Volume-6 Issue-12

Download 20
Total Views 387
File Size 4.00 KB
File Type unknown
Create Date August 27, 2017
Last Updated September 6, 2017

 Download Abstract Book

S. No

Volume-6 Issue-12, August 2017, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Ch. Rambabu, J. Bhaskararao

Paper Title:

Study of Various Compensation Models for Transmitter Leakage in Carrier Aggregation Applications

Abstract:  Communication is one of the important aspects of human life. With increasing demands of high data rates, carrier aggregation technique will be widely employed in wireless cellular communication. So to support carrier aggregation, it requires multi band transmitters. Due to non-linear characteristics of radio frequency amplifiers, the distortion normally added into the transmitted signal after amplification. The distortion signal not only presented at transmitted bands but also at the intermodulation bands. Finally fall into the received bands leads to huge quality degradation in signals. In order to overcome the transmitter problems there is various techniques proposed. In this paper various compensation models for transmitter leakage in carrier aggregation applications are studied.

 transmitter leakage, carrier aggregation, DPD, FPGA, receiver.


1.       C. Yu, M. Allegue-Martinez, Y. Guo, and A. Zhu,  Output-controllable partial inverse digital predistortion for RF power amplifiers,” IEEE Trans. Microw. Theory Tech., vol. 62, no. 11, pp. 2499–2510, Nov. 2014.
2.       P. Roblin, S. K. Myoung, D. Chaillot, Y. G. Kim, A. Fathimulla, J. Strahler, and S. Bibyk, “Frequency selective predistortion linearization of RF power amplifiers,” IEEE Trans. Microw. Theory Tech., vol. 56, no. 1, pp. 65–76, Jan. 2008.

3.       J. Kim, P. Roblin, D. Chaillot, and Z. Xie, “A generalized architecture for the frequency-selective digital predistortion linearization technique,” IEEE Trans. Microw. Theory Tech., vol. 61, no. 1, pp. 596–605, Jan. 2013.

4.       S. A. Bassam, M. Helaoui, and F. M. Ghannouchi, “Channel-selective multi-cell digital predistorter for multi-carrier transmitters,” IEEE Trans. Commun., vol. 60, no. 8, pp. 2344–2352, Aug. 2012.

5.       Z. Fu, L. Anttila, M. Abdelaziz, M. Valkama, and A. M. Wyglinski, “Frequency-selective digital predistortion for unwanted emission reduction,” IEEE Trans. Commun., vol. 63, no. 1, pp. 254–267, Jan. 2015.

6.       C. Yu and A. Zhu, “Modeling and suppression of transmitter leakage in concurrent dual-band transceivers with carrier aggregation,” in Proc. IEEEMTT-S Int. Microw. Symp. Dig., Phoenix, AZ, USA, May 2015.

7.       Chao Yu, Anding Zhu, “Digital Compensation for Transmitter Leakage in Non-Contiguous Carrier Aggregation Applications with FPGA implementation”, IEEE Microw., vol. 63, no. 12, pp. 4306-4318. December 2015

8.       J. E. Volder, “The CORDIC trigonometric computing technique,” IRE Trans. Electron. Compute., vol. EC-8, no. 3, pp. 330–334, Sep. 1959.

9.       Nir Yahav, A. Efendowicz, “Broadband high linearity IQ modulator for direct conversion transmitters”, IEEE Microw.,EU. 46, pp. 1019 -1022, Oct. 2016

10.    M. Iwamura, K. Etemad, M. H. Fong, R. Nory, and R. Love, “Carrier aggregation framework in 3GPP LTE-advanced [WiMAX/LTE update],” IEEE Commun. Mag., vol. 48, no. 8, pp. 60–67, Aug. 2010.






Kehinde Adebusuyi, Ezea Hilary, Gerald Ijemaru

Paper Title:

A Research of VoIP Jitter on Packet Loss in GSM Voice over IP Systems

Abstract: Jitter in the next generation network Voice over Internet Protocol Systems is a fundamental network problem in call quality measurement research. We classify Jitter according to call quality requirement in overall quality of service of a reliable information and communication technology infrastructure especially as convergence of voice, video and data increases in Internet telephony systems. Internet telephony mode of communication systems is delivered via Voice over IP media and signaling techniques adopted for internet transmission in achieving VOIP system. Our goal in this paper is to investigate the impact of VoIP Jitter by studying the optimal packet Call Flow Routing (CFR) model in Real Voice Optimization to reduce Jitter in VoIP systems. The results of the simulations shows that as the time in arrival of consecutive voice packets increase, the optimal packet  Call Flow Programmatic Routing (CFR) reduces with time varying demands in the total packetized call transmission across all network links. We observed that the set of call Flow Routing constraints investigated imposes the packet flow load balance at end-to-end gateway router and shows a reduction in packet loss and at a point, records no loss. The value at which the time slots for the network caller party demand increases, more Caller party serves the subsets of packet flows by simulating the behavior of the network per each slot independently of each slots. Hence, the caller router and called party router flows are positive by resolving the individual routing problem per each slot and integrating the models.

Jitter, VoIP, Voice, Optimize CFR, Packet Flow,


1.       (O. Ali Abdullah and A. M. Jassim Al-Hindawi, “Analysis and  Modelimg of GSM/EDGE Mobile Communication System” IOSR  Journal of Engineering ISSN: 2278 – 8719, Vol. 04, Issue 12 December (2014)
2.       (B.Xi, H. Chen, W.S. clevered & T. Telkomp)” statistical analysis and modeling of Internet VOIP traffic for network enginering”. Electronic  Journal of statistics. Vol. 4 .pg 58-116, ISSN 1935-7524. (2010).

3.       (I)Oghogho, D. odikayon, A.Alii Adebayo & S. Wara). “VOIP vs GSM Technology”. The way of the future for the communication”. (2012).

4.       Angeles D.Keromytis “A comprehensive survey of voice over IP security Research” IEEEE Journal of communications survey & Tutorials (2012).

5.       “M.Alshamrani, H. Croikshak, Z.Sun, B.Elmosni & V. fami”  “Evaluation of sip signalling andQOS for VOIP over OLSR MANET Routing protocol.” 15th International Conference on computer modelling and simulation. IEEE computer society (2013).

6.       V. Peter daniel, N. Chikazo. Agbanusi, and K.Joro Danjum “A survey of bandwith. Olptimization Techniques and patterns in VOIP services Vol 11, ISSUE 2 No2, March (2014).

7.       K.E. Samovy bv, and A.V. pechinkin “Analytical modelling and simulation for performance evalution of sip server with hysteretic overload control” proceedings of the 28th European Conference on modelling and simulations. ISBN 978-0-9564944-9-8(2013).

8.       J.Caop,M.Gregory “performance Evaluation of VOIP services using different CODERS over a UMTS Network.” School of Electrical and computer Enginering RMIT university melbouine, Vic 3000 Australia (2006).

9.       M.H. Mime, S.A. Molvi, M.Ali, M.A, Ganie and A.H. Hussein “Analysis of QOS of VOIP Traffic through Wiffi-UMTS Networks. Proceedings of the World cangresson Engineering Vol1, WCE, U.K ISBN: 978-988-19252-7-5, ISSN : 2078-0966 (online) July.2-4, (2014).

10.    A.Tora-Croz, A.L-Sakib Khan Pathan, Jolio C. Ramrez pacheco, “Accurate modeling of VOIP traffic QOS parameters in correct and  future Networks with Multi fractional and markermodels”  Accepted version for mathematical and computer modelling.  Journal Else vier(2010)

11.    M.Vonznak, A.Kovac and M.Halas “Effective packet loss Estimation on VOIP Jitter Buffer”. Research and developmentfor innovations project. Slovak university of
Technology Bratislava (2012).

