Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
AMeasure of Trajectory Similarity Based on a Negative Correlation with Distance
Jilin Normal University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the development of wireless communication technology and positioning technology, trajectory data emerge in large quantities. Similarity measurement is used in the query and analysis of trajectory data. In this paper, an improved similarity measure- ment is proposed. By introducing the negative correlation between the distance of points and the similarity into the real sequence ed- iting distance, the robustness to noise is preserved and the sensitivity to difference is improved. We apply different similarity mea- sures to the trajectory privacy protection method based on cluster-reconstruction, and verify the effectiveness of the proposed trajec- tory similarity measure by experiment on the real data and the synthetic data.
Key wordstrajectory data      similarity measure      privacy protection     
Published: 24 February 2021

Cite this article:

WANG Shuai ZHANG Gui-jie. AMeasure of Trajectory Similarity Based on a Negative Correlation with Distance. Computer & Telecommunication, 2020, 1(11): 60-64.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2020/V1/I11/60

[1] TONG Wei HUANG Qi-ping.
Optimization Strategy of Privacy-oriented BRNN Protection
[J]. 电脑与电信, 2021, 1(12): 58-61.
[2] Peng Li-xun Liu Feng-kai. Resource RecommendationAlgorithm Based on K-anonymity for Generalizing User Query Requests[J]. 电脑与电信, 2020, 1(6): 66-73.
[3] CAI Chang-hao LU Chang-xing HATe SUN Ruo-xi XIN Yu-liang. Research on User Privacy Protection Method in Logistics Industry[J]. 电脑与电信, 2020, 1(12): 75-79.
[4] ZUO Wen-tao LUO Guo-qiang. Analysis of Data Security and Privacy Protection in the Background of "Artificial Intelligence+"[J]. 电脑与电信, 2019, 1(3): 39-41.
[5] Zhang Shuai, Zhao Yan. Research on Scenario Privacy Protection Design for Mobile Terminal[J]. 电脑与电信, 2017, 1(5): 38-40.
[6] Zhao Junjie. Research on the Protection of Consumers' Privacy in Electronic Commerce[J]. 电脑与电信, 2016, 1(5): 33-35.
[7] Chen Rong. Study on the SSL VPN Network Security Technology[J]. 电脑与电信, 2015, 1(10): 50-51.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd