600
Views
5
CrossRef citations to date
0
Altmetric
Articles

On the Kohn–Vogelius formulation for solving an inverse source problem

, &
Pages 56-72 | Received 06 Jan 2020, Accepted 19 May 2020, Published online: 22 Jun 2020

Abstract

An inverse source problem related to the Poisson equation is the main concern of this work. Specifically, we deal with the reconstruction of a mass distribution in a geometrical domain from a partial boundary measurement of the associated potential. The considered problem is motivated by various applications such as the identification of geological anomalies underneath the Earth's surface. The proposed approach is based on the Kohn–Vogelius formulation and the topological derivative method. An explicit second-order sensitivity related to circular shaped anomalies is calculated for different examples of the Kohn–Vogelius type functional. Then, the optimal location and size of the unknown support of the mass distribution are characterized as the solution to a minimization problem. The resulting reconstruction procedure is non-iterative and robust with respect to noisy data. Finally, we produce numerical results from four different examples of the Kohn–Vogelius type functional. The results first demonstrate the method and then compare the robustness of each functional in solving the inverse source problem.

2010 Mathematics Subject Classifications:

1. Introduction

In this paper, we consider the reconstruction of a mass density distribution with support within a geometrical domain from a boundary measurement of the associated potential. This type of inverse problem has been studied by many authors [Citation1–4]. Isakov [Citation3] proved the identifiability of anomalies with star-shaped or convex in one direction supports. Then, El-Badia and Ha-Duong [Citation1] established the uniqueness in determining multiply-connected ball-shaped anomalies from a single Cauchy data, while Hettlich and Rundell [Citation2] considered a Newton-type iterative method to reconstruct the shape of the anomaly. Liu [Citation4] proposed an iterative approach based on the shape derivative. They applied the gradient descent algorithm (GDA) and trust-region-reflective algorithm (TRA) to detect the location, size, and shape of the source. In the context of gravimetry, Canelas et al. [Citation5] solved this reconstruction problem in the two-dimensional case from complete boundary measurements. They proposed a method which relies on the minimization of a Kohn–Vogelius type functional by using the topological derivative method. In [Citation6], the same authors extend the ideas presented in [Citation5] to cover the two and three spatial dimensions cases with incomplete (partial) boundary measurements.

To reconstruct the location, size, shape and number of the mass density distributions in the geometrical domain, we follow the ideas presented in [Citation6]. The proposed approach is based on the Kohn–Vogelius formulation [Citation7] and the topological derivative method [Citation8]. More precisely, we reconstruct the support ωΩ of a source-term, where ΩR2, with boundary Ω, from a partial boundary measurement of the associated potential on the boundary ΓMΩ, but without using the Newtonian potential to complement the unavailable information about the hidden boundary as presented in [Citation6].

The Kohn–Vogelius shape functional measures the misfit between the solutions of two auxiliary problems containing information about the boundary measurements. It is a self regularization technique that rephrases the inverse problem as an optimization problem where the support of the anomalies is the unknown variable. The minimum of the Kohn–Vogelius objective functional is reached when the unknown support coincides with the actual one. The topology optimization problem consists of minimizing the variation of the Kohn–Vogelius type functional with respect to a class of mass distributions defined by a finite number of ball-shaped trial anomalies.

An asymptotic expansion of the Kohn–Vogelius functional with respect to the circular perturbations is computed using the topological derivative method. The second-order topological gradient is applied in the context of the proposed source reconstruction problem. In particular, four different versions of the Kohn–Vogelius shape functional are considered: the L2(ΓM)-norm, L2(Ω)-norm, H1(Ω)-seminorm and H1(Ω)-norm of the error function. The main idea of this type of functional was first introduced by Wexler et al. [Citation9] where a procedure to detect the unknown impedance from boundary measurements was proposed. Then, Kohn and Vogelius [Citation7] suggested a modification of Wexler's procedure to make it an alternating direction one by proposing a new misfit gap-cost functional. Since then, this formulation has been used to solve various inverse problems [Citation6,Citation10,Citation11]. Variants of this type of inverse problem have applications in various fields such as gravimetry, where the goal is to determine the Earth's density distribution from measurements of the gravity and its derivatives on the surface of the Earth [Citation3].

