Abstract

In order to improve the collaborative optimization effect of tourism resources and highway network, this paper combines deep learning algorithm to construct a collaborative optimization model of tourism resources and highway network, and adopts an algorithm based on continuous convex approximation. By iterating the optimal solution obtained each time, a high-quality approximate beamforming matrix and artificial noise covariance matrix can finally be obtained, which eliminates the problem that the traditional algorithm cannot solve the noise. Moreover, this paper introduces artificial noise to prove that the rank relaxation is compact by considering the corresponding minimization power problem. The simulation results show that the proposed scheme and approximation algorithm can obtain better system security and speed than the existing literature, and there are certain improvements compared with the traditional method, so the effectiveness of the method in this paper is verified by simulation experiments.

1. Introduction

The research on the interaction between the transportation system and the tourism system has always been a hot topic in the discussion of spatial geography. The continuous development of the expressway network, which is the key to the transportation system, has an increasingly obvious impact on the development of tourism resources, and the development of the tourism industry in turn promotes or restricts the extension of the expressway network.

Through the analysis of the structural characteristics of the regional passenger transportation network, we locate the roles and functions of each tourism node in the passenger flow network and transportation network, and find out and identify potential traffic improvement nodes and tourism investment nodes. The operation effect of the entire regional highway network can be optimized, and the total social investment benefit can be maximized. This provides new ideas for highway planning and a theoretical basis for regional highway network planning decision-makers, to effectively save the travel time and travel costs of road travelers, improve travel satisfaction, and further increase the revisit rate of big tourist travelers.

The main contributions of this paper are as follows: in the previous provincial expressway network planning, only the connectivity of major cities was generally considered, and the connectivity of tourist attractions was not included. With the continuous development of tourism and the improvement of the service demand of tourist attractions, the planning of high-speed tourist highways will become inevitable. In this paper, combined with deep learning, the tourism resources and the road network collaborative optimization model are linked, and it is hoped that the planned road network tourism resources’ demand will increase the most. From the point of view of network users (travelers), each user wishes to travel with the least amount of time or expense.

In this paper, through this optimization method, this paper optimizes the allocation of tourism resources; at the same time, improves the operation efficiency of the highway network; and provides a strong support for the integration, development, and utilization of regional system resources.

The research on tourism spatial structure is an extension of the research theory of regional spatial structure. The research on regional spatial structure accompanies the time course from the agricultural era to the industrial era. Foreign scholars have put forward the spatial structure theories divided by economic industries, such as agricultural regional theory and industrial location theory [1]. The regional spatial evolution structure of different grades of central places with decreasing scale from top to bottom under the constraints of different factors is proposed, that is, the principle of central places [2]. The study puts forward the growth pole theory, which holds that economic growth first occurs on the growth pole, and then spreads to the surrounding areas in different ways [3]. Taking increasing returns and monopolistic competition as analytical tools for the study of the regional spatial economy, he proposes the “center-periphery” theory [4], arguing that the spatial distribution pattern of economic activities will eventually reach equilibrium under the influence of agglomeration and dispersion.

The research system of tourism geography is summarized [5]. It is proposed that the places where tourists gather, such as hotels and restaurants, can be used as a tourist bubble, which can be divided into the core area and the peripheral area, and tourism-influenced activities are mainly concentrated in the core area [6]. By analyzing the tourism spatial characteristics of the most important international tourism regions in South Africa, it is believed that tourism activities are mainly concentrated in a few regions and are concentrated [7]. The study found that the tourism fringe area is an important part of tourism development [8]. The “core-periphery” model of tourism space has been applied in many cases, and through the comparative study of the spatial distribution of the tourism industry, it is found that the tourism industry tends to be concentrated in the central cities [9].

The study found that destination transportation cost and destination living cost are important influencing factors of tourism behavior [9]. The study analyzed that high-speed transportation infrastructure such as highways and high-speed railways (high-speed rail) can promote long-distance travel for tourists [10].

The study believes that the lack of accessibility in India caused by aviation policy is an important factor hindering the development of tourism in India [11]. In terms of analysis methods for measuring the impact of transportation infrastructure on space, the accessibility analysis model is often used to measure the change in regional spatial pattern, and measurement indicators such as distance and weighted time are used to analyze the impact of transportation accessibility on the change in regional pattern [12].

