scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Engineering Development and Research in 2015"



Journal Article
TL;DR: Intrusion Prevention and the IDS tools that are employed to detect these attacks and some open source tools to prevent and detection of intrusion are discussed and how can the authors use Open Source tools in their system are discussed.
Abstract: Network based technology and Cloud Computing is becoming popular day by day as many enterprise applications and data are moving into cloud or Network based platforms. Because of the distributed and easy accessible nature, these services are provided over the Internet using known networking protocols, Protocol standards and Protocol formats under the supervision of different management’s tools and programming language. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion so many Attacks like Denial of Service (DDOS), Buffer overflows, Sniffer attacks and Application-Layer attacks have become a common issue today. Recent security incidents and analysis Have manual response to such attacks and resolve that attacks are no longer feasible. In Internet and Network system application or platform facing various types of attacks in every day. Intrusion Prevention and the IDS tools that are employed to detect these attacks and discuss some open source tools to prevent and detection of intrusion and how can we use Open Source tools in our system. Snort is an open source Network Intrusion Detection System (NIDS) which is available free of cost. NIDS is the type of Intrusion Detection System (IDS) that is used for scanning data flowing on the network. There is also host-based intrusion detection systems, which are installed on a particular host and detect attacks targeted to that host only. Although all intrusion detection methods are still new, Snort is ranked among the top quality systems available today.

25 citations


Journal Article
TL;DR: This work in progress paper illustrates an existing robot designed by us, which can be controlled by hand gestures using a wearable device called as MYO, which has its sensors embedded in itself which recognizes the gesture commands and acts accordingly.
Abstract: There is a huge demand for military robots in almost all the countries which comes under the field of human computer interaction and artificial intelligence. There are many different ways of operating a robot: self controlled, automatic controlled etc. Also, gesture controlled operation mode is on the rise. This acted as our motivation to develop a gesture controlled robot using MYO armband. The word ‘MYO’ has created a buzz in the technological world by its astonishing features and its utility in various fields. Its introduction as a armband that can wrap around our arm to control robots with our movements and gestures has opened new wide doors of its experimentation with robotics. This independently working gesture recognition system does not rely on any external sensors (motion capturing system) as it has its sensors embedded in itself which recognizes the gesture commands and acts accordingly. This armband can be worn by soldiers to operate robots to fight against enemies. This work in progress paper illustrates an existing robot designed by us, which can be controlled by hand gestures using a wearable device called as MYO. We would like to investigate more on this and implement, such that the robot can be interfaced with a MYO armband for a successful control.

23 citations




Journal Article
TL;DR: Cryogenic storage vessels are pressure vessels used for storage cryogenic liquids with minimum heat in-leak into the vessel from the outside as far as possible and the utmost care is taken to design a storage vessel satisfying both mechanical and thermal design.
Abstract: After a cryogenic fluid has been liquefied and purified to the desired level; it must then be stored and transported. Cryogenic fluid storage-vessel and transfer line design has progressed rapidly as a result of the growing use of cryogenic liquids in many areas of engineering and science. The development of the Dewar vessel represented such an improvement in cryogenic fluid storage vessels that it could be classed as a “break-through” in container design. The high performance storage vessels in use today are based on the concept of the Dewar design principle a double walled container with the space between the two vessels filled with an insulation and the evacuated from the space. The detailed conventional-cryogenic-fluid storage vessel design is covered in such standards as the American society of mechanical engineers (ASME) boiler and pressure vessel code, section VIII (1983), and British Standards Institution standards 1500 or 1515. Most users require that the vessels be designed, fabricated, and tested according to the code for sizes larger than about 250 dm3 i.e. 66 U.S. gallons, because of the proven safety code design. Cryogenic storage vessels are pressure vessels are used for storage cryogenic liquids with minimum heat in-leak into the vessel from the outside as far as possible. The challenge of design is to use such materials that do not lose their desirable properties at such a low temperature. Here the utmost care is taken to design a storage vessel satisfying both mechanical and thermal design. The results will be compared to the existing vessel of industry.

