Research Article

A Trajectory Privacy Protect Method Based on Location Pair Reorganization

Algorithm 3

Construct candidate location set
Input: Semantic trajectory ; semantic trajectory equivalence class ; location
   pair similarity threshold
Output: Candidate location set
1.
2.fordo
3.
4.fordo
5.      fordo
6.         if <> and <>
         meets the candidate of
         Definition8then
7.           
8.           exit
9.
10. return