Foreign research on road network optimization problems is mainly reflected in the research on network design problems (NDP, network design problem). According to the different conditions of the road network optimization, the decision variables can be divided into continuous and discrete. For the improvement of road capacity, discrete variables correspond to the problem of new roads [13]. The type of decision variables in network design problems determines the type of optimization model to be constructed, so network optimization problems can be divided into three categories: continuous, discrete, and mixed according to the different types of variables [14]. Among them, the hybrid optimization design problem takes into account the problems of new road sections and reconstruction of existing road sections, which is consistent with the idea of road network optimization in practical engineering. However, since the hybrid problem involves two types of decision variables, the solution of its optimization model method design is the most difficult of the three types of models [15]. Road linearity, geographic conditions, etc. are the constraints [16]. We combined the discrete network design with road route selection optimization and established a two-layer optimization model for continuous route layout. From the perspective of macro planners, the model can optimize road network corridor selection and route layout at the same time [14]. A double-layer planning model for highway network lines is constructed, which takes into account factors such as expressway operation, earthworks, and line collinearity [17]. On the basis of considering travel demand, construction cost, and related soft factors, an optimization model of highway corridor layout is established. A variety of heuristic algorithms are used to solve the model, and it is found that the improved simulated annealing algorithm can better deal with the local minimum problem under low traffic demand [18].

3. Network Collaborative Optimization Model

The realization of the highway initial path generation based on deep reinforcement learning can solve the problem that the manually selected route cannot approach the optimal and provide the basis for the generation of the highway route path based on the deep reinforcement learning. It can promote the simulation of the model in this paper.

As shown in Figure 1, it consists of a source node, a legitimate destination node, K relay nodes, and M eavesdropping nodes. The source node tries to send confidential information to the destination node in the presence of M listening nodes. It is assumed that there is no direct link between the destination node and the source node, and all the information transfer between them needs to be completed by the relay node. Since there is information leakage in the two-hop link, all relay nodes are divided into two. The nodes used to transmit confidential information are called cooperative relays, and the nodes used to generate interference signals to weaken the listening nodes are called interference relays, where .

Here, we consider the scenario where eavesdropping nodes are also system users, but they do not have the right to receive services provided by the current source, such as pay TV services. Therefore, it is assumed that the global CSI (including the CSI of the eavesdropping node) is known, and all channels experience slow fading with flat frequency. Among them, the vector represents the channel from the source to the cooperative relay, and from the cooperative relay to the destination node, respectively. The vector represents the channel from the interfering relay to the destination node, to the l-th eavesdropping node, and there is .

In the traditional secure relay network, the cooperative beamforming and cooperative interference techniques complete information transfer and signal interference within two time slots. In the proposed new transmission scheme, these two functions will be extended to three slots, so we will describe the transmission process with a three-slot transfer model.

In the first time slot, that is, the broadcast stage in the relay two-hop, the source broadcasts a unit energy signal s to all cooperative relays, and this signal will be monitored by the eavesdropping node at the same time. In order to interfere with the eavesdropping node listening to confidential information, the interfering relay generates a set of artificial noise locally and transmits the interference signal . In this time slot, the signal containing the useful signal s received by the cooperative relay and eavesdropping node can be written in the following form, where the superscript indicates the serial number of the time slot in question.

In the above formula, for simple processing, the above artificial noise is designed in the null space of all cooperative relays and destination nodes, so as not to bring additional interference to them. If the interfering relay works in the receiving mode, the information security of this time slot completely depends on the cooperative relay. Similarly, using the idea of null space to design the beamforming weight vector at the cooperative relay can ensure that no information is leaked to the eavesdropping node.

In the second time slot, that is, the relay stage in the relay two-hop, the cooperative relay adopts the AF-based cooperative beamforming strategy to forward the information of the source to the destination node. The received signal about s involved in this time slot is only at the interfering node and the destination node.

The introduction of the third time slot is to allow the interfering relay to complete the transfer of confidential information s to the destination node. The difference is that the source emits the next useful signal with unit energy. The signal at the interfering node is no longer only composed of artificial noise. It can be seen that all copies of the signal s can be received by the destination node only after the transmission of the above three time slots is completed.

As mentioned earlier, the null-space design of artificial noise completely eliminates its influence on cooperative relays and destination nodes. Similarly, the useful signal part in is designed in the null space of eavesdropping nodes and cooperative relays. In this way, on the one hand, information leakage is prevented, and on the other hand, the mutual interference between the two groups of relay nodes is avoided. Since only the reception containing the copy of the s signal is concerned, in the third time slot, there is only a received signal about s at the destination node.

