A Centralized Architecture for Cooperative Air-Sea Vehicles Using UAV-USV
This paper deals with the problem of monitoring and
cleaning dirty zones of oceans using unmanned vehicles. We present
a centralized cooperative architecture for unmanned aerial vehicles
(UAVs) to monitor ocean regions and clean dirty zones with the help
of unmanned surface vehicles (USVs). Due to the rapid deployment
of these unmanned vehicles, it is convenient to use them in oceanic
regions where the water pollution zones are generally unknown. In
order to optimize this process, our solution aims to detect and reduce
the pollution level of the ocean zones while taking into account the
problem of fault tolerance related to these vehicles.
Cryptographic Attack on Lucas Based Cryptosystems Using Chinese Remainder Theorem
Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack.
Italian Central Guarantee Fund: An Analysis of the Guaranteed SMEs’ Default Risk
Italian Central Guarantee Fund (CGF) has the purpose to facilitate Small and Medium-sized Enterprises (SMEs)’ access to credit. The aim of the paper is to study the evaluation method adopted by the CGF with regard to SMEs requiring its intervention. This is even more important in the light of the recent CGF reform. We analyse an initial sample of more than 500.000 guarantees from 2012 to 2018. We distinguish between a counter-guarantee delivered to a mutual guarantee institution and a guarantee directly delivered to a bank. We investigate the impact of variables related to the operations and the SMEs on Altman Z’’-score and the score consistent with CGF methodology. We verify that the type of intervention affects the scores and the initial condition changes with the new assessment criterions.
Bug Localization on Single-Line Bugs of Apache Commons Math Library
Software bug localization is one of the most costly tasks in program repair technique. Therefore, there is a high claim for automated bug localization techniques that can monitor programmers to the locations of bugs, with slight human arbitration. Spectrum-based bug localization aims to help software developers to discover bugs rapidly by investigating abstractions of the program traces to make a ranking list of most possible buggy modules. Using the Apache Commons Math library project, we study the diagnostic accuracy using our spectrum-based bug localization metric. Our outcomes show that the greater performance of a specific similarity coefficient, used to inspect the program spectra, is mostly effective on localizing of single line bugs.
Fault-Tolerant Control Study and Classification: Case Study of a Hydraulic-Press Model Simulated in Real-Time
Society demands more reliable manufacturing processes
capable of producing high quality products in shorter production
cycles. New control algorithms have been studied to satisfy this
paradigm, in which Fault-Tolerant Control (FTC) plays a significant
role. It is suitable to detect, isolate and adapt a system when a harmful
or faulty situation appears. In this paper, a general overview about
FTC characteristics are exposed; highlighting the properties a system
must ensure to be considered faultless. In addition, a research to
identify which are the main FTC techniques and a classification
based on their characteristics is presented in two main groups:
Active Fault-Tolerant Controllers (AFTCs) and Passive Fault-Tolerant
Controllers (PFTCs). AFTC encompasses the techniques capable of
re-configuring the process control algorithm after the fault has been
detected, while PFTC comprehends the algorithms robust enough
to bypass the fault without further modifications. The mentioned
re-configuration requires two stages, one focused on detection,
isolation and identification of the fault source and the other one in
charge of re-designing the control algorithm by two approaches: fault
accommodation and control re-design. From the algorithms studied,
one has been selected and applied to a case study based on an
industrial hydraulic-press. The developed model has been embedded
under a real-time validation platform, which allows testing the FTC
algorithms and analyse how the system will respond when a fault
arises in similar conditions as a machine will have on factory. One
AFTC approach has been picked up as the methodology the system
will follow in the fault recovery process. In a first instance, the fault
will be detected, isolated and identified by means of a neural network.
In a second instance, the control algorithm will be re-configured to
overcome the fault and continue working without human interaction.
