+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
FINAL YEAR PROJECT SOLUTIONS COMPUTERS & IT PROJECT LIST
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
.Net
Domain
1
Secure Data Retrieval For Decentralized Disruption-Tolerant
Military Networks
Cloud
Computing
2
Secure Data Sharing In Cloud Computing Using Revocable-
Storage Identity-Based Encryption
Cloud
Computing
3
Vpsearch: Achieving Verifiability For Privacy-Preserving Multi-
Keyword Search Over Encrypted Cloud Data
Cloud
Computing
4
World Wide Cloud Inter Hospital Access Health Care System
Cloud
Computing
5
Agriculture Marketing In Generation
Application
6
Inventory System For Electronic Factory
Application
7
ATM Application Using Key-logger And Mobile Number
Security
Application
8
A Secure Anti-Collusion Data Sharing Scheme For Dynamic
Groups In The Cloud
Cloud
Computing
9
User Monitoring System Using Lan
Networking
10
Smartcab: Online Booking System For Cab
Application
11
Private Over-Threshold Aggregation Protocols Over Distributed
Datasets
Cloud
Computing
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr No.
.Net
Domain
12
Shadow Attacks Based On Password Reuses: A Quantitative
Empirical Analysis
Security
13
Mining Health Examination Records A Graph-Based Approach
Data Mining
14
Dynamic Proofs Of Retrievability For Coded Cloud Storage
Systems
Cloud
Computing
15
Publicly Verifiable Inner Product Evaluation Over Outsourced
Data Streams Under Multiple Keys
Cloud
Computing
16
Trust-But-Verify: Verifying Result Correctness Of Outsourced
Frequent Item-Set Mining In Data-Mining-As-A-Service Paradigm
Data Mining
17
Cotton Leaf Disease Identification Using Pattern Recognition
Techniques
Image
Processing
18
Location Aware Keyword Query Suggestion Based On Document
Proximity
Cloud
Computing
19
Online Banking Authentication System Using Mobile-Otp With
QR-Code
Application
20
Secure De-Duplication With Efficient And Reliable Convergent
Key Management
Cloud
Computing
21
Combining Efficiency, Fidelity, And Flexibility In Resource
Information Services
Cloud
Computing
22
Space-Efficient Verifiable Secret Sharing Using Polynomial
Interpolation
Cloud
Computing
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
.Net
Domain
23
Power Consumption Monitoring House Hold Electronic Device
Application
24
Expressive, Efficient And Revocable Data Access Control For
Multi-Authority Cloud Storage
Cloud
Computing
25
An Efficient Privacy-Preserving Outsourced Calculation
Toolkits With Multiple Keys
Cloud
Computing
26
Key Logging-Resistant Visual Authentication Protocols
Security
27
A Study Of The Application Of A Keywords Based Chatbot
System On Teaching Of Programming Languages
Artificial
Intelligence
28
A Secure Client Side De-Duplication Scheme In Cloud Storage
Environment
Cloud Security
29
Oruta: Privacy-Preserving Public Auditing For Shared Data In
The Cloud
Cloud
Computing
30
Key-Aggregate Cryptosystem For Scalable Data Sharing In
Cloud Storage
Cloud
Computing
31
Mona Secure Multi-Owner Data Sharing For Dynamic Groups
In The Cloud
Cloud
Computing
32
Achieving Secure, Scalable, And Fine-Grained Data Access
Control In Cloud Computing
Cloud
Computing
33
Data Leakage Detection
Security
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
.Net
Domain
34
Distributed, Concurrent, And Independent Access To Encrypted
Cloud Databases
Cloud
Computing
35
A Secure And Dynamic Multi-Keyword Ranked Search Scheme Over
Encrypted Cloud Data
Cloud
Computing
36
