Construction of a Nonlinear Model of Tourism Economy Forecast Based on Wireless Sensor Network from the Perspective of Digital Economy

With the outbreak of the new crown epidemic, the world economy has been severely tested, making predictions more difficult. Wireless sensors have the advantages of low cost, ease of use, high reliability, and high safety and have been widely used in the tourism economy. In order to understand the ability of wireless sensors to predict the regional economy, this article uses an example to construct a nonlinear model of wireless sensors to predict the regional economy. With the continuous development of the concept of circular economy, circular economy has gradually been recognized by Chinese scholars and practitioners. After domestic scholars continue to study the theory of circular economy, practicing the concept of circular economy and taking the road of sustainable development have become one of the important directions of the development of industrial theory. Literature analysis and other methods were used to conduct research on databases such as CNKI, Wan fang Database, and SSCI. Literature was collected, and GIS spatial analysis technology was used to analyze different areas and finally get a prediction model. The phenomenon is nonlinearity (such as saturation nonlinearity in the magnetic circuit), and some are caused by the nonlinear relationship between system variables (such as linear resistance and squared nonlinearity between current and power) and some artificially introduced nonlinear links (such as the hysteresis nonlinearity of relays). Experiments have proved that there is a certain error between the prediction model and the actual result; the error value is about 9%, which is less than the value of other prediction models. This shows that the output results of the nonlinear model of wireless sensor regional economic prediction should be processed reasonably. This result has a certain reference value, and its output should be combined with the actual situation. Related research found that under the nonlinear model, the more accurate and comprehensive the input value is, the closer the output result is to the actual value.