Determination of Surface Deformations with Global Navigation Satellite System Time Series
The development of Global Navigation Satellite System (GNSS) technology has led to increasingly widely and successful applications of GNSS surveys for monitoring crustal movements. Instead of the multi-period GNSS solutions, this study utilizes GNSS time series that are required to more precisely determine the vertical deformations in the study area. In recent years, the surface deformations that are parallel and semi-parallel to Bolvadin fault have occurred in Western Anatolia. These surface deformations have continued to occur in Bolvadin settlement area that is located mostly on alluvium ground. Due to these surface deformations, a number of cracks in the buildings located in the residential areas and breaks in underground water and sewage systems have been observed. In order to determine the amount of vertical surface deformations, two continuous GNSS stations have been established in the region. The stations have been operating since 2015 and 2017, respectively. In this study, GNSS observations from the mentioned two GNSS stations were processed with GAMIT/GLOBK (GNSS Analysis Massachusetts Institute of Technology/GLOBal Kalman) program package to create coordinate time series. With the time series analyses, the GNSS stations’ behaviour models (linear, periodical, etc.), the causes of these behaviours, and mathematical models were determined. The study results from the time series analysis of these two 2 GNSS stations show approximately 50-90 mm/yr vertical movement.
Conditions for Fault Recovery of Interconnected Asynchronous Sequential Machines with State Feedback
In this paper, fault recovery for parallel interconnected
asynchronous sequential machines is studied. An adversarial input
can infiltrate into one of two submachines comprising parallel
composition of the considered asynchronous sequential machine,
causing an unauthorized state transition. The control objective is to
elucidate the condition for the existence of a corrective controller
that makes the closed-loop system immune against any occurrence
of adversarial inputs. In particular, an efficient existence condition
is presented that does not need the complete modeling of the
interconnected asynchronous sequential machine.
On Fault Diagnosis of Asynchronous Sequential Machines with Parallel Composition
Fault diagnosis of composite asynchronous sequential
machines with parallel composition is addressed in this paper. An
adversarial input can infiltrate one of two submachines comprising
the composite asynchronous machine, causing an unauthorized state
transition. The objective is to characterize the condition under
which the controller can diagnose any fault occurrence. Two control
configurations, state feedback and output feedback, are considered in
this paper. In the case of output feedback, the exact estimation of
the state is impossible since the current state is inaccessible and the
output feedback is given as the form of burst. A simple example is
provided to demonstrate the proposed methodology.
Effect of Fault Depth on Near-Fault Peak Ground Velocity
Fault depth is an important parameter to be determined in ground motion simulation, and peak ground velocity (PGV) demonstrates good application prospect. Using numerical simulation method, the variations of distribution and peak value of near-fault PGV with different fault depth were studied in detail, and the reason of some phenomena were discussed. The simulation results show that the distribution characteristics of PGV of fault-parallel (FP) component and fault-normal (FN) component are distinctly different; the value of PGV FN component is much larger than that of FP component. With the increase of fault depth, the distribution region of the FN component strong PGV moves forward along the rupture direction, while the strong PGV zone of FP component becomes gradually far away from the fault trace along the direction perpendicular to the strike. However, no matter FN component or FP component, the strong PGV distribution area and its value are both quickly reduced with increased fault depth. The results above suggest that the fault depth have significant effect on both FN component and FP component of near-fault PGV.
Influence of the Line Parameters in Transmission Line Fault Location
In the paper, two fault location algorithms are presented for transmission lines which use the line parameters to estimate the distance to the fault. The first algorithm uses only the measurements from one end of the line and the positive and zero sequence parameters of the line, while the second one uses the measurements from both ends of the line and only the positive sequence parameters of the line. The algorithms were tested using a transmission grid transposed in MATLAB. In a first stage it was established a fault location base line, where the algorithms mentioned above estimate the fault locations using the exact line parameters. After that, the positive and zero sequence resistance and reactance of the line were calculated again for different ground resistivity values and then the fault locations were estimated again in order to compare the results with the base line results. The results show that the algorithm which uses the zero sequence impedance of the line is the most sensitive to the line parameters modifications. The other algorithm is less sensitive to the line parameters modification.
