Research Article

A Trajectory Privacy Protect Method Based on Location Pair Reorganization

Algorithm 2

Construct semantic trajectory
Input: Real trajectory ; time threshold ; distance threshold ; point-of-interest set
   
Output: Semantic trajectory ; Semantic trajectory equivalence class
1.
2.
3.
4.
5.
6.whiledo
7.
8.whiledo
9. ifthen
10.      ifthen
11.         
12.         
13.         
14.    
15.   
16. fordo
17.   whiledo
18.      
19.      whiledo
20.         ifthen
21.         ifthen
22.            
23.            
24.            
25.         
26.   
27.  
28. return