A Level Set Technique for 3D Magnetic Induction Tomography at - - PowerPoint PPT Presentation

a level set technique for 3d magnetic induction
SMART_READER_LITE
LIVE PREVIEW

A Level Set Technique for 3D Magnetic Induction Tomography at - - PowerPoint PPT Presentation

A Level Set Technique for 3D Magnetic Induction Tomography at Different Scales Oliver Dorn The University of Manchester, United Kingdom ICERM workshop on Mathematical and Computational Aspects of Radar Imaging, Providence 18 October 2017 1 /


slide-1
SLIDE 1

A Level Set Technique for 3D Magnetic Induction Tomography at Different Scales

Oliver Dorn

The University of Manchester, United Kingdom

ICERM workshop on Mathematical and Computational Aspects

  • f Radar Imaging, Providence

18 October 2017

1 / 35

slide-2
SLIDE 2

Applications of Interest

Electromagnetic imaging in the near field has a variety of applications. We are interested in using time-harmonic EM fields for the 3D imaging of domains or objects. Of particular concern to us is penetration depth. The objects we are interested in might be enclosed in metallic boxes or in a conductive environment. Practical applications include:

Geophysics/Environmental - Locating objects in the earth (> 200m3) Cargo Containers (∼ 10m3) Boxes/Suitcases/Luggage (∼ 1m3) Small boxes (∼ 0.5m3)

2 / 35

slide-3
SLIDE 3

Proof of Concept - Geophysical Scale (> 200m3)

Source: https://en.wikipedia.org/wiki/Lost Hills Oil Field

3 / 35

slide-4
SLIDE 4

Proof of Concept - Cargo Container Scale (20m3)

Source: Wikipedia https://en.wikipedia.org/wiki/Cargo scanning

4 / 35

slide-5
SLIDE 5

Proof of Concept - Luggage and Box Scale (2m3)

Source: https://en.wikipedia.org/wiki/Airport security

5 / 35

slide-6
SLIDE 6

Maxwell’s Equations

∇ × E − iωµH = Ms ∇ × H − ˆ σ(x)E = Js ˆ σ = σ − iωǫ Use one frequency (for the moment). We want to use ‘low frequencies’ in order to increase penetration depth. Fields tend to behave diffusive. Inverse problem becomes severely ill-posed. Singularities inside the domain are not represented by ‘measurable’ singularities in the data.

6 / 35

slide-7
SLIDE 7

Mathematical Forward Problem

For the moment we restrict ourselves to imaging σ. We write Maxwell’s equations in operator form as Λ(σ) u = q with u = (E, H) and q being the source (e.g. coil) Forward operator A mapping the parameter σ to the corresponding data g = Mu: A(σ) = M u = M Λ(σ)−1q where M is the linear measurement operator (e.g. coils)

7 / 35

slide-8
SLIDE 8

Optimization problem formulation of inverse problem

Physically measured ’true data’ (for ˜ u being true field) ˜ g = M˜ u Residual operator R: R(σ) = A(σ) − ˜ g. Optimization problem (regularized output least squares) Minσ J (σ) = 1 2R(σ)2

2 + η

2σα where σα denotes some norm or semi-norm of σ and η is some regularization parameter.

8 / 35

slide-9
SLIDE 9

The shape-based inverse problem

Often we are interested in detecting and characterizing specific

  • bjects (targets) of unknown shapes (a priori assumption).

Can we determine and characterize shape-like targets (with sharp interfaces to the background) from data that do not contain visible singularities? In more details, assume that the parameter σ has the following specific form σ(x) =

  • σi

in S σe(x) in Ω\S where S is the shape of interest.

9 / 35

slide-10
SLIDE 10

Shape evolution approach (‘shape optimal control’)

shape after a few shape after more ’time−steps’ ’time−steps’ hidden objects initial shape

Shape Evolution

10 / 35

slide-11
SLIDE 11

Shape evolution by artificial shape velocity field

n(x) F(x) = V(x) n(x)

boundary Γ = δΩ

V(x)

Moving the boundary with velocity field V(x)

11 / 35

slide-12
SLIDE 12

Practical shape optimization

There are two basic problems to solve in the shape evolution approach:

1 Constructing an appropriate velocity function from boundary

data.