Panda: Public Auditing For Shared Data With Efficient User
Revocation In The Cloud
Cloud
Computing
37
Usher: Improving Data Quality With Dynamic Forms
Data Mining
38
A Dynamic Secure Group Sharing Framework In Public Cloud
Computing
Cloud
Computing
39
Micro-Insurance: A Mechanism For Women Empowerment
Through Self Help Group Linked Lic
Application
40
Secure Electronic Transaction (Set Protocol)
Security
41
Attribute-Based Data Sharing Scheme Revisited In Cloud Computing
Cloud
Computing
42
Fog Computing: Mitigating Insider Data Theft Attacks In The Cloud
Cloud
Computing
43
Fade: A Secure Overlay Cloud Storage System
Cloud
Computing
44
Internet Banking- Benefits And Challenges In An Emerging
Economy
Security
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
.Net
Domain
45
Identity-Based Secure Distributed Data Storage Schemes
Cloud
Computing
46
Development Of Web Bases Online Examination System
Application
47
Efficient And Secure Ranked Multi-Keyword Search On
Encrypted Cloud Data
Cloud
Computing
48
An Effective Recommendations By Diffusion Algorithm For Web
Graph Mining
Data Mining
49
Secure Cloud Storage Using Decentralized Access Control With
Anonymous Authentication
Cloud
Computing
50
Pair Based Scheme For Authentication Using Session Password
Security
51
Automatic Question Paper Generation System Using
Randomization Algorithm
Application
52
Predicting Missing Items In Shopping Cart Using Associative
Classification Mining
Data Mining
53
Fully Anonymous Profile Matching In Mobile Social Networks
Application
54
Ames-Cloud: A Framework Of Adaptive Mobile Video Streaming
And Efficient Social Video Sharing In The Clouds
Cloud
Computing
55
Click Prediction For Web Image Re-Ranking Using Multimodal
Sparse Coding
Data Mining
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
.Net
Domain
56
Enabling Fine-Grained Multi-Keyword Search Supporting
Classified Sub-Dictionaries Over Encrypted Cloud Data
Cloud
Computing
57
An Efficient Certificate Less Encryption For Secure Data Sharing
In Public Clouds
Cloud
Computing
58
RFID-Based Parking Management System
RFID
59
RFID Based Centralized Patient Monitoring System And Tracking
RFID
60
RFID Based Toll Deduction System
RFID
61
Activity Manipulation Using Ontological Data For U-Healthcare
RFID
62
RFID-Based Students Attendance Management System With
Student Tracking
RFID
63
RFID Based Toll Container Management System For Dockyards
RFID
64
RFID Based Library Management System
RFID
65
Rfid Based E-Passport System
RFID
66
Rfid Based Gym Management System With Attendance
RFID
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
JAVA
Domain
1
A Novel Recommendation Model Regularized With User Trust And
Item Ratings
Data Mining
2
Booster In High Dimensional Data Classification
Data Mining
3
Cross-Domain Sentiment Classification Using Sentiment Sensitive
Embedding’s
Data Mining
4
Efficient Algorithms For Mining Top-K High Utility Itemsets
Data Mining
5
Knnvwc An Efficient K-Nearest Neighbors Approach Based On
Various-Widths Clustering
Data Mining
6
Location Aware Keyword Query Suggestion Based On Document
Proximity
Data Mining
7
Mining High Utility Patterns In One Phase Without Generating
Candidates
Data Mining
8
Probabilistic Static Load-Balancing Of Parallel Mining Of Frequent
Sequences
Data Mining
9
Similarity Measure Selection For Clustering Time Series Databases
Data Mining
10
Temporal Skeletonization On Sequential Data Patterns,
Categorization, And Visualization
Data Mining
11
A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint
Cryptosystem Using Pair-Polar Minutiae Structures
Information
And Forensic
12
Content-Adaptive Steganography By Minimizing Statistical
Detectability
Information
And Forensic
13
Fine-Grained Two-Factor Access Control For Web-Based Cloud
Computing Services
Information
And Forensic
14
On The Security Of Permutation-Only Image Encryption Schemes
Information
And Forensic
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
JAVA
Domain
15
Two-Level QR Code For Private Message Sharing And
Document Authentication
Information
And Forensic
16
Cognitive And Opportunistic Relay For QOS Guarantees
In Machine-To-Machine Communications
Mobile
Computing
17
Contact-Aware Data Replication In Roadside Unit Aided
Vehicular Delay Tolerant Networks
Mobile
Computing
18
Detecting Colluding Blackhole And Greyhole Attacks In Delay
Tolerant Networks
Mobile
Computing
19
Detecting Node Failures In Mobile Wireless Networks A
Probabilistic Approach
Mobile
Computing
20
Energy And Memory Efficient Clone Detection In Wireless
Sensor Networks
Mobile
Computing
21
Energy Mitigating Denial Of Service Attacks In Olsr Protocol
Using Fictitious Nodes
Mobile
Computing
22
Timer-Based Bloom Filter Aggregation For Reducing Signaling
Overhead In Distributed Mobility Management
Mobile
Computing
23
A Heuristic Clustering-Based Task Deployment Approach For Load Balancing Using Bayes Theorem In Cloud Environment
Networking
24
A Secure Anti-Collusion Data Sharing Scheme For Dynamic
Groups In The Cloud
Networking
25
Circuit Cipher-text-Policy Attribute-Based Hybrid Encryption
With Verifiable Delegation In Cloud Computing
Networking
26
Code-Based Neighbor Discovery Protocols In Mobile Wireless
Networks
Networking
27
Duplicate Detectable Opportunistic Forwarding In Duty-Cycled
Wireless Sensor Networks
Networking
28 Optimal Partial Relaying For Energy-Harvesting Wireless Networks
Networking
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
JAVA
Domain
29
Optimizing Cost For Online Social Networks On Geo-Distributed
Clouds
Networking
30
A Pseudonym Management System To Achieve Anonymity In
Vehicular Ad Hoc Networks
Network Security
31
Enabling Fine-Grained Multi-Keyword Search Supporting
Classified Sub-Dictionaries Over Encrypted Cloud Data
Network Security
32
Netcsi A Generic Fault Diagnosis Algorithm For Large-Scale
Failures In Computer Networks
Network Security
33
Privacy Protection For Wireless Medical Sensor Data
Network Security
34
Wireless Communications Under Broadband Reactive Jamming
Attacks
Network Security
35
Collective Travel Planning In Spatial Networks
Data Mining
36
Modeling And Estimation Of The Vehicle-Miles Traveled Tax Rate
Using Stochastic Differential Equations
Data Mining
37
Secure Transmission Against Pilot Spoofing Attack A Two-Way Training-Based Scheme
Data Mining
38
Understanding Short Texts Through Semantic Enrichment And
Hashing
Data Mining
39
Automated Classification Of Peach Tree Rootstocks By Means Of Spectroscopic Measurements And Signal Processing Techniques
Data Mining
40
Connecting Social Media To E-Commerce Cold-Start Product
Recommendation Using Micro blogging Information
Data Mining
41
Efficient And Exact Local Search For Random Walk Based Top-K
Proximity Query In Large Graphs
Data Mining
42
A Pairwise Algorithm Using The Deep Stacking Network For
Speech Separation And Pitch Estimation
Networking
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
JAVA
Domain
43
Predicting Protein Function Via Semantic Integration Of Multiple