By uniqueness of the auxiliary forward problems, all objective functions are equivalent in theory. From the practical point of view, however, their effectiveness may depend on the modelling uncertainties (noisy data) and discretization strategies. The main concern of this paper is to compare the four metrics in different scenarios, which represents the main originality of the current article in comparison to Canelas et al. [Citation6]. The findings reported here are useful not only for readers interested in the topological derivative method but also for anyone dealing with the inverse source problem and related reconstruction problems.

The paper is organized as follows. In Section 2 the inverse problem to be considered is rewritten in the form of a topology optimization problem, which consists of minimizing a Kohn–Vogelius shape functional with respect to a set of ball-shaped anomalies. To solve this inverse problem the concept of second-order topological derivative is introduced in Section 3. The resulting Newton-type method is presented in Section 4, together with the associated reconstruction algorithm. In Section 5, we present numerical examples that demonstrate the effectiveness of the devised reconstruction algorithm and compare the distance functions proposed. Finally, in Section 6 there are concluding remarks.

2. Inverse source problem

Consider determining a source term f for the following elliptic problem: (1) {Δu=finΩ,νu=0onΓM,u=0onΓ0:=ΩΓM¯,(1) from the given boundary data: u=uonΓM, where ΩR2 is an open and bounded domain with a Lipschitz boundary Ω, and ΓM is an open subset of Ω with a non-void interior (with respect to the boundary topology). In addition, νu=uν and ν is the unit outward normal vector to Ω.

The major difficulty with this inverse problem is that the general source terms are unidentifiable due to the nature of the boundary data. To handle this question of uniqueness, a priori assumptions on the class of sources to be detected are made. Hence, the source term f is modelled as a discontinuous source, namely, f=χω where χω is the characteristic function of the unknown sub-domain ωΩ, that have to be recovered from partial boundary measurement of the associated potential on ΓM.

The inverse problem to be solved consists in finding χωA(Ω) such that the boundary value problem (Equation1) is satisfied. The set of admissible solutions A(Ω) is given by characteristic functions of the form: (2) A(Ω)={χω:ΩR|χω=1inωandχω=0inΩω},(2) where ωΩ is a Lebesgue measurable set. However, the difficulty is that the inverse problem (Equation1) is an over-determined boundary value problem and there is a lack of stability in the sense of Hadamard. In order to deal with the over-determined problem, (Equation1) is separated into two well posed problems: given χωA(Ω), find uD and uN such that (3) {ΔuD=χωinΩuD=uonΓMuD=0onΓ0and{ΔuN=χωinΩνuN=0onΓMuN=0onΓ0.(3) These problems assume that the medium is big enough that the potential decays to zero on the portion of the boundary that is not measured (Γ0=ΩΓM). The solution to (Equation1), due to the uniqueness of the traces of uD and uN on ΓM, is: (4) Ifχω=χωuD=uN.(4) Then, we find the solution by formulating the inverse problem as a topology optimization problem which minimizes the difference between uD and uN: (5) MinimizeχwA(Ω)ρ(uDuN)(5) where ρ(uDuN) represents the distance between uD and uN in some appropriated norm. To measure this distance we will consider different examples of the Kohn–Vogelius type functional, such as the L2(ΓM)-norm, L2(Ω)-norm, H1(Ω)-seminorm, and H1(Ω)-norm. Note that in this context, ω can be interpreted as an initial guess for the true anomaly ω. Since ω is arbitrary, we will assume later trivial initial guess given by ω=.

Since the inverse source problem (Equation1) is rewritten as a topology optimization problem (Equation5), we seek to solve the optimization problem by using the topological derivative method which is described in the next section.

