hero image
Nazrul Islam - Farmingdale State College. Farmingdale, NY, UNITED STATES

Nazrul Islam

Chair, Security Systems and Law Enforcement Technology Department | Farmingdale State College

Farmingdale, NY, UNITED STATES

Dr. Islam is Chair of the Security Systems and Law Enforcement Technology Department, and a member of the Protect New York think tank.

Biography

Dr. Nazrul Islam is a professor in, and chair of, the Security Systems and Law Enforcement Technology Department at Farmingdale State College. He has been in academia since 1991, and has worked at several other institutions, including Old Dominion University, University of South Alabama, University of West Florida, and Bangladesh University of Engineering and Technology.

His research interests include optical communication, wireless communication, digital image processing, security technologies and solid state devices. He has published more than 150 articles in refereed journals and for conferences, and has successfully completed research projects sponsored by federal and private institutions, including U.S. Army, National Science Foundation, and Department of Energy.

Media

Publications:

Documents:

Photos:

Nazrul Islam Photo Nazrul Islam Photo Nazrul Islam Photo

Videos:

Audio/Podcasts:

Areas of Expertise (6)

Facial Recognition

Solid-state Devices

Digital Image Processing

Wireless Communications

optical communication

security technologies

Industry Expertise (5)

Computer/Network Security

Education/Learning

Electrical Engineering

Telecommunications

Renewables and Environmental

Accomplishments (8)

“Strengthening the resources for Software Technology and Computer Security Technology programs to support Open SUNY Initiative” (professional)

“Strengthening the resources for Software Technology and Computer Security Technology programs to support Open SUNY Initiative”

“Establishing infrastructure, transportation and security center” (professional)

“Establishing infrastructure, transportation and security center”

enhancing student learning process through applied research projects in forensics and security imaging (professional)

enhancing student learning process through applied research projects in forensics and security imaging

automatic human wound detection in warfield, US Army Medical Research and Material Command

automatic human wound detection in warfield, US Army Medical Research and Material Command

IEEE Region 1 Award (professional)

For outstanding service to the IEEE Long Island Systems Applications and Technology (LISAT) Conference while serving as its Publications Chairman

IEEE Long Island Section Outstanding Volunteer Award (professional)

For revitalizing the Photonics Society chapter and leadership in many other Section activities

Individual Development Award Program (IDAP) Award (professional)

State of New York/United University Professions Joint Labor-Management Committee award for research presentation

Individual Development Award Program (IDAP) Award (professional)

State of New York/United University Professions Joint Labor-Management Committee award for research presentation

Education (3)

Muroran Institute of Technology: Doctor of Engineering, Engineering (Electrical and Electronic) 1999

Bangladesh University of Engineering and Technology: Master of Science in Engineering, Engineering (Electrical and Electronic) 1994

Bangladesh University of Engineering and Technology: Bachelor of Science in Engineering, Engineering (Electrical and Electronic) 1991

Social

Affiliations (7)

  • Institute of Electrical and Electronics Engineers (IEEE)
  • IEEE Signal Processing Society
  • IEEE Photonics Society
  • International Society for Optics and Photonics
  • Institution of Engineers
  • Bangladesh Electronics Society
  • Bangladesh Computer Society

Languages (2)

  • English
  • Bangla

Event Appearances (13)

“Optical security system employing shifted phase-encoded joint transform correlation and orthogonal code"

10th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT 2013)  Melville, NY

“Enhanced information security employing orthogonal code, steganography and joint transform correlation"

Proceedings of SPIE in Optical Pattern Recognition XXIV  Baltimore

“Efficient and robust information security system employing color encoded steganography and orthogonal encryption"

10th IASTED International Conference on Visualization, Imaging and Image Processing  Banff, Canada

“Color image encryption using multiple reference joint transform correlation"

8th IEEE Long Island Systems, Applications and Technology Conference  New York, NY

“A biometric-based secure architecture for mobile computing"

8th IEEE Long Island Systems, Applications and Technology Conference  New York, NY

“Encryption and multiplexing of fingerprints for enhanced security"

7th IEEE Long Island Systems, Applications and Technology Conference  New York, NY

“A secure approach for encryption and compressing biometric information employing orthogonal code and steganography"