Health Monitoring and Failure Detection of Electronic and Structural Components in Small Unmanned Aerial Vehicles
Fully autonomous small Unmanned Aerial Vehicles
(UAVs) are increasingly being used in many commercial applications.
Although a lot of research has been done to develop safe, reliable
and durable UAVs, accidents due to electronic and structural failures
are not uncommon and pose a huge safety risk to the UAV operators
and the public. Hence there is a strong need for an automated health
monitoring system for UAVs with a view to minimizing mission
failures thereby increasing safety. This paper describes our approach
to monitoring the electronic and structural components in a small
UAV without the need for additional sensors to do the monitoring.
Our system monitors data from four sources; sensors, navigation
algorithms, control inputs from the operator and flight controller
outputs. It then does statistical analysis on the data and applies
a rule based engine to detect failures. This information can then
be fed back into the UAV and a decision to continue or abort the
mission can be taken automatically by the UAV and independent of
the operator. Our system has been verified using data obtained from
real flights over the past year from UAVs of various sizes that have
been designed and deployed by us for various applications.
Design and Implementation of 4 Bit Multiplier Using Fault Tolerant Hybrid Full Adder
The fault tolerant system plays a crucial role in the critical applications which are being used in the present scenario. A fault may change the functionality of circuits. Aim of this paper is to design multiplier using fault tolerant hybrid full adder. Fault tolerant hybrid full adder is designed to check and repair any fault in the circuit using self-checking circuit and the self-repairing circuit. Further, the use of conventional logic circuits may result in more area, delay as well as power consumption. In order to reduce these parameters of the circuit, GDI (Gate Diffusion Input) techniques with less number of transistors are used compared to conventional full adder circuit. This reduces the area, delay and power consumption. The proposed method solves the major problems occurring in the most crucial and critical applications.
A Case Study on Performance of Isolated Bridges under Near-Fault Ground Motion
This paper presents a numerical investigation on the seismic performance of a benchmark bridge with different optimal isolation systems under near fault ground motion. Usually, very large displacements make seismic isolation an unfeasible solution due to boundary conditions, especially in case of existing bridges or high risk seismic regions. Hence, near-fault ground motions are most likely to affect either structures with long natural period range like isolated structures or structures sensitive to velocity content such as viscously damped structures. The work is aimed at analyzing the seismic performance of a three-span continuous bridge designed with different isolation systems having different levels of damping. The case study was analyzed in different configurations including: (a) simply supported, (b) isolated with lead rubber bearings (LRBs), (c) isolated with rubber isolators and 10% classical damping (HDLRBs), and (d) isolated with rubber isolators and 70% supplemental damping ratio. Case (d) represents an alternative control strategy that combines the effect of seismic isolation with additional supplemental damping trying to take advantages from both solutions. The bridge is modeled in SAP2000 and solved by time history direct-integration analyses under a set of six recorded near-fault ground motions. In addition to this, a set of analysis under Italian code provided seismic action is also conducted, in order to evaluate the effectiveness of the suggested optimal control strategies under far field seismic action. Results of the analysis demonstrated that an isolated bridge equipped with HDLRBs and a total equivalent damping ratio of 70% represents a very effective design solution for both mitigation of displacement demand at the isolation level and base shear reduction in the piers also in case of near fault ground motion.
Hierarchical Checkpoint Protocol in Data Grids
Grid of computing nodes has emerged as a
representative means of connecting distributed computers or
resources scattered all over the world for the purpose of computing
and distributed storage. Since fault tolerance becomes complex due
to the availability of resources in decentralized grid environment,
it can be used in connection with replication in data grids. The
objective of our work is to present fault tolerance in data grids
with data replication-driven model based on clustering. The
performance of the protocol is evaluated with Omnet++ simulator.
The computational results show the efficiency of our protocol in
terms of recovery time and the number of process in rollbacks.
A Comparison of Inverse Simulation-Based Fault Detection in a Simple Robotic Rover with a Traditional Model-Based Method
Robotic rovers which are designed to work in
extra-terrestrial environments present a unique challenge in terms
of the reliability and availability of systems throughout the mission.