12.    G. Vennila, MSK Mani Kandan, “A scalable detection technique for real-time transport protocol (RTP) flooding attacks in Voip Network”. 6th International conferences on advances in computing & communications ICACC, Pg 893-901, 6-8 september 2016, cochin India. (2016)   

13.    Stylianos Karapantazis, Fotini-Niovi Pavlidou “VoIP: A comprehensive survey on a promising technology”  Journal of Computer Networks 53 pg 2050–2090 (2009)

14.    Un-Ku Moon, Karti Mayaram, and John T. Stonick, “Spectral Analysis of Time-Domain Phase Jitter Measurements” IEEE transactions  on circuits and systems—ii: analog and digital signal processing, pg 321 – 371, vol. 49, no. 5, may 2002

15.    Claude-Joachim Hamann, Steffen Zschaler  “Scheduling Real-Time Components Using Jitter-Constrained Streams” Operating Systems Group, Fakult¨at Informatik (2005)

16.    W. Mazurczyk, “VoIP Steganography and Its Detection—A Survey”Warsaw University of Technology. ACM Computing Surveys, Vol. 46, No. 2, Article 20, (November 2013), 21 pages.






C. Menaka M.C.A, N. Nagadeepa

Paper Title:

Lexical Tag Parsing, Contour Filter Refine and Multilevel Annotation Techniques for Extracting Relevant Cartoon Images

Abstract: Many number of techniques are used in the existing systems to classify the images in the process of web image classification. In this work, proposed technique considers two HTML tags namely alt and src. In a group of web pages these tags are taken into account to download the images. Mainly this approach considers the cartoon image category web link then images can be extracted and stored. LTP techniques is applied here to parse the given tags. Images are clustered and stored in their respective folders as per the category after clustering process. CFR algorithm is used here to refine the images for storing. MIA technique is applied here to give annotation for all images which is in the cluster for best retrieval. Finally based upon the given input as image resultant image can be searched from various available clusters and return to the user along with its detailed description.

Image clustering, LTP, MIA, CFR, Image annotation, SIC.


1.     S. Xia, Z. Q. Xiang, Y. X. Zou* ADSPLAB/EL LIP, “Integrating Visual and Textual Features for Web Image Clustering”, IEEE International Conference on Multimedia Big Data.
2.     Shukui Bo, Yongju Jing ,” Image Clustering Using Mean Shift Algorithm” Fourth International Conference on Computational Intelligence and Communication Networks.

3.     A.Kannan, Dr.V.Mohan, Dr. Anbazhagan, “Image Clustering and Retrieval using Image Mining Techniques” IEEE International Conference on Computational Intelligence and Computing Research.

4.     Felci Rajam and S.Valli, A survey on content based image retrieval, Life science journal 2013; 10(2) June 2013.

5.     Allan hanbury, “A survey of methods for Image annotation”, International journal of computer applications, Volume 37 No.6,January 2012.

6.     C.Wang, F.Jing , L.Zhang, H.Zhang, “content based image annotation refinement “, proc. of CVPR,2007.






Prasanna R, Rammohan Y. S, Venkateswaran R, CH Satyaprasad

Paper Title:

Development of Testing Fixture for Space Borne Optical Component Measurement

Abstract:  This paper presents the process of design and development of testing fixture for measuring linear and angular errors in semi-finished optical components that are used in  space born telescopes.. The telescopes used in earth observation satellites have reflective optical systems or refractive optical systems. Reflective optical systems consist of large size mirrors and refractive systems consist of multi element lens assemblies. Refractive telescope consists of multiple lens elements which have to be fabricated and positioned accurately to get the required image quality. Fabrication of lens elements is a critical process and various parameters have to be measured and controlled accurately during the course of their fabrication. Tilt and decenter of the lens surfaces are two such critical parameters that have to be controlled within few microns. A testing fixture is developed to measure these errors to an accuracy of 20 microns in the lens elements during their fabrication with minimum measurement time.

 Angular & linear error, high accuracy, measurement, semi-finished space borne optical component.


1.    John filhaber, Zygo corp, How the wedge and decenter affect aspheric optics.
2.    Brandon Light Optimax system, 6367 dean parkway, Ontario, Ny USA,20 Apr 11.

3.    Lin Li,,Ke Wang,Yan Yan,Xudong Song,and Zhicheng Liu,Reasearch on calculation of the IOL titl and Decenterion based on surface Fitting, Research Article, Volume 2013,Article ID 572530.

4.    Poonam D. Chavan, Komal M.Barge,A study of ring gear runout checking fixture, International Journal for research in Applied Science & Engineering Technology, Volume 3IssueV,May 2015,ISSN:2321-9653.