For the confidential signal generated by the next source, its transmission mode is the same as s, which can be described by the above three time slots. It should be noted that will always remain in the form of a mixed signal, as shown in equation (4). In the expression (2) of the signal received by the corresponding eavesdropping node, needs to be changed to . In the proposed transmission model, a signal is transmitted across three time slots. However, it can be easily analyzed that the broadcast stages of the two connected signals overlap, as shown in Figure 2.

Therefore, the transmission efficiency of this scheme is , where N is the frame length. When the value of N is large, the transmission efficiency will tend to 1/2, which is the same as the traditional cooperative relay system. In addition, if the useful signal part in is ignored, the scheme can easily degenerate into a situation that the traditional interference relay only sends artificial noise. Below, the above null space constraints on , and are summarized as follows.

According to the above constraints of null space, in order to ensure sufficient spatial degrees of freedom, the selection of the number of cooperative relays, interfering relays, and eavesdropping nodes needs to satisfy two conditions: and . When the vector and the covariance matrix are given, according to the signal model in formulas (2), (4), and (5), the received signal-to-noise ratio at the destination node and the eavesdropping node can be calculated as follows:

Therefore, the achievable safe rate can be defined as the following form:

In the formula, represents the logarithmic function of base two, and the coefficient is the approximate relay transmission efficiency when N is large. It should be noted that represents a certain transmission rate at which the destination node can decode the confidential information but the eavesdropping node cannot.

This paper focuses on a joint beamforming and artificial noise design scheme based on safety rate maximization. First, the constraints of each relay’s own power are given, which can be obtained as follows:

In the formula, represents the unit vector whose ith element is one, represents the unit vector whose kth element is one, and represents the unit matrix whose size is . Meanwhile, and denote the own power budgets of the ith cooperative relay and the kth interfering relay, respectively.

The goal of this scheme is to maximize the safe rate under the power constraints of each cooperative relay and interfering relay. The optimization problem after ignoring the constant $1/2$ can be expressed as follows:

Problem (11) is nonconvex. It is difficult to solve. In order to simplify the problem, problem (11) is decomposed into two subproblems. First, and are not considered, and is only optimized with the goal of maximizing . The second subproblem utilizes the obtained to optimize and according to the corresponding criteria. Such a decomposition undoubtedly results in a loss of safe rate performance, since and cannot be jointly optimized. However, the subsequent simulation results prove that the above suboptimal solution can still achieve a good safe rate. The first subproblem can be expressed as follows:

In order to solve the above problems effectively, problem (12) is first relaxed into a convex semidefinite program (SDP) with the help of semidefinite relaxation (SDR) and Charnes–Cooper transformation. By defining , and there is , the semidefinite relaxation problem of problem (12) can be obtained as follows:

Problem (13) is a convex problem, so it can be solved directly by the toolkit SeDuMi or CVX based on interior point methods. Since problem (12) is relaxed into the form of problem (13), a semidefinite relaxation method is adopted, and the rank-one constraint of ’s nonconvexity is removed, so it seems that the two problems are not equivalent. However, through the following theorem, we will prove that the abovementioned rank relaxation is compact, that is, the only optimal can be obtained from the matrix .

Theorem 1. If it is assumed that problem (13) is feasible, and is the optimal solution to problem (13), the rank of must be equal to one.

Proof. It can be seen that all problems in problem (13) are linear constraints. If is the optimal solution of problem (13), the optimal solution of and its dual problem satisfies the KKT condition. The KKT conditions related to the proof are listed as follows:In the formula, and are the optimal dual variables corresponding to the equation constraints and constraints in problem (13), respectively. is a dual variable corresponding to each node’s own power constraint. Problem (14) is substituted into problem (15), and we can get the following:Among them, is a full rank matrix. Therefore, the following conclusions can be drawn as follows:Obviously, is impossible because is infeasible for the equality constraints in problem (15). Therefore, must hold.
According to Theorem 1, we can simply extract the optimal solution of problem (12) from by eigenvalue decomposition. On the basis of obtaining , the corresponding can be calculated by substituting it into formula (6). After the solution to the first subproblem is known, the results that have been obtained are used to turn to the second subproblem, which is shown below as follows:It can be seen that the objective function of problem (19) is in the form of the subtraction of two concave functions, and it is very difficult to solve it directly. In order to effectively solve the above problem, a slack variable is introduced. It aims to solve the original problem into an optimization problem with a two-layer structure. First, the inner layer problem is solved. For any feasible , the inner layer problem can be expressed as follows:Since the logarithmic function is monotonically increasing, it can be removed. After the specific expressions of and are substituted, the following form can be further obtained:In the formula, there is . In the objective function of problem (21), the operation of ignoring does not affect the solution of the entire optimization problem. This is because for any given is a constant. Similar semidefinite relaxation techniques and Charnes–Cooper transformations to the first subproblem are employed. In order to write problem (21) as a convex semidefinite program, first we set the following:At the same time, the original maximization problem is rewritten in the form of minimizing the reciprocal of the original problem as follows:Since problem (23) is convex, its global optimal solution can be efficiently solved by SeDuMi or CVX toolkit. The problem now is that if is a matrix of rank one, the rank relaxation for the second subproblem is also compact. The optimal can be directly obtained by eigenvalue decomposition of . In the following theorem, we will show that the relaxation for is also tight.