3. Topological sensitivity analysis

The topological derivative measures the sensitivity of a given shape function with respect to infinitesimal geometry perturbations such as the creation of inclusions, cracks, cavities, inhomogeneities, or source-terms. Theoretically, the topological sensitivity concept is the first term of the asymptotic expansion of such shape functions with respect to the small parameter that measures the size of the introduced perturbation. This idea was first developed by Schumacher [Citation12] under the name of bubble method in the context of compliance minimization in linear elasticity, followed by Sokołowski and Żochowski [Citation13] and Céa et al. [Citation14]. Since then, this concept has been successfully applied to many relevant scientific and engineering problems such as inverse problems [Citation15–20], topology optimization [Citation21–24], image processing [Citation25–28], damage [Citation29,Citation30] and fracture [Citation31,Citation32] evolution modelling, and many other applications.

To present the basic idea of this method, we consider an open and bounded domain ΩRd (d{2,3}) and a non-smooth perturbation confined in a small set ωε,z of size ε>0 centred at an arbitrary point z of Ω such that ωε,zΩ. To be more precise, in this context ωε,z represents the topological perturbed counterpart of the initial guess ω. We introduce a characteristic function xχ(x),xΩ, associated with the unperturbed domain, namely χ=1Ω. Similarly, we define a characteristic function xχε(z,x),xΩ, associated to the topologically perturbed domain. In the case of a perforation, for instance, χε(z)=1Ω1ωε,z and the perturbed domain is given by Ωε,z=Ωωε,z¯. Then, for a given shape functional G(χε(z)) associated with the topologically perturbed domain, the topological sensitivity analysis method would provide an asymptotic expansion of G(χε(z)) of the form: (6) G(χε(z))=G(χ)+f1(ε)T(z)+o(f1(ε)),(6) where:

  • G(χ) is the shape functional associated with the unperturbed domain;

  • εf1(ε) is a scalar positive function such that f1(ε)0 when ε0;

  • the function zT(z) is called the first-order ‘topological derivative’ or ‘topological sensitivity’ of the shape functional G at z and plays the role of leading term of the variation G(χε(z))G(χ). Mathematically, we express it as: T(z):=limε0G(χε(z))G(χ)f1(ε).

We can define the second-order topological derivative of the shape functional G at z by expanding the remainder term o(f1(ε)) in (Equation6). Therefore, an asymptotic expansion of the functional G at z can be in the following form: (7) G(χε(z))=G(χ)+f1(ε)T(z)+f2(ε)T2(z)+o(f2(ε)),(7) where:

  • εf2(ε) is a scalar positive function such that f2(ε)=o(f1(ε)) and f2(ε)0 when ε0;

  • T2(z) denotes the second-order topological derivative of the shape function G at z, which can be defined as T2(z):=limε0G(χε(z))G(χ)f1(ε)T(z)f2(ε).

In this paper, the problem is perturbed by introducing balls in order to determine the sensitivities. Consider n ball-shaped anomalies, with radii and centres ε=(ε1,,εn) and ξ=(z1,,zn) respectively. This results in the characteristic function: (8) χωε=χω+i=1nχBεi(zi)(8) where Bεi(zi) denotes a ball of radius εi and centre zi in Ω, for i=1,,n. We assume that Bεi(zi)Ω such that Bεi(zi)Bεj(zj)= for ij. Therefore, given χωεA(Ω), the perturbed counterparts of problems (Equation3) are: find uεD and uεN such that (9) {ΔuεD=χωεinΩuεD=uonΓMuεD=0onΓ0and{ΔuεN=χωεinΩνuεN=0onΓMuεN=0onΓ0(9)

