Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033997
D. Neelamegam, V. Rajesh
This paper presents a compact narrow band antenna for Wireless Local Area Network (WLAN) which operates at 3.6 GHz. The proposed antenna has M-shaped structure with length (l) of 35.89 mm and width (w) of 22.99 mm respectively. In this, selection of the patch length and width are the major parameters taken into considerations when designing an antenna. Desired patch is initially simulated by using IE3D simulator and is realized as per design requirements. This antenna provides return loss of -20 dB while the -10 dBpassband of the developed antenna is 1GHz from 3.5GHz to 3.7 GHz. the designed antenna is fabricated on FR4 substrate with dielectric constant of 4.4, loss tangent of 0.0004 and thickness of 1.6 mm using dual side Printed Circuit Board (PCB) technology. The measured S parameter of an antenna is compared with the simulated one, where the results obtained over the desired passband is at acceptable level.
{"title":"Development and analysis of microstrip antenna for Wireless Local Area Network (IEEE 802.11y)","authors":"D. Neelamegam, V. Rajesh","doi":"10.1109/ICICES.2014.7033997","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033997","url":null,"abstract":"This paper presents a compact narrow band antenna for Wireless Local Area Network (WLAN) which operates at 3.6 GHz. The proposed antenna has M-shaped structure with length (l) of 35.89 mm and width (w) of 22.99 mm respectively. In this, selection of the patch length and width are the major parameters taken into considerations when designing an antenna. Desired patch is initially simulated by using IE3D simulator and is realized as per design requirements. This antenna provides return loss of -20 dB while the -10 dBpassband of the developed antenna is 1GHz from 3.5GHz to 3.7 GHz. the designed antenna is fabricated on FR4 substrate with dielectric constant of 4.4, loss tangent of 0.0004 and thickness of 1.6 mm using dual side Printed Circuit Board (PCB) technology. The measured S parameter of an antenna is compared with the simulated one, where the results obtained over the desired passband is at acceptable level.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"34 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89687899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034021
E. Venkatesan, V. P. Kolanchinathan
This paper presents a hardware implementation of a digital watermarking system that can insert invisible watermark information into video streams in real time. The watermark embedding is processed in the integer based wavelet transformation, lifting and least significant bits approach. To achieve high performance, the proposed system architecture employs pipeline structure and uses parallelism. Hardware implementation using field programmable gate array has been done, and an experiment was carried out using a custom versatile breadboard for overall performance evaluation. Experimental results show that a hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and segment removal on video sequences. Furthermore, the proposed hardware based watermarking system features low power consumption, low cost implementation, high processing speed, and reliability.
{"title":"Hardware implementation for sending concealed data in video by using wavelets","authors":"E. Venkatesan, V. P. Kolanchinathan","doi":"10.1109/ICICES.2014.7034021","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034021","url":null,"abstract":"This paper presents a hardware implementation of a digital watermarking system that can insert invisible watermark information into video streams in real time. The watermark embedding is processed in the integer based wavelet transformation, lifting and least significant bits approach. To achieve high performance, the proposed system architecture employs pipeline structure and uses parallelism. Hardware implementation using field programmable gate array has been done, and an experiment was carried out using a custom versatile breadboard for overall performance evaluation. Experimental results show that a hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and segment removal on video sequences. Furthermore, the proposed hardware based watermarking system features low power consumption, low cost implementation, high processing speed, and reliability.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"33 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84026255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033881
Th Theepigaa, A. Bhuvaneswari
Online social networks(OSNs) become a successful portal for millions of Internet users. These OSNs offer attractive means for social interactions and information sharing, but also raise a number issues in security and privacy. While OSNs allow users to restrict access to shared data, they do not currently provide any mechanism to enforce the privacy over data associated with multiple users. To share the private content and data our analysis presents an approach to enable the protection of shared data associated with multiple users in online social networks. We formulate an access control model to capture the essence of multiparty authorization requirements along with a multiparty policy specification scheme and enforcement mechanism. Our access control model allows us to overcome the disadvantages of existing system and perform various analysis tasks on privacy data sharing and selection strategies using the multiparty access control Framework (MACF).
