Biography
Dr. Nazrul Islam is a professor in, and chair of, the Security Systems and Law Enforcement Technology Department at Farmingdale State College. He has been in academia since 1991, and has worked at several other institutions, including Old Dominion University, University of South Alabama, University of West Florida, and Bangladesh University of Engineering and Technology.
His research interests include optical communication, wireless communication, digital image processing, security technologies and solid state devices. He has published more than 150 articles in refereed journals and for conferences, and has successfully completed research projects sponsored by federal and private institutions, including U.S. Army, National Science Foundation, and Department of Energy.
Media
Publications:
Documents:
Videos:
Audio/Podcasts:
Areas of Expertise (6)
Facial Recognition
Solid-state Devices
Digital Image Processing
Wireless Communications
optical communication
security technologies
Industry Expertise (5)
Computer/Network Security
Education/Learning
Electrical Engineering
Telecommunications
Renewables and Environmental
Accomplishments (8)
“Strengthening the resources for Software Technology and Computer Security Technology programs to support Open SUNY Initiative” (professional)
“Strengthening the resources for Software Technology and Computer Security Technology programs to support Open SUNY Initiative”
“Establishing infrastructure, transportation and security center” (professional)
“Establishing infrastructure, transportation and security center”
enhancing student learning process through applied research projects in forensics and security imaging (professional)
enhancing student learning process through applied research projects in forensics and security imaging
automatic human wound detection in warfield, US Army Medical Research and Material Command
automatic human wound detection in warfield, US Army Medical Research and Material Command
IEEE Region 1 Award (professional)
For outstanding service to the IEEE Long Island Systems Applications and Technology (LISAT) Conference while serving as its Publications Chairman
IEEE Long Island Section Outstanding Volunteer Award (professional)
For revitalizing the Photonics Society chapter and leadership in many other Section activities
Individual Development Award Program (IDAP) Award (professional)
State of New York/United University Professions Joint Labor-Management Committee award for research presentation
Individual Development Award Program (IDAP) Award (professional)
State of New York/United University Professions Joint Labor-Management Committee award for research presentation
Education (3)
Muroran Institute of Technology: Doctor of Engineering, Engineering (Electrical and Electronic) 1999
Bangladesh University of Engineering and Technology: Master of Science in Engineering, Engineering (Electrical and Electronic) 1994
Bangladesh University of Engineering and Technology: Bachelor of Science in Engineering, Engineering (Electrical and Electronic) 1991
Affiliations (7)
- Institute of Electrical and Electronics Engineers (IEEE)
- IEEE Signal Processing Society
- IEEE Photonics Society
- International Society for Optics and Photonics
- Institution of Engineers
- Bangladesh Electronics Society
- Bangladesh Computer Society
Languages (2)
- English
- Bangla
Event Appearances (13)
“Optical security system employing shifted phase-encoded joint transform correlation and orthogonal code"
10th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT 2013) Melville, NY
“Enhanced information security employing orthogonal code, steganography and joint transform correlation"
Proceedings of SPIE in Optical Pattern Recognition XXIV Baltimore
“Efficient and robust information security system employing color encoded steganography and orthogonal encryption"
10th IASTED International Conference on Visualization, Imaging and Image Processing Banff, Canada
“Color image encryption using multiple reference joint transform correlation"
8th IEEE Long Island Systems, Applications and Technology Conference New York, NY
“A biometric-based secure architecture for mobile computing"
8th IEEE Long Island Systems, Applications and Technology Conference New York, NY
“Encryption and multiplexing of fingerprints for enhanced security"
7th IEEE Long Island Systems, Applications and Technology Conference New York, NY
“A secure approach for encryption and compressing biometric information employing orthogonal code and steganography"
SPIE in Optical Pattern Recognition XXIII Baltimore
“Target tracking using log-polar transform-based shifted phase-encoded joint transform correlation"
SPIE in Optical Pattern Recognition XXV Baltimore
“Modified local binary pattern (MLBP) for robust face recognition"
International Conference on Neural Computation Theory and Applications Paris, France
“Distortion-invariant face recognition using multiple phase-shifted-reference based joint transform correlation"
SPIE in Optics and Photonics for Information Processing V San Diego
“Intelligent traffic light control system"
8th International Conference and Expo on Emerging Technologies for a Smarter World
“Modified local binary pattern (MLBP) for robust face recognition”