7 citations


Journal Article
TL;DR: In this article, the authors have discussed the current status, various issues, regulatory policies and incentives for promotion of solar PV Power Park in Rajasthan along with a case study, site report and geotechnical investigation for Photovoltaic Solar Power Plant.
Abstract: The sun produces an unbelievable amount of energy that reaches the earth. The amount of energy that is absorbed by the earth in one hour is more energy than mankind uses in one year. The total amount of solar energy reaching the earth in one year is huge twice as much energy as ever existed from all sources of coal, oil, natural gas, and uranium combined. With its abundance of sunlight, India has tremendous potential to emerge as one of the leaders in solar power generation. According to the Government of India's policy for the solar sector - Jawaharlal Nehru Nationaln Solar Mission (JNNSM) - a target of 20 GW of solar installations by 2022 has been set. India is endowed with vast solar energy potential, About 5,000 trillion kWh per year energy is incident over India's land area with most parts receiving 4-7 kWh per sq. m per day. Solar energy intensity varies geographically in India, but Western thar Rajasthan receives the highest annual solar radiation energy. Its western thar part blessed with abundant natural resource with more then 325 days of sunshine every year. Jodhpur , popularly known as the sun city of india. A dedicated 400 kV network with associated 220 & 132 kV strong transmission network in Barmer, Jaisalmer, Jodhpur, Bikaner area was created. Indeed, Rajasthan is the only State in India which has established a strong power evacuation network in desert area. Hence current status, various issues, regulatory policies and incentives for promotion of Solar PV Power Parks in Rajasthan along with a case study , site report and geotechnical investigation for Photovoltaic Solar Power Plant has been discussed in this Paper.

7 citations


Journal Article
TL;DR: In this article, an effort has been made to find out the perceived risks of Indian customers with reference to online shopping, and the risk in online shopping is mainly concerned with the misuse of credit cards, leakage of personnel information, product risk and risk of convenience.
Abstract: In the rapidly changing time and especially in India where service sector is witnessing exponential growth; the online marketing sector is all set to witness bright future ahead. The increased use of internet in India provides greater prospects for online shopping. Despite of this increased use of internet, there are several factors affecting Indian consumer’s online buying behaviour. And if the online retailers make aware themselves about these factors they can further develop their prospects and converts potential customers into active ones. In this research paper an effort has been made to find out the perceived risks of Indian customers with reference to online shopping. The risk in online shopping is mainly concerned with the misuse of credit cards, leakage of personnel information, product risk and risk of convenience.

7 citations



Journal Article
TL;DR: This paper proposes a novel approach for dynamic clustering in WSN using an improved Simulated Annealing based Neural Network, which shows several improvements over the static clustering techniques in terms of throughput, delay and energy.
Abstract: Wireless Sensor Networks finds its utility in several applications and has gained significant attention from researchers in recent times. Clustering forms one of the main phases for efficient implementation of transmission algorithms. There have been attempts to address this problem using static clustering but these approaches are unable to utilize several information of the nodes which can further improve the efficiency of the network. This paper proposes a novel approach for dynamic clustering in WSN using an improved Simulated Annealing based Neural Network. Clusters are formed dynamically based on the information present in the nodes. A cost function based on residual energy and distance is optimized when a threshold criterion is satisfied. Re-clustering of nodes takes place when the residual energy of battery falls below the proposed threshold. Routing is done using DSR algorithm. Simulated Annealing technique is used to optimize the weights of Neural Network in back propagation method. Results show several improvements over the static clustering techniques in terms of throughput, delay and energy.

6 citations


Journal Article
TL;DR: This paper is about to use nonconventional energy source for power generation by generating energy by air compression when vehicle passing from speed breaker generates electricity.
Abstract: Electricity is the most necessary form of the energy. We cannot even imagine our life without electricity. Consumption of the electricity is increase day by day. Nowadays most of the electricity is generated by conventional fossil fuels, eventually the conventional power sources will get depleted by the next few decades. This paper is about to use nonconventional energy source for power generation. Here we generate energy by air compression. All the setup is place under speed breaker when vehicle passing from speed breaker it generates electricity. Main benefit of this method is here we use wasted energy for power generation. ________________________________________________________________________________________________________