{"title":"Efficient and contorlled sharing of privacy data in social networks","authors":"Th Theepigaa, A. Bhuvaneswari","doi":"10.1109/ICICES.2014.7033881","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033881","url":null,"abstract":"Online social networks(OSNs) become a successful portal for millions of Internet users. These OSNs offer attractive means for social interactions and information sharing, but also raise a number issues in security and privacy. While OSNs allow users to restrict access to shared data, they do not currently provide any mechanism to enforce the privacy over data associated with multiple users. To share the private content and data our analysis presents an approach to enable the protection of shared data associated with multiple users in online social networks. We formulate an access control model to capture the essence of multiparty authorization requirements along with a multiparty policy specification scheme and enforcement mechanism. Our access control model allows us to overcome the disadvantages of existing system and perform various analysis tasks on privacy data sharing and selection strategies using the multiparty access control Framework (MACF).","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84285588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034151
Prateek Rajgarhia, P. James, Vivek Nainwal, P. Sowjanya, Santosh Sam Koshy
A Wireless Sensor Network (WSN) Gateway is treated as the most crucial entity of the WSN network, since it facilitates Data Storage, WSN Network Management and InterConnectivity to a back-end network. Most of the Gateway designs are implemented using a High End Processor and Operating System, to provide reliable data aggregation from the WSN. This paper, discusses the feasibility of using a low power, micro-controller as the Gateway, to provide reliable data aggregation in the face of challenges such as limited power supply, intermittent back end network connectivity and outdoor deployment conditions. In addition, the paper also discusses various mechanisms employed, to ensure that the system recovers and self-heals, when confronted with on-field failures. Finally, debug mechanisms, supplemented by various technologies are implemented and discussed, to provide additional and important on-field and off-field information.
{"title":"Development of an Ultra-low power WSN gateway for outdoor deployments","authors":"Prateek Rajgarhia, P. James, Vivek Nainwal, P. Sowjanya, Santosh Sam Koshy","doi":"10.1109/ICICES.2014.7034151","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034151","url":null,"abstract":"A Wireless Sensor Network (WSN) Gateway is treated as the most crucial entity of the WSN network, since it facilitates Data Storage, WSN Network Management and InterConnectivity to a back-end network. Most of the Gateway designs are implemented using a High End Processor and Operating System, to provide reliable data aggregation from the WSN. This paper, discusses the feasibility of using a low power, micro-controller as the Gateway, to provide reliable data aggregation in the face of challenges such as limited power supply, intermittent back end network connectivity and outdoor deployment conditions. In addition, the paper also discusses various mechanisms employed, to ensure that the system recovers and self-heals, when confronted with on-field failures. Finally, debug mechanisms, supplemented by various technologies are implemented and discussed, to provide additional and important on-field and off-field information.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"73 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84321083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033914
V. Mareeswari, S. Sundareswari
To propose a new safe and secure mechanism to detect identity crimes, more precisely to identify replica in credit card. The synthetic identity fraud is the practice of reliable but false identities which is easy to make but more complicated to apply on real time. Detection system contains two layers which is communal detection and spike detection. Communal detection finds real social relationships to shrink the suspicion score, and is corrupt opposed to synthetic social relationships. It is the white list-oriented approach on a fixed set of attributes. Spike detection finds spikes in duplicates to enhance the suspicion score, and is probe-resistant for attributes. It is the attribute-oriented approach on a variable-size set of attributes. Both communal detection and spike detection become aware of more types of attacks, better account for changing legal behaviour, and remove the redundant attributes. To enhance identity crime detection systems flexible to real world scenario. The response time of the detection and fraud events need to be reduced. In credit card applications the key part is constrained to Identity Crime. Active Phase Blending algorithm is to reduce the time constraints on identifying fraudulent identity usage and response time.
