People & Office Hours

Office Hours Schedule

Office hours are held weekly in the senior design lab. This sheet will be updated if any schedule changes. Make sure to double check the sheet before assuming there will be a TA present when you go!

Fall 2025 Instructors

Name Area
Prof. Mark Butala (Instructor)

butala@illinois.edu
Prof. Arne Fliflet (Instructor)
3056
afliflet@illinois.edu
microwave generation and applications
Prof. Aaron Geiger (Instructor)

ageiger2@illinois.edu
Prof. Zhefeng Guo (Instructor)

zhefengg@illinois.edu
Prof. Huan Hu (Instructor)

huanhu2@illinois.edu
Prof. Timothy Lee (Instructor)

lee527@illinois.edu
Prof. Craig Shultz (Instructor)
CSL 220
shultz88@illinois.edu
Haptics, Human Computer Interaction, Signals, Audio, HCI, Actuators
Fatemeh Cheraghi Pouria (TA)

fatemeh5@illinois.edu
Amritesh Dasari (TA)

mdasari2@illinois.edu
Lukas Dumasius (TA)

lukasd2@illinois.edu
Alma Furayi (TA)

afurayi@illinois.edu
Caitlin Jones (TA)

caitlinj@illinois.edu
Xiaoyue Li (TA)

xiaoyuel@illinois.edu
Image Processing, Deep Learning
Chunzeng Luo (TA)

cluo@illinois.edu
Muhammad Malik (TA)

mmalik@illinois.edu
Ian Meliala (TA)

imeliala@illinois.edu
Yiqun Niu (TA)

yiqunn2@illinois.edu
Qi Wang (TA)
ZJUI C318
qiw7@illinois.edu
Xinyi Xu (TA)

xinyixu@illinois.edu
Ronghui Zheng (TA)

ronghuiz@illinois.edu
Yuchuan Zhu (TA)

yuchuan5@illinois.edu
Yutao Zhuang (TA)

yutaoz@illinois.edu

Other Important People

Name Office Phone Email Area
Dean Biskup UIUC ECE Building   dbiskup2@illinois.edu UIUC TA

Authentication System for SARS-CoV-2 Management

Jiongfan Chen, Zheyuan Zhang, Zhonghao Zhang, Pengyang Zhou

Featured Project

## MEMBERS

- Pengyang Zhou [pz6]

- Jiongfan Chen [jc47]

- Zheyuan Zhang [zheyuan5]

- Zhonghao Zhang [zz46]

## PROBLEM

Preventing SARS-CoV-2 spread requires managing access to public spaces using a phone app. Scanning QR code at the entrance is inconvenient and leads to crowding. Specifically, access control in some other places requires users to take out their mobile phones and show green or blue codes to verify their identity, which also makes users feel troublesome. How to let the user be able to pass the access control quickly is a huge problem to be solved. On the other hand, the health code observed by the human eye is easy to fabricate. How to improve security is also a big problem.

## SOLUTION OVERVIEW

We plan to design a wearable wristband for users. When passing through the access control, a corresponding RFID detection device can send identity query requests to users' wristbands from a distance, and the users' wristbands will respond to convey users' identity and health information. In addition, the wristband itself will send out a signal every few seconds to interact with other wristbands. This would help to monitor people suspected of being infected.

## SOLUTION COMPONENTS

### Wristband Subsystem:

- Broadcast the user token for other wristbands to record the passers-by.

- Receiver the request for identity from the receiver and send back the user token.

### Inspection Device at Access Control Subsystem:

- Send signals to the wristband and receive the feedback of the user identity information, through the database verification and comparison to determine the health status of the user.

## CRITERION FOR SUCCESS

- The wristband connects the inspection device and carries out information transfer successfully, and interconnects with other wristbands.

- The inspection device and database can verify the identity and health information of the user trying to enter.

- If the wristband is lost, it cannot be used by others.

- The user token is hard to be fabricated.

## DISTRIBUTION OF WORK

- Wireless communication hardware design, setup, and verification - Zhonghao Zhang (EE).

- Design and manufacture of the wristband and inspection device at access control - Jiongfan Chen (ME).

- Build the data center; Encryption and handling of data - Zheyuan Zhang & Pengyang Zhou (ECEs).