SlideShare a Scribd company logo
1 of 25
Head of department
-Sabina Ansari
Case study teacher
-Priyanka pawar
LAXMAN DEVRAM SONAWANE
COLLEGE
Case study
on
Face recognition in
e-attendance
Overview
Introduction History
What are
biometrics
Why we
choose face
recognition
over other
biometrics
What is face
recognition
Components
of face
recognition
How facial
recognition
system works
Where face
recognition
technology is
used
Future of face
recognition
Introduction
• In today's networked world, the need to maintain the security of
information or physical property is becoming both increasingly
important and increasingly difficult.
• Face recognition is one of the few biometric methods that possess the
merits of both high accuracy & Complex and largely software based
technique.
• Analyze unique shape, pattern & positioning of facial features.
• It compare scans to records stored in central or local database or
even on a smart card.
History
• The first attempts to use face recognition began in the 1960’s with a
semi-automated system.
• Marks were made on photographs to locate the major features; it
used features such as eyes, ears, noses, and mouths.
• Then distances and ratios were computed from these marks to a
common reference point and compared to reference data.
• In 1970s, Goldstein and Harmon used 21 specific subjective markers
such as hair color and lip thickness to automate the recognition.
• This proved even harder to automate due to the subjective nature of
many of the measurements still made completely by hand.
What are biometrics
• A biometric is a unique, measurable
characteristic of a human being that
Can be used to automatically recognize
an individual or verify an individual’s
identity.
Biometrics can measure both physiological and behavioral
characteristics –
• Physiological biometrics:- This types of biometrics is based on
measurements and data derived from direct measurement of a part
of the human body.
• Behavioral biometrics:- This types of biometrics is based on
measurements and data derived from an action.
Types of biometrics
PHYSIOLOGICAL BEHAVIORAL
 Finger-scan Voice-scan
 Facial Recognition Signature-scan
 Iris-scan Keystroke-scan
 Retina-scan
 Hand-scan
Why we choose face recognition over other biometrics
• It requires no physical interaction on behalf of user.
• It is accurate and allows for high enrolment and verification.
• Not require an expert to interpret the comparison result.
• It can use your existing hardware infrastructure, existing cameras and
image capture, devices will work with no problems.
• It is the only biometric that allow you to perform passive identification
in one to Many environments (e.g.: identifying a terrorist in a busy
Airport terminal.
What is face recognition
• Face recognition is one of the few
biometric methods that possess the
merits of both high accuracy and low
intrusiveness.
• A facial recognition system is a computer application for
automatically identifying or verifying a person from a digital
image from the source, One of the ways to do this is by comparing
selected facial features from the image and a facial database.
• Detection – two-class classification.
• Face vs. Non-face.
• Recognition – multi-class classification.
• One person vs. all the others.
Difference between face detection and recognition
Two types of comparison in face recognition
• Face Verification: The system compares a face image that might not
belong to the database, verify whether it is from the person it is
claimed to be in the database.
• Face Identification: The system compares a face image that belongs
to a person in a database, tell whose image it is.
Stages of identification
Capture
Extraction
Comparison
Match/Non match
Accept/Project
1
2
3
4
5
Capture- Capture the behavioral
and physical sample.
Extraction- Unique data is extracted
from the sample and a template is
created.
Comparison- The template is
compared with a new sample.
Match/non match- The system
decides whether the new samples
are matched or not.
Components of face recognition
 Enrollment module-An automated
mechanism that scans and
captures a digital or analog
image of a living personal
characteristics.
 Database-Another entity which
handles compression ,processing
,data storage and compression of
the captured data with stored
data.
 Identification module-The third
interfaces with the application
system.
How facial recognition system works
• Facial recognition software is based on the ability to first recognize
faces, which is a technological feat in itself. If you look at the mirror,
you can see that your face has certain distinguishable landmarks.
These are the peaks and valleys that make up the different facial
features.
• VISIONICS defines these landmarks as nodal points. There are about
80 nodal points on a human face.
• distance between the eyes
• width of the nose
• depth of the eye socket
• cheekbones
• jaw line
Nodal points that are measured by the software
• Detection- when the system is attached to a video surveillance
system, the recognition software searches the field of view of a
video camera for faces. If there is a face in the view, it is detected
within a fraction of a second. A multi-scale algorithm is used to
search for faces in low resolution. The system switches to a high-
resolution search only after a head-like shape is detected.
• Alignment- Once a face is detected, the system determines the
head's position, size and pose. A face needs to be turned at least 35
degrees toward the camera for the system to register it.
• Normalization-The image of the head is scaled and rotated so that it
can be registered and mapped into an appropriate size and pose.
Normalization is performed regardless of the head's location and
distance from the camera. Light does not impact the normalization
process.
• Representation-The system translates the facial data into a unique
code. This coding process allows for easier comparison of the newly
acquired facial data to stored facial data.
• Matching- The newly acquired facial data is compared to the stored
data and (ideally) linked to at least one stored facial representation.
Advantages and disadvantages
ADVANTAGES
• Convenient, social acceptability.
• More user friendly.
• Inexpensive technique of identification.
DISADVANTAGES
• Problem with false rejection when people change their hair style, grow
or shave a beard or wear glasses.
• Face recognition systems can’t tell the difference between identical
twins.
Where face recognition technology is used
• Airports and railway stations
• Voter verification
• Cashpoints
• Stadiums
• Public transportation
• Financial institutions
• Government offices
• Businesses of all kinds
Future of face recognition
• Some consider the problem impossible.
• Advancements in hardware and software.
• Slow integration into society in limited environments.
• Very large potential market.
CONCLUSION
• Face recognition technologies have been associated generally with
very costly top secure applications. Today the core technologies have
evolved and the cost of equipment's is going down dramatically due
to the integration and the increasing processing power. Certain
applications of face recognition technology are now cost effective,
reliable and highly accurate. As a result there are no technological or
financial barriers for stepping from pilot project to widespread
deployment.
• For implementations where the biometric system must verify and
identify users reliably over time, facial scan can be a very difficult, but
not impossible, technology to implement successfully.
Thanks
Movie on face recognition in e attendace

