Design and realization of a random display system of a virtual keyboard based on a fuzzy system

Document Type : Research Paper

Authors

1 department of Electronic, Faculty of the Sciences of the technology, University of Constantine 1, Algeria

2 ENSICAEN NORMANIDE UNIVERSITE Caen, France

3 department of Electronic, Faculty of sciences of the technology, University of Constantine 1

4 Departement of Electronic, faculty of sciences of the tehcnology, University of Constantine 1, Algeria

Abstract

Security and con dentiality of our information such as access codes bank or postal accounts are becoming more and more important to protect against espionage by foreigners. There are several researches to improve the security of the user's personal information when entering the password, or saving, ... etc. The objective of this paper is to create a novel virtual keyboard display system based on a random display algorithm, in order to have a keyboard with random combinations
of the virtual display matrix. This work focuses on the introduction of fuzzy systems mixed with the random number generation. Fuzzy systems use the values of the pressure forces exerted by the user or the operator on the virtual keyboard touchscreen as inputs to the fuzzy systems. The fuzzy system is designed by using the time-varying fuzzy sets. We use the "modulo operator" algorithm to generate a random integer. For the realization, we use a microcontroller (ESP8266 node MCU.V3 microcontroller) and the touchscreen (ili9341) to display a 4X4 numeric matrix to enter a standard four-digit code.