Journal Article
TL;DR: In this paper, the influence of abrasive jet machining (AJM) process parameters on material removal rate and diameter of holes of glass plates using silicon carbide abrasive particles was investigated.
Abstract: Use of abrasive jet has been in existence for over twenty years, but it is yet to reach its full potential in the construction industry. Abrasive jets were introduced in the United States during the 1970’s, and were utilized merely for cleaning purposes. As the technology developed to include abrasive jets, new applications were discovered. This paper deals with different experiments which were conducted to study the influence of abrasive jet machining (AJM) process parameters on material removal rate and diameter of holes of glass plates using silicon carbide abrasive particles. The experimental results of the present work are used to discuss the validity of proposed model as well as the other models. With the increase in stand tip distance (STD), the upper surface diameter and lower surface diameter of hole increases as it is in general observation of abrasive jet machining process. As the pressure increases, the material removal rate (MRR) is also increased. Index Terms Abrasive jet machining, stand of distance, Material removal rate, Glass material ________________________________________________________________________________________________________


Journal Article
TL;DR: In this paper, the advances made in engineering materials, their classification and the role/importance engineering materials in current day world vis-a-vis their properties and areas of application are reviewed.
Abstract: Materials had been in use since time immemorial. Our world is all about materials, which is why Materials Science and Engineering are taking prominence and centre-stage position in many developed and developing countries. Over the years there have been changes in man’s choice of materials for his engineering activities. The ages and times/period of man’s activities on earth are sometimes usually referred to by age and period when such materials were in vogue like the Stone Age, the Iron Age and the current Silicon age, etc. But the challenges of current world are constantly fuelling the discovery and development of new kinds of materials with the desired properties and the right cost to meet the challenges of the current day world. This article is, therefore, aimed at reviewing the advances made in engineering materials, their classification and the role/importance engineering materials in current day world vis-a-vis their properties and areas of application. ________________________________________________________________________________________________________

Journal Article
TL;DR: The results show that the BER performance is improved dramatically in low SNR than in high SNR, and the more accurate model is Rayleigh model which can be considered for developing multipath fading channel model.
Abstract: There are various kinds of channel used in wireless communication. This Paper shows a performance analysis on the basis of different fading channels. This is the comparative analysis with different kinds of modulation techniques. communication. The effects of noise on fading and property of the channel were tested. Here we have also measured the Bit Error Rate with respect to different modulation techniques and compare the rate in different channels. The results show that the BER performance is improved dramatically in low SNR than in high SNR. This is reasonable since at low SNR, white Gaussian noise dominate the BER which can be improved by enhancing SNR while in high SNR, phase estimation error dominate the BER error which cannot be improved by simply enhancing SNR. Next we have tested, analyzed and compared the performance of the channels. The more accurate model is Rayleigh model which can be considered for developing multipath fading channel model. IndexTerms Fading channels, Rayleigh fading, AWGN Channel, Rician channel, BER, SNR. ________________________________________________________________________________________________________

Journal Article
TL;DR: This paper deals with automatically collecting the Water consumption by a customer and also detecting the leakages in the water distribution system and GSM and ZigBee technology automatically collects consumption, diagnoses, and collects status data from energy meter and transfers that data to a central database for billing, troubleshooting, and analyzing.
Abstract: This paper deals with automatically collecting the Water consumption by a customer and also detecting the leakages in the water distribution system. Water leakage is an important component of water losses. In addition to raising consumer awareness of their water use, metering is also an important way to identify and localize water leakage. A leak detection program can be highly proactive, helping water utilities automate water systems, detecting problem areas earlier, giving customers tools to monitor water use, providing more accurate rates and reducing demand. The objective is to overcome the disadvantages of using current meter technology and make the billing and troubleshooting process faster along with reducing the wastage of water. GSM and ZigBee technology automatically collects consumption, diagnoses, and collects status data from energy meter and transferring that data to a central database for billing, troubleshooting, and analyzing. This advancement saves utility providers the expense of periodic trips to each physical location to read a meter. Another advantage is billing can be based on near real time consumption rather than on estimates based on previous or predicted consumption. This timely information coupled with analysis, can help both utility providers and customers better control to the use and production of water consumption. Index Terms Flow conservation, Leakage detection, Transceiver, GSM, ZigBee ________________________________________________________________________________________________________