Introduction
The spatial structure of regional tourism mainly studies the spatial distribution of tourism economic activities in the region, reveals the spatial agglomeration degree and agglomeration forms formed by the interaction of the system and tourism activities in space, and reflects the spatial attributes and interrelationships of the regional tourism system and tourism activities. With the continuous development of local tourism and the acceleration of the process of regional economic integration, the research on the spatial structure of regional tourism has received more and more attention. At the end of the last century, the application and popularization of computer technology, especially database technology, made it possible to obtain a large amount of data [1]. Then, how to effectively process data information, find laws, and use these laws to predict future data or unobservable data becomes particularly important. The rapid development of Internet technology makes the network present a variety of data information resources However, the rapidly increasing amount of data has not been able to develop corresponding data processing and analysis methods at the same time, and the contradictions between them have become more and more prominent. People hope to conduct scientific research, commercial decision management, or business decisionmaking on existing data. For business management, traditional data analysis methods can no longer meet the requirements of gradual data generation and update, and data mining technology has emerged. With the rapid development of Internet technology today, data mining technology not only promotes the development of technology and economy but also brings great convenience to people's living standards. With the development of data mining technology, more and more industries will also use this technology to process massive data sets [2,3]. In recent years, wireless sensor networks have become more and more widely used and have been fully integrated into our lives and become an important part of the "Internet +." Wireless sensor networks and mobile ad hoc networks (MANET) are both IoT, in the perception layer of the three-tier framework of the IoT, responsible for signal collection and transmission.
The network topology of wireless sensor networks will dynamically change with unstable environmental factors, and network propagation can only be done in the form of broadcasting. These two characteristics make the security of wireless sensor networks challenged. Among the many security problems of wireless sensor networks, the most serious threat is the networking and transmission parts, which are vulnerable to man-in-the-middle attacks, flooding attacks, and selective forwarding attacks. It may cause serious national property losses and people's safety threats, such as electricity leakage in the transmission network, failure of forest fire alarms, and privacy leakage of smart homes. With the development and popularization of the Internet of Things (IoT), as an important supporting technology of the Internet of Things, WSNs have received more and more attention from researchers. WSNs are the products of the continuous development and maturity of wireless communication, sensor technology, and microelectronics technology. Their appearance directly promotes the development of the Internet of Things, so they have huge development potential and application prospects. In the era of data explosion, the development of wireless sensor networks from the perspective of the digital economy has also promoted the development of learning based on wireless sensor networks in big data classification. In the classic wireless sensor network, all sample sets are trained in the initial training process to obtain a classification model, and then, new samples are added to the initial sample set for training to obtain a new classification model. This method usually leads to a longer training time. If the relevant useful information of the SVM classification model obtained after the initial training can be effectively used in the learning process [4], the time required for relearning can be reduced to a certain extent, and there is no need to change the initial value, retrain, and learn wireless samples of sensor networks. Today, with the rapid development of information technology and Internet technology, new data for information updates are constantly being produced, and basic data processing methods can no longer be synchronized with data updates [5]. Therefore, in order to effectively solve the problem that wireless sensor networks cannot meet the classification requirements when generating new data, the application of incremental learning to wireless sensor networks has become an important area of wireless sensor network method research [6].
For the role of wireless sensor networks in prediction, scholars at home and abroad have conducted a lot of research. Xingjie et al. studied the research on classification algorithms of wireless sensor networks; proposed the application of wireless sensor networks in generalized learning, face recognition, and automatic encoders; and verified the role of wireless sensor networks through experiments [7]; Ying and Naiqiu discussed the basis of wireless sensor networks, conducted theoretical research on the advantages of wireless sensor networks, and classified them based on the application of wireless sensor networks [8]; Yuanhang et al. used wireless sensor networks to establish training models and input stock-related data, get experimental results and errors, and verify the prediction function of wireless sensor networks [9]; Hongshuang and Lu introduced linearity based on the characteristics of wireless sensor networks, the difference between nonlinear wireless sensor networks, and large-scale algorithm research of nonlinear wireless sensor networks [10]. In order to improve the quality of image segmentation, Wu et al. adopt the kernel function algorithm of wireless sensor networks, use wireless sensor networks to input related functions, and get the best segmentation line for prediction; after testing and verification, the prediction error is very small [11]; Zhang et al. integrated machine learning theory into wireless sensor networks and introduced the effect of machine learning theory on wireless sensor networks. It is proved through experiments that the algorithm after machine learning theory fusion is more balanced [12]; Wang et al. use the prediction function of wireless sensor networks to establish an economic development level model and use the strong promotion ability and overall optimization characteristics of wireless sensor networks. The related model was verified [13]. Generally speaking, domestic and foreign experts have conducted in-depth and comprehensive research on the application and classification of wireless sensor networks, but there are few related researches on the nonlinear models of wireless sensor networks which build provide the foundation [14].
This article introduces some basic concepts and principles of wireless sensor networks and statistical learning theory, provides necessary background support for nonlinear modeling based on wireless sensor networks, and then specifically introduces the basic ideas, specific theories, and theories of wireless sensor network system architecture. For the algorithm, a direct wireless sensor network regional economic forecasting nonlinear model was established, and case analysis was used to analyze the economic conditions of Beijing, Hangzhou, Wuhan, Xi'an, Guangzhou, and other places to predict economic development trends, which is the role of theoretical research. The collection method means that the detection node can be the sensor node itself or an independent collection node deployed separately, and even in some hop networks, the collection node can be the base station itself. The processing location is divided into distributed and centralized types. The distributed type requires relatively small bandwidth and higher hardware requirements for the detection unit; the centralized type consumes more bandwidth and needs to send information to the base station or cluster head node, which has a greater impact on the power consumption which is large and may have a large impact on the performance of the application itself. As shown in Figure 1, after deployment, a large number of sensor nodes form a network through self-organization. After the sensor nodes collect the sensing information of the monitoring area [15,16], the signal processing in the node will process the sensing signals and convert analog signals into digital signals. The signal is transmitted to the sink node or base station in a hop mode, and the base station sends these data to the task management center through communication satellites, wireless networks, or the Internet. Managers send monitoring tasks to the base station through communication satellites or the Internet. The nodes in wireless sensor networks are generally divided into two types: sensor nodes and aggregation nodes. The sensor node has the functions of physical information collection, processing, and wireless communication, and the energy it carries is small. The aggregation node has a gateway and data forwarding function, is responsible for the information interaction between the sensor network and the Internet, can convert different communication protocols, has complex functions, is not limited by energy, and generally has a small amount of data.
The apostasy caused by a node being captured is an internal attack. Insider attacks are the main problem faced by security detection. How to prevent apostasy nodes, namely, attackers, from causing greater damage to the network, how to detect attacks more quickly, and how to detect attacks with low cost and low consumption are the main difficulty of wireless sensor networks. Wireless sensor network security detection is divided into two major research areas. One is the system framework of security detection, including how to collect data, where to analyze the data, and the frequency and period of data collection. The second is the security detection method. The main research content is which data to collect, how to analyze the data, what model to use, and how to deal with errors.
The nodes in the wireless sensor network have certain information collection, processing, storage, and wireless communication functions. The working environment of the node requires the node to have the characteristics of small size and low energy consumption. As shown in Figure 2, the node structure is divided into four parts according to its function: sensor, data processing part, wireless communication part, and power supply [17]. The transmitter is composed of various physical sensing devices, which sense various physical signals, generate analog signals, and convert the analog signals into digital signals through digital-to-analog conversion equipment. The processor part has simple data preprocessing and storage capabilities. The communication part can send and receive data through a wireless communication transceiver. The main function of the power supply is to provide power to the node to ensure the normal operation of the node.
The wireless sensor network technology has just started, and the wireless sensor network protocol has not yet formed a unified standard. The protocols between manufacturers are different. There is currently no stable wireless sensor network security protocol, and there is no mature attack type analysis. Researchers can only construct attackers based on their own understanding, and their detection capabilities cannot be tested and guaranteed. Therefore, a more comprehensive and reliable security detection mechanism is needed, which is also the goal of establishing a wireless sensor network security detection platform. The wireless sensor network architecture is based on the TCP/IP network protocol, which is the distribution and description of each layer of the network and its functions. Although the architecture of the wireless sensor network is similar to the existing computer network architecture, it is different. As shown in Figure 3, from top to bottom, the wireless sensor network layer protocol includes the physical layer, data link layer, network layer [18,19], transmission layer, and application layer. These protocols, together with power management, security management, and task management, have realized the functions of network time synchronization, node location, transmission control, routing, channel access, and topology generation.