Should some fault occur, with the nearest human potentially millions
of kilometres away, detection and identification of the fault must
be performed solely by the robot and its subsystems. Faults in
the system sensors are relatively straightforward to detect, through
the residuals produced by comparison of the system output with
that of a simple model. However, faults in the input, that is, the
actuators of the system, are harder to detect. A step change in
the input signal, caused potentially by the loss of an actuator,
can propagate through the system, resulting in complex residuals
in multiple outputs. These residuals can be difficult to isolate or
distinguish from residuals caused by environmental disturbances.
While a more complex fault detection method or additional sensors
could be used to solve these issues, an alternative is presented here.
Using inverse simulation (InvSim), the inputs and outputs of the
mathematical model of the rover system are reversed. Thus, for a
desired trajectory, the corresponding actuator inputs are obtained.
A step fault near the input then manifests itself as a step change
in the residual between the system inputs and the input trajectory
obtained through inverse simulation. This approach avoids the need
for additional hardware on a mass- and power-critical system such
as the rover. The InvSim fault detection method is applied to a
simple four-wheeled rover in simulation. Additive system faults and
an external disturbance force and are applied to the vehicle in turn,
such that the dynamic response and sensor output of the rover
are impacted. Basic model-based fault detection is then employed
to provide output residuals which may be analysed to provide
information on the fault/disturbance. InvSim-based fault detection
is then employed, similarly providing input residuals which provide
further information on the fault/disturbance. The input residuals are
shown to provide clearer information on the location and magnitude
of an input fault than the output residuals. Additionally, they can
allow faults to be more clearly discriminated from environmental
Online Electric Current Based Diagnosis of Stator Faults on Squirrel Cage Induction Motors
In the present paper, five electric current based methods to analyze electric faults on the stator of induction motors (IM) are used and compared. The analysis tries to extend the application of the multiple reference frames diagnosis technique. An eccentricity indicator is presented to improve the application of the Park’s Vector Approach technique. Most of the fault indicators are validated and some others revised, agree with the technical literatures and published results. A tri-phase 3hp squirrel cage IM, especially modified to establish different fault levels, is used for validation purposes.
Asynchronous Sequential Machines with Fault Detectors
A strategy of fault diagnosis and tolerance for
asynchronous sequential machines is discussed in this paper. With
no synchronizing clock, it is difficult to diagnose an occurrence
of permanent or stuck-in faults in the operation of asynchronous
machines. In this paper, we present a fault detector comprised of
a timer and a set of static functions to determine the occurrence
of faults. In order to realize immediate fault tolerance, corrective
control theory is applied to designing a dynamic feedback controller.
Existence conditions for an appropriate controller and its construction
algorithm are presented in terms of reachability of the machine and
the feature of fault occurrences.
Application of Computer Aided Engineering Tools in Performance Prediction and Fault Detection of Mechanical Equipment of Mining Process Line
Nowadays, to decrease the number of downtimes in the industries such as metal mining, petroleum and chemical industries, predictive maintenance is crucial. In order to have efficient predictive maintenance, knowing the performance of critical equipment of production line such as pumps and hydro-cyclones under variable operating parameters, selecting best indicators of this equipment health situations, best locations for instrumentation, and also measuring of these indicators are very important. In this paper, computer aided engineering (CAE) tools are implemented to study some important elements of copper process line, namely slurry pumps and cyclone to predict the performance of these components under different working conditions. These modeling and simulations can be used in predicting, for example, the damage tolerance of the main shaft of the slurry pump or wear rate and location of cyclone wall or pump case and impeller. Also, the simulations can suggest best-measuring parameters, measuring intervals, and their locations.
Diesel Fault Prediction Based on Optimized Gray Neural Network
In order to analyze the status of a diesel engine, as well as conduct fault prediction, a new prediction model based on a gray system is proposed in this paper, which takes advantage of the neural network and the genetic algorithm. The proposed GBPGA prediction model builds on the GM (1.5) model and uses a neural network, which is optimized by a genetic algorithm to construct the error compensator. We verify our proposed model on the diesel faulty simulation data and the experimental results show that GBPGA has the potential to employ fault prediction on diesel.