5.    Karl T.Ulrich, steven D. Eppinger, Anitha Goyal, Product Design and Development (Mc Graw Hill education (India) private limited,New delhi 110 016,twelfth edition reprint 2014)






Anurag Tiwari, Sonal Rai

Paper Title:

An Optimal Approach To Achieve Effective Email Marketing: Review

Abstract: Email Marketing has been emerging as a most powerful medium of marketing. In beginning time email had been using in a very small scale and area. People were using email to contact with their friends and for their official communication. But as the time grows email has started using in business communication. Peoples started using email for the communication with their customers, users, clients. And later this form of marketing is considered as email marketing. Here the point is for doing the best effective email marketing to achieve our goal however all the ESP are providing the basic facility of sending emails in their ESP plans. We can’t instantly make the rules and method for the best effective email marketing, but we can always make it better by observing and analyze the email campaign sent and received over a period of time along with the behavior of the reader who is finally responsible for opening an email.

  Email Marketing, Email Verification, Domain Verification, Spf & Dkim.


1.       Response Goodarz Javadian Dehkordi1, Samin Rezvani1, Muhammad Sabbir Rahman1, Firoozeh Fouladivanda1 Neda Nahid1A Conceptual Study on E-marketing and Its Operation on Firm's Promotion and Understanding Customer’s & Samaneh Faramarzi Jouya2 International Journal of Business and Management; page5,Vol. 7, No. 19; 2012 ISSN 1833-3850 E-ISSN 1833-8119 Published by Canadian Center of Science and Education.
2.       Manish Kumar* A Countermeasure Technique for Email Spoofing Volume 4, No. 2, Jan-Feb 2013,page3, International Journal of Advanced Research in Computer Science ISSN No. 0976-5697     ,Dr. M. Hanumanthappa  ,Dr. T.V. Suresh Kumar.

3.       Jacopo Soriano, Timothy Au and David Banks Text Mining in Computational Advertising Department of Statistical Science, Duke

4.       University, Durham, NC, page 1-2,USA Received 12 January 2013; revised 8 May 2013; accepted 14 May 2013 DOI:10.1002/sam.11197 Published online in Wiley Online Library (wileyonlinelibrary.com).

5.       Rekha 1,International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 6 - May 2014 ISSN: 2231-5381 http://www.ijettjournal.org Page 1 A Review on Different Spam Detection Approaches, Sandeep Negi 2

6.       Siti-Hajar-Aminah Ali1, Seiichi Ozawa1Journal of Intelligent Learning Systems and Applications, 2015, 7, 42-57 Published Online May 2015 in SciRes.http://www.scirp.org/journal/jilsahttp://dx.doi.org/10.4236/jilsa.2015.72005 How to cite this paper: Ali, S.-H.-A., Ozawa, S., Nakazato, J., Ban, T. and Shimamura, J. (2015) An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing. Journal of Intelligent Learning Systems and Applications, 7, 42-57.

7.       Bryan Klimt and Yiming Yang ,The Enron Corpus: A New Dataset for Email Classification Research Language Technologies Institute Carnegie

8.       Mellon University Pittsburgh, PA 15213-8213, USA {bklimt,yiming}@cs.cmu.edu.

9.       LEE Gek Ling Baker, A. (2003). Email etiquette. Retrieved on June 15, 2009, from http://oit.wvu.edu/email/ Email%20Etiquette.pdf Lesikar, R., Flatley, M.E., &
Rentz, K. (2008). Email. Business communication – Making connections in a digital world (11th ed.), pp. 96-109. New York: McGraw-Hill Irwin. The OWL at Purdue (2008). OWL Materials: Email etiquette. Retrieved on June 15, 2009, from http:// owl.english.purdue.edu/owl/resource/636/01/

10.    A Trend Micro Research Paper Concerns Regarding Flaws in the New DKIM Standard Douglas Otis (Forward-Looking Threat Research Team Dave Crocker. (June 21, 2011). CircleID. “Searching Under Lampposts with DKIM.” Last accessed September11,2013, http://www.circleid.com/posts/searching_under_lampposts_with_dkim/.