Tourism Trend Prediction Method Based on Wireless
Sensor Network. In reality, part of the problem is a nonlinear problem. Corresponding rules need to be established to transform the training data; that is, nonlinear problems in low-dimensional space are transformed into highdimensional linear problems for solving. Nonlinearity is a common phenomenon in actual control systems. Some are caused by the inherent characteristics of the system (such as saturation nonlinearity in the magnetic circuit), and some are caused by the nonlinear relationship between system variables (such as linear resistance and squared nonlinearity between current and power), and some are caused by artificially introduced nonlinear links (such as the hysteresis nonlinearity of relays) [20]. Therefore, nonlinear systems are general systems. In recent decades, the theory and application of nonlinear systems have also developed greatly. However, the research and development of nonlinear systems still lack a complete, systematic system and effective analysis tools. This part briefly introduces some specific types of control problems, as well as some important and representative theories and methods.
Nonlinear systems may have richer and more complex characteristics than linear systems, and their theoretical research models and methods also have their own scope of 3 Wireless Communications and Mobile Computing application. The part and the whole are no longer unified, nor do they satisfy the superposition principle of linear systems [21]. Even if it is a known nonlinear dynamic system, it is difficult to model and control it. When the structure of the controlled object is completely unknown, the research of the system will become more complicated. This also makes the model identification and control of nonlinear systems a research hotspot in the current control field. In recent years, artificial intelligence technology has been widely used in the identification of black box systems. Among them, the regional economy has attracted much attention. Its unique nonlinear approximation ability brings vitality to the modeling of nonlinear systems, but the selection of network structure and parameter optimization, model verification, and generalization capabilities are involved in the modeling process [22]. The dynamic behavior of a nonlinear system is not like a linear system that can be represented by a general model structure, which makes the choice of the network structure directly affect the correctness and effectiveness of the modeling [23].

