Research Article

Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology

Figure 2

Before partition of k-anonymity region.