11.    E. Fariborzi and M. Zahedifard, International Journal of e-Education, e-Business, e-Management and e-Learning, Vol. 2, No. 3, June 2012E-mail Marketing: Advantages, Disadvantages andImproving Techniques.

12.    An Experian Marketing Services’ study. 2013 Email Market StudyHow today’s email marketers are connecting,engaging and inspiring their customers December 2013,page3.

13.    Five new failings of email marketing withbest practice solutionsAustralian research into email marketing ACMA, Australia in the Digital Economy, page2,online participation report, Roy Morgangraph,http://www.acma.gov.au/webwr/aba/about/recruitment/online_participation_aust_in_digital_economy.pdf  CheetahMail
Professional Services Department Study, 2008.

14.    How It Is Hurting Email and Degrading Life on the Internet For release at 6 p.m. [Eastern] October 22 2003 Deborah Fallows, Senior Research Fellow PEW INTERNET & AMERICAN LIFE PROJECT 1100 CONNECTICUT AVENUE, page2,NW – SUITE 710 WASHINGTON, D.C. 20036 202-296-0019 http://www.pewinternet.org/ Spam How It Is

15.    Hurting Email and Degrading Life on the Internet For release at 6 p.m. [Eastern] October 22 2003 Deborah Fallows, Senior Research Fellow.

16.    Yingjie Zhou, Mark Goldberg, Malik Magdon-Ismail, and   William A. Wallace Strategies for Cleaning Organizational Emails with an Application to Enron Email Dataset page3,  Yingjie Zhou  Rensselaer Polytechnic Institute  zhouy5@rpi.edu .

17.    The Economics of Spam_ Justin M. Rao Microsoft Research David H. ReileyGoogle,page 1, Inc. Keywords: spam, externalities, email, arms race, screening JEL Codes: D02, D23, D62

18.    R. Miller, E.Y.A. Charles  Department of Computer Science,  University of Jaffna, Sri Lanka  Millerfeeds@gmail.com. 2016 International Conference on Advances in ICT for Emerging Regions (ICTer): 058 - 065  978-1-5090-6078-8/16/$31.00 ©2016 IEEE  A psychological based analysis of Marketing Email Subject Lines.






P. Srinivasa Rao, S. Pallam Shetty

Paper Title:

Fuzzy Based Routing Information Protocol (Rip) To Enhance the Performance in Mobile Ad Hoc Networks

Abstract:  MANET has wide application in communication of data. MANET is defined as self-configuring ad hoc network model mobile nodes. Routing in network layer protocol it is discovers the best available path from source to destination. The performance of MANET routing protocol is evaluated different QOS parameters such as throughput, end-to-end delay, load etc. an attempt has been made to compare the performance of Fuzzy logic based RIP with traditional RIP using OPNET simulator. The simulation are carried out by varying update timer counter interval time dynamically calculating the timer values by using Fuzzy logic. In the Fuzzy base RIP outperforms for small network when compare with traditional RIP. The FLBUDTCRIP has the better performance than RIP in small network sizes. The throughput was enhanced by 2.25%, Traffic sent was enhanced by 5.39% , Traffic received was enhanced by 5.18%. The performance comparision of RIP and FLBUDTCRIP for medium size networks in terms of performance metrics throughput, Average end-to-end delay, Load, Traffic sent, Traffic received . The end-to-end delay was reduced by 0.25% , load was reduced by 0.6%.The performance comparison of RIP and FLBUDTCRIP for Large size networks in terms of performance metrics throughput, Average end-to-end delay , Load, Traffic sent, Traffic received. The end-to-end delay was reduced by 0.76% , load was reduced by 1.278%,Traffic sent was enhanced by 1.68%.The FLBUDTCRIP not suitable for large network sizes.

RIP, FLBUDTC, Fuzzy system, Update timer counter interval time, throughput, delay, load .