A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System
Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.
Sensor and Actuator Fault Detection in Connected Vehicles under a Packet Dropping Network
Connected vehicles are one of the promising technologies for future Intelligent Transportation Systems (ITS). A connected vehicle system is essentially a set of vehicles communicating through a network to exchange their information with each other and the infrastructure. Although this interconnection of the vehicles can be potentially beneficial in creating an efficient, sustainable, and green transportation system, a set of safety and reliability challenges come out with this technology. The first challenge arises from the information loss due to unreliable communication network which affects the control/management system of the individual vehicles and the overall system. Such scenario may lead to degraded or even unsafe operation which could be potentially catastrophic. Secondly, faulty sensors and actuators can affect the individual vehicle’s safe operation and in turn will create a potentially unsafe node in the vehicular network. Further, sending that faulty sensor information to other vehicles and failure in actuators may significantly affect the safe operation of the overall vehicular network. Therefore, it is of utmost importance to take these issues into consideration while designing the control/management algorithms of the individual vehicles as a part of connected vehicle system. In this paper, we consider a connected vehicle system under Co-operative Adaptive Cruise Control (CACC) and propose a fault diagnosis scheme that deals with these aforementioned challenges. Specifically, the conventional CACC algorithm is modified by adding a Kalman filter-based estimation algorithm to suppress the effect of lost information under unreliable network. Further, a sliding mode observer-based algorithm is used to improve the sensor reliability under faults. The effectiveness of the overall diagnostic scheme is verified via simulation studies.
Microseismicity of the Tehran Region Based on Three Seismic Networks
The main purpose of this research is to show the current active faults and active tectonic of the area by three seismic networks in Tehran region: 1-Tehran Disaster Mitigation and Management Organization (TDMMO), 2-Broadband Iranian National Seismic Network Center (BIN), 3-Iranian Seismological Center (IRSC). In this study, we analyzed microearthquakes happened in Tehran city and its surroundings using the Tehran networks from 1996 to 2015. We found some active faults and trends in the region. There is a 200-year history of historical earthquakes in Tehran. Historical and instrumental seismicity show that the east of Tehran is more active than the west. The Mosha fault in the North of Tehran is one of the active faults of the central Alborz. Moreover, other major faults in the region are Kahrizak, Eyvanakey, Parchin and North Tehran faults. An important seismicity region is an intersection of the Mosha and North Tehran fault systems (Kalan village in Lavasan). This region shows a cluster of microearthquakes. According to the historical and microseismic events analyzed in this research, there is a seismic gap in SE of Tehran. The empirical relationship is used to assess the Mmax based on the rupture length. There is a probability of occurrence of a strong motion of 7.0 to 7.5 magnitudes in the region (based on the assessed capability of the major faults such as Parchin and Eyvanekey faults and historical earthquakes).
Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System
Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.
Suitability of Black Box Approaches for the Reliability Assessment of Component-Based Software
Although, reliability is an important attribute of quality, especially for mission critical systems, yet, there does not exist any versatile model even today for the reliability assessment of component-based software. The existing Black Box models are found to make various assumptions which may not always be realistic and may be quite contrary to the actual behaviour of software. They focus on observing the manner in which the system behaves without considering the structure of the system, the components composing the system, their interconnections, dependencies, usage frequencies, etc.As a result, the entropy (uncertainty) in assessment using these models is much high.Though, there are some models based on operation profile yet sometimes it becomes extremely difficult to obtain the exact operation profile concerned with a given operation. This paper discusses the drawbacks, deficiencies and limitations of Black Box approaches from the perspective of various authors and finally proposes a conceptual model for the reliability assessment of software.