Calculation Method of Standard Deviation
Ellipse. This article first introduces the research status of regional tourism spatial structure and spatial economics. The analysis points out that tourism economy has the main characteristics of spatial economic research objects. First, tourism market competition belongs to the type of monopolistic competition, so the monopolistic competition is generally adopted by the theory of spatial economics; the equilibrium analysis method is also applicable to the tourism market. The standard deviation ellipse is a tool that can reflect the center, distribution, and direction of spatial elements, by calculating thexandydirections, the standard distance to define the axis of an ellipse that contains the distribution of all the elements [24]. Standards are build based on the calculation of spatial objects after the difference ellipse; the basic elements of the  Wireless Communications and Mobile Computing standard deviation ellipse (center point, semimajor axis, semiminor axis, spread range, and azimuth angle) analysis can identify the spatial differentiation characteristics of spatial objects. The center point represents the relative position of the spatial distribution of spatial objects, and the difference between the center point and the center of the space object reflects the degree of data variation of the space object; the semimajor axis reflects the void of the degree of dispersion of space objects in the main trend direction [25]. The short semiaxis reflects the degree of dispersion of space objects in the secondary direction. The difference between the short semiaxes is the embodiment of the centripetal force of the space object; the spread range is determined by the standard deviation taken by the standard deviation ellipse; the value is from 1 to 3, indicating that the standard deviation ellipse contains 68%, 95%, and 99% of the centroid of the space object; the azimuth angle is the performance of the main trend direction and is used to analyze the spatial distribution direction of spatial objects. The table of standard deviation ellipse format is as follows: In the formula, x i and y i are the coordinates of the element i, x, Y represent the average center of the element, and n is the amount of the element.
The calculation process of the standard deviation ellipse azimuth is as follows: Spatial economics is based on economies of scale and increasing returns to scale, and the related theories of economies of scale are also applicable to the tourism industry. Spatial economic models assume that consumers have diverse preferences and analyze product consumption through the maximization of consumer utility. In the regional tourism market, tourists also take utility maximization as the code of conduct and have diverse preferences and characteristics. Therefore, the theory of the spatial economic model is applicable to the study of the tourism spatial structure. In the formula, x~i and y~i are the difference between the average center and the xy coordinates.

Nonlinear Regression Method.
While drawing on the theory of spatial economics to study the spatial structure of regional tourism, it is also necessary to fully consider the   Wireless Communications and Mobile Computing characteristics of the tourism industry itself. The spatial economics of the composition of the tourist source area analyzes the trade exchanges within the region through the transportation of products between different regions, and tourism products cannot be transported. The nonlinear method studies the nonlinear interaction relationship between variables [26], and the nonlinear regression is the regression function about the unknown; the regression coefficient has a nonlinear structure of regression. When the explained variable of the regression model is more than one function of the explanatory variable formula, the regression law will be shown as a curve of volatility on the graph [27]. Nonlinear regression algorithms usually use mathematical means to convert the nonlinear regression into a linear regression problem and then solve the problem according to the linear regression method; when the nonlinear regression cannot be solved when regression is transformed into linear regression, methods such as decision tree and ANN are often used to solve nonlinear problems. Decision tree and other parties are compared with the method; it has the characteristics of fast execution speed and strong interpretability. At the same time, it can build multiple decision trees for integrated learning. It has a big advantage, so this article adopts the decision tree as a nonlinear forecasting method [28].
Regression decision trees rely on classification and regression trees (CART) to solve regression problems to output continuous variables. CART [29] uses binary recursive segmentation technology to construct a binary tree, selects the feature according to the Gini index estimation function of the minimum distance, and determines the optimal binary cut point of the feature, making the decision tree highly interpretable, and when the data complexity is higher when the number of variables increases, the regression decision tree based on CART can usually obtain more accurate results than other methods.
With the development of artificial intelligence technology, researchers gradually tend to use artificial intelligence technology to solve nonlinear problems.
Extreme gradient boosting (XGBoost) is a machine learning algorithm implemented under the gradient boosting framework. XGBoost uses the regression tree in CART as the base classifier but adopts the concept of integrated learning to combine multiple learning models to obtain better results. The specific implementation process of XGBoost is the following: by constructing multiple interrelated decision trees, the error between the output result of the previous decision tree and the true value is input to the next decision tree, and finally, all the output results of the decision tree are accumulated and combined. The cumulative sum is output as the result. The prediction model of XGBoost can be expressed aŝ In the formula,ŷ i represents the prediction result of sample x i , k is the tree of the decision tree, and f k represents the k th tree.
In order to make the predicted value of the decision tree closer to the true value, XGBoost solves and evaluates the model by minimizing the loss function. The expression of the loss function is In the formula, lðy i ,ŷ l Þ represents the error between the true value of the ith sample and the predicted value; Ωðf k Þ represents the complexity of the decision tree, and the complexity is inversely proportional to the generalization ability of the prediction model. The expression Ωðf k Þ is In the formula, γ is the number of leaves, T is the number of leaf nodes, and w is the score value of the leaf nodes.

Time Series
Research. If a certain variable xðtÞ, at time point: t 1 , t 2 , ⋯, t N ðt 1 < t 2 <⋯<t N Þ, there is a series of data xðt 1 Þ, xðt 2 Þ, ⋯, xðt N Þ in a certain order, then this column of data is called discrete time sequence; the sample sequence of daily visitors to Jiuzhaigou analyzed here is a discrete time sequence. In practical applications, the most widely used time series model is the ARMA model. There are mainly three basic ARMA models, autoregressive models, moving average models, and autoregressive moving average models, which combine autoregressive models and moving average models.

