Research Article
A Trajectory Privacy Protect Method Based on Location Pair Reorganization
Algorithm 5
Generate fake trajectory set
Input: Semantic trajectory ; location pair graph ; semantic similarity threshold ; | Geographical similarity threshold ; directional similarity threshold ; | Semantic trajectory equivalence class | Output: Dummy trajectory set | 1. | 2. Calculate the slope of | 3. Remove all which do | not satisfy Def(10) and Def(11) from G | 4.whiledo | 5. Random generates a fake semantic trajectory | 6. ifthen | 7. | 8. else | 9. if | then | 10. for | 11. fordo | 12. ifthen | 13. all point between and join | 14. | 15. return |
|