Search
Skip to Search Results- 35Noonari, Juned (Supervisor)
- 32MacGregor, Mike (Supervisor)
- 13Rogers, Leonard (Supervisor)
- 10Nanda, Gurpreet (Supervisor)
- 9Kaur, Sandeep (Supervisor)
- 7MacGregor, Mike (Advisor)
- 21Cloud computing
- 18Computer networks
- 14Computer network protocols
- 14Computer security
- 12Internet of things
- 11Software-defined networking (Computer network technology)
-
Detection and Prevention of Cybersecurity Risks of Cloud-connected Machinery in Industrial Internet of Things System (IIoT)
Download2022-03-09
Internet of Things (IoT) is the interconnection of physical devices, which are equipped with sensor to collect data, and management platforms to perform analysis on the data collected. IoT helps people to make decision or further control on other devices automatically. Industrial Internet of...
-
Detection Performance of Wireless Sensor Networks with Multiple Antennas in Fading Channels
Download2014-02-17
The problem of distributed detection and decision fusion in wireless sensor networks (WSNs) is revisited. The detection performance of a WSN is inherently limited by the wireless propagation environment. The fusion of decisions forwarded by each sensor is subject to Nakagami-m fading which can...
-
Distributed Ledger System Analysis with Crypto-currency and other Useful Applications and Use Cases
Download2019-03-01
The main purpose of this research is to explore the potential of Distributed Ledger System analysis (DLT) with respect to cryptocurrencies and other useful application. Distributed ledger technology can play a crucial role in the future of our financial system and other useful sectors. In 2009...
-
2014-12-15
Project Objective: The objective of this project is to implement Domain Name System Security Extensions (DNSSEC) in the RDC.AB.CA domain for which Red Deer College (RDC) maintains two authoritative Domain Name System (DNS) servers, NS and NS2. Further to this, the project will implement a...
-
2021-11-03
Our doorbell system is a client-server architecture program to improve the security of SSH. Some port scanning software such as nmap can detect the listening port of SSH and thus the port is a target for hackers. With running the doorbell system and under its control, the listening port can be...
-
2012-12-01
This paper describes Dynamic Network Device Configurator (DNDC), a graphical Java application that allows networks to be constructed easily, and linked by one or more dynamic routing protocols, such as ISIS, EIGRP, OSPF, RIPv2, and BGP. It is designed to help students learn the implementation of...
-
Dynamic Provisioning of Subscribers on Alcatel-Lucent Platform IP Edge Devices Based on Authentication Solution Using Open Source Radius Implementation
Download2015-04-01
The solution implemented in this project focuses on fast and reliable provisioning of subscriber hosts using Circuit-ID sub-option of DHCP. This project works on the principles of DHCP relay. Triple Play for enhanced subscriber management knowledge is required to understand the working of this...
-
Dynamic Provisioning of Subscribers on Alcatel-Lucent Platform IP Edge Devices using ALU Subscriber Management Solutions
Download2014-04-14
Today’s subscribers are driven by the freedom and flexibility of on-demand, video services and wide range of consumer electronics choices. They want a more flexible and personalized broadband experience in which they can consume any content or application on any device, anytime, anywhere....
-
Dynamic Provisioning of Subscribers on Alcatel-Lucent Platform IP Edge Devices using Open Source Subscriber Management Solutions
Download2014-04-01
This project aims at a general industrial multi-vendor approach enabling subscriber authentication based on DHCP Option 82 circuit-ID and dynamic provisioning of subscribers by designing and implementing an open source RADIUS authentication solution and DHCP environment. This project accomplishes...
-
2015-01-23
The widespread adoption of wireless technologies is leading to an ever increasing demand for the Radio Frequency (RF) spectrum that supports mobile communication. A Cognitive Radio (CR) can increase the amount of a radio frequency spectrum that is usefully employed by authorizing unlicensed users...