Networks
Networking
44
Predicting Hub Genes Associated With Cervical Cancer Through
Gene Co-Expression Networks
Networking
45
Optimal Rate Allocation For Video Streaming In Wireless
Networks With User Dynamics
Networking
46
Trustworthy Parking Communities Helping Your Neighbor To
Find A Space
Networking
47
Achieving Flatness Selecting The Honey-words From Existing
User Passwords
Networking
48
Inference Attack On Browsing History Of Twitter Users Using
Public Click Analytics And Twitter Metadata
Networking
49
Measuring The Influence Of Perceived Cybercrime Risk On Online
Service Avoidance
Networking
50
Privacy Protection For Preventing Data Over-Collection In Smart
City
Mobile
Computing
51
Malware Propagation In Large Scale Networks
Data Mining
52
Discovery Of Ranking Fraud For Mobile Apps
Data Mining
53
Scalable Daily Human Behavioral Pattern Mining from
Multivariate Temporal Data
Data Mining
54
Mining Health Examination Records — A Graph-Based Approach
Data Mining
55
Coral: A Cloud-Backed Frugal File System
Cloud Computing
56
Topicsketch: Real-Time Bursty Topic Detection From Twitter
Data Mining
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
JAVA
Domain
57
Phe: An Efficient Traitor Tracing And Revocation For Encrypted File
Syncing-And-Sharing In Cloud
Cloud
Computing
58
Mining Health Examination Records A Graph-Based Approach
Data Mining
59
Detecting Communities On Topic Of Transportation With Sparse
Crowd Annotations
Networking
60
A Mutual Reinforcement Model For Trustworthy Online Rating Systems
Data Mining
61
SmartCrawler: A Two-Stage Crawler For Efficiently Harvesting Deep-
Web Interfaces
Data Mining
62
Quantitative Reasoning About Cloud Security Using Service Level
Agreements
Cloud Security
63
Social Cloud Computing: An Opportunity For Technology Enhanced
Competence Based Learning
Cloud
Computing
64
Cloudkeybank: Privacy And Owner Authorization Enforced Key
Management Framework
Cloud Security
65
Frappe: Detecting Malicious Facebook Applications
Security
66
Up loader Intent For Online Video: Typology, Inference And
Applications
Data Mining
67
YouTube Video Promotion By Cross-Network
Networking
68
Geolocalized Modeling For Dish Recognition
Data Mining
69
Dispersing Instant Social Video Service Across Multiple Clouds
Cloud
Computing
70
Online Learning In Large-ScaleContextual Recommender Systems
Data Mining
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
JAVA
Domain
71
Trust Agent-Based Behavior Induction In Social Networks
Networking
72
Enabling Secure And Fast Indexing For Privacy-Assured Healthcare
Monitoring Via Compressive Sensing
Data Mining
73
Social Friend Recommendation On Multiple Network Correlation
Data Mining
74
Tag Based Image Search By Social Re-Ranking
Data Mining
75
Pripayd: Privacy-Friendly Pay-As-You-Drive Insurance
Security
76
Personalized Geo-Specific Tag Recommendation For Photos On Social
Websites
Data Mining
77
Learning And Recognition Of On-Premise Signs From Weakly Labeled
Street View Images
Data Mining
78
Finger Thump Based Shopping Cart
Application
79
Trained Volunteers Create A Successful Social Campaign
Application
80
I School
Application
81
An Efficient And Fine-Grained Big Data Access Control Scheme With
Privacy-Preserving Policy
Big Data
82
Fidoop: Parallel Mining Of Frequent Itemsets Using Map reduce
Big Data
83
De-duplication On Encrypted Big Data In Cloud
Big Data
84
Fidoop-Dp: Data Partitioning In Frequent Itemset Mining On Hadoop
Clusters
Big Data
Sr.