3.1. Asymptotic analysis of the solution

Let us introduce the following ansätze for the solutions to the perturbed problems (Equation9): (10) uεD(x)=uD(x)+i=1nπεi2vεiD(x)(10) (11) uεN(x)=uN(x)+i=1nπεi2vεiN(x)(11) where vεiD and vεiN are the solutions of the following auxiliary boundary value problems for i=1,,n: find vεiD and vεiN such that (12) {ΔvεiD=1πεi2χBεi(zi)inΩvεiD=0onΓMvεiD=0onΓ0and{ΔvεiN=1πεi2χBεi(zi)inΩνvεiN=0onΓMvεiN=0onΓ0(12) Since vεiD and vεiN depend on εi in the ball Bεi(zi), separate them into two parts: (13) vεiD(x)=pεi(x)+qiD(x)(13) (14) vεiN(x)=pεi(x)+qiN(x)(14) where pεi is solution of the following boundary value problem defined in a big ball BR(zi)Ω of radius R and centre at zi: find pεi such that (15) {Δpεi=1πεi2χBεi(zi)inBR(zi)pεi=12πlnRonBR(zi)(15) The above boundary value problem admits the explicit solution, namely: (16) pεi(x)={14π(xzi2εi2+2lnεi1)xBεi(zi)12πlnxzixBR(zi)Bεi(zi)(16) Finally, qiD and qiN must compensate for the discrepancies left by pεi on Ω. In particular, they are the solutions to the following boundary value problems: find qiD and qiN such that (17) {ΔqiD=0inΩqiD=12πlnxzionΩ(17) (18) {ΔqiN=0inΩνqiN=12πxzixzi2νonΓMqiN=12πlnxzionΓ0(18) Therefore, the difference between uεD and uεN is simply given by (19) uεDuεN=uDuN+i=1nπεi2hi,(19) with hi=qiDqiN. The following result justifies the ansätze (Equation10) and (Equation11):

Lemma 3.1

Let us consider the expansion (Equation19), then the following estimate holds true (20) wεwH1(Ω)C|ε|2,(20) where wε:=uεDuεN, w:=uDuN, |ε|=ε1++εn and C is a constant independent of the small parameters εi, for i=1,,n.

Proof.

By taking into account the triangular inequality in expansion (Equation19), we have (21) (uεDuεN)(uDuN)H1(Ω)C1i=1nεi2hiH1(Ω),(21) which leads to the result provided that each hi is independent of εi, for i=1,,n.

3.2. Asymptotic analysis of the distance function

In this section, we want to find a better approximation ωε than the initial guess ω to the target ω. Therefore, let us propose an expansion of the form: (22) Ψn(α,ξ)=αd(ξ)+12H(ξ)αα,(22) where Ψn(α,ξ)=ρ(uεDuεN)ρ(uDuN) and vector α=(α1,αn), with αi=πεi2, remembering that n is the number of anomalies to be reconstructed, ξ are their locations and α their sizes (areas). Note that the number of anomalies n to be reconstructed is arbitrary. However, since we are interested in comparing different distance functions, for the sake of simplicity we assume that n is given. Finally, vector d and matrix H, with entries (23) d(ξ)=(d1d2dn)andH(ξ)=(H11H12H1nH21H22H2nHn1Hn2Hnn),(23) will be defined according to each distance function.

3.2.1. L2(ΓM)-norm

Consider ρ(uDuN)=J1(uD,uN), with (24) J1(uD,uN):=ΓM|uDuN|2.(24) The associated topological asymptotic expansion is: (25) J1(uεD,uεN)=ΓM|uεDuεN|2=J1(uD,uN)+2i=1nπεi2ΓM(uDuN)hi+i,j=1nπεi2πεj2ΓMhihj(25) such that the entries of the vector d and matrix H are: (26) di=2ΓM(uDuN)hiandHij=2ΓMhihj(26)

3.2.2. L2(Ω)-norm

Consider ρ(uDuN)=J2(uD,uN), with (27) J2(uD,uN):=Ω|uDuN|2.(27) The associated topological asymptotic expansion is: (28) J2(uεD,uεN)=Ω|uεDuεN|2=J2(uD,uN)+2i=1nπεi2Ω(uDuN)hi+i,j=1nπεi2πεj2Ωhihj(28) such that the entries of the vector d and matrix H are: (29) di=2Ω(uDuN)hiandHij=2Ωhihj(29)