2 Moving the shape computationally according to the velocity

function Notice that: During the evolution, the ease of handling topological changes is crucial since we do not know the topology of the shapes a-priori.

12 / 35

slide-13
SLIDE 13

Level set approach

Introduce a sufficiently smooth level set function ψ such that σ(x) = σi, if ψ(x) ≤ 0 σe, if ψ(x) > 0

level set function

S

+

S ( ψ )

shape δ +

S S (S) ψ

δS +

S ( ψ ) ψ(S)

δψ( S) = + plane z=0 x y z level set function δ

13 / 35

slide-14
SLIDE 14

Formal setup

The boundary Γ(t) of the shape S at time t is Γ(t) = {x : ψ(x, t) = 0} The residual operator R R(ψ) = R(σ(ψ)) = A(σ(ψ)) − ˜ g is now understood as a function in ψ. The least squares cost functional (without explicit regularization term) is given by J (ψ) = 1 2R(ψ)2

14 / 35

slide-15
SLIDE 15

Some formal calculations

We consider the general evolution law dψ dt = f (x, t, ψ, A, ˜ g, . . .) We introduce the one-dimensional Heaviside function h(ψ) h(ψ) = 1 , ψ > 0 , ψ ≤ 0 Then, we can write σ(ψ) = σeh(ψ) + σi(1 − h(ψ)). Formal differentiation yields dσ dψ = (σe − σi)δ(ψ)

15 / 35

slide-16
SLIDE 16

More formal calculations

Formal differentiation of the least squares cost functional J (σ(ψ(t))) yields dJ dt = dJ dσ dσ dψ dψ dt =

  • R′(σ)∗R(σ) , dσ

dψ dψ dt

  • P

by the chain rule. Here, R′(σ) is the linearized residual operator, and R′(σ)∗ is its adjoint. Remark: The sensitivities R′(σ)∗R(σ) can be calculated efficiently by just solving one forward and one adjoint Maxwell problem (’adjoint scheme’).

16 / 35

slide-17
SLIDE 17

Adjoint scheme for calculating sensitivities

The operator R′(σ)∗ is defined by R′(σ)δσ, ρZ = δσ, R′(σ)∗ρP . (1) We have R′(σ)∗

j Rj(σ) = Ej(x) · Ej(x)

(2) where Ej and Hj are the solution of the ’adjoint Maxwell system’ −b ∇× ∇× a0 Ej Hj

  • = M∗

j Rj(σ)

17 / 35

slide-18
SLIDE 18

Even more formal calculations

Collecting terms yields dJ dt =

  • R′(σ)∗R(σ) , (σe − σi)δ(ψ) f (x, . . .)
  • P

. Let us define now the descent direction fd by fd(x, t, ψ, R, . . .) = − F χNB,∂S with the narrowband function χNB,∂S(x) and F(x) = (σe − σi)R′(σ)∗R(σ). This provides us with a descent flow for J .

18 / 35

slide-19
SLIDE 19

Regularization

Regularization: Use regularized forcing term fr = (αI − β∆)−1 fd with regularization parameters α > 0 and β > 0. Discretization: We calculate discrete time-steps with step-size τ > 0 ψ(t + τ) − ψ(t) τ = (αI − β∆)−1 fd(t) With ψ(n+1) = ψ(t + τ) and ψ(n) = ψ(t), this yields ψ(n+1) = ψ(n) + τ (n)δψ(n), ψ(0) = ψ0 with δψ(n) = (αI − β∆)−1 f (n)

d 19 / 35

slide-20
SLIDE 20

A nonlinear Kaczmarz style approach with line search

The step size τ (n) needs to be determined by a line search procedure. Regardless which forward solver we use, 3D Maxwell simulation in heterogeneous media is computationally expensive. Full gradient calculation requires one forward and one adjoint solve times the number of sources. A traditional line search requires another one or two forward solves per source. This is too expensive! Instead, we apply updates immediately after an individual source position is considered (‘nonlinear Kaczmarz’). As line search we control the ‘shape speed’ instead of reduction in cost which can be done ‘on the fly’ without extra computational cost (no additional forward or adjoint problem).