International Joint Conference on Computational Intelligence Paris, France
“Learning by research: a review of undergraduate research experience in the School of Engineering Technology”
ASEE Mid-Atlantic Conference New York, NY
Sample Talks (1)
Optical Pattern Recognition and Security Systems
Optical pattern recognition and security techniques employ optical light source, lenses and other optical components to process the images in parallel for correlation decision, which makes them ideal candidates for real-time pattern recognition system. A phase-shifted and phase-encoded fringe-adjusted joint transform correlation (SPFJTC) technique is developed, which can detect multiple targets in one processing step and ensures better utilization of the space-bandwidth product (SBP) resource by generating one correlation peak per target. This technique is found to be efficient with variable number of targets and even in the presence of noise in the input scene. The SPFJTC technique is extended to color pattern recognition system to utilize color of the target objects as additional feature to the spatial characteristics. Color pattern recognition technique has also been extended to multispectral system, where the images are recorded at several light wavelengths, which introduces additional feature to the target detection process. In addition to pattern recognition applications, the SPFJTC technique has been employed for securing confidential information by incorporating nonlinear encryption. This presentation will introduce the optical pattern recognition and security systems along with challenges and future directions.
Style
Availability
- Keynote
- Moderator
- Panelist
- Workshop Leader
- Host/MC
- Author Appearance
- Corporate Training
Media Appearances (2)
Police investigate alleged fake 'sexts' involving CE Mangano
News 12 Long Island tv
The county executive says his phone was recently hacked and X rated messages were apparently sent, but he says they did not come from him.
Nassau County Executive Ed Mangano Says He's Victim of Impersonator's Sexting
WNBC-TV tv
Police are investigating a complaint from Nassau County Executive Ed Mangano that he's been impersonated in a sexually aggressive text message.
Research Focus (6)
Security Systems
Analysis and design of cryptographic tools and security systems
Pattern Recognition
• Analysis and design of optical correlation technique for real time pattern recognition applications • Hyperspectral image processing for target detection • Face recognition systems
Digital Image Processing
• Super resolution enhancement of still images and video scene • Medical application of image processing techniques
Optical Communication and Optoelectronics
• Analysis and design of optical communication system incorporating fiber nonlinear effects • Design and characterization of optical devices
Wireless Communication
• Analysis of access networks for mobile communication systems • Performance evaluation of wireless system incorporating various limitations and noises
Solid State Electronics
Analysis and design of electronic devices and systems
Research Grants (5)
Strengthening the resources for Software Technology and Computer Security Technology programs to support Open SUNY Initiative
State University of New York (SUNY) High Need Program $75,000
Strengthening the resources for Software Technology and Computer Security Technology programs to support Open SUNY Initiative
Establishing infrastructure, transportation and security center
Round IV NYSUNY 2020 Program $7 million
Establishing infrastructure, transportation and security center
W. E. B. Du Bois faculty student research experience
SUNY Farmingdale W. E. B. Du Bois Research Project $500
W. E. B. Du Bois faculty student research experience
: Farmingdale students first grant
SUNY Farmingdale Title III Grants $2,500
: Farmingdale students first grant
Automatic human wound detection in warfield
US Army Medical Research and Material Command $60,000
Automatic human wound detection in warfield
Published Articles (3)
Robust information security system using steganography, orthogonal code and joint transform correlation
International Journal for Light and Electron Optics
Robust information security system using steganography, orthogonal code and joint transform correlation
A Review of “Introduction to Computer Networks and Cybersecurity
Journal of Applied Security Research
A Review of “Introduction to Computer Networks and Cybersecurity
Automatic fingerprint recognition employing optical phase-modulated joint transform correlation
Journal of Applied Security Research
Automatic fingerprint recognition employing optical phase-modulated joint transform correlation
Courses (9)
Intrusion Detection
A study of the architecture, monitoring strategies and analysis engines of intrusion detection. An examination of host-based information sources. An analysis of information transformation processes for intrusion detection such as misuse and anomaly detection. A study of technical issues in intrusion detection such as scalability, interoperability, sensor control, reliability, integration and user interfaces. An examination of legal matters in intrusion detection such as the rules of evidence with regard to system logs and monitoring activities with regard to the right of privacy.