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
JAVA
Domain
85
Efficient Image Geo-Tagging Using Large Databases
Big Data
86
Mining Suspicious Tax Evasion Groups In Big Data
Big Data
87
Cloud Infrastructure Resource Allocation For Big Data Applications
Big Data
88
Grorec : A Group-Centric Intelligent Recommender System Integrating
Social, Mobile And Big Data Technologies
Big Data
89
Predictive Big Data Analytics In Healthcare
Big Data
90
Privacy Preserving Rack-Based Dynamic Workload Balancing For
Hadoop Map reduce
Big Data
91
Big Data For Remote Sensing: 2 Challenges And Opportunities
Big Data
92
Improve The Prediction Accuracy Of Naïve Bayes Classifier With
Association Rule Mining
Big Data
93
An Efficient Privacy-Preserving Ranked Keyword Search Method
Big Data
94
Scalable Algorithms For Nearest-Neighbor Joins On Big Trajectory
Data
Big Data
95
Hadoop Multi Node Cluster Resource Analysis
Big Data
96
Research On Map reduce-Based Cloud Storage Batch Auditing
Big Data
97
H2hadoop: Improving Hadoop Performance Using The Metadata Of
Related Jobs
Big Data
98
Distributed Storage Design For Encrypted Personal Health Record
Data
Big Data
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
JAVA
Domain
99
A Map Reduce-Based Nearest Neighbor Approach For Big-Data-
Driven Traffic Flow Prediction
Big Data
100
Protection Of Big Data Privacy
Big Data
101
Social Network Analysis Using Big Data
Big Data
102
Accelerating Map reduce On Commodity Clusters An SSD
Empowered Approach
Big Data
103
High Performance Analytics Of Big Data With Dynamic And
Optimized Hadoop Cluster
Big Data
104
Big Data Analytics In Mobile Cellular Networks
Big Data
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
MATLAB
Domain
1
Brain Tumor Segmentation Using Convolutional Neural
Networks In MRI Images
Digital Image
Processing
2
Robust Texture Image Representation By Scale Selective
Local Binary Patterns
Digital Image
Processing
3
An Efficient SVD-Based Method For Image De-noising
Digital Image
Processing
4
Unsupervised Sar Image Change Detection Based On Sift Key
points And Region Information
Digital Image
Processing
5
An Empirical Study For PCA- And LDA-Based Feature
Reduction For Gas Identification
Wireless
Communication
6
Analyzing The Effect Of Jpeg Compression On Local Variance
Of Image Intensity
Digital Image
Processing
7
High Performance Personalized Heartbeat Classification
Model For Long-Term ECG Signal
Signal Processing
8
Reversible Data Hiding In Encrypted Images By Reversible
Image Transformation
Digital Image
Processing
9
Robust Cell Detection Of Histopathological Brain Tumor
Images Using Sparse Reconstruction And Adaptive Dictionary Selection
Digital Image
Processing
10
A Novel Approach To Segment Skin Lesions In Dermoscopic
Images Based On A Deformable Model
Digital Image
Processing
11
Detection And Classification Of Printed Circuit Boards
Defects
Image Processing
12
Person Identification Based On Teeth Recognition
Image Processing
13
The Automatic Detection And Recognition Of The Traffic Sign
Image Processing
14
Copy-Move Image Forgery Detection
Image
Processing
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
MATLAB
Domain
15
A Feature Learning And Object Recognition Framework For
Underwater Fish Images
Image Processing
16
Ear Based Recognition
Image Processing
17
A Feature Learning And Object Recognition Framework For
Underwater Fish Images
Image Processing
18
Automated Diagnosis Of Normal And Alcoholic EEG Signals
Image Processing
19
Fingerprint Based ATM System
Security
20
Computer Aided Skin Cancer Detection
Image Processing
21
Face Based Attendance Management System
Image Processing
22
Voice Based Door Lock System
Signal
Processing/Security
23
Fingerprint Based Attendance System
Image Processing
24
Facial Expression Recognition
Image Processing
25
Multi-Biometric Authentication
Security
26
A Robust And Fast Video Copy Detection System Using Content-
Based Fingerprinting
Image Processing
27
Wavelet Based ECG Steganography
Signal Processing
28
Bone Fracture Detection
Image Processing
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
MATLAB
Domain
29
Ear Pattern Recognition
Image Processing
30
Index Codes For Multi-Biometric Pattern Retrieval
Image Processing
31
Optic Disk And Cup Segmentation From Monocular Color