Theorem 2. If it is assumed that problem (23) is feasible, and is the optimal solution to problem (23), the rank of must be equal to one.

Proof. We set to be the optimal solution to problem (23). Since the constraints in problem (23) are all linear constraints, satisfies the KKT condition as follows: corresponds to the power constraints of each cooperating relay and interfering relay. Through the Lagrangian strong duality property, we can simply prove that the value of is the value of the objective function of problem (23). This means that must be positive.In the formula, represents the optimal value of problem (23). By substituting problem (24) into , the following formula can be obtained:It can be seen that is a positive definite matrix , because it is the sum of a positive definite matrix and a positive semidefinite matrix. Then, we can get the following:Likewise, cannot appear because the equality constraint in problem (23) needs to be satisfied.
Theorem 2 shows that problem (23) is indeed equivalent to problem (21). Meanwhile, the optimal solution of problem (21) can be obtained by . Among them, represents the operation of taking the corresponding eigenvector.
For any given , the inner layer problem has been optimally solved. To this end, we next turn our attention to the outer optimization problem. It can be seen that it is a univariate optimization problem.In the formula, and represent the lower and upper bounds of implied in the constraint , respectively. can be obtained by carefully observing the feasibility of this constraint. Furthermore, an effective is derived from the following relation:The expression about the lower bound can be obtained by sorting the following:Because problem (31) is a univariate optimization problem on a finite interval with interval lengths less than 1, many one-dimensional optimization techniques that require no derivatives can be used to search for an optimal solution to problem (31). In practice, in order to reduce the complexity, the golden-section search can be used, which guarantees that at least one local optimal solution can be found.
This section presents some simulation results to verify the safe rate performance of the proposed transmission strategy. Because the distance between the cooperative relay and the interfering relay is relatively short, it is assumed that the channel between them obeys the complex Gaussian distribution of , and the rest of the channels obey the standard complex Gaussian distribution . In the simulation, the average transmit power of the source is set to , which represents the total power budget of the cooperative and interfering relays. As a comparison, we also simulate three existing traditional two-slot-based secure transmission schemes. In the first strategy, all jamming relays only transmit artificial noise to jam eavesdropping nodes. In the second strategy, all relays (including cooperative relays and interfering relays) use the null-space design to help forward confidential signals to destination nodes. In the third strategy, the operation of the relay node is the same as the second strategy. The difference is that the destination node will act as an interfering node in the broadcast phase, and the interference is transmitted to weaken the received signal quality at the eavesdropping node.
Figure 3 presents the curves of the safe rate versus the total power budget for the proposed scheme and the other three schemes. The specific parameters are that each cooperative relay and the interfering relay have the same power budget, which is . The number of cooperative relays is , the number of interfering relays is , and the number of eavesdropping nodes is M = 3. Obviously, the proposed scheme shows the optimal safe rate performance at each power value. In addition, it can be seen from the figure that the second scheme will tend to a fixed value after the power continues to increase. This is because this transmission scheme does not protect the information leakage in the broadcast stage; the security rate will gradually reach a bottleneck.
Figure 4 plots the safe rate curves of different schemes with respect to the source transmit power when there is . As can be seen, the proposed transmission strategy exhibits the best performance. Moreover, with the increase in the transmit power of the source, the security rate will experience a process of first increasing and then decreasing. This is because when is relatively small, the source transmit power is increased, which can significantly improve the received signal-to-noise ratio of the destination node. When is larger, the information leakage of the first time slot will become more serious.
Figure 5 illustrates the relationship between the security rate and the number M of eavesdropping nodes. In this simulation, is set. We note that in the proposed scheme, the selection of M needs to satisfy the constraint to ensure that there are enough spatial degrees of freedom to design the beamforming weight vector. First, it can be seen that the proposed scheme exhibits obvious advantages when the number of eavesdropping nodes is much smaller than the number of cooperative relays and interfering relays. When the number of eavesdropping nodes gradually increases, the security rate of all schemes decreases. Within the limited value range of M, the proposed scheme still shows the best performance.
Figure 6 considers the scenario of , and shows the curve of the safe rate and the value of cooperative relay . Since there is M = 5, in order to ensure enough degrees of freedom in space, can take all the possibilities of the abscissa in the figure. As can be seen from the curve of scheme 3, since it assumes that all relays are used as cooperative relays, the allocation of the number of and does not affect its safe speed.
However, for the proposed scheme and scheme 1, how to allocate the number of cooperative relays and interfering relays has an impact on the security rate. As can be seen from the figure, after the number of cooperative relays increases in scheme 1, the security rate has a significant improvement. Moreover, the proposed scheme is relatively stable over the entire range of possible values, with only a small downward trend. This shows that the proposed scheme does not need to think too much about how to distribute the relays. In addition, there is still a gap of about 0.6 bps/Hz between the optimal performance point of scheme 1 and the optimal performance point of the proposed scheme.