Journal Article
TL;DR: “Performance Analysis and Augmentation of K-means Clustering, based approach for Human Detection in Videos” takes us to video level processing techniques to identify human from video.
Abstract: “Performance Analysis and Augmentation of K-means Clustering, based approach for Human Detection in Videos” takes us to video level processing techniques to identify human from video. Surveillance System have become increasingly popular in the globalization process. Intelligent Video Surveillance system based on image recognition is widely used to effectively help to provide security, safety and prevents many crimes. Due to the high Complexity in techniques such as real-time processing and image contents analysis/understanding. However detecting humans in images and videos still challenging task owing to their variable appearance caused by variety of clothes shadows, articulation and illumination situations, and unpredictable poses that they can adopt. In this thesis there is a brief survey of different object detection techniques, as well as human detection techniques like fuzzy logic, single Gaussian model, mixture of Gaussian model, Background Subtraction Technique, human body Pose Recognition ,appearance based ,motion-based and hybrid methods. Hear Adaptive Background subtraction method and K-means clustering used for detection of the human .It works efficient for the indoor environment. There is near about 67-70% human detection from the video frame for the indoor. For the outdoor there are so many parameters which effect the human detection, so it is not efficient.

Journal Article
TL;DR: This paper defines a recognition mechanism for a recognition fully distributed of chronicle using Continuous Query Language (CQL), and this approach is tested in a classical Web Service Application.
Abstract: The chronicles paradigm has been used to determine fault in dynamic systems, allows modeling the temporal relationships between observable events and describing the patterns of behavior of the system. The mechanisms used until now usually use semi-centralized approaches, which consist of a central component, that is responsible for making the final inference about the fault diagnosis of the system based on the information collected from the local diagnosers. This model has problems when is implemented for monitoring very large systems, due to the bottleneck representing the central component. In this paper we define a recognition mechanism for a recognition fully distributed of chronicle using Continuous Query Language (CQL). This approach is tested in a classical Web Service Application. Index Terms Distributed Pattern Recognition, Temporal patterns recognition, Chronicles, Distributed Fault Diagnostic, Web service composition, fault tolerance ________________________________________________________________________________________________________

Journal Article
TL;DR: By using this project, one can detect the multiple faults of three phase transmission lines one can monitor the Temperature, Voltage, Current by means of GSM modem by sending message.
Abstract: The microcontroller has been recognized as a general purpose building block for intelligent digital system. A microcontroller is a microprocessor system build on a single chip. Major features of PIC 16f877A microcontroller are 16 bit CPU optimized for control applications, Extensive Boolean processing capabilities, On-Chip Flash program memory, On-Chip data RAM, Bi-directional and Individual Addressable Input and Output Lines, Multiple 16-Bit Timer or Counter, Full Duplex UART, Multiple Source/Vector/Priority Interrupt structure, On-Chip Oscillator and Clock circuitry, On-Chip EEPROM, SPI Serial Bus Interface, Watch Dog Timer. In this project, we are using one Temperature sensor, Microcontroller PIC16F877A, LCD for displaying the faults and parameters, GSM Board and XBEE used to send the fault message to electricity board. In this project, we are using one Temperature sensor, ADC, Microcontroller 8051, LCD for displaying the faults and parameters, GSM board used to send the fault message to electricity board. By using this project, we can detect the multiple faults of three phase transmission lines one can monitor the Temperature, Voltage, Current by means of GSM modem by sending message. KeywordsMicrocontroller, Transformer, fault detection and diagnosis, LCD, GSM, XBEE ________________________________________________________________________________________________________

Journal Article
TL;DR: In this article, pure and Gd 3+ doped Titanium dioxide nanocrystals were prepared using the sol-gel method using Titanium isopropoxide (TIP) as the precursor for Titania sol preparation.
Abstract: Pure and Gd 3+ doped Titanium dioxide nanocrystals were prepared using the sol – gel method. Titanium isopropoxide (TIP) was used as the precursor for Titania sol preparation. X-ray powder diffraction confirms that the particles crystallize purely in anatase phase and the broadening of Bragg’s peaks ascertains smaller particles size. The formation of uneven spherical grains composed of small primary titania particles are observed from SEM. The UV-Vis spectral analysis was carried out between 200 nm and 800 nm. More over the presence of Gadolinium had resulted in a shift of 10 nm from the undoped TiO2. The FT-IR and FT-Raman spectra confirmed the anatase phase of Titanium dioxide. ________________________________________________________________________________________________________

Journal Article
TL;DR: Discussion of these research papers emphasizes the scheduling vulnerabilities of existent as well as new techniques in the field of distributed file system.
Abstract: Cloud computing has major role in parallel and distributed data processing. Hadoop environment is mainly used for storage and processing of such data. In Hadoop, MapReduce framework is a programming model which processes terabytes of data in very less time. MapReduce framework uses a task scheduling method to schedule task. There are various methods available for scheduling task in MapReduce framework. Scheduling of jobs parallely across nodes is a major concern in distrusted file system. Discussion of these research papers emphasizes the scheduling vulnerabilities of existent as well as new techniques in the field of distributed file system.


