Centre collégial de transfert de technologie en télécommunications

Our services

C2T3 is the only wireless telecommunications technology transfer center in Canada offering a full range of applied research services, technical services and telecommunications training for SMEs and large businesses.

The specificity of C2T3 is expressed through the research and development of cutting-edge information transport solutions meeting the increased requirements for scope, speed, security and interoperability of the telecommunications market, on a chain of value ranging from conceptual studies, the development of functional prototypes, tests and measurements, to the pre-certification of marketable products.

Areas of expertise

Wireless telecommunications

Automation

Devices connected to networks

Big data aggregation portals

Internet of Things (IoT)

Electronic design and prototyping

5G and 6G networks

Embedded electronic programming (firmware)

Terrestrial and satellite connectivity

Software programming

Artificial intelligence (Edge and Cloud computing)

Radio identification (RFID)

Generative artificial intelligence

Radio frequency metrology up to 26 GHz

Quantum artificial intelligence

EMI-EMC electromagnetic compliance (ISO 17025)

Machine learning

Cybersecurity, encryption, regulations

Areas of intervention

The C2T3 focus areas are backed by major global trends in information and communications technologies (ICT) where telecommunications play a key role, including :

Industry 4.0

Logistic

Energy

Automation and robotization

Automated generation of plans and quotes

Connected road and maritime transport

Cyber-physical systems

Connectivity of remote regions (mines and forests)

Connected buildings

Industrial traceability

Smart cities

Big data

Cybersecurity

Infrastructure

The C2T3 research infrastructures are located at the Parc Micro Sciences in Trois-Rivières. We facilitate access to the unique C2T3 facilities including the operable anechoic chamber up to the 5G frequency domain and the prototyping laboratories for new high frequency technologies. EMC-EMI electromagnetic compatibility and FCC pre-marketing tests and measurements are ISO 17025 accredited.

Pre-marketing laboratories

Electronics laboratory

Computer laboratory

5G Networking Lab

Security and Defense

The C2T3 – Centre de transfert technologique en télécommunications – has recognized multidisciplinary expertise in several key areas of public security and technological defense. 

In terms of drone technologies, the center develops advanced solutions integrating modules for on-board measurements (AI targeting, intelligent flight maneuvers), on-board countermeasures (on-board radar detection, collision avoidance), and decision-making autonomy using artificial intelligence for high-level missions criticality. He also masters the protocols of stealth connectivity suitable for environments with a low RF footprint, enabling discreet and resilient communication.

In radar technologies2T3 designs and tests detection systems integrating inference algorithms for the reconstruction of trajectories of collaborative or non-collaborative objects (UAVs, vehicles, moving targets), and works to reduce false alarm rates in environments noisy.

In civil security and defense, it designs secure communication architectures for critical infrastructure (water, energy, transport, mining), including in extreme conditions (far north, geographic isolation, maritime operations) and for the connectivity of infrastructure deployable in emergency situations (mobile airport towers and other deployments).

In cybersecurity, its work includes the development of integrated IoT security layers for constrained networks, electromagnetic (EM) shielding for protecting sensitive data from interference and radiation attacks, as well as advanced techniques RF stealth applied to the concealment of electromagnetic signatures. This expertise positions C2T3 as a strategic technological player in strengthening the resilience and autonomy of public security infrastructures.

Finally, the center actively contributes to the development of the post-quantum security by integrating cryptographic algorithms resistant to quantum attacks to ensure the confidentiality, authenticity and security of digital exchanges in industrial networks, critical infrastructures and connected objects. This includes analyzing resistance to Shor and Grover-like algorithms, integrating post-quantum primitives, and simulating secure transmission chains in deployed environments, thereby contributing to the digital sovereignty of national infrastructure.