Browsing by Author "Yadav, R"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
Item Advances in Optical Visual Information Security: A Comprehensive Review(2024-01) Sachin; Kumar, R; Sakshi; Yadav, R; Reddy, S; Yadav, A; Singh, PIn the modern era, the secure transmission and storage of information are among the utmost priorities. Optical security protocols have demonstrated significant advantages over digital counterparts, i.e., a high speed, a complex degree of freedom, physical parameters as keys (i.e., phase, wavelength, polarization, quantum properties of photons, multiplexing, etc.) and multi-dimension processing capabilities. This paper provides a comprehensive overview of optical cryptosystems developed over the years. We have also analyzed the trend in the growth of optical image encryption methods since their inception in 1995 based on the data collected from various literature libraries such as Google Scholar, IEEE Library and Science Direct Database. The security algorithms developed in the literature are focused on two major aspects, i.e., symmetric and asymmetric cryptosystems. A summary of state-of-the-art works is described based on these two aspects. Current challenges and future perspectives of the field are also discussed.Item Advances in Optical Visual Information Security: A Comprehensive Review(2024-01) Sachin; Kumar, R; Sakshi; Yadav, R; Yadav, AKIn the modern era, the secure transmission and storage of information are among the utmost priorities. Optical security protocols have demonstrated significant advantages over digital counterparts, i.e., a high speed, a complex degree of freedom, physical parameters as keys (i.e., phase, wavelength, polarization, quantum properties of photons, multiplexing, etc.) and multi-dimension processing capabilities. This paper provides a comprehensive overview of optical cryptosystems developed over the years. We have also analyzed the trend in the growth of optical image encryption methods since their inception in 1995 based on the data collected from various literature libraries such as Google Scholar, IEEE Library and Science Direct Database. The security algorithms developed in the literature are focused on two major aspects, i.e., symmetric and asymmetric cryptosystems. A summary of state-of-the-art works is described based on these two aspects. Current challenges and future perspectives of the field are also discussed.Item Building an outreach culture for fairer access to higher education in Haryana, India: a ‘bottom up’ contribution to policy implementation(2023) Stewart, A; Sabharwal, N; Yadav, RThis article is concerned with an institutional initiative designed to encourage the development of an outreach culture which can support fairer, more equal, access to higher education (HE) in India. The initiative constituted the final impact phase of a five-year research Fair Chance Foundation (FCF) project (2017-2022) which explored gendered pathways to fair access to HE in the northern Indian state of Haryana. We present the methodology used to prepare a toolkit, named an Outreach Activity Resource (OAR), which enabled staff in government colleges in Haryana to plan and conduct pilot ‘taster days’. The article provides an assessment of the outcome of these events. It argues that a practitioner as researcher methodology and a collaborative ‘bottom up’ research approach provides the basis for the development of contextually appropriate outreach activities to support fairer, more equal, access to higher education (HE). We argue that the adoption of ‘top down’ initiatives, in very different economic, social and cultural contexts to the those where they were originated, may fail to address the way in which the local ‘problem’ presents itself and may hinder the development of a contextually informed outreach culture which will support fairer, more equal access to HE. In contrast, initiatives such as the one present here, can contribute essential locally informed expertise, built on contextually informed research, to national and international policy making in relation to widening access to HE in an era in which massification is extending across the globe.Item Combining Forth and Rust: A Robust and Efficient Approach for Low-Level System Programming(2023-12) Gupta, P; Rahar, R; Yadav, R; Singh, A; Ramandeep; Kumar, SRust is a modern programming language that addresses the drawbacks of earlier languages by providing features such as memory safety at compilation and high performance. Rust’s memory safety features include ownership and borrowing, which makes it an ideal choice for systems programming, where memory safety is critical. Forth is a stack-based programming language that is widely used for low-level system programming due to its simplicity and ease of use. This research paper aims to explore the combination of Forth and Rust programming languages to create a more robust and efficient solution for low-level system programming. The primary objective is to demonstrate the implementation of essential Forth operations, including addition, subtraction, assignment, comparison, and if-else statements, while demonstrating loops, push operations, and dump operations in Rust. The implementation of these operations in Rust is demonstrated using code from actual implementation. This research paper also discusses the advantages of using Rust for low-level system programming. Rust’s memory safety features, coupled with its high performance, make it an ideal choice for systems programming, where memory safety and performance are critical. The combination of Forth and Rust provides a more efficient and safer solution for low-level system programming, making the implementation more robust. Our implementation tries to leverage these properties of both languages to make a memory-safe and low-level system programming language. This research paper also includes code snippets to provide a practical demonstration of how the Forth operations can be implemented in Rust.Item Combining Forth and Rust: A Robust and Efficient Approach for Low-Level System Programming †(2023-12) Gupta, P; Rahar, R; Yadav, R; Singh, AAbstract: Rust is a modern programming language that addresses the drawbacks of earlier languages by providing features such as memory safety at compilation and high performance. Rust’s memory safety features include ownership and borrowing, which makes it an ideal choice for systems programming, where memory safety is critical. Forth is a stack-based programming language that is widely used for low-level system programming due to its simplicity and ease of use. This research paper aims to explore the combination of Forth and Rust programming languages to create a more robust and efficient solution for low-level system programming. The primary objective is to demonstrate the implementation of essential Forth operations, including addition, subtraction, assignment, comparison, and if-else statements, while demonstrating loops, push operations, and dump operations in Rust. The implementation of these operations in Rust is demonstrated using code from actual implementation. This research paper also discusses the advantages of using Rust for low-level system programming. Rust’s memory safety features, coupled with its high performance, make it an ideal choice for systems programming, where memory safety and performance are critical. The combination of Forth and Rust provides a more efficient and safer solution for low-level system programming, making the implementation more robust. Our implementation tries to leverage these properties of both languages to make a memory-safe and low-level system programming language. This research paper also includes code snippets to provide a practical demonstration of how the Forth operations can be implemented in Rust.