[1] T. AbuHmed, K. Lee, D. Nyang, UOIT keyboard: A constructive keyboard for small touchscreen devices, IEEE
Transactions on Human Machine Systems, 45(6) (2015), 782-789.
https://doi.org/10.1109/THMS.2015.2449309
[2] a-Si TFT LCD Single Chip Driver 240RGBx320 Resolution and 262K color, Specification, website http://www.
lcdwiki.com/2.4inch_SPI_Module_ILI9341_SKU:MSP2402, acessed on Nov, 15th, 2024.
[3] L. Blum, M. Blum, M. Shub, A simple unpredictable pseudo random number generator, SIAM Journal on Computing,
15 (1986), 364-383.
https://doi.org/10.1137/0215025
[4] M. Collotta, G. Pau, Bluetooth for internet of things: A fuzzy approach to improve power management in smart
homes, Sciences direct, Computers and Electrical Engineering, Computers and Electrical Engineering, 44 (2015),
137-152.
https://doi.org/10.1016/j.compeleceng.2015.01.005
[5] ESP8266 Technical Reference, website https://www.espressif.com/en/support/download/other-tools,
acessed on Nov, 15th, 2024.
[6] P. Fan, X. Haot, H. Zhou, Design and implementation of network-based virtual keyboard for the remote alarm
supervisory system, 2010 Second Pacific-Asia Conference on Circuits, Communications and System, (2010). https:
//doi.org/10.1109/PACCS.2010.5626969
[7] S. Gong, J. Lin, Y. Sun, Design and implementation of anti-screenshot virtual keyboard applied in online banking,
Conference: The International Conference on E-Business and E-Government, ICEE 2010, Guangzhou, China,
Proceedings, 7-9 May 2010.
http://dx.doi.org/10.1109/ICEE.2010.337
[8] D. Karaku¸s, ¨ O. Karabiber Cura, B. Ye¸silkaya, A. Akan, Design of brain-computer interface for controlling A virtual
keyboard, 2019 Medical Technologies Congress (TIPTEKNO), IEEE Xplore: 11 November 2019, https://doi.org/
10.1109/TIPTEKNO.2019.8895133
[10] A. Kumar, K. Kumar Dubey, H. Gupta, S. Lamba, M. Memoria, K. Joshi, Keylogger awareness and use in cyber
forensics, Rising Threats in Expert Applications and Solutions, 434 (2022), 719-725. http://dx.doi.org/10.1007/
978-981-19-1122-4_75
[11] A. M. Law, W. D. Kelton, Simulation modeling and analysis, McGraw-Hill, Chap.7-8, 1991. https://industri.
fatek.unpatti.ac.id/wp-content/uploads/2019/03/108-Simulation-Modeling-and-Analysis-Averill-M.
-Law-Edisi-5-2014.pdf
[13] Q. Liang, J. M. Mendel, Equalization of nonlinear time-varying channels using type-2 fuzzy adaptive filters, IEEE
Transactions on Fuzzy Systems, 8(5) (2000), 551-563.
https://doi.org/10.1049/iet-com.2010.0081
[14] S. MacKenzie, S. X. Zhang, The design and evaluation of a high-performance soft keyboard, Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems, (1999), 25-31. https://doi.org/10.1145/302979.
302983
[16] C. Napole, O. Barambones, M. Derbeli, I. Calvo, Design and experimental validation of a piezoelectric actuator
tracking control based on fuzzy logic and neural compensation, Fuzzy Sets and Systems, 464 (2023). https://doi.
org/10.1016/j.fss.2022.12.005
[17] P. Owusu-Agyeman, W. Xie, Y. Yeboah, A robust alternative virtual key input scheme for virtual keyboard systems,
Journal of Computer and Communications, 04(04) (2016), 99.
http://dx.doi.org/10.4236/jcc.2016.44009
[18] F. Panneton, P. L’Ecuyer, M. Matsumoto, Improved long-period generators based on linear recurrences modulo 2,
ACM Transactions on Mathematical Software, 32(1) (2006), 1-16.
http://dx.doi.org/10.1145/1132973.1132974
[19] H. Sun Chin, S. Fahn, Development of a virtual keyboard based on buttons tracking using magnetic induction,
Journal of the Chinese Institute of Engineers, 27(30) (2007), 311-322. https://doi.org/10.1080/02533839.2007.
9671257
[20] K. Tanaka, H. O. Wang, Fuzzy control systems design and analysis: A linear matrix inequality approach, John
Wiley and Son, Inc., 2001.
https://doi.org/10.1002/0471224596
[21] E. V. Tushkanov, O. V. Kuznetsova, A. Y. Kuznetsov, Authentication method for the keyboard usage based on fuzzy
logic, International Conference Quality Management, Transport and Information Security, Information Technologies
(IT&QM&IS), St. Petersburg, Russia, 2017.
https://doi.org/10.1109/ITMQIS.2017.8085777
[22] N. K. Verma, V. Singh, S. Rajurkar, M. Aqib, Fuzzy inference network with Mamdani fuzzy inference system, In:
Computational Intelligence: Theories, Applications and Future Directions, I, Springer, Singapore, (2018), 375-388.
http://dx.doi.org/10.1007/978-981-13-1132-1_29
[23] What is ATM, Definition and Uses, https://paytm.com/blog/atm/what-is-atm-full-form-definition-uses/,
Retrieved Nov, 15th , 2024.
[25] Y. Zhang, W. Yan, A. Narayanan, A virtual keyboard implementation based on finger recognition, International
Conference on Image and Vision Computing New Zealand (IVCNZ) (IEEE), 2017. https://doi.org/10.1109/
IVCNZ.2017.8402452
[26] S. Ziani, Time-varying fuzzy sets based on a Gaussian membership function for developing fuzzy controller, Iranian
Journal of Fuzzy Systems, 14(3) (2017), 15-39.
https://doi.org/10.22111/ijfs.2017.3241
[27] S. Ziani, F. Salim, Time-varying fuzzy sets in adaptive control, In 14th International Conference on Sciences and
Techniques of Automatic Control and Computer Engineering (STA2013), April 06, 2015.http://dx.doi.org/10.
1109/STA.2013.6783097
[28] S. Ziani, F. Salim, Y. Huo, A time-varying fuzzy sets as functions of the error, International Journal of Innovative
Computing, Information and Control, 6(12) (2010), 5709-5723.
https://doi.org/10.1007/s11633-016-0988-0
[29] https://www.arduino.cc/reference/en/libraries/, Accessed on Nov, 15th, 2024