Privacy Protection Method for Vehicle Trajectory Based on VLPR Data

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

designing unmanned aerial vehicle based on neuro-fuzzy systems

در این پایان نامه، کنترل نرو-فازی در پرنده هدایت پذیر از دور (پهپاد) استفاده شده است ابتدا در روش پیشنهادی اول، کنترل کننده نرو-فازی توسط مجموعه اطلاعات یک کنترل کننده pid به صورت off-line آموزش دیده است و در روش دوم یک کنترل کننده نرو-فازی on-line مبتنی بر شناسایی سیستم توسط شبکه عصبی rbf پیشنهاد شده است. سپس کاربرد این کنترل کننده در پهپاد بررسی شده است و مقایسه ای ما بین کنترل کننده های معمو...

User Privacy Protection from Trajectory Perspective in Location-based Applications

Under the help of information and communication technologies, our lives are becoming better than ever in such a way we have been spending. One of popular and worthy supports comes from mobile devices. Integrated with modern positioning-aware technologies like Assisted Global Positioning System (A-GPS), mobile devices nowadays can locate users’ position with acceptable accuracy. However, privacy...

متن کامل

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Novel method for hurricane trajectory prediction based on data mining

This paper describes a novel method for hurricane trajectory prediction based on data mining (HTPDM) according to the hurricane’s motion characteristics. Firstly, all frequent trajectories in the historical hurricane trajectory database are mined by using association analysis technology and their corresponding association rules are generated as motion patterns. Then, the current hurricane traje...

متن کامل

Algorithm-irrelevant Privacy Protection Method Based on Randomization

Privacy preserving classification mining is one of the fast-growing subareas of data mining. The algorithm-related methods of privacy-preserving are designed for particular classification algorithm and couldn’t be used in other classification algorithms. To solve this problem, it proposes a new algorithm-irrelevant privacy protection method based on randomization. This method generates and open...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Advanced Transportation

سال: 2020

ISSN: 0197-6729,2042-3195

DOI: 10.1155/2020/6026140