Keywords

Main Subjects


[1] T. AbuHmed, K. Lee, D. Nyang, UOIT keyboard: A constructive keyboard for small touchscreen devices, IEEE
Transactions on Human Machine Systems, 45(6) (2015), 782-789. https://doi.org/10.1109/THMS.2015.2449309
[2] a-Si TFT LCD Single Chip Driver 240RGBx320 Resolution and 262K color, Specification, website http://www.
lcdwiki.com/2.4inch_SPI_Module_ILI9341_SKU:MSP2402, acessed on Nov, 15th, 2024.
[3] L. Blum, M. Blum, M. Shub, A simple unpredictable pseudo random number generator, SIAM Journal on Computing,
15 (1986), 364-383. https://doi.org/10.1137/0215025
[4] M. Collotta, G. Pau, Bluetooth for internet of things: A fuzzy approach to improve power management in smart
homes, Sciences direct, Computers and Electrical Engineering, Computers and Electrical Engineering, 44 (2015),
137-152. https://doi.org/10.1016/j.compeleceng.2015.01.005
[5] ESP8266 Technical Reference, website https://www.espressif.com/en/support/download/other-tools,
acessed on Nov, 15th, 2024.
[6] P. Fan, X. Haot, H. Zhou, Design and implementation of network-based virtual keyboard for the remote alarm
supervisory system, 2010 Second Pacific-Asia Conference on Circuits, Communications and System, (2010). https:
//doi.org/10.1109/PACCS.2010.5626969
[7] S. Gong, J. Lin, Y. Sun, Design and implementation of anti-screenshot virtual keyboard applied in online banking,
Conference: The International Conference on E-Business and E-Government, ICEE 2010, Guangzhou, China,
Proceedings, 7-9 May 2010. http://dx.doi.org/10.1109/ICEE.2010.337
[8] D. Karaku¸s, ¨ O. Karabiber Cura, B. Ye¸silkaya, A. Akan, Design of brain-computer interface for controlling A virtual
keyboard, 2019 Medical Technologies Congress (TIPTEKNO), IEEE Xplore: 11 November 2019, https://doi.org/
10.1109/TIPTEKNO.2019.8895133
[9] R. Kumar, P. Chaudhary, User defined custom virtual keyboard, Information Science (ICIS), International Conference
on. IEEE, (2016), 18-22. https://doi.org/10.1109/INFOSCI.2016.7845293
[10] A. Kumar, K. Kumar Dubey, H. Gupta, S. Lamba, M. Memoria, K. Joshi, Keylogger awareness and use in cyber
forensics, Rising Threats in Expert Applications and Solutions, 434 (2022), 719-725. http://dx.doi.org/10.1007/
978-981-19-1122-4_75
[11] A. M. Law, W. D. Kelton, Simulation modeling and analysis, McGraw-Hill, Chap.7-8, 1991. https://industri.
fatek.unpatti.ac.id/wp-content/uploads/2019/03/108-Simulation-Modeling-and-Analysis-Averill-M.
-Law-Edisi-5-2014.pdf
[12] P. L’Ecuyer, R. Simard, Testu01: A C library for empirical testing of random number generators, ACM Transactions
on Mathematical Software, 33(4) (2007), 1-40. http://doi.acm.org/10.1145/1268776.1268777
[13] Q. Liang, J. M. Mendel, Equalization of nonlinear time-varying channels using type-2 fuzzy adaptive filters, IEEE
Transactions on Fuzzy Systems, 8(5) (2000), 551-563. https://doi.org/10.1049/iet-com.2010.0081
[14] S. MacKenzie, S. X. Zhang, The design and evaluation of a high-performance soft keyboard, Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems, (1999), 25-31. https://doi.org/10.1145/302979.
302983
[15] J. M. Mendel, R. I. B. John, Type-2 fuzzy sets made simple, IEEE Transactions on Fuzzy Systems, 10(2) (2002),
117-127. http://dx.doi.org/10.1109/91.995115
[16] C. Napole, O. Barambones, M. Derbeli, I. Calvo, Design and experimental validation of a piezoelectric actuator
tracking control based on fuzzy logic and neural compensation, Fuzzy Sets and Systems, 464 (2023). https://doi.
org/10.1016/j.fss.2022.12.005
[17] P. Owusu-Agyeman, W. Xie, Y. Yeboah, A robust alternative virtual key input scheme for virtual keyboard systems,
Journal of Computer and Communications, 04(04) (2016), 99. http://dx.doi.org/10.4236/jcc.2016.44009
[18] F. Panneton, P. L’Ecuyer, M. Matsumoto, Improved long-period generators based on linear recurrences modulo 2,
ACM Transactions on Mathematical Software, 32(1) (2006), 1-16. http://dx.doi.org/10.1145/1132973.1132974
[19] H. Sun Chin, S. Fahn, Development of a virtual keyboard based on buttons tracking using magnetic induction,
Journal of the Chinese Institute of Engineers, 27(30) (2007), 311-322. https://doi.org/10.1080/02533839.2007.
9671257
[20] K. Tanaka, H. O. Wang, Fuzzy control systems design and analysis: A linear matrix inequality approach, John
Wiley and Son, Inc., 2001. https://doi.org/10.1002/0471224596
[21] E. V. Tushkanov, O. V. Kuznetsova, A. Y. Kuznetsov, Authentication method for the keyboard usage based on fuzzy
logic, International Conference Quality Management, Transport and Information Security, Information Technologies
(IT&QM&IS), St. Petersburg, Russia, 2017. https://doi.org/10.1109/ITMQIS.2017.8085777
[22] N. K. Verma, V. Singh, S. Rajurkar, M. Aqib, Fuzzy inference network with Mamdani fuzzy inference system, In:
Computational Intelligence: Theories, Applications and Future Directions, I, Springer, Singapore, (2018), 375-388.
http://dx.doi.org/10.1007/978-981-13-1132-1_29
[23] What is ATM, Definition and Uses, https://paytm.com/blog/atm/what-is-atm-full-form-definition-uses/,
Retrieved Nov, 15th , 2024.
[24] W. Yanshan, A novel soft keyboard for touchscreen phones: QWERT, International Journal of Human Factors and
Ergonomics, 2(4) (2013), 246-261. https://doi.org/10.1504/IJHFE.2013.059374
[25] Y. Zhang, W. Yan, A. Narayanan, A virtual keyboard implementation based on finger recognition, International
Conference on Image and Vision Computing New Zealand (IVCNZ) (IEEE), 2017. https://doi.org/10.1109/
IVCNZ.2017.8402452
[26] S. Ziani, Time-varying fuzzy sets based on a Gaussian membership function for developing fuzzy controller, Iranian
Journal of Fuzzy Systems, 14(3) (2017), 15-39. https://doi.org/10.22111/ijfs.2017.3241
[27] S. Ziani, F. Salim, Time-varying fuzzy sets in adaptive control, In 14th International Conference on Sciences and
Techniques of Automatic Control and Computer Engineering (STA2013), April 06, 2015.http://dx.doi.org/10.
1109/STA.2013.6783097
[28] S. Ziani, F. Salim, Y. Huo, A time-varying fuzzy sets as functions of the error, International Journal of Innovative
Computing, Information and Control, 6(12) (2010), 5709-5723. https://doi.org/10.1007/s11633-016-0988-0
[29] https://www.arduino.cc/reference/en/libraries/, Accessed on Nov, 15th, 2024