{"id":18969,"date":"2022-12-05T01:53:30","date_gmt":"2022-12-05T06:53:30","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=18969"},"modified":"2023-02-16T06:58:28","modified_gmt":"2023-02-16T11:58:28","slug":"advantages-of-biometric-deduplication-software","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/","title":{"rendered":"Advantages of Using Biometric Deduplication"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In today&#8217;s highly informational age, data duplication is quite widespread. When dealing with your personal information, it might not create a huge issue. However, data duplication can be a nightmare when it comes to biometrics. When dealing with an automated biometric matching engine, biometric deduplication is used to eliminate multiple entries and keep the database unique.<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"Advantages of using biometric deduplication\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/sFf1Uvyk5Ww?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<h2><b>What is biometric deduplication?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The process of giving each user in a database a distinct identity by biometric means is called &#8220;biometric de-duplication.&#8221; The system may have saved the same person under several different IDs. To prevent the same user from enrolling more than once using different forms of identification, duplicate records must be removed from the database.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, it verifies enrollment by comparing the biometric data a user inputs against a database of stored biometric data at a ratio of 1:N, making the enrollment process both visible and efficient. Using data deduplication guarantees that each piece of information is stored only once, regardless of the technique used. With this technology, one of the most notable features is the high degree of precision it provides. File, block, and even byte levels are all accessible for de-duplication.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Biometric duplication can occur during taking data-related actions. This action includes transferring, migrating, backing up, editing, etc., especially when working with large amounts of data. If there is an issue during enrollment, duplicate biometric information may be stored. Biometric data is gathered from many sites and then uploaded to a central database as part of large-scale biometric data collection efforts like biometric voter ID, biometric country ID campaigns, etc.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-18974\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2022\/12\/HyperDeduplicator-banner-600x327.jpg\" alt=\"biometric deduplication\" width=\"600\" height=\"327\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2022\/12\/HyperDeduplicator-banner-600x327.jpg 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2022\/12\/HyperDeduplicator-banner.jpg 661w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2><b>What is the process of biometric deduplication?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The standard procedure for biometric providers involves loading the full biometric database onto computer servers and then searching each record against the entire database, a process that requires as many searches as there are entries in the database.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Deduplication with conventional <a href=\"https:\/\/markmeets.com\/business\/why-is-mobile-biometrics-important-for-e-government-software-solutions\/\">biometric software<\/a>, on the other hand, necessitates 10 million one-to-many searches if the database has 10 million records. Performing the deduplication would take over six months if each biometric search took just one second. Traditional deduplication software providers, aware of this problem, typically employ many servers to boost processing power and decrease the completion time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thankfully, M2SYS developed a method to deal with the problem. The complete biometric database is loaded onto a single server, where <a href=\"https:\/\/www.m2sys.com\/biometric-deduplication-hyper-deduplicator\/?utm_source=post&amp;utm_medium=blog&amp;utm_campaign=m2sys%20blog\">Hyper-Deduplicator software<\/a> performs a filtering phase similar to an industrial separation process, removing all duplicates in a matter of hours. There is no need for one-to-many (1:N) biometric searches when using the Hyper-Deduplicator software developed by M2SYS.<\/span><\/p>\n<h2><b>Advantages of using biometric deduplication software<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In the data-driven world of today, biometric deduplication software not only saves organizations time and money on resources, but it can also make data transfers faster and use less bandwidth. De-duplication is especially useful for governments that have to deal with a lot of biometric data. Here are the top three advantages of using biometric deduplication software:<\/span><\/p>\n<p><b>Risk of identity theft<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">We are vulnerable to identity fraud, so it&#8217;s important to recognize the gravity of the issue first. If you want to provide the users with the greatest possible experience when they interact with your organization, you need to make sure they can trust you with their personal information.<\/span><\/p>\n<p><b>Regulations and protecting customer data<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Failure to remove fake or duplicate accounts may also prevent you from complying with mandatory laws. Companies&#8217; use of consumer data and the security of that data are governed by laws in most countries today. Business owners risk steep penalties if they don&#8217;t clean up their books by getting rid of duplicate or fictitious accounts.<\/span><\/p>\n<p><b>Avoiding financial setbacks<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">If you don&#8217;t deduplicate, you risk losing money in the form of fines from the government or becoming a victim of identity theft. Taking action to deduplicate your system is one useful move. That may help you minimize income loss at a time when increasing your bottom line is so critical.