20 / 35

slide-21
SLIDE 21

Numerical forward solver

We are currently experimenting with two different numerical forward solvers.

1 A finite volume frequency domain discretization in 3D. 2 A finite difference frequency domain discretization in 3D.

Alternative forward solvers are possible, such as finite elements or variants of iterated Born/Neumann series.

21 / 35

slide-22
SLIDE 22

Schematic pseudo code I

, H

f

E

f

, H

f

E

f

receiver, data g(S) receiver, data g(S) Ω source u(S) u(S)

Forward Problem

domain shape S

22 / 35

slide-23
SLIDE 23

Schematic pseudo code II

Ea , Ha Ea , Ha g(S) − g ~ z(S) z(S) adjoint sources: (phase−conjugated residuals) attached at receiver positions

Adjoint Problem

source domain Ω shape S

23 / 35

slide-24
SLIDE 24

Schematic pseudo code III

Ef , Hf domain Ω source (from forward problem) E , H

a a

(from adjoint problem) u(S) z(S) z(S) u(S)

Adjoint Scheme

shape S

24 / 35

slide-25
SLIDE 25

Schematic pseudo code IV

plane z=0 x y z shape S δS S+δS + level set function f(S+δS) = f(S)+ δ f (F(S))

25 / 35

slide-26
SLIDE 26

Schematic pseudo code V

source Ω domain receiver receiver F(S) F(S)=F(u(S),z(S)) shape S S +δ

26 / 35

slide-27
SLIDE 27

Geometry of Problem (Geophysics and Environmental)

BH 1 BH 2 BH 4 BH 3

1 2 3 4 5 6 7 8 9 10 11 12 200 m 2 m receiver loop source loop z 200 m x y

Figure: f = 1kHz.

27 / 35

slide-28
SLIDE 28

Proof of concept - Geophysics scale

Figure: f = 1kHz.

28 / 35

slide-29
SLIDE 29

Geometry of Problem (boxes and containers)

receivers x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x emitters x

Figure: f = 0.2 MHz (containers) or f = 10MHz (boxes)

29 / 35

slide-30
SLIDE 30

Sensitivity Functions

  • 10
  • 5
5 10

z = 35: x

  • 10
  • 8
  • 6
  • 4
  • 2
2 4 6 8 10

y

  • 0.2
  • 0.15
  • 0.1
  • 0.05
0.05 0.1 0.15 0.2
  • 10
  • 5
5 10

z = 40: x

  • 10
  • 8
  • 6
  • 4
  • 2
2 4 6 8 10

y

  • 0.15
  • 0.1
  • 0.05
0.05 0.1 0.15
  • 10
  • 5
5 10

z = 45: x

  • 10
  • 8
  • 6
  • 4
  • 2
2 4 6 8 10

y

  • 0.15
  • 0.1
  • 0.05
0.05 0.1 0.15
  • 10
  • 5
5 10

z = 50: x

  • 10
  • 8
  • 6
  • 4
  • 2
2 4 6 8 10

y

  • 8
  • 6
  • 4
  • 2
2 4 6 8
  • 10
  • 5
5 10

z = 55: x

  • 10
  • 8
  • 6
  • 4
  • 2
2 4 6 8 10

y

  • 1
  • 0.8
  • 0.6
  • 0.4
  • 0.2
0.2 0.4 0.6 0.8 1

Sensitivity Re(S) = Re(E.E) 30 / 35

slide-31
SLIDE 31

Proof of Concept - Cargo Container Scale (20m3)

y

30 30 40

z

50

x

Initial Shape S(0)