More Related Content

What's hot

Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
leenak770
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
Avinash Singh
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
nialler27
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
The_Archer
 
Facial Recognition Vinod
Facial Recognition VinodFacial Recognition Vinod
Facial Recognition Vinod
Vinod siragaon
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
Smriti Tikoo
 

What's hot (20)

Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal GargFace Recognition Technology by Vishal Garg
Face Recognition Technology by Vishal Garg
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.Face recognition for augmented reality and media management.Viewdle.2011.
Face recognition for augmented reality and media management.Viewdle.2011.
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Project presentation by Debendra Adhikari
Project presentation by Debendra AdhikariProject presentation by Debendra Adhikari
Project presentation by Debendra Adhikari
 
Face detection system
Face detection systemFace detection system
Face detection system
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
seminar presentation on Face ricognition technology
seminar presentation on Face ricognition technologyseminar presentation on Face ricognition technology
seminar presentation on Face ricognition technology
 
Facial Recognition Vinod
Facial Recognition VinodFacial Recognition Vinod
Facial Recognition Vinod
 
Dissertation final report
Dissertation final reportDissertation final report
Dissertation final report
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition tech1
Face recognition tech1Face recognition tech1
Face recognition tech1
 
Face Detection
Face DetectionFace Detection
Face Detection
 

Similar to Movie on face recognition in e attendace

Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 

Similar to Movie on face recognition in e attendace (20)

Face recognition
Face recognition Face recognition
Face recognition
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
face-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptxface-recognition-technology-ppt.pptx
face-recognition-technology-ppt.pptx
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face Recognition System/Technology
Face Recognition System/TechnologyFace Recognition System/Technology
Face Recognition System/Technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
ACET.pptx
ACET.pptxACET.pptx
ACET.pptx
 
Pattern recognition
Pattern recognitionPattern recognition
Pattern recognition
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Movie on face recognition in e attendace