Autoregressive Model
ARðpÞ. If the generation of random process X t satisfies The stochastic process X is called the P-order autoregressive process, abbreviated as ARðpÞ.

Moving Average Model
MAðqÞ. If the generation of random process X t satisfies The stochastic process X is called the q-order moving average process, abbreviated as MAðqÞ.

Autoregressive Moving Average Model ARMAðp, qÞ.
For the random process X, the generation satisfies It is called the stochastic process X t , which is the autoregressive moving average process, abbreviated as ARMA ðp, qÞ. 6 Wireless Communications and Mobile Computing Sequence autocorrelation refers to the correlation between all observations X t , X t−1 , X t−2 , ⋯, X t−r in the time series X t , and the autocorrelation function is to measure the autocorrelation relationship between observations. Define the autocorrelation function as ρ τ is a measure of the degree of correlation between the random variable X t and X t−τ , but it may be affected by the random variable X t−1 , X t−2 , ⋯, X t−τ+1 . In order to eliminate the influence of random variables, calculate the correlation coefficient to get the partial correlation function, recorded as ρ τ -partial autocorrelation, which refers to the time series X t , under the condition of a fixed X t−1 , X t−2 , ⋯, X t−τ+1 . The conditional correlation between X t and X t−τ , the partial autocorrelation coefficient, is an index to measure the degree of partial autocorrelation definition. The partial autocorrelation function is

Kernel Function.
The kernel function is one of the key factors that determine the performance of the support vector machine. The kernel representation method is to map the data to a high-dimensional space to change the separation status. When the space dimension increases, only the inner product algorithm is changed. It does not become complicated with the increase of dimensionality, nor does it affect the promotion ability in high-dimensional space. The learning method is based on the kernel function. An important building block in the support vector machine is provided by the kernel function. Support vector machines use different kernel functions to construct learning machines with different types of nonlinear decision surfaces in the input space.
In order to solve the two-category classification, the support vector machine classification method was proposed. However, the regional economy of this system is a multiclassification problem, so the next difficulty lies in how to apply the two-category classification method to the multiclass problem. The support vector machine method cannot be directly applied to the multicategory classification problem. To solve the multicategory recognition problem, the twocategory classification problem in the support vector machine can be combined to achieve. Generally speaking, the processing strategy is divided. For "one-on-one" and "one-on-one," each classifier needs to choose one of two each time, so the training data of type a needs to be divided into two. Finally, the total number of support vector machines is constructed, and then, the "voting" method is adopted for identification during classification N 2 a = aða − 1Þ/2. This is the calculation process of the "one-to-one" method. A classifier needs to separate each category from all other categories. When dealing with N classification problems, it is necessary to construct a support vector machine. It is the task of each vector machine to distinguish this type of data from the rest of the data. The support vector machine with the farthest distance from the interface plays a decisive role in the final classification result. This is the recognition process of the "one-to-the-rest" method. Since the regional economy of this system is a multicategory pattern recognition problem, we choose to adopt the "one-to-one" method. The kernel function is the most important part of SVM. The kernel function directly affects the classification efficiency of SVM. SVM's nonlinear classification processing method is to map the input vector of each sample to a high-dimensional feature space with a nonlinear function and then linear regression to obtain the effect of nonlinear regression on the original space.

