Research Article
A Trajectory Privacy Protect Method Based on Location Pair Reorganization
Algorithm 3
Construct candidate location set
Input: Semantic trajectory ; semantic trajectory equivalence class ; location | pair similarity threshold | Output: Candidate location set | 1. | 2.fordo | 3. | 4.fordo | 5. fordo | 6. if <> and <> | meets the candidate of | Definition8then | 7. | 8. exit | 9. | 10. return |
|