3.2.3. H1(Ω)-seminorm

Consider ρ(uDuN)=J3(uD,uN), with (30) J3(uD,uN):=Ω(uDuN)2.(30) Its associated topological asymptotic expansion is: (31) J3(uεD,uεN)=Ω(uεDuεN)2=J3(uD,uN)+2i=1nπεi2Ω(uDuN)hi+i,j=1nπεi2πεj2Ωhihj(31) such that the entries of the vector d and matrix H are: (32) di=2Ω(uDuN)hiandHij=2Ωhihj(32)

3.2.4. H1(Ω)-norm

Consider ρ(uDuN)=J2(uD,uN)+J3(uD,uN), with (33) J2(uD,uN)+J3(uD,uN)=Ω|uDuN|2+Ω(uDuN)2.(33) Its associated topological asymptotic expansion is: (34) J2(uεD,uεN)+J3(uεD,uεN)=J2(uD,uN)+J3(uD,uN)+2i=1nπεi2Ω(uDuN)hi+i,j=1nπεi2πεj2Ωhihj+2i=1nπεi2Ω(uDuN)hi+i,j=1nπεi2πεj2Ωhihj(34) such that the entries of the vector d and matrix H are: (35) di=2Ω((uDuN)hi+(uDuN)hi)(35) (36) Hij=2Ω(hihj+hihj)(36)

Remark 3.2

Since we are dealing with topological perturbation given by circular anomalies, the resulting expansions (Equation25), (Equation28), (Equation31) and (Equation34) fit the ansatz (Equation22), which is exact up to order |α|2. For arbitrary-shaped anomalies, the analysis becomes more involved and non-trivial remainder terms should appear, which would have to be estimated in an appropriate norm.

4. Reconstruction algorithm

Given the general function of form (Equation22), the minimum is found when: (37) DαΨn(α,ξ),β=0βRn(37) Furthermore, given Hij is symmetric positive definite, the minimum of the function with respect to α is the global minimum. In particular, (38) (H(ξ)α+d(ξ))β=0βH(ξ)α=d(ξ)(38) provided that H=H. Therefore, (39) α=α(ξ)=H(ξ)1d(ξ),(39) such that the quantity α, solving (Equation39), becomes a function of the locations ξ. Replacing the solution of (Equation39) into Ψn(α,ξ), defined by (Equation22), the optimal locations ξ can be obtained from a combinatorial search over the domain Ω. These locations are the solutions to the following minimization problem: (40) ξ=argminξX{Ψn(α(ξ),ξ)=12α(ξ)d(ξ)},(40) where the set of admissible locations of anomalies X is defined as (41) X={xiΩ:i=1,,mandnm<}.(41) Then, the optimal sizes are given by α=α(ξ).

To summarize, we have introduced a second-order topology optimization algorithm which is able to find the optimal sizes α of the hidden anomalies and their locations ξ for a given number n of trial balls. The inputs to the algorithm are:

  • the vector d and the matrix H, whose entries are given by f(i):=di and A(i,j):=Hij, respectively;

  • the m=card(X) points at which the system (Equation39) is solved;

  • the number n of anomalies to be reconstructed.

The algorithm returns the optimal sizes α and locations ξ. The above procedure is written in pseudo-code format as shown in Algorithm 1. In the algorithm, Π maps the vector of nodal indices I=(i1,i2,,in) to the corresponding vector of nodal coordinates ξ. For further applications of this algorithm we refer to [Citation5,Citation6,Citation33–36], which can be combined with well-established and more computationally sophisticated iterative methods [Citation37–41].

5. Numerical results

In this section, the described algorithm is implemented to first establish its validity in solving the inverse problem we are dealing with. Then, it compares the distance functions (error norms) proposed. Each example is two-dimensional and in a semi-circular domain with a radius of 1 that is discretized with 33,280 three-node finite elements. The measured portion of the boundary is the top of the semi-circle. Each example also has a grid of points, which is a subset of the mesh's nodes, which will be the candidate points for each ball's centre, over which the optimization problem (Equation40) is solved. Finally, as already mentioned, we assume trivial initial guess, namely ω=.

