Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Track clustering privacy protection method based on semantics

A privacy protection and trajectory clustering technology, which can be used in specific environment-based services, digital data protection, vehicle wireless communication services, etc., and can solve the problem of not considering privacy protection.

Pending Publication Date: 2021-04-16
CHANGAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The clustering method based on semantic analysis proposed in recent years has effectively improved the clustering accuracy, but in the process of clustering, privacy protection is still not considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Track clustering privacy protection method based on semantics
  • Track clustering privacy protection method based on semantics
  • Track clustering privacy protection method based on semantics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060]The invention will be further described in detail below with reference to the accompanying drawings:

[0061]Such asfigure 1As shown, a semantic-based trajectory cluster privacy method includes the following steps:

[0062]Step 1, trajectory segmentation;

[0063]1.1 Search the cluster in a single marker trajectory according to the direction and speed changes. Calculate two-point P in a single marker trajectoryi-1PiDuan direction changes (DC (p)i-1, Pi)) And speed changes (SC (Pi-1, Pi)), Where DC (Pi-1, Pi) = | DC (pi-1) -DC (pi), Sc (pi-1, Pi) = | V (pi-1) -V (p)i) |, V (pi)iTime point Pispeed.

[0064]Original trajectory: indicating the time-space sampling point sequence of time intervals:

[0065]P = {P0= (X0Y0, T0), P1= (X1Y1, T1), ..., pn= (XnYn, Tn}

[0066]Set Pi= (XiYi, Ti) For some sampling point in the trajectory, where XiIndicates the sampling point PiSlender, yiIndicates the sampling point PiThe latitude, TiIndicates the sampling point PiThe sampling time, n represents the number o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a track clustering privacy protection method based on semantics. Vehicle track data mining and privacy protection of interest points in a track are combined. The method comprises the following steps: firstly, carrying out trajectory segmentation by using an improved Clusters function so as to generate a cluster on a single trajectory; then calculating a distance range Eps of trajectory data clustering; determining an Eps neighborhood of the track point according to the Eps, then determining a core point of the cluster, and performing stop area clustering by using the core point and the Eps neighborhood of the core point; adjusting the Eps to enable the Eps to meet a termination condition; performing secondary clustering on the stop area through core attribute selection; before track data is published, carrying out road network segmentation according to a privacy protection level and a Delaunay triangulation method to form a plurality of Voronoi maps (VM); secondly, based on the anonymity degree and the category degree, classifying the interest points in each VM into a plurality of buckets (buckets); and finally, publishing track data containing the pseudo positions of the interest points. In the invention, the pseudo positions of the interest points refer to the interest points closest to the duration time of each interest point in the bucket corresponding to the interest point. According to the method, the privacy information involved in the vehicle track interest point mining process can be effectively protected.

Description

Technical field[0001]The present invention relates to the field of data mining and privacy protection, specifically a semantic trajectory cluster privacy method.Background technique[0002]With the widespread application of GPS equipment, the rapid increase in vehicle trajectory data, from the complex time and space trajectory, it has become an important issue. Traditional trajectory clustering methods mainly include distance measurements, density-based methods and hierarchical methods, etc., these methods are to be further improved in terms of clustering accuracy. The clustering method based on semantic analysis in recent years effectively improves clustering accuracy, but there is still no privacy protection in the process of clustering. Therefore, how to protect the privacy data without leakage while performing data mining, it is an urgent problem to solve.Inventive content[0003]It is an object of the present invention to provide a semantic-based trajectory cluster privacy method t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06K9/62G01S19/42H04W4/40
Inventor 樊娜郝家欢徐燕段宗涛王青龙朱依水陈拓
Owner CHANGAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products