SPIE in Optical Pattern Recognition XXIII  Baltimore

“Target tracking using log-polar transform-based shifted phase-encoded joint transform correlation"

SPIE in Optical Pattern Recognition XXV  Baltimore

“Modified local binary pattern (MLBP) for robust face recognition"

International Conference on Neural Computation Theory and Applications  Paris, France

“Distortion-invariant face recognition using multiple phase-shifted-reference based joint transform correlation"

SPIE in Optics and Photonics for Information Processing V  San Diego

“Intelligent traffic light control system"

8th International Conference and Expo on Emerging Technologies for a Smarter World  

“Modified local binary pattern (MLBP) for robust face recognition”

International Joint Conference on Computational Intelligence  Paris, France

“Learning by research: a review of undergraduate research experience in the School of Engineering Technology”

ASEE Mid-Atlantic Conference  New York, NY

Sample Talks (1)

Optical Pattern Recognition and Security Systems

Optical pattern recognition and security techniques employ optical light source, lenses and other optical components to process the images in parallel for correlation decision, which makes them ideal candidates for real-time pattern recognition system. A phase-shifted and phase-encoded fringe-adjusted joint transform correlation (SPFJTC) technique is developed, which can detect multiple targets in one processing step and ensures better utilization of the space-bandwidth product (SBP) resource by generating one correlation peak per target. This technique is found to be efficient with variable number of targets and even in the presence of noise in the input scene. The SPFJTC technique is extended to color pattern recognition system to utilize color of the target objects as additional feature to the spatial characteristics. Color pattern recognition technique has also been extended to multispectral system, where the images are recorded at several light wavelengths, which introduces additional feature to the target detection process. In addition to pattern recognition applications, the SPFJTC technique has been employed for securing confidential information by incorporating nonlinear encryption. This presentation will introduce the optical pattern recognition and security systems along with challenges and future directions.

Style

Availability

  • Keynote
  • Moderator
  • Panelist
  • Workshop Leader
  • Host/MC
  • Author Appearance
  • Corporate Training

Media Appearances (2)

Police investigate alleged fake 'sexts' involving CE Mangano

News 12 Long Island  tv

The county executive says his phone was recently hacked and X rated messages were apparently sent, but he says they did not come from him.

view more

Nassau County Executive Ed Mangano Says He's Victim of Impersonator's Sexting

WNBC-TV  tv

Police are investigating a complaint from Nassau County Executive Ed Mangano that he's been impersonated in a sexually aggressive text message.

view more

Research Focus (6)

Security Systems

Analysis and design of cryptographic tools and security systems

Pattern Recognition

• Analysis and design of optical correlation technique for real time pattern recognition applications • Hyperspectral image processing for target detection • Face recognition systems

Digital Image Processing

• Super resolution enhancement of still images and video scene • Medical application of image processing techniques

Optical Communication and Optoelectronics

• Analysis and design of optical communication system incorporating fiber nonlinear effects • Design and characterization of optical devices

Wireless Communication

• Analysis of access networks for mobile communication systems • Performance evaluation of wireless system incorporating various limitations and noises

Solid State Electronics

Analysis and design of electronic devices and systems

Research Grants (5)

Strengthening the resources for Software Technology and Computer Security Technology programs to support Open SUNY Initiative

State University of New York (SUNY) High Need Program $75,000

Strengthening the resources for Software Technology and Computer Security Technology programs to support Open SUNY Initiative

Establishing infrastructure, transportation and security center

Round IV NYSUNY 2020 Program $7 million

Establishing infrastructure, transportation and security center

W. E. B. Du Bois faculty student research experience

SUNY Farmingdale W. E. B. Du Bois Research Project $500

W. E. B. Du Bois faculty student research experience

: Farmingdale students first grant

SUNY Farmingdale Title III Grants $2,500

: Farmingdale students first grant

Automatic human wound detection in warfield

US Army Medical Research and Material Command $60,000

Automatic human wound detection in warfield

Published Articles (3)

Robust information security system using steganography, orthogonal code and joint transform correlation


International Journal for Light and Electron Optics

Robust information security system using steganography, orthogonal code and joint transform correlation


A Review of “Introduction to Computer Networks and Cybersecurity


Journal of Applied Security Research

A Review of “Introduction to Computer Networks and Cybersecurity


Automatic fingerprint recognition employing optical phase-modulated joint transform correlation


Journal of Applied Security Research

Automatic fingerprint recognition employing optical phase-modulated joint transform correlation


Courses (9)

Intrusion Detection

A study of the architecture, monitoring strategies and analysis engines of intrusion detection. An examination of host-based information sources. An analysis of information transformation processes for intrusion detection such as misuse and anomaly detection. A study of technical issues in intrusion detection such as scalability, interoperability, sensor control, reliability, integration and user interfaces. An examination of legal matters in intrusion detection such as the rules of evidence with regard to system logs and monitoring activities with regard to the right of privacy.

view more

Access Control

A study of firewall technologies, including packet filtering, proxying, network address translation, and virtual private networks. An analysis of firewall architectures such as screening routers, screened hosts, hosts, screened subnets, perimeter networks and internal firewalls. An examination of security threats on the internet, including service attacks, eavesdropping, worm programs and the like. A study of access control hardware devices such as voice signatures, fingerprints, facial geometry, hand geometry and retinal scanners-iris patterns for servers, workstations and mobile computers.

view more

Computer Security I

This course focuses on security threats to an organization's data network such as hackers, intruders, industrial espionage and sabotage, fraud and theft. The components of computer security architecture are studied as well as the principles of security networking protocols, encryption, fault tolerance techniques, and file system protection. Additional topics covered include the protection of computer hardware and software.

view more

Computer Security II

This course is a continuation of CRJ 310, and includes an analysis of the security features of computer operating systems. The course will review the OSI model and describe how systems communicate with one another. Also included in the course is a detailed study of authentication technologies and how they are used to secure an organization's assets and electronic transactions.

view more

Computer Security III

The course examines computer software threats which include the birth, life and termination of computer viruses, their modes of operation, detection techniques, virus signatures and virus removal methods as well as other "virus like" threats which are delivered by e-mail and internet/intranet packets.

view more

Computer Forensics II

Computer Forensics II is a continuation of CRJ 115. This course covers topics such as disk geometry and organization. Master boot sector record and volume record creation and organization, file signatures for data type identification, cyclic redundancy checksum for data integrity validation, and RSA's MD5 hash values for file authentication. Other subjects introduced include the UNIX "grep" search utility, search string techniques and file signature matching, and recovery of files that are intentionally deleted, hidden, or renamed. The course examines advanced computer-based evidentiary and "discovery" data methodologies, and includes a study of evidence identification, documentation, and chain of custody procedures.

view more

Introduction to Criminal Justice

Philosophical and historical background of policing throughout the free world; special emphasis is placed on the heritage of British and American policing, the governmental role of law enforcement in society; administration of American justice at all levels of government. The role of technology in law enforcement and crime prevention; history, modes and impact.

view more

Physical Security I

A study of the theory and practice of managing the movement of people in organizational settings. This lecture course examines the operating principles and applications of access control readers, card encoding technologies, locking assemblies, and system functions such as fail-safe, fail-secure, access levels, time zones, limited and unlimited access privileges, and the like. Also, the course focuses on the role of alarm systems in an organization's overall protection plan, from the control of violence in the workplace to preventing theft of company property. Sensor technologies as well as controls and signaling systems are analyzed and evaluated with applications in the following areas: perimeter, interior, occupant, and object protection.

view more

Physical Security II

A continuation of CRJ 420. Advanced topics include a study of camera and lens types, monitors, video signaling systems, scanners, pan and tilt positioning devices, video motion detectors, camera housings and enclosures, switchers, multiplexers, time-lapse VCRs, digital video recorders, and their interactive role in the design of CCTV systems. Analysis of illumination technologies, including fluorescent, high and low pressure sodium, metal halide, ultraviolet and infrared light sources. Other topics include the application philosophy as well as the hardware and software components of video surveillance computers, and the analysis of video field and frame compositions with reference to identification issues in criminal cases. An inquiry into the legal and ethical dimensions of surveillance, including Fourth Amendment guidelines, Plain View Doctrine cases, the Expectation of Privacy court cases and directives, and the Exclusionary Rule.

view more

 Your profile is not published.

Contact