 2012
◦ AP English Lang Comp, AP US History, AP Euro History, Chemistry I PreAP,
Computer Program, English II Pre AP, Pre-Calculus, PreAP Spanish III, Pre AP
Algebra II, Pre AP Biology I, Pre AP English I
Francis Tuttle Pre-Engineering Academy
◦ Digital Electronics , Principles Engineering , Physics I PreAP, AP Calculus AB, AP
Physics, Engineering Development and Design, Computer Intergraded
Manufacturing
OSU-OKC - College Trig
Internship – Surgery Logistics (RFID Specialist)
3.
Goal
◦ Attend Neumont University and receive a Bachelor's degree computer science
OCCC
Classes taken: English Composition I American Federal Government
Putnam City North high school – Class of 2012
◦ Pre-AP Geometry Pre-AP English III Pre-AP English I Pre-AP Pre-Calculus Pre-AP
English II Pre-AP US History Pre-AP Trigonometry Oklahoma History Pre-AP
Algebra II Web Design Robotics Computer Aided Design Computer Apps I
Francis Tuttle Technology Center – Class of 2012
◦ AP Calculus AP Physics Engineering Design & Development Computer
Integrated Manufacturing Network Technology Programming and Software dev
Awards
◦ Prepared Presentation – 1st in state. Electronic Research & Experimentation –
Top-Ten finalist at nationals. Radio Controlled Transportation – 1st in state.
4.
Goal
◦ Attend OSU to attain a Bachelor’s in Computer Science
Putnam City North High School - Graduating class of 2012
◦ English I, II, III, & IV, Pre-AP Geometry , Oklahoma History, World History, U.S.
History, Government , Pre-AP Biology, Computer Apps I, Web Design, PreEngineering, 3D CAD.
Francis Tuttle Pre-Engineering Academy
◦ Pre-AP Algebra 2, Pre-AP Trigonometry/Pre-Calculus, AP Calculus AB, Pre-AP
Chemistry, AP Chemistry, Pre-AP Physics, Introduction to Engineering Design,
Principles of Engineering, Computer Integrated Manufacturing, Digital Electronics,
Network Technology.
Accomplishments
Mu Alpha Theta – Math Club, Member of Skills USA
5.
Inaccurate inventory due to insufficient theft prevention, and
a batch database result in decreased customer satisfaction.
6. Integrated Circuit (IC)
Radio Frequency Identification Antenna
What makes up the tag?
How does it work?
Communication (Passive)
• Signal from reader -> Powers Integrated Circuit
• IC powers up -> Transmits back
• Reader interprets-> Displays results
• Active tags constantly transmit
Substrate
7. Type
Frequency
Low Frequency
125kHz, 134kHz
Few inches
n/a
High Frequency
13.56Mhz
Less than 3 ft
n/a
860 -960Mhz
15+ ft
n/a
Semi-Passive
-
100+ ft
Yes
Active
-
300 -750 ft
yes
Ultra High Frequency
Range
BAT
9.
UPC to Barcode as EPC to RFID
Company: EPCglobal
A serial, created by the Auto-ID Center
Digits to identify the manufacturer, product category
and the individual item
12.
Kohl’s RFID inventory system
Ten stores in the Oklahoma district
Department
Loss
Men’s Athletic
$8,400
Women’s Athletic
$5,000
Men’s Casual
$1,800
Kid’s Athletic
$1,000
Total Loss:
$16,200
13.
Market grew by $900 million last year
$70.5 billion from 2012 until the end of 2017
In 2017 largest market will be retail
Account for more than 20 percent of that year's
expenditures
17.
RFID Tag
Passive RFID tags for each shoe
◦ Attached to the eyelet of the shoe
◦ Test tags for our application
◦ Reusable (Read/Write)
Security
◦ If tag is 3 ft. from the reader a silent alarm will be sent to LP
◦ Allowing them to move the cameras to that direction and record
◦ Alarm sounds if it’s 1 ft. distance from reader
◦ Associate and Loss Prevention act on the audible alarm
Customer
◦ Geared for a better customer experience
◦ Quicker and more accurate assistance
18.
VICS – Item Level RFID Initiative
Contact: Joe Andraski
The mission: is to establish a course of action for the adoption
of EPC-enabled RFID technology throughout the retail supply
chain.
Their goal: is to develop collaborative and measurable value
propositions for retailers, suppliers, consumers and other
shareholders, and to continue to develop business
applications and best practices.
28. Pilot
Offers
•
•
•
•
An initial batch of tags (men & women’s athletic)
One store isolated improvement
Two-Four antennas at each exit
A hand held reader for the associates
• Instantaneous inventory
• New Loss Prevention action plan
• Quicker customer assistance
29. Actual camera view in Kohl’s
Cameras
◦ Will focus on door due to silent
alarm
◦ Recording once short distance
achieved
Reader Placement
◦ In-between doors, outside
◦ Determined by store layout
An outside camera (Not real view)
30.
A limited access online database system
Allowing customers to access live store inventory
Gives them ability to hold shoes at a certain location
Associate will check update status of these holds
Show last time of an inventory check
31.
RFID cleared of data
Bin of blank RFID tags
Embedded RFID Reader NF
Screens on the computer
◦ Asking to remove tags
◦ Check shoes for the correct info
◦ Scan them over embedded RFID reader
32.
Items tagged at D.C.
◦ Encoding and tagging done at D.C.
◦ Future: manufacturing starts the process
Terminals at the dock doors
◦ Items enter the database (no human intervention)
◦ Eliminate human labor required
◦ Will check to make sure correct shipment received
Be able to interrupt return data
34.