Generalization Ability.
Generalization ability is a very important problem in support vector machines. The generalization ability of the learning model is its generalization ability. In the prediction regression problem, it means that the data not in the training sample can also produce more reasonable prediction results. In the past learning and training, the training error is often minimized. During training, sometimes overfitting the training data can minimize the training error, but sometimes the trained learning model is used for a certain point in the future. When making predictions, the phenomenon of overlearning will inevitably occur, thus reducing the generalization ability of the learning model. Therefore, only relying on the minimization of prediction errors cannot achieve satisfactory results.
In the case of limited samples, the training error and the generalization ability of the model are mutually restricted. Generally speaking, the smaller the training error, the weaker the generalization ability. When all the sample data is trained, the training error is zero, or when the situation is too small, the phenomenon of overlearning occurs. Therefore, in the actual application process, under the condition of ensuring enough training samples, reasonable selection of prediction models and algorithms can avoid the generation of learning to a certain extent. It can be obtained that under the limited number of samples, the experience risk minimization does not necessarily meet the desired risk minimization.
Theoretical and experimental studies show that the generalization performance of regional economy greatly depends on the accuracy and difference of individual regional economy in the integration. In order to obtain highly differentiated individual networks, researchers use different training sets, different network structures, different network types, different initial conditions, and different training algorithms to improve the differences between networks. Usually from the following aspects: Changing the initial random weight set. Each time the network is trained, the same training data is used, but different random initial weights are used. This method can generate a set of different networks.
Changing the topology structure. Before each training, by changing the topology of the network and then using the same data set for training on the changed network, a group of different networks can be generated.
Changing the network type. Changing the network type can use different network types to generate integrated members. For example, you can use multilayer perceptrons [30], radial basis function regional economy, and probability regional economy to generate a group of different regional economies.
Changing the algorithm used. When predicting the regional economy, use the same data set but use different learning algorithms for training, and a set of networks can be obtained through this method.
Changing the training data. Changing the training data is a method often used in regional economy, including data sampling, the use of disjoint training sets, and adaptive resampling, different data sources, and preprocessing methods. A group of different regional economies can be obtained through these methods.

Experimental Analysis
Object. This article uses the case investigation method to make statistics on Beijing, Hangzhou, Wuhan, Xi'an, and Guangzhou. Through relevant literature, statistics on economic development and changes in the five places are used to study the impact of relevant variables on economic changes and construct a regional economic development model.

Establish a Model Evaluation Index
System. The evaluation index is a specific evaluation item determined according to some evaluation goals, which can reflect some basic characteristics of the evaluation object. The index is specific and measurable, and it is the observation point of the goal. Definite conclusions can be drawn through actual observation of objects. Generally speaking, the evaluation index system includes three levels of evaluation indexes: they are the relationship between gradual decomposition and refinement. Among them, the first-level evaluation indicators and the second-level evaluation indicators are relatively abstract and cannot be used as a direct basis for evaluation. The third-level evaluation indicators should be specific, measurable, and behavior-oriented and can be used as a direct basis for teaching evaluation.

Determine the Evaluation Weight.
The index weight is a numerical index indicating the importance and function of the index. In the indicator system of the evaluation plan, the weight of each indicator is different. Even if the indicator level is the same, the weight is different. Index weight is also called weight and is usually represented by a. It is a number greater than zero but less than 1, and the sum of the weights of all first-level indicators must be equal to 1, that is, satisfy the conditions 0 < a < 1 and ∑a − 1.

Comprehensive Evaluation
Model. Currently, there are two main evaluation models: one is the main factor highlight model, and the other is the weighted average model. If the weight of a single factor is significant and there are dominant factors in the evaluation factors, you can choose the prominent main factor model; if the weight of the evaluation factors is relatively average, you can choose the weighted average model. These two models have their own characteristics. In the specific implementation process, the two methods can be implemented separately. Finally, the results of the two models are compared.

Nonlinear Regional Economic Forecasting
Model Analysis  Table 1. According to Table 1, Beijing's economic situation is the best, with an average annual growth rate of about 12%. The average annual growth rate of other cities ranges from 9% to 11%. The growth rate is the fastest in 2019. The growth rate is about 18%, and the growth rate of the rest is about 13%.
According to the survey of the economies of various regions in the past five years, we have obtained the changes in the five regions in recent years, and input their variables into a nonlinear model, as shown in Figure 4.
As shown in Figure 4, in the past five years, economic changes in various regions have been steadily increasing. Among them, Beijing has the fastest change, followed by Guangzhou. Among the five regions, Xi'an has the slowest change. This is mainly due to different economic foundations, different local policies, development levels, and attractiveness to talents caused by differences in the current uneven development, and the power of science and technology must be fully utilized.
Science and technology are the primary productive forces, and the implementation of circular economy theory and the path of sustainable development provide motivation support for science and technology. In practicing the production process of circular economy, on the one hand, we must rely on the company's own long-term scientific research experience and at the same time actively draw on and learn from the advanced research results of other research units to build a technical foundation for our own units to practice the theory of circular economy. In the process of knowledge absorption, the government should issue a series of support policies to build communication bridges between technology-controlled scientific research departments and companies that need technology.

