 Okay, hello everyone, I'm Leilin, the CEO of Juzix Technology from China. We are focusing on the next generation distributed computation infrastructure and related cryptographic algorithms. We are not only the traditional blockchain company, we are not only the traditional distributed ledger technology company. We believe that in the new future, the most important thing is the liquidity of data, just for data, not just coin, not just digital currency, but data. We have the biggest team of developers and experts, almost more than 150, based in Shanghai and Shenzhen and Wuhan. We are best founding company in this field last year in China, almost 2300 US dollars in USA. For the last 20 months, we have the ones that heavily in the cryptographic algorithms. So I would like to share with you about what we do and what we have. Juzix is now own enterprise platform, of course, it's derived from the Eastern. It was three months ago, sorry, three months ago, we together we one-shot blockchain in WeBank to announce the open source project BCOS, blockchain and open source in China. The Juzix platform is totally derived from this project and we will provide service for the developers and users. We adopted enterprise consensus solution, is featured with the platform consensus architecture. We have optimized the PBFT and the RUT. So no solution could provide add and remove NOS dynamically and automatic isolation recovery of 40 NOS. This is a basic features. And in the most difficult problem in blockchain technology is consensus. We do not think that the PBFT is the best solution, but in the world, we haven't found the best one yet. No solution still provide identity verification and access control. You know, the role-based access control model have been embedded in smart contracts. And in the new future, we will continuously provide fine-grained access control using the attribute-based encryption. The most important thing is data privacy protection. As you know, we have integrated a lot of algorithms into the different levels. Group signature is used in transaction protocol to facilitate civilians and tracking when requested requested by the legal offices. And we have integrated or applying the six encryption algorithms and the ZK proof to ISM account model. In the transaction, we have used a state channel mechanism to ISM and you can specify the receivers via broadcast encryption. Hardware, we believe that if there's not any hardware, there's no any security. Now we'll secure hardware, support Bluetooth and USB standards and support broadcast encryption, group signature, parallel homomorphic and the Jesus and Isaac non-interactive zero knowledge. For sure, because we are company from China, we have to support the national cryptographic standards SM-9. We also support multiple platforms so you can use it from PC, Android or iOS mobile phone. We have worked together with my partners in China almost 15 to 18 Jews to help them to write their own smart contracts to support our virtual industry applications. There's very difficult for most of the developers to use solidity, it's a little bit difficult. So we have some new instructions into EBM and to EBM to optimize and extend its functionality. EBM log output instruction, just impact an app instruction and cross contract invocation instruction. And for sure, homomorphic encryption and the ZK proof instruction into the EBM. For the developers, the most important thing is user experience, the user-friendly GUI and the configuration wizard, this is what we have done. And of course, the strong monitoring is for business class platform. Okay, the next step, what we will provide is, we will integrate Java machine in the next three to four months. Oracle Mechanism, Cross-Chain Protocol and a fully-pluckable cryptographic framework is now a next step. The use case, we are honored to be the partner with the Chinese biggest security infrastructure provider. Sorry, I just cannot say his name. For almost one year, more than 30 engineers in this project, we have delivered 31 small contracts in this project and this is what we have delivered. It is a very difficult project because you know not only the technology but the business process and the regulation is not so much true in China. So what I've done, the most of our work is to communicate with our partner to reconstruct the whole business, the business process and we have to optimize and extend it EVM. As you know, EVM is not so much true. So let's turn to the second part, the algorithms. The first one is NIS-AK, non-intractive zero knowledge. This was the difference between zero-cash and no company. The security of our solution has been, or can be mathematically proven and we will publishing in our detailed white paper in the new future, maybe in the end of this year. We are the first to succeed to integrate the whole algorithm into the SRAM account model and it is compatible with the smart contract. You can implement the balance iterations to matching with the old systems. It's very interesting that we have got lots of achievements to be milliseconds latency and our solution can support lightweight devices such as your mobile phone. A lot of solutions in the various industries can be supported. The classical application that is the supply chain financing, stock assets or identity protection. Most important thing is you can provide fully protection for your data, your address, your balance and almost all of the details such as the financial data, your transaction records, all of them. The second algorithm we have invested heavily in the past one year is MPC, multi-party computation. We have worked together with the top scientists and the top institution in China to deliver this solution. We, our solution is the first enterprise MPC platform in the world and this solution could support customized computation logic with millisecond latency for just two, two-part computation. Two-part, just two-part computation is very, very heavily computation, complexity and very, very heavily telecomputing nation complexity. In the new future, we will deliver the new version. It is available for multi-party joint computation for three-party and even more. Two and three is in the different world. So what is the MPC? MPC can protect your data, you can store your data locally and never been copied by some others and then we can benefit from this data. So MPC and the business circumstances, we can use it as a collaborative management just as distributed key storage and the collaborative recovery and credit rating computation and risk control. Maybe it is an interesting sense, big data analysis because everybody has data but we are all the blind men. Each of us, one of us cannot get the whole data set forever. So we have to, we have to make a, thank you, we have to make a secure distributed data exchange and the joint computation just like MPC solution. We can give the optimization of quantitative models through data sharing. Okay, here you can see our solutions performance just like the NISI-K. We believe there is the best performance in word now but in the next phrase, we will still invest heavily to improve this parameter, this one. Proof verification. Okay, we have a big project, Omega. Now we have support, zero knowledge, multi-body computation and ECC. The next step is game theory and the lattice-based cryptography. The last one is now open platform, open platform, just for it. We have integrated juice with lots of algorithms, middle-value API and solutions to help developers to get the most user-friendly experience in the near future. This is now platform framework and it's the roadmap. I think the most featured is DAPP market in next year. We will integrated the JVM and provided the Solidity IDE and both Solidity and Java. So for the users, no company, we will continuously provide training and document and the development and compiling and testing services for the developers. Lots of Chinese leading company have been my partner in this open platform. So welcome you to join us, join this open platform. Thank you, thank you all. Thank you very much.