Journal Article
TL;DR: The use of 7 Quality control tools is best way to reduce rejections and defects of product after analyzing of manufacturing process as mentioned in this paper. But the quality control tools are used to increase the level of standard products which they require as vision of an organization.
Abstract: Increasing productivity and profitability are main objectives of any organization. Many tools and techniques are used to reduce rejections and defects of product. Most of the rejections and defects are occurred due to improper control of quality of product. So use of 7 Quality control tools is best way to reduce rejections and defects of product after analyzing of manufacturing process. Another advantage is increasing customer satisfaction by use of 7 Quality control tools in today competitive market. Based on application of these tools will increase the level of standard products which they require as vision of an organization.

Journal Article
TL;DR: Some routing attacks and challenges faced by WSNs and MANETs are discussed and some secure routing protocols are added and also some secure routes are added to improve routing security in MANET.
Abstract: A Mobile Ad hoc Network (MANET) consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure. Wireless Sensor Networks (WSN) have become a growing area of research and development due to the tremendous number of applications that can greatly benefit from such systems and has lead to the development of tiny, cheap, disposable and self-contained battery powered computers, known as sensor nodes or ―motes‖, which can accept input from an attached sensor, process this input data and transmit the results wirelessly to the transit network. Routing is a basic step for data exchange. In wireless ad-hoc networks each node acts as a router and executes a routing protocol. Wireless ad-hoc networks are highly resource constrained in terms of network topology, memory and computation power. The reliable data transfer is a difficult task in mobile ad-hoc networks because of resource constraints. Despite making such sensor networks possible, the broadcasting nature of the sensors presents a number of security threats when deployed for certain applications like military, surveillances etc .The problem of security is due to the wireless nature of the sensor networks and constrained nature of resources on the wireless sensor nodes, which means that security architectures used for traditional wireless networks are not viable. However, wireless MANET is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, limited bandwidth and limited battery power. Generally, routing security in MANETs appears to be a problem that is not trivial to solve. It is observed that the routing attacks have severe impact on MANET than WSN. In this paper we discuss some routing attacks and challenges faced by WSNs and MANETs and also add some secure routing protocols. IndexTerms Wireless Sensor Networks (WSN), Mobile Ad-Hoc Networks(MANET), Routing Protocols, Threats and Security Attacks. ________________________________________________________________________________________________________

Journal Article
TL;DR: A system based on the concept of web services which is implemented on Android mobile application as well as on PC that communicates with the database residing on a remote server that provides unique identification numbers to the persons who using this system.
Abstract: College Management Software is web enabled software designed to manage the entire Operations of an institution. College Management Software is a simple yet powerful one joint integrated platform that connects all the various departments of an institution like Administration, Account, Student section, Student and many more specialized modules. We have seen over the years that the process of notice boards, important notification about academics has been carried out manually almost across all educational institutions.The process is not only time consuming but also inefficient.Today, we need not to maintain paper based Notice boards. Also in this system we are going to add the web based technology using which we can get the notifications given by the institutes. Following this thought, we have developed a system based on the concept of web services which is implemented on Android mobile application as well as on PC that communicates with the database residing on a remote server. The Unique ID system provides unique identificationnumbers to the persons who using this system. UID Number which would not justhelp the admin to track down individuals, but would makelife far easier for users as they would not have to submit multiple documents each time because those will be available and to be used.