Descriptive Statistics of Visitor Volume and Internet
Search Data in City m. The following will perform descriptive statistics on the daily visitor volume data and Baidu search data of p scenic spots in the corresponding time period, and the analysis results are shown in Figures 5 and 6.
The above all reflect the abnormal search phenomenon of each keyword. It can be found that the search changes of each keyword are not the same, and there will be a 8 Wireless Communications and Mobile Computing phenomenon that the search volume is particularly high in some years and holidays, and the trend of the change in the number of visitors to the p scenic spot every year. They all present a similar situation, which is different from the change trend of the eight keywords. Therefore, it is meaningful to study the impact of the search data of the eight keywords on the daily visitor volume of p scenic spots.
From the Baidu search statistics of eight keywords, people searched the Internet the most for "p scenic spot." Its six-year average search value was 11,755.5, the highest value was 86347, and the lowest value was 2542, always maintaining a high level. Search volume and the average search value of "p scenic spot" are also very close to the average daily visitor volume of p scenic spot. Secondly,   9 Wireless Communications and Mobile Computing the most searched ones are "p scenic spot weather," "p scenic spot travel guide," and "p scenic spot travel." The search volume of these three keywords has exceeded 1000, and they have a certain degree of attention, and these three keywords are related to p spot tourism, showing the behavioral characteristics of people searching on the Internet before traveling. Finally, the search volume of the four keywords of "p scenic spot picture," "m city p scenic spot," "p scenic spot map," and "p scenic spot scenic spot" is relatively low, which is related to keyword refinement and overlap.  Figure 7. According to the analysis, it can be found that the daily visitor volume of p scenic spot is significantly correlated with the keywords "p scenic spot travel guide," "p scenic spot map," and "p scenic spot." There is a greater chance that the crowd will visit the p attractions. Among the eight keywords of Internet search data, the keywords "p scenic spots," "m city p scenic spots," "p scenic spots map," and "p scenic spots weather" are all related to the keyword "p scenic spots travel guide." This shows that while doing travel guides for p scenic spots, most people will choose to inquire about the situation of p scenic spots and the weather of p scenic spots. In addition, the keyword "p scenic spot picture" has the strongest correlation with the keyword "p scenic spot," the keyword "p scenic spot tourism" has the strongest correlation with the keyword "p scenic spot map," and the keyword "p scenic spot scenic spot" has the strongest correlation with the keyword "p scenic spots" which are the most relevant. One of the interesting phenomena is that the keyword "p scenic spot travel" has a particularly weak correlation with all keywords except "p scenic spot map," and the correlation with the daily visitor volume of p scenic spot is also the weakest of all keywords. Yes, the correlation with "p scenic spot pictures" is even only 0.06. But on the contrary, the keyword "p scenic spot travel guide" has a strong correla-tion with most keywords and the daily visitor volume of p scenic spots, which may have a certain relationship with the overlap of the two keywords.

Granger Causality Analysis.
Since one of the research focuses of this article is whether network search data can be used to predict the economic development of scenic spots, the Granger causality test is carried out on the number of visitors to p scenic spots and eight keywords. The Granger causality test is a hypothesis testing method based on the autoregressive model. The premise is that the time series must be stationary. Therefore, the stationarity test is performed on the time series of p scenic spots and the time series of eight Baidu search keywords. In Eviews8.0, the ADF unit root test was performed on 9 sequences. Through the test, it was found that the five sequences of p scenic spots daily visitor volume and keywords p scenic spots, p scenic spots pictures, p scenic spots travel guides, p scenic spots, and scenic spots are 0-order. The single integral stationary series meets the preconditions of cointegration analysis. The ADF test results are shown in Table 2. Next, the Granger causality test was performed. If a random variable K is helpful for predicting another random variable, then the variable is said to be the Granger cause of the variable. Table 3, the Baidu index can reflect the "user attention" and "media attention" of different keywords in the past period of time. Therefore, the Baidu index has certain timeliness. For tourism, consumers mainly, the main network searches are conducted in two time periods. One is to explore tourist destinations before preparing to travel, mainly from the aspects of clothing, food, housing, transportation, and play. The other is to search for the purpose of   10 Wireless Communications and Mobile Computing travel during the travel period, searching locally, such as surrounding attractions, traffic, etc. Therefore, there may be a time difference in the prediction of tourist flow from the Internet search data, so the sample is processed again. Keep the daily visitor volume of p scenic spots unchanged, and move forward the Baidu search data of eight keywords, that is, study the advancement of online search. This article will study the impact of Baidu search data from one day in advance to seven days in advance on the forecast of p scenic spots and use the gradient boosting regression (GBRT) with the best prediction effect in Section 5 for fitting. The regression evaluation indicators are shown in Table 4. Using RMSE as the main evaluation index, it can be found that Baidu search data two days in advance, three days in advance, and four days in advance can effectively improve the accuracy of the model. Among them, the accuracy of Baidu search data two days in advance is the best. In the GBRT regression model, using Baidu search data two days in advance can reduce RMSE by 6.36%. The RMSE changes are shown in Figure 8. The changes in RMSE reflect the decision-making process of tourists from the side. Most people will conduct corresponding online searches for destinations before they travel, mainly in the two or three days before travel, with more searches conducted two days in advance.