  • 1. Head of department -Sabina Ansari Case study teacher -Priyanka pawar LAXMAN DEVRAM SONAWANE COLLEGE
  • 3.
  • 4. Overview Introduction History What are biometrics Why we choose face recognition over other biometrics What is face recognition Components of face recognition How facial recognition system works Where face recognition technology is used Future of face recognition
  • 5. Introduction • In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. • Face recognition is one of the few biometric methods that possess the merits of both high accuracy & Complex and largely software based technique. • Analyze unique shape, pattern & positioning of facial features. • It compare scans to records stored in central or local database or even on a smart card.
  • 6. History • The first attempts to use face recognition began in the 1960’s with a semi-automated system. • Marks were made on photographs to locate the major features; it used features such as eyes, ears, noses, and mouths. • Then distances and ratios were computed from these marks to a common reference point and compared to reference data. • In 1970s, Goldstein and Harmon used 21 specific subjective markers such as hair color and lip thickness to automate the recognition. • This proved even harder to automate due to the subjective nature of many of the measurements still made completely by hand.
  • 7. What are biometrics • A biometric is a unique, measurable characteristic of a human being that Can be used to automatically recognize an individual or verify an individual’s identity.
  • 8. Biometrics can measure both physiological and behavioral characteristics – • Physiological biometrics:- This types of biometrics is based on measurements and data derived from direct measurement of a part of the human body. • Behavioral biometrics:- This types of biometrics is based on measurements and data derived from an action.
  • 9. Types of biometrics PHYSIOLOGICAL BEHAVIORAL  Finger-scan Voice-scan  Facial Recognition Signature-scan  Iris-scan Keystroke-scan  Retina-scan  Hand-scan
  • 10. Why we choose face recognition over other biometrics • It requires no physical interaction on behalf of user. • It is accurate and allows for high enrolment and verification. • Not require an expert to interpret the comparison result. • It can use your existing hardware infrastructure, existing cameras and image capture, devices will work with no problems. • It is the only biometric that allow you to perform passive identification in one to Many environments (e.g.: identifying a terrorist in a busy Airport terminal.
  • 11. What is face recognition • Face recognition is one of the few biometric methods that possess the merits of both high accuracy and low intrusiveness. • A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image from the source, One of the ways to do this is by comparing selected facial features from the image and a facial database.
  • 12. • Detection – two-class classification. • Face vs. Non-face. • Recognition – multi-class classification. • One person vs. all the others. Difference between face detection and recognition
  • 13. Two types of comparison in face recognition • Face Verification: The system compares a face image that might not belong to the database, verify whether it is from the person it is claimed to be in the database. • Face Identification: The system compares a face image that belongs to a person in a database, tell whose image it is.
  • 14. Stages of identification Capture Extraction Comparison Match/Non match Accept/Project 1 2 3 4 5 Capture- Capture the behavioral and physical sample. Extraction- Unique data is extracted from the sample and a template is created. Comparison- The template is compared with a new sample. Match/non match- The system decides whether the new samples are matched or not.
  • 15. Components of face recognition  Enrollment module-An automated mechanism that scans and captures a digital or analog image of a living personal characteristics.  Database-Another entity which handles compression ,processing ,data storage and compression of the captured data with stored data.  Identification module-The third interfaces with the application system.
  • 16. How facial recognition system works • Facial recognition software is based on the ability to first recognize faces, which is a technological feat in itself. If you look at the mirror, you can see that your face has certain distinguishable landmarks. These are the peaks and valleys that make up the different facial features. • VISIONICS defines these landmarks as nodal points. There are about 80 nodal points on a human face.
  • 17. • distance between the eyes • width of the nose • depth of the eye socket • cheekbones • jaw line Nodal points that are measured by the software
  • 18. • Detection- when the system is attached to a video surveillance system, the recognition software searches the field of view of a video camera for faces. If there is a face in the view, it is detected within a fraction of a second. A multi-scale algorithm is used to search for faces in low resolution. The system switches to a high- resolution search only after a head-like shape is detected. • Alignment- Once a face is detected, the system determines the head's position, size and pose. A face needs to be turned at least 35 degrees toward the camera for the system to register it. • Normalization-The image of the head is scaled and rotated so that it can be registered and mapped into an appropriate size and pose. Normalization is performed regardless of the head's location and distance from the camera. Light does not impact the normalization process.
  • 19. • Representation-The system translates the facial data into a unique code. This coding process allows for easier comparison of the newly acquired facial data to stored facial data. • Matching- The newly acquired facial data is compared to the stored data and (ideally) linked to at least one stored facial representation.
  • 20. Advantages and disadvantages ADVANTAGES • Convenient, social acceptability. • More user friendly. • Inexpensive technique of identification. DISADVANTAGES • Problem with false rejection when people change their hair style, grow or shave a beard or wear glasses. • Face recognition systems can’t tell the difference between identical twins.
  • 21. Where face recognition technology is used • Airports and railway stations • Voter verification • Cashpoints • Stadiums • Public transportation • Financial institutions • Government offices • Businesses of all kinds
  • 22. Future of face recognition • Some consider the problem impossible. • Advancements in hardware and software. • Slow integration into society in limited environments. • Very large potential market.
  • 23. CONCLUSION • Face recognition technologies have been associated generally with very costly top secure applications. Today the core technologies have evolved and the cost of equipment's is going down dramatically due to the integration and the increasing processing power. Certain applications of face recognition technology are now cost effective, reliable and highly accurate. As a result there are no technological or financial barriers for stepping from pilot project to widespread deployment. • For implementations where the biometric system must verify and identify users reliably over time, facial scan can be a very difficult, but not impossible, technology to implement successfully.