Research Article
A Trajectory Privacy Protect Method Based on Location Pair Reorganization
Algorithm 2
Construct semantic trajectory
Input: Real trajectory ; time threshold ; distance threshold ; point-of-interest set | | Output: Semantic trajectory ; Semantic trajectory equivalence class | 1. | 2. | 3. | 4. | 5. | 6.whiledo | 7. | 8.whiledo | 9. ifthen | 10. ifthen | 11. | 12. | 13. | 14. | 15. | 16. fordo | 17. whiledo | 18. | 19. whiledo | 20. ifthen | 21. ifthen | 22. | 23. | 24. | 25. | 26. | 27. | 28. return |
|