Retinal Images For Glaucoma Assessment
Image Processing
32
Line-Based Cubism-Like Image—A New Type Of Art Image
And Its Application To Lossless Data Hiding
Image Processing
33
Face Detection Using Sift
Image Processing
34
Off-Line Signature Verification And Recognition By Svm
Image Processing
35
Study On Various Glass Defect Using Sift
Image Processing
36
Partial Face Recognition : Alignment –Free Approach
Image Processing
37
Hand Gesture Recognition Using Neural Network
Image Processing
38
Image Retrieval Of Digital Crime Scene Images
Image Processing
39
In Painting Approach To Repair Cracked Images
Image Processing
40
3d Face Recognition Under Expressions, Occlusions, And Pose
Variations
Image Processing
41
Content Based Image Retrieval
Image Processing
42
Data Hiding In Encrypted H.264avc Video Streams By Code
word Substitution
Security
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
MATLAB
Domain
43
Matching Forensic Sketches To Mug Shot Photos
Image
Processing
44
Speech And Speaker Recognition System Using Artificial Neural
Networks
Signal
Processing
45
Understanding Kin Relationship In A Photo
Image
Processing
46
A Secret-Sharing-Based Method For Authentication Of Grayscale Document Images Via The Use Of The Png Image With A Data
Repair Capability
Image
Processing
47
Automatic License Plate Recognition (Alpr) Using Neural
Networks And Multi-Thresholding Techniques
Image
Processing
48
Gender Recognition From Face Images With Local Wld Descriptor
Image
Processing
49
Video Object Tracking In The Compressed Domain Using Spatio-
Temporal Markov Random Fields
Image
Processing
50
Copy Move Forgery Detection In Medical Images
Image
Processing
51
Iris Based Cryptography
Image
Processing
52
Tiny Videos: A Large Data Set For Non-Parametric Video
Retrieval And Frame Classification
Image
Processing
53
Emotion Recognition In Mentally Retarded Children Using Facial
Expressions
Image
Processing
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
ANDROID
1
Gps Based Automated Sound Profile Changer Using Android
2
A Mobile Phone Based Medicine Intake Reminder And Monitor
3
Offline Course Learning System
4
Preserving And Prolonging Students Information In College Using Android
Application
5
An Android Application To Aid Uneducated Deaf-Dumb People
6
E-Crime File Management Application For Android
7
Library Management Using Android
8
Shoulder Surfing Resistant Graphical Password Scheme
9
Exam Crazy (For The Students, By The Students)
10
Sbvlc: Secure Barcode-Based Visible Light Communication For Smartphones
11
Stamp: Enabling Privacy-Preserving Location Proofs For Mobile Users
12
Distributed Secret Sharing Approach With Cheater Prevention Based On Qr Code
13
Woral: A Witness Oriented Secure Location Provenance Framework For Mobile
Devices In Dot Net
14
Senspeed: Sensing Driving Conditions To Estimate Vehicle Speed In Urban
Environments
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
ANDROID
15
Qr Code For Best Before Date
16
Android Battery Saver System
17
Offline Course Learning System
18
Mobile Wallet With Merchant Payment Using Android
19
Bus Pass With Barcode Card Scan
20
Suburban Railway Ticketing Using Android Phone
21
Project Management Tool
22
Modern Farming Technique Using Android Application
23
Android Employee Tracker
24
Child Tracking App Using Gps Device
25
M-Indicator
26
Faculty Attendance Android App
27
Packman game control through app
28
Towards Context Aware Messaging For Emergency Situation
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Sr. No.
ANDROID
29
Digital Ordering System For Restaurant Using Android
30
Android Blood Bank
31
College Selector App
32
A Mobile Based Women Safety Application
33
Smart Video Security Surveillance With Mobile Remote Control
34
Using Smart Map In A Mobile Information Environment For Tourism
35
Comp-droid -Remote Desktop Access Through Android Mobile Phone
36
A Remotely Secure E-Voting And Social Governance System Using Android Platform
37
GPS based Accident location tracker
+91-9987580058 | +91-7738134440
[email protected] |www.finalyearsolutions.in
Email: [email protected]
Call: 022-65000815 , +91 7738134440, +91 9987580058
finalyearsolutions.in
Head Office: Kharghar #22, SN Park, Belpada, Sector-3, Kharghar, Navi
Mumbai. Pin: 410210