{"title":"Data stream mining based resilient identity fraudulent detection","authors":"V. Mareeswari, S. Sundareswari","doi":"10.1109/ICICES.2014.7033914","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033914","url":null,"abstract":"To propose a new safe and secure mechanism to detect identity crimes, more precisely to identify replica in credit card. The synthetic identity fraud is the practice of reliable but false identities which is easy to make but more complicated to apply on real time. Detection system contains two layers which is communal detection and spike detection. Communal detection finds real social relationships to shrink the suspicion score, and is corrupt opposed to synthetic social relationships. It is the white list-oriented approach on a fixed set of attributes. Spike detection finds spikes in duplicates to enhance the suspicion score, and is probe-resistant for attributes. It is the attribute-oriented approach on a variable-size set of attributes. Both communal detection and spike detection become aware of more types of attacks, better account for changing legal behaviour, and remove the redundant attributes. To enhance identity crime detection systems flexible to real world scenario. The response time of the detection and fraud events need to be reduced. In credit card applications the key part is constrained to Identity Crime. Active Phase Blending algorithm is to reduce the time constraints on identifying fraudulent identity usage and response time.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"39 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84399894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033931
V. Anuradha, D. Sumathi, P. Student
Cloud computing provides user-requested services that are reliable, dynamic, flexible and efficient. In order to offer such guaranteed services to cloud users, effective resource allocation strategies must be implemented. The methodology used should also confirm to the Service Level Agreement (SLA) drawn between the customer and the service provider. This work presents a study of such resource allocation strategies in cloud computing. The strategies include resource requirements prediction algorithms and resource allocation algorithms. This works studies the various resource allocation techniques utilized in cloud computing and makes a comparative study of the merits and demerits of each technique. This study aims to identify an efficient resource allocation strategy that utilizes resources effectively in the resource constrained environment of cloud computing.
{"title":"A survey on resource allocation strategies in cloud computing","authors":"V. Anuradha, D. Sumathi, P. Student","doi":"10.1109/ICICES.2014.7033931","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033931","url":null,"abstract":"Cloud computing provides user-requested services that are reliable, dynamic, flexible and efficient. In order to offer such guaranteed services to cloud users, effective resource allocation strategies must be implemented. The methodology used should also confirm to the Service Level Agreement (SLA) drawn between the customer and the service provider. This work presents a study of such resource allocation strategies in cloud computing. The strategies include resource requirements prediction algorithms and resource allocation algorithms. This works studies the various resource allocation techniques utilized in cloud computing and makes a comparative study of the merits and demerits of each technique. This study aims to identify an efficient resource allocation strategy that utilizes resources effectively in the resource constrained environment of cloud computing.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87936963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033905
Vimal Kumar Pal, Sneha M. Ramteke
As the Internet takes an increasingly central role in day to day communications infrastructure, the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in IP networks, it presents a new recovery scheme called Multiple Routing Configurations (MRC). The proposed scheme guarantees recovery in all single failure scenarios, using a single mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. It can be implemented with only minor changes to existing solutions. The present MRC analyze its performance with respect to scalability, backup path lengths, and load distribution after a failure. It also shows how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic, and thus reduce the chances of congestion when MRC is used.
{"title":"A framework for fast IP rerouting","authors":"Vimal Kumar Pal, Sneha M. Ramteke","doi":"10.1109/ICICES.2014.7033905","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033905","url":null,"abstract":"As the Internet takes an increasingly central role in day to day communications infrastructure, the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in IP networks, it presents a new recovery scheme called Multiple Routing Configurations (MRC). The proposed scheme guarantees recovery in all single failure scenarios, using a single mechanism to handle both link and node failures, and without knowing the root cause of the failure. MRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. MRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. It can be implemented with only minor changes to existing solutions. The present MRC analyze its performance with respect to scalability, backup path lengths, and load distribution after a failure. It also shows how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic, and thus reduce the chances of congestion when MRC is used.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"89 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88097085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033994
C. Bhargava, Nidhi Verma
With all speedy development's immediate satisfaction going in the vicinity, once potency not noticed the intensity to which professional business also depends on Digital Imaging. Administrators of both print and internet stuffs rely upon densely on the feature and approachability of their images. This paper outlined the exploratory data that undoubtedly testify to the outlook of Image Quality IMPROVEMENT of JPEG IMAGE with respect to Quality, File Size, Compression Ratio, Mean Square Error and Peak Signal to Noise Ratio. The utilitarian implementation of all exploratory outcome processes utilizing MATLAB code has been compiled on MATLAB R2013a software gizmo.