Research on the Timeliness of Network Search Data. As shown in
In order to study the number of visitors to p scenic spots based on web search data, the SVR algorithm model and GBRT algorithm model are used to fit and predict the number of visitors to p scenic spots, combined with web search data. In the SVR study, the linear kernel function, polynomial kernel function, and Gaussian kernel function were selected to fit and predict the samples. It can be found that the performance of support vector regression is related to the choice of kernel function. Among them, the Gaussian kernel function reaches 74%, and the RMSE is 0. 506183, the goodness of fit is the best, and the prediction effect is the best among the three kernel functions. The overall prediction trend is close to the true value, but even if it is the Gaussian kernel function with the best fit among the three kernel functions, it is in the fitting. It is not as good as the AR model. In the GBRT study, the gradient boosting regression algorithm was used to predict the fitting of samples, and the goodness of fit R 2 reached 95%, and the RMSE was 0.211645, the overall trend is similar to the true value, it has better performance at each volatility turning point, and accurate predictions are made at the two peaks. Comparing   the three prediction methods, the GBRT model added to the network search data has the best goodness of fit and the best prediction performance.

Data Comparison Deviation and Prediction of Wireless
Sensor Network. In this paper, the comparison is obvious.
The actual data in 2019 and the output data of the nonlinear support vector machine are selected for comparison. The results are shown in Figure 9.
It can be seen from Figure 9 that there is an error between the predicted result of the nonlinear model of the wireless sensor network and the actual result. The error value is about 8%-9%. This is because there are too many factors affecting the economy, even nonlinear. The wireless sensor network of this model does not need too much data in the calculation, and it will also cause certain errors. However, from the results, the error value is within an acceptable range. It can be seen that the prediction results of this model can be used as a relevant reference.
This paper uses the nonlinear model of wireless sensor networks to predict the economic changes in East Asia in the next four years. The specific results are shown in Figure 10.
As can be seen from Figure 10, through the prediction of the nonlinear model, the overall economy of East Asia will shrink in 2020 due to the epidemic and other reasons but will begin to show a steady growth trend in 2021, which shows that the overall forecasting model is about the future development situation. Optimistically, although the forecast model still has shortcomings and errors, the forecast results still have a certain reference value.

Conclusions
The dimensions of the indicators in the sample data may be inconsistent. If the data is not normalized, the influence of the smaller data value on the result will be affected by the larger data value, so the calculated result may be realistic; there is a certain deviation in the situation. The normalization of data is a basic work of data mining. After the raw data is processed through data standardization, the indicators are at the same level, so that the results obtained by comparative evaluation are more in line with the objective reality.
As an important component and technical support of the Internet of Things, wireless sensor networks have attracted more and more attention to their security issues. The wireless sensor network is different from the wired network; because of its protocol diversity and network dynamics, network security is greatly threatened. The existing wireless sensor network security detection system has neither formalized analysis of protocols nor in-depth research on attack types. This makes the types of attacks detected not comprehensive enough, and the reliability of the detection effect is poor. For an innovative nonlinear research method of evaluation results, future research can consider using other calculation methods and models to analyze indicator data, which will help to understand the level of regional economic development more deeply and accurately and help analyze the impact and contribution of a specific single indicator to the overall result, so as to make the evaluation results more effective and accurate and improve the value of research and application.
The nonlinear model based on wireless sensor networks is used to predict the overall economy, and the results have a

12
Wireless Communications and Mobile Computing certain value, but the relevant data still needs to be strictly screened to ensure data quality, so that the results can more restore the actual situation. In the future, wireless sensor networks will have more and more applications in economic forecasting and will play a greater role.

Data Availability
No data were used to support this study.