1.    Fuzzy logic weighted multi-criteria of dynamic route lifetime for reliable multicast routing in ad hoc networks Bey-Ling Su, Ming-Shi Wang, Yueh-Ming Huang * Department of Engineering Science, National Cheng Kung University, Tainan 700, Taiwan, ROC Available online at www.sciencedirect.com Expert Systems with Applications 35 (2008) 476
2.    2013 AASRI Conference on Parallel and Distributed Computing Systems Analysis of Reactive Routing Protocol Using Fuzzy Inference System M. N. Doja, [3]Bashir Alam, Vivek Sharma* Department of Computer Engineering, Jamia Millia Islamia New Delhi, 110025, India.

3.    Wong, Y.F., Wong, W.C.: A fuzzy-decision-based routing protocol for mobile ad hoc networks. In: 10th IEEE International Conference on Network, pp. 317–322 (2002)

4.    Goswami, M.M., Dharaskar, R.V., Thakare, V.M.: Fuzzy Ant Colony Based Routing Protocol For Mobile Ad Hoc Network. In: International Conference on Computer Engineering and Technology, ICCET 2009, pp. 438–448 (2009)

5.    S. N. Sivanandam, S. Sumathi , S. N. Deepa, “Introduction to Fuzzy Logic using MATLAB” Springer publishes, 2007.

6.    Sameena Naaz, Afshar Alam, Ranjit Biswas, “Effect of different defuzzification methods in a fuzzy based load balancing application “IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 1, September 2011, pp.261-267.

7.    S. Murthy, J.J. Garcia-Luna-Aceves, “An efficient routing protocol for wireless networks,” ACM Mobile Networks and App.J.,Special issue on routing in Mobile communication Networks, October1996, Vol.1, Issue 2, pp. 183-197.

8.    HuiYao Zhang, Marek E. Bialkowski, “An Extended AODV Protocol for VoIP Application in Mobile Ad Hoc Network”,ECTTransactions on Electrical Eng., Electronics and Communications, Vol.7, No.2 August 2009, pp.114- 121.

9.    Sunil Taneja, Ashwani Kush, “A Survey of Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Innovation, Management and Technology, Vol. 1,No. 3,( ISSN: 2010-0248) August 2010, pp.279-285






Asibor, Raphael Ehikhuemhen, Omokhuale, Emmanuel

Paper Title:

Micropolar Fluid Behavior With Constant Pressure, Permeability, Heat And Mass Transfer

Abstract:  Micropolar fluid behavior on convective boundary layer flow with constant pressure, permeability, heat and mass transfer have been studied analytically. Perturbation technique is used as the main tool for the analytic approach. Some non-dimensional quantities are used to transform the governing equations. The non-dimensional equations for the momentum, angular momentum, temperature and concentration are solved analytically to obtain approximate solutions by the above mentioned technique. With the aid of graphs, the effects of various important parameters associated with the velocity, micro rotation, temperature and concentration fields within the boundary layer were examined and discussed. Further, the skin friction coefficients at the plate was computed and the influence of physical parameters of engineering interest were discussed.

Mass transfer, Micropolar fluid, Magneto-hydrodynamic, Porous medium


1.       Abo-Eldahab, E. M. and Ghonaim, A. F. (2005). Radiation effect on heat transfer of a micropolar fluid through a porous medium, Journal of Applied Mechanics and Computation, 169, 500-510.
2.       Ahmad, K., Ishak, A. and Nazar, R. C. (2013). Micropolar fluid flow and heat transfer over a nonlinearly stretching plate with viscous dissipation. Mathematical Problem in Engineering, 2013, 1 – 5.

3.       Ashraf, M and Batool, K. (2013). MHD flow and mass transfer of a micropolar fluid over a stretchable disk. Journal of Theoretical and Applied Mechanics, 51(1), 25 – 38.

4.       Aurangzaib, A. R., Kasim, M., Mohammed, N. F. and Shafie, S. (2013). Unsteady MHD mixed convection flow with heat and mass transfer over a vertical plate in a Micropolar fluid – Saturated porous medium. Journal of Applied Science and Engineering, 16(2), 141 – 150.

5.       El-Amin, M. F. (2001). MHD free convection and mass transfer flow in micropolar fluid with constant suction. Journal of Magnetic Materials, 234, 567-574.