{"title":"Improved subjective and objective image quality assessment of JPEG image","authors":"C. Bhargava, Nidhi Verma","doi":"10.1109/ICICES.2014.7033994","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033994","url":null,"abstract":"With all speedy development's immediate satisfaction going in the vicinity, once potency not noticed the intensity to which professional business also depends on Digital Imaging. Administrators of both print and internet stuffs rely upon densely on the feature and approachability of their images. This paper outlined the exploratory data that undoubtedly testify to the outlook of Image Quality IMPROVEMENT of JPEG IMAGE with respect to Quality, File Size, Compression Ratio, Mean Square Error and Peak Signal to Noise Ratio. The utilitarian implementation of all exploratory outcome processes utilizing MATLAB code has been compiled on MATLAB R2013a software gizmo.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"69 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86905537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033761
J. Davidson, I. Jacob, K. G. Srinivasagam
Document Annotation is the task of adding metadata information in the document which is useful in information extraction. Document annotation has emerged as a different stream in data mining. Majority of algorithms are concentrated on query workload. This paper uses Probing algorithm with Bayesian approach which identifies the attribute based on query workload, text frequency and content of the previous text annotation such as content value. This method has been implemented in datasets that facilitates data annotation and prioritizes the values of the attributes by ranking scheme. Query cost is also low when compared to other approach. The experimental analysis shows a better performance while comparing with other methods because probability theory provides a principled foundation for such reasoning under uncertainty.
{"title":"Information extraction based on probing algorithm with Bayesian approach","authors":"J. Davidson, I. Jacob, K. G. Srinivasagam","doi":"10.1109/ICICES.2014.7033761","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033761","url":null,"abstract":"Document Annotation is the task of adding metadata information in the document which is useful in information extraction. Document annotation has emerged as a different stream in data mining. Majority of algorithms are concentrated on query workload. This paper uses Probing algorithm with Bayesian approach which identifies the attribute based on query workload, text frequency and content of the previous text annotation such as content value. This method has been implemented in datasets that facilitates data annotation and prioritizes the values of the attributes by ranking scheme. Query cost is also low when compared to other approach. The experimental analysis shows a better performance while comparing with other methods because probability theory provides a principled foundation for such reasoning under uncertainty.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"57 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86790997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034161
T. Tadivaka, M. Srikanth, T. Vijay Muni
Voltage flicker is a disturbance in electrical power systems. The reason for this disturbance is mainly due to the large nonlinear loads such as electric arc furnaces. A STATCOM is considered as a proper technique to mitigate the voltage flicker. Application of more suitable and precise power electronic converter leads to a more precise performance of the compensator. The voltage flicker compensation by 6 - pulse as well as 12-pulse static synchronous compensator (STATCOM) has been performed. In this case, injection of harmonics into the system caused some problems which were later overcome by using 12-pulse assignment of SATCOM and RLC Alter. This paper deals with the voltage flicker mitigation and reduction in total harmonic distortion (THD) and compared the results in detail. The obtained results show that STATCOM is very efficient and effective for the compensation and mitigation of voltage flicker and harmonics all the simulation results have been performed on the MATLAB Software.
{"title":"THD reduction and voltage flicker mitigation in power system base on STATCOM","authors":"T. Tadivaka, M. Srikanth, T. Vijay Muni","doi":"10.1109/ICICES.2014.7034161","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034161","url":null,"abstract":"Voltage flicker is a disturbance in electrical power systems. The reason for this disturbance is mainly due to the large nonlinear loads such as electric arc furnaces. A STATCOM is considered as a proper technique to mitigate the voltage flicker. Application of more suitable and precise power electronic converter leads to a more precise performance of the compensator. The voltage flicker compensation by 6 - pulse as well as 12-pulse static synchronous compensator (STATCOM) has been performed. In this case, injection of harmonics into the system caused some problems which were later overcome by using 12-pulse assignment of SATCOM and RLC Alter. This paper deals with the voltage flicker mitigation and reduction in total harmonic distortion (THD) and compared the results in detail. The obtained results show that STATCOM is very efficient and effective for the compensation and mitigation of voltage flicker and harmonics all the simulation results have been performed on the MATLAB Software.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"15 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87069502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}