Journal Article
TL;DR: In this paper, the authors presented an overview of a proposed tall building design platform that has the aim of determining the optimal external shape and structural system for tall buildings subject to aerodynamic loads.
Abstract: Bluff body aerodynamics plays a critical role in the determination of the principal response of a high-rise building. Tall buildings can be susceptible to excessive motion during wind events that can cause occupant discomfort and reduce the overall appeal of the structure. Furthermore, these excessive motions can create high base loads, which can increase the cost of the structure. Structural engineers generally opt for optimizing the structural system or increasing modal mass to reduce wind-induced motion .This paper presents an overview of a proposed tall building design platform that has the aim of determining the optimal external shape and structural system for tall buildings subject to aerodynamic loads. The platform is intended to bridge the gap between the traditionally manual conceptual design stage and the more automated detailed design stage in an attempt to define a new generation of innovative tall buildings. The project work deals with the analysis of tall buildings with ANSYS Computational Fluid Dynamics (CFD). The model provided by ANSYS is used to find the behavior of building when subjected to wind load. A comparison is made between the effect of building shape on the wind-induced response of a structure through a comprehensive investigation of the building of different cross section based on the CFD results. Finally, the significance of aerodynamic modifications against wind excitation, which include modifications of building’s cross-sectional shape and its corner geometry, sculptured building tops, vertical openings through-building, are done. Index Terms Tall Building, shape effects, Finite Volume Analysis, Drag Coefficients, ANSYS, Computational Fluid Dynamics (CFD), Shape optimization of building ,Aerodynamic Modifications, Corner modification, Tapered building, Cross Section (C.S) ________________________________________________________________________________________________________

Journal Article
TL;DR: The paper describes about the searching in text document with its concepts of LSA (Latent Semantic Analysis), the technique of searching documents which is used to improve indexing of stored documents and search engine query performance.
Abstract: The paper describes about the searching in text document with its concepts. The searching of text relevant document with the help of keyword or query is known as information retrieval. The information retrieval technique which is used to improve indexing of stored documents and search engine query performance is known as LSA (Latent Semantic Analysis) is explained in this paper. LSA, the technique of searching documents, is also known as LSI (Latent Semantic Indexing). LSA involves a matrix operation called singular value decomposition, which is main component of analysis of LSA.

Journal Article
TL;DR: This paper attempts to acquire the FEA implementation for analysis and design optimization of C Frame of 100 ton Hydraulic Press Machine to reduce the thickness of the plates for the C frame structure in order to save the material and its cost.
Abstract: This paper attempts to acquire the FEA implementation for analysis and design optimization of C Frame of 100 ton Hydraulic Press Machine. Availability of limited resources for profit oriented manufacturing industries forces optimum use of available overall resources with a basic intention of cost saving approach. Design of a hydraulic press structure is of prime importance keeping in mind the design parameters and performance indicators and their relationship with proper knowledge of existing working conditions and application of load. By FEA implementation, attempts are being made to reduce the thickness of the plates for the C frame structure in order to save the material and its cost. Index Terms C Frame, Hydraulic press, stiffness, Finite element method.

Journal Article
TL;DR: This work has shown that Genetic Algorithm is an effective optimization technique to solve the community detection problem in Social network.
Abstract: Community detection has been an important research topic in complex networks.Community detection can be viewed as an optimization problem. Complex network can be easily represented in graph. Graph based data mining, is the extraction of novel and useful knowledge from a graph representation of data .There have been many algorithms proposed so far to detect community structures in complex networks, where most of the algorithms are not suitable for very large networks because of their time complexity. Genetic Algorithm is an effective optimization technique to solve the community detection problem in Social network. Social network is one type of Complex network. Social networks are defined as a set of actors and relationships that represent the interactions between entities in the network. To detect a Community in social network is main challenge.

Journal Article
TL;DR: In this paper, the authors have analyzed the load balancing problem in cloud computing and proposed an algorithm for load balancing which will work dynamically for optimal usage of resource utilization, which will make sure that all computing resources are circulated proficiently and fairly.
Abstract: Cloud computing can be define as a structured model that which defines computing services, in which resources as well as data are retrieve from cloud service supplier via internet through some well shaped web-based device and application. It provides the on demand services for various applications and infrastructure to the user. Cloud service providers are required to provide the service efficiently and effectively. For that, a cloud provider utilizes all the resource from the node. Thus, the node that are meant for creating a task in the cloud computing must be considered for efficient usage of the available resources. Resources have to be properly selected according to the properties of the task. By analyzing the present research on cloud computing, we have come to the most common and important issue of load balancing. Load balancing has been always a study topic whose purpose is to make sure that all computing resources are circulated proficiently and fairly. As numbers of users are increasing on the cloud, the load balancing has become the challenge for the cloud provider. Load balancing being subject of research, proposed algorithm for load balancing which will work dynamically for optimal usage of resource utilization. Index Terms – Load balancing, Cloud Computing, Load balancing technique , User base priority.