5.1. Example 1: Three balls, on-grid, no noise

In this initial example, we consider three balls of varying sizes. The centre points of the balls are within the set of 1093 grid points and there is no noise corrupting the boundary measurement generated from the solution, as shown in Figure (a). To solve this inverse problem the L2(ΓM)-norm is employed as the distance function. The method proposed finds three balls with the correct centre-points and radii with 2.7×104%, 1.9×104%, and 1.1×104% error as shown in Figure (b). This demonstrates that in the ideal case, non-corrupted measurements and the centre points within the given set, the found balls match the target.

Figure 1. Example 1: Three balls, on-grid, no noise. (A) Target. (B) Result.

Figure 1. Example 1: Three balls, on-grid, no noise. (A) Target. (B) Result.

5.2. Example 2: One rectangle, on-grid, no noise

In this example we consider one 0.4 wide and 0.2 high rectangle which will be reconstructed as one and two balls. The centroid of the rectangle is within the set of 1093 grid points and there is no noise corrupting the boundary measurement generated from the solution, as shown in Figure . To solve this inverse problem all four error norms are employed as the distance function. The equivalent radius of the rectangle is defined as the radius of a circle with the same area. The method proposed first reconstructs the rectangular anomaly as one ball as shown in Figure . The resulting difference in centroid location and equivalent radius are listed in Table . This demonstrates that in the case that the target is not the assumed shape the equivalent centroid and area are reconstructed exactly for the L2(Ω)-norm, and close to this for the other error norms. Then the method reconstructs the rectangular anomaly as two balls as shown in Figure  and the error in compound centroid and equivalent radius is listed in Table . In this case the equivalent centroid and area are almost exactly reconstructed. The small error and lack of symmetry is likely due to the non-conforming mesh. However, it has shown in further examples that this method does not reconstruct more complex shapes well. It often fails with shapes such as an L-shaped anomaly.

Figure 2. Example 2: Rectangular target, no noise, on grid.

Figure 2. Example 2: Rectangular target, no noise, on grid.

Figure 3. Example 2: Reconstruction of one rectangular target, no noise, on grid. (A) One ball. (B) Two balls.

Figure 3. Example 2: Reconstruction of one rectangular target, no noise, on grid. (A) One ball. (B) Two balls.

Table 1. Example 2: Error in constructing one rectangular target from one ball, no noise, on grid.

Table 2. Example 2: Error in constructing one rectangular target from two balls, no noise, on grid.

5.3. Example 3: One ball, no noise, with varying grid densities

In this example consider one ball with a radius of 0.1 where the centre point is not within the set of grid points, with no noise corrupting the boundary measurement, as shown in Figure . Here we consider grids with 79, 287, 1093, and 4665 points and all four distance functions. Based on the error in found centre and radius plotted in Figure , it is clear that as the grid is refined, regardless of distance function, the method converges towards a more accurate solution. Therefore, regardless of grid density or distance function, the found centre point is the closest to the true one. Also, it is shown that any error in centre point is compensated for by the radius of the ball.

Figure 4. Example 3: Target for one ball, no noise.

Figure 4. Example 3: Target for one ball, no noise.

Figure 5. Example 3: Result for one ball, no noise, with varying grid densities.

Figure 5. Example 3: Result for one ball, no noise, with varying grid densities.

5.4. Example 4: One ball, on-grid, with varying levels of noise

In this example consider one ball where the centre point is within the set of 1093 grid points. Normally distributed random numbers, seeded with a value of one, are generated to act as noise. A varying per cent of this noise is then used to corrupt the target, which induces a corrupted boundary measurement. In particular, the target source f is replaced by (42) fμ(x)=f(x)+μτ(x),(42) where τ:ΩR is a random variable taking values in (0,1) and μ corresponds to the noise level, as shown in Figure . Note that in this context, noisy data can be interpreted as modelling uncertainties. For each level of boundary measurement corruption, the error in found centre and radius is calculated for each distance function, as shown in Figure . These graphs demonstrate that, at larger