6.       Eringen, A. C. (1966). Theory of micropolar fluids, Journal of Mathematics Mechanics, 16, 1-18.

7.       Hassanien, J. A. and Gorla, R. S. R. (1990). Heat transfer in a micropolar fluid from a non-Isothermal stretching sheet with suction and blowing, Acta Mechanics, 84, 191-199.

8.       Haque, M. Z., Alam, M. M., Ferdows, M. and Postelncu, A. (2012). Micropolar fluid behaviors on steady MHD free convection and mass transfer flow with constant heat and mass fluxes, joule heating and viscous dissipation. Journal of King Saud University – Engineering Sciences, 24, 71 – 84.

9.       Hussanan, A., Salleh, M. Z., Khan, I. and Tahar, R. M. (2016). Heat and mass transfer in a micropolar fluid with Newtonian heating; an exact analysis. Neural Computing Applications. DIO.1007/s00521-016-2516-0.

10.    Islam A., Ali, B. H. M., Islam, M. R. and Mohiuddin, S. M. (2011). MHD micropolar fluid flow through vertical porous medium. Acedemic Research International, 1(3), 381-393.

11.    Khedre, M.-E. M., Chamkha, A, J. and Bayomi, M. (2009). MHD flow of a micropolar fluid past a stretched permeable surface with heat generation or absorption. Nonlinear Analysis: Modelling and Control, 14, 27-40.

12.    Kim, Y. J. and Lee, J. C. (2002). Analytical studies on MHD oscillatory flow of a micropolar fluid over a vertical porous plate, Surface and Coatings Technology, 171, 187-193.

13.    Kim, Y. J. (2001). Unsteady MHD micropolar flow and heat transfer over a vertical porous moving plate with variable suction. Proceedings of the 2nd International Conference of Computational Heat and Mass transfer.

14.    Nayok, M. K., Dash, G. C. and Singh, L. P. (2015). Flow and mass transfer analysis of a Micropolar fluid in a vertical channel with heat source and chemical reaction. ASME Journals -2015-Series: Modelling B; 84(1). 69 – 81.

15.    Olajuwon, B. I. and Oahimire, J. I. (2013). Unsteady free convection heat and mass transfer in an MHD Micropolar fluid in the presence of thermo diffusion and thermal radiation. International Journal of Pure and Applied Mathematics, 84(2), 15 – 37.

16.    Patil, P. M. and Kulkarni P. S. (2008). Effects of chemical reaction on free convective flow of polar fluid through a porous medium in the presence of internal heat generation, International Journal of Thermal Science, 47, 1043-1054.

17.    Rahman, M. M. and Sultana, T. (2008). Radiative Heat transfer flow of a micropolar fluid with variable heat flux in a porous medium. Nonlinear Analysis: Modelling
and Control, 13(1), 71-87.

18.    Reddy, M. G. and Reddy, G. R. S. (2017). Micropolar fluid flow over a non-linear stretching convectively heated vertical surface in the presence of Cathaneo-Christov heat flux and viscous dissipation. Frontiers in Heat and Mass Transfer, 8(20), 1 – 9.

19.    Satya, S. S. and Dubey, G. K. (2011). Unsteady MHD heat and mass free convection flow of polar fluids past a vertical moving porous medium with heat generation and thermal diffusion.

20.    Nonlinear Analysis: Modelling and Control, 11, 28-40.

21.    Singh, K. and Kumar, M. (2016). Influence of chemical reaction on heat and mass transfer flow of a micropolar fluid over a permeable channel with radiation and heat generation. Journal of Thermodynamics, 2016, 1 – 10.

22.    Sharma, R. C. and Gupta, U. (1995). Thermal convection in micropolar fluids in a porous medium, International Journal of Engineering Science, 33(13). 1887-1892.

23.    Sultana, M., Haque, M. M., Alam, M. M., Ferdows, M. and Postelnicu, A. (2011). Micropolar fluid behavior on MHD Heat transfer flow through a porous medium with induced magnatic field. European Journal of Scientific Research, 53(3), 477-490.

24.    Nadeem et al. (2011) investigated the boundary layer flow of a Jeffery fluid over exponentially stretching surface. The effect of thermal radiation was carried out for two cases. The reduced similarity equations were solved by homotopy analysis method (HAM).