20 30 20 10 10

y

30 30 40

z

50

x

m = 25

20 30 20 10 10

y

30 30 40

z

50

x

m = 50

20 30 20 10 10

y

30 30 40

z

50

x

m = 100

20 30 20 10 10

y

30 30 40

z

50

x

True Shape S(t)

20 30 20 10 10 50 100

m

1.5 2 2.5 3 3.5 4 Norm of Residual

f =0.2MHz

Imaging cargo container (f = 0.2 MHz)

31 / 35

slide-32
SLIDE 32

Proof of Concept - Box Scale (1m3)

y 30 30 40 z 50 x Initial Shape S(0) 20 30 20 10 10 y 30 30 40 z 50 x m = 25 20 30 20 10 10 y 30 30 40 z 50 x m = 50 20 30 20 10 10 y 30 30 40 z 50 x m = 100 20 30 20 10 10 y 30 30 40 z 50 x True Shape S(t) 20 30 20 10 10 50 100 m 50 100 150 200 250 Norm of Residual f =10MHz

Imaging boxes (f = 10 MHz)

32 / 35

slide-33
SLIDE 33

Summary

Shapes and objects can be estimated and characterized from low frequency EM data when going beyond the Born approximation; This allows for penetrating shielding structures such as walls, foliage, metallic cases, or the surface of the Earth (GPR); Computational cost is increased due to the need for forward models incorporating inhomogeneous backgrounds; Multistatic antenna setups are preferred in order to obtain 3D reconstructions; Novel measurement technologies inspire new applications; This can be applied at various scales; Much research still needs to be done . . .

33 / 35

slide-34
SLIDE 34

References

[1] Champagne, N.J., Berryman, J.G. and Buettner, H.M., 2001. FDFD: A 3D finite-difference frequency-domain code for electromagnetic induction tomography. Journal of Computational Physics, 170(2), pp.830-848. [2] Dorn, O. and Ascher, U., 2007. Shape reconstruction in 3D electromagnetic induction tomography using a level set technique. Proc. 23rd International Review of Progress in Applied Computational Electromagnetics ACES, pp.1-6. [3] Dorn, O., Bertete-Aguirre, H., Berryman, J.G. and Papanicolaou, G.C., 1999. A nonlinear inversion method for 3D electromagnetic imaging using adjoint fields. Inverse Problems, 15(6), p.1523. [4] Dorn, O. and Lesselier, D., 2006. Level set methods for inverse scattering. Inverse Problems, 22(4), p.R67. [5] Dorn, O. and Hiles, A., 2018. A level set method for magnetic induction tomography of 3D boxes and

  • containers. Submitted to Electromagnetic Nondestructive Evaluation, Vol XXI, series Studies in Applied

Electromagnetics and Mechanics, IOS Press. [6] Haber, E., Ascher, U.M., Aruliah, D.A. and Oldenburg, D.W., 2000. Fast simulation of 3D electromagnetic problems using potentials. Journal of Computational Physics, 163(1), pp.150-171. [7]

  • S. Hussain, L. Marmugi, C. Deans, F. Renzoni, “Electromagnetic imaging with atomic magnetometers: a

novel approach to security and surveillance”, SPIE Proc. Vol 9823: Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XXI, May 2016. [8] Darrer, B.J., Watson, J.C., Bartlett, P. and Renzoni, F., 2015. Toward an automated setup for magnetic induction tomography. IEEE Transactions on Magnetics, 51(1), pp.1-4. [9] Wood J., Ward R., Lloyd C., Tatum P., Shenton-Taylor C., Taylor S., Bagley G., Joseph M. and Watson J.C., 2017. Effect of Shielding Conductivity on Magnetic Induction Tomographic Security Imagery, IEEE

  • Trans. Magn. 53 (4).

34 / 35

slide-35
SLIDE 35

QUESTIONS?

35 / 35