Hamiltonian Related Properties with and without Faults of the Dual-Cube Interconnection Network and Their Variations
In this paper, a thorough review about dual-cubes, DCn,
the related studies and their variations are given. DCn was introduced
to be a network which retains the pleasing properties of hypercube Qn
but has a much smaller diameter. In fact, it is so constructed that the
number of vertices of DCn is equal to the number of vertices of Q2n
+1. However, each vertex in DCn is adjacent to n + 1 neighbors and
so DCn has (n + 1) × 2^2n edges in total, which is roughly half the
number of edges of Q2n+1. In addition, the diameter of any DCn is 2n
+2, which is of the same order of that of Q2n+1. For selfcompleteness,
basic definitions, construction rules and symbols are
provided. We chronicle the results, where eleven significant theorems
are presented, and include some open problems at the end.
Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems
Intrusion Detection Systems are an essential tool for
network security infrastructure. However, IDSs have a serious
problem which is the generating of massive number of alerts, most of
them are false positive ones which can hide true alerts and make the
analyst confused to analyze the right alerts for report the true attacks.
The purpose behind this paper is to present a formalism model to
perform correlation engine by the reduction of false positive alerts
basing on vulnerability contextual information. For that, we propose
a formalism model based on non-monotonic JClassicδє description
logic augmented with a default (δ) and an exception (є) operator that
allows a dynamic inference according to contextual information.
Elman Neural Network for Diagnosis of Unbalance in a Rotor-Bearing System
The operational life of rotating machines has to be extended using a predictive condition maintenance tool. Among various condition monitoring techniques, vibration analysis is most widely used technique in industry. Signals are extracted for evaluating the condition of machine; further diagnostics is carried out with detected signals to extend the life of machine. With help of detected signals, further interpretations are done to predict the occurrence of defects. To study the problem of defects, a test rig with various possibilities of defects is constructed and experiments are performed considering the unbalanced condition. Further, this paper presents an approach for fault diagnosis of unbalance condition using Elman neural network and frequency-domain vibration analysis. Amplitudes with variation in acceleration are fed to Elman neural network to classify fault or no-fault condition. The Elman network is trained, validated and tested with experimental readings. Results illustrate the effectiveness of Elman network in rotor-bearing system.
Actuator Fault Detection and Fault Tolerant Control of a Nonlinear System Using Sliding Mode Observer
In this work, we use the Fault detection and isolation and the Fault tolerant control based on sliding mode observer in order to introduce the well diagnosis of a nonlinear system. The robustness of the proposed observer for the two techniques is tested through a physical example. The results in this paper show the interaction between the Fault tolerant control and the Diagnosis procedure.
Mathematical Modeling of Wind Energy System for Designing Fault Tolerant Control
This paper addresses the mathematical model of wind energy system useful for designing fault tolerant control. To serve the demand of power, large capacity wind energy systems are vital. These systems are installed offshore where non planned service is very costly. Whenever there is a fault in between two planned services, the system may stop working abruptly. This might even lead to the complete failure of the system. To enhance the reliability, the availability and reduce the cost of maintenance of wind turbines, the fault tolerant control systems are very essential. For designing any control system, an appropriate mathematical model is always needed. In this paper, the two-mass model is modified by considering the frequent mechanical faults like misalignments in the drive train, gears and bearings faults. These faults are subject to a wear process and cause frictional losses. This paper addresses these faults in the mathematics of the wind energy system. Further, the work is extended to study the variations of the parameters namely generator inertia constant, spring constant, viscous friction coefficient and gear ratio; on the pole-zero plot which is related with the physical design of the wind turbine. Behavior of the wind turbine during drive train faults are simulated and briefly discussed.
A Fault-Tolerant Full Adder in Double Pass CMOS Transistor
This paper presents a fault-tolerant implementation for
adder schemes using the dual duplication code. To prove the
efficiency of the proposed method, the circuit is simulated in double
pass transistor CMOS 32nm technology and some transient faults are
voluntary injected in the Layout of the circuit. This fully differential
implementation requires only 20 transistors which mean that the
proposed design involves 28.57% saving in transistor count
compared to standard CMOS technology.