Project

# Title Team Members TA Documents Sponsor
11 Automated Chinese Traditional Chimes with Song
Luting Lei
Siyi Li
Tianle Wu
Xiaoxiao Pan
design_document1.pdf
design_document2.pdf
proposal2.docx
Yu Lin
# Team Members
- Tianle Wu (tianle3)
- Luting Lei (lutingl2)
- Siyi Li (siyili4)
- Xiaoxiao Pan (xp8)

# Problem

Few people play Chinese traditional Chimes, and they're often stuck in traditional music, which seems to be a barrier of traditional instruments. Additionally, there are few research on blending modern music with Chinese traditional genres. By addressing these issues, the project is an invention contributes to Chinese traditional music instrument in a modern context and innovatively researches the possible music style transformation between model music and traditional Chinese music.

# Solution Overview

The project aims to revive the melody played by smartphones in the Chinese traditional Chimes. We will first recognize a melody from a smartphone and generate the adapted melody for chimes, then transform the melody to signals, and then control a mechanical design to ring the chimes with the motor.

# Solution Components
- Melody Recognition and Generating Model: The model will be trained to automatically recognize the main melody from a period of sound played by the smartphone and adapt to Chinese traditional style for chimes.
- Electrical Control System: The system will transform the generated melody to location and time signals (for different pitches and rhythms) and build a microcontroller.
- Mechanical System: A hammer structure hanging horizontally at the top of a series of chimes controlled by a motor. It will ring the corresponding chimes controlled by the electrical control system.

# Criteria for Success
- Training a machine learning model that could correctly recognize the melody from a smartphone (with noise). Apply the algorithm to adapt the recognized melody for chimes play.
- Generating correct position and time signals and successfully controlling motor operation.
- Easy and flexible structure for hammer ringing every chime.
- Make the adapted music pleasant and make the whole structure as simple as possible.

Authentication System for SARS-CoV-2 Management

Jiongfan Chen, Zheyuan Zhang, Zhonghao Zhang, Pengyang Zhou

Featured Project

## MEMBERS

- Pengyang Zhou [pz6]

- Jiongfan Chen [jc47]

- Zheyuan Zhang [zheyuan5]

- Zhonghao Zhang [zz46]

## PROBLEM

Preventing SARS-CoV-2 spread requires managing access to public spaces using a phone app. Scanning QR code at the entrance is inconvenient and leads to crowding. Specifically, access control in some other places requires users to take out their mobile phones and show green or blue codes to verify their identity, which also makes users feel troublesome. How to let the user be able to pass the access control quickly is a huge problem to be solved. On the other hand, the health code observed by the human eye is easy to fabricate. How to improve security is also a big problem.

## SOLUTION OVERVIEW

We plan to design a wearable wristband for users. When passing through the access control, a corresponding RFID detection device can send identity query requests to users' wristbands from a distance, and the users' wristbands will respond to convey users' identity and health information. In addition, the wristband itself will send out a signal every few seconds to interact with other wristbands. This would help to monitor people suspected of being infected.

## SOLUTION COMPONENTS

### Wristband Subsystem:

- Broadcast the user token for other wristbands to record the passers-by.

- Receiver the request for identity from the receiver and send back the user token.

### Inspection Device at Access Control Subsystem:

- Send signals to the wristband and receive the feedback of the user identity information, through the database verification and comparison to determine the health status of the user.

## CRITERION FOR SUCCESS

- The wristband connects the inspection device and carries out information transfer successfully, and interconnects with other wristbands.

- The inspection device and database can verify the identity and health information of the user trying to enter.

- If the wristband is lost, it cannot be used by others.

- The user token is hard to be fabricated.

## DISTRIBUTION OF WORK

- Wireless communication hardware design, setup, and verification - Zhonghao Zhang (EE).

- Design and manufacture of the wristband and inspection device at access control - Jiongfan Chen (ME).

- Build the data center; Encryption and handling of data - Zheyuan Zhang & Pengyang Zhou (ECEs).