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In short, it is crucial to identify duplicate identities and remove them from the system. This must be done before merging decentralized or distributed biometric data into a central system. To prevent the system from storing duplicate information. You can use <a href=\"https:\/\/www.m2sys.com\/biometric-deduplication-hyper-deduplicator\/?utm_source=post&amp;utm_medium=blog&amp;utm_campaign=m2sys%20blog\">Hyper-Deduplicator by M2SYS<\/a> for high-speed multi-biometric deduplication. To learn more about it, please get in touch with us.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s highly informational age, data duplication is quite widespread. When dealing with your personal information, it might not create<\/p>\n","protected":false},"author":425,"featured_media":18972,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometric deduplication","_yoast_wpseo_title":"%%title%%","_yoast_wpseo_metadesc":"Biometric deduplication is used to eliminate multiple entries to avoid errors in data and to provide accurate biometric information.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[930],"tags":[734],"class_list":["post-18969","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-software","tag-biometric-deduplication"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Advantages of Using Biometric Deduplication<\/title>\n<meta name=\"description\" content=\"Biometric deduplication is used to eliminate multiple entries to avoid errors in data and to provide accurate biometric information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Advantages of Using Biometric Deduplication\" \/>\n<meta property=\"og:description\" content=\"Biometric deduplication is used to eliminate multiple entries to avoid errors in data and to provide accurate biometric information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-05T06:53:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-16T11:58:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2022\/12\/241E01A7-6AF1-4D8F-8D43-3F04103EA61A.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adam Willsey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Willsey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/\"},\"author\":{\"name\":\"Adam Willsey\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ea4c79d6761c94094046c16d52abef8a\"},\"headline\":\"Advantages of Using Biometric Deduplication\",\"datePublished\":\"2022-12-05T06:53:30+00:00\",\"dateModified\":\"2023-02-16T11:58:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/\"},\"wordCount\":724,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric deduplication\"],\"articleSection\":[\"Biometric Software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/\",\"name\":\"Advantages of Using Biometric Deduplication\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2022-12-05T06:53:30+00:00\",\"dateModified\":\"2023-02-16T11:58:28+00:00\",\"description\":\"Biometric deduplication is used to eliminate multiple entries to avoid errors in data and to provide accurate biometric information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Advantages of Using Biometric Deduplication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ea4c79d6761c94094046c16d52abef8a\",\"name\":\"Adam Willsey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/39999399f5bbdb3cb11f894d8a2e938f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/39999399f5bbdb3cb11f894d8a2e938f?s=96&d=mm&r=g\",\"caption\":\"Adam Willsey\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/ifran\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Advantages of Using Biometric Deduplication","description":"Biometric deduplication is used to eliminate multiple entries to avoid errors in data and to provide accurate biometric information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/","og_locale":"en_US","og_type":"article","og_title":"Advantages of Using Biometric Deduplication","og_description":"Biometric deduplication is used to eliminate multiple entries to avoid errors in data and to provide accurate biometric information.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2022-12-05T06:53:30+00:00","article_modified_time":"2023-02-16T11:58:28+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2022\/12\/241E01A7-6AF1-4D8F-8D43-3F04103EA61A.png","type":"image\/png"}],"author":"Adam Willsey","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Adam Willsey","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/"},"author":{"name":"Adam Willsey","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ea4c79d6761c94094046c16d52abef8a"},"headline":"Advantages of Using Biometric Deduplication","datePublished":"2022-12-05T06:53:30+00:00","dateModified":"2023-02-16T11:58:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/"},"wordCount":724,"commentCount":2,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric deduplication"],"articleSection":["Biometric Software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/","name":"Advantages of Using Biometric Deduplication","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2022-12-05T06:53:30+00:00","dateModified":"2023-02-16T11:58:28+00:00","description":"Biometric deduplication is used to eliminate multiple entries to avoid errors in data and to provide accurate biometric information.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-software\/advantages-of-biometric-deduplication-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Advantages of Using Biometric Deduplication"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ea4c79d6761c94094046c16d52abef8a","name":"Adam Willsey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/39999399f5bbdb3cb11f894d8a2e938f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39999399f5bbdb3cb11f894d8a2e938f?s=96&d=mm&r=g","caption":"Adam Willsey"},"url":"https:\/\/www.m2sys.com\/blog\/author\/ifran\/"}]}},"modified_by":"Adam Willsey","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/18969"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/425"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=18969"}],"version-history":[{"count":5,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/18969\/revisions"}],"predecessor-version":[{"id":19599,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/18969\/revisions\/19599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/18972"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=18969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=18969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=18969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}