Access Control
A study of firewall technologies, including packet filtering, proxying, network address translation, and virtual private networks. An analysis of firewall architectures such as screening routers, screened hosts, hosts, screened subnets, perimeter networks and internal firewalls. An examination of security threats on the internet, including service attacks, eavesdropping, worm programs and the like. A study of access control hardware devices such as voice signatures, fingerprints, facial geometry, hand geometry and retinal scanners-iris patterns for servers, workstations and mobile computers.
Computer Security I
This course focuses on security threats to an organization's data network such as hackers, intruders, industrial espionage and sabotage, fraud and theft. The components of computer security architecture are studied as well as the principles of security networking protocols, encryption, fault tolerance techniques, and file system protection. Additional topics covered include the protection of computer hardware and software.
Computer Security II
This course is a continuation of CRJ 310, and includes an analysis of the security features of computer operating systems. The course will review the OSI model and describe how systems communicate with one another. Also included in the course is a detailed study of authentication technologies and how they are used to secure an organization's assets and electronic transactions.
Computer Security III
The course examines computer software threats which include the birth, life and termination of computer viruses, their modes of operation, detection techniques, virus signatures and virus removal methods as well as other "virus like" threats which are delivered by e-mail and internet/intranet packets.
Computer Forensics II
Computer Forensics II is a continuation of CRJ 115. This course covers topics such as disk geometry and organization. Master boot sector record and volume record creation and organization, file signatures for data type identification, cyclic redundancy checksum for data integrity validation, and RSA's MD5 hash values for file authentication. Other subjects introduced include the UNIX "grep" search utility, search string techniques and file signature matching, and recovery of files that are intentionally deleted, hidden, or renamed. The course examines advanced computer-based evidentiary and "discovery" data methodologies, and includes a study of evidence identification, documentation, and chain of custody procedures.
Introduction to Criminal Justice
Philosophical and historical background of policing throughout the free world; special emphasis is placed on the heritage of British and American policing, the governmental role of law enforcement in society; administration of American justice at all levels of government. The role of technology in law enforcement and crime prevention; history, modes and impact.
Physical Security I
A study of the theory and practice of managing the movement of people in organizational settings. This lecture course examines the operating principles and applications of access control readers, card encoding technologies, locking assemblies, and system functions such as fail-safe, fail-secure, access levels, time zones, limited and unlimited access privileges, and the like. Also, the course focuses on the role of alarm systems in an organization's overall protection plan, from the control of violence in the workplace to preventing theft of company property. Sensor technologies as well as controls and signaling systems are analyzed and evaluated with applications in the following areas: perimeter, interior, occupant, and object protection.
Physical Security II
A continuation of CRJ 420. Advanced topics include a study of camera and lens types, monitors, video signaling systems, scanners, pan and tilt positioning devices, video motion detectors, camera housings and enclosures, switchers, multiplexers, time-lapse VCRs, digital video recorders, and their interactive role in the design of CCTV systems. Analysis of illumination technologies, including fluorescent, high and low pressure sodium, metal halide, ultraviolet and infrared light sources. Other topics include the application philosophy as well as the hardware and software components of video surveillance computers, and the analysis of video field and frame compositions with reference to identification issues in criminal cases. An inquiry into the legal and ethical dimensions of surveillance, including Fourth Amendment guidelines, Plain View Doctrine cases, the Expectation of Privacy court cases and directives, and the Exclusionary Rule.
Social