4. Model Building

During the process of tourism resource development and road network construction, the travel (including tourists) will be affected. The game relationship between traffic travelers and planners is shown in Figure 7.

Generally speaking, road tourism is a process in which tourists travel from the tourist source to the tourist destination and back through the road. In this paper, tourism resources are used as the nodes of the road network, which mainly include cities, core scenic spots, and scenic spots and scenic spots. It is necessary to break the circle or add edges to the tourist road network, and establish a reasonable and effective tourist road network with complete functions, as shown in Figure 8(b). Corresponding tourist highway functions are classified as follows: urban hub-scenic area road (including the main line of tourism service and main line-scenic area tourist road), scenic area-scenic area tourist road, and scenic spot (scenic spot-scenic spot) tourist road.

This paper analyzes the mechanism of the coupling system between tourist roads and resources. Moreover, on the basis of constructing the evaluation index system of the spatial coupling between the tourist road network and the tourist resources, this paper adopts the gray relational analysis method to quantitatively reveal the main factors and the degree of coupling correlation between the tourism road network and the tourism resource space from the perspective of time and space, so as to show the scientificity and rationality of the tourism road network layout planning based on the perspective of tourism resources. The coupling between the tourism road network and the tourism resource composite system is shown in Figure 9.

The coupling effect and optimization effect of the collaborative optimization model of tourism resources and highway network based on deep learning proposed in this paper are verified, and the experimental analysis is carried out in combination with the actual situation. The statistical simulation test results are shown in Figure 10.

From the above research, it can be seen that the collaborative optimization model of tourism resources and highway network based on deep learning proposed in this paper can effectively promote the collaborative optimization of tourism resources and highway network.

5. Conclusions

The vigorous development of the economy has brought about the continuous improvement of people’s living standards. People’s demand for tourism activities is also showing a blowout development, whether it is a suburban trip or a long-distance trip, and even the number of foreign trips is increasing year by year. However, the premise of travel is that it needs good transportation facilities to support it. For this reason, the country is constantly improving the construction of infrastructure, especially the construction of transportation, and the annual increase in high-speed mileage ranks first in the world. While vigorously supporting the tourism industry, the country is also insisting on expanding its opening to the outside world, strengthening international economic cooperation, and creating new opportunities for the better development of the tourism industry. At this stage, the development of tourism has gradually transformed from the early single-point breakthrough and advanced development model to the development model of regional cooperation and system integration. Making development and optimization plans from the perspective of a single system can easily lead to repeated infrastructure configuration, and it is difficult to improve the level of resource utilization. Therefore, from the perspective of system coordination, it is necessary to realize the reconfiguration and combination of resources through the integration of the tourism system and the highway transportation system, so as to maximize the regional economic benefits. This paper combines deep learning algorithms to build a collaborative optimization model of tourism resources and highway network, verifies the dependence of tourism travel on the transportation network, and determines the potential development points of tourism resources in the network and the optimization and improvement points of the road network, so as to coordinate the tourism resources and the highway network. Optimization provides a reliable basis. The research shows that the collaborative optimization model of tourism resources and highway network based on deep learning proposed in this paper can effectively promote the collaborative optimization of tourism resources and highway network. In actual life, it can facilitate people’s travel, improve the convenience and comfort of tourism, accelerate the mining and promotion of local tourism resources, and drive the local economy to develop along with the green management model.

Data Availability

The labeled datasets used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

Acknowledgments

The research was supported by the “Blue Project” involving Universities and Colleges of Jiangsu Province in 2021.