Supplier: EnaSys
Contact: Al Franklin
Name: MC-3190Z
Type: Mobile RFID reader
MC3190-Z Capabilities:
• Windows Mobile
• Motorola’s omnidirectional MAX RFID antenna
• Motorola MAX secure
• Motorola MAX data capture
35.
36.
Company: EnaSys
Contact: Al Franklin
Capabilities:
◦ Rapid inventory utilizing RFID Handheld, fixed readers
◦ Feedback capability to see items captured, items not captured
and items that are misplaced
◦ Customer Defined Screens and Fields
37.
Company: William Frick & Company
Contact: Ricardo Navarro
Type: UHF passive
Tag testing
◦ Best read ranges
◦ Casings for attachment to shoes
45.
•
•
•
•
•
Supplier: ASAP Systems
Name: Passport
Contact: Micah Burridge
Overview:
Wi-Fi enabled
Reports
Professional installation/ training
Support
Desktop barcode label printer
46.
47.
48.
1st Presentation:
◦ Mrs. Derrick
◦ Mr. King
2nd Presentation:
◦ Mr. Hester
◦ Ms. Fadaiepour
Results:
◦ Receptive, possibility in the near future
49.
Reji Zachariah – Computer Programmer: FAA Employee
Graylan Fulson – Electrical Engineer: Joint Force Headquarters
Mark Barrett Alyn – Owner ScanTexas RFID
Wesley Wheeler - Field Service Engineer : ScanTexas
Harry Pappas – CEO, President: RFID Education Foundation
Ricardo Navarro - Sales Rep: William Frick & Company
John Rommel - Senior Mgr, RFID: Motorola Solutions
Micah Burridge - ASAP Systems
Marc Hoster – Alien Technology Rep
Brian Hensley – Certified RFID Engineer
Micah Burridge - ASAP Systems
Al Franklin – President: EnaSys
Andrew J. Allen – VP of Operations: IMS
Debbie Shropshire - Operations Manager: Transition Works
Scott Tran - FAS Product Specialist: IMS
Shaun Stigall - RFID Mid-West Sales Manager at UPM RFID
Steve Weiss - Business Consultant at Concept2 Solution
Joe Andraski - President & CEO at VICS
Editor's Notes
Perhaps we should begin? This morning we would like to present our edd project shoe theft prevention system.
Josh Birdwell - Introduce your self
Yuvraj Rana – Introduce Yourself
Aaron Weaver – Introduce Yourself
Josh
Yuvraj
UV
Aaron WeaverRFID has commercial applications that are used daily. Wal-Mart uses it for there warehousing pallet inventory. Pikepass is something we are familiar with. They use passive RFID tags now as supposed to the old active tags to identify a specific car passing through the gateway. The reason they switched was because the passive tags are inexpensive, and do not have to have a battery changed. Since they are not transmitting constantly that’s why they have to be aligned more specific than the active which could be place anywhere. Libraries take advantage of this new technology making managing the books much easier. [Explain System flow] JoshWe’ve analyzed many systems and devised a custom tailored application for Francis Tuttle’s specific needs.
Josh
JoshBarcoding is a excellent way to simply place a barcode on an asset to take inventory.However, a line of sight is required to scan the barcode requiring the person to find the object and scan it.In addition, it is time consuming. Mrs. Derek told us that “it to young ladies the whole summer to do 2/3 of the Rockwell campus not including offices”RFID has been making advances in the recent years for smaller applications to be achievable.There is no line of sight required meaning when taking inventory a whole room can be scanned in a matter of seconds.Our chosen software allows for Wi-Fi enabled inventory allowing for it to be updated from room to room.The current database can be easily switched over to the new software.However, the initial time taken to implement all the tags on every asset will take time.
Uv
Yuvraj
Yuvraj
Aaron
Josh -
Josh
UV
Josh
Uv
Yuvraj Explain this tomorrow
Yuvraj
Yuvraj
Yuvraj
Aaron
Aaron
Aaron
Aaron
Yuvraj That is, a scanner has to "see" the bar code to read it, which means people usually have to orient the bar code towards a scanner for it to be read. Radio frequency identification, by contrast, doesn’t require line of sight. RFID tags can be read as long as they are within range of a reader.
Yuvraj
Aaron
Josh
Josh
Aaron
Aaron
Aaron
Josh
UV
UV
Yuvraj
Josh
AaronOur proposal will save not only time but the labor required to take inventory. Being a user friendly interface was a factor we weighed greatly in our decision along with it being windows based.Online training library will be available to learn the software and how to manage the inventory.
Yuvraj
JoshThe provider for our RFID tags is UPM Raflatac. This is for the standard RFID tags, not the metal mounted tags. For the metal assets, we can use barcodes. There is, however, an option to buy metal mounted tags, which cost a bit more than normal tags.
Aaron
JoshASAPwas chosen after research of many rfid inventory suppliers and then a process of conference calls to the respective companies. There is a number of reason to why they stood at of the crowd. The interface is extremely user friendly with endless options to create a personalized experience. Report creator on the software is clean and easy to use. It allows for fields to be selected and de-selected then formatting the chosen options to a PDF or excel file. ASAP is a web based software which allows for compliance with Infinite Vision. There are hosting options available which allows for our database to be based by them. Everything is online from the software updates to their private training videos. On the support side, the Gold level is recommended for the first year. This level allows for unlimited incidents for 1 year and email and telephone support. There will be a dedicated support specialist for Francis Tuttle. Response times have a maximum of one hour and a target 24 hour fix window. Four authorized contact personal will assist us in any questions or problems.
Yuvraj Here is the moblie application that will be ran on the MC-3190z. The picture on the right is a screen display of when inventory is began. It is extremely simply to add an asset to the existing inventory.
Yuvraj
Josh
Yuvraj
UV – do you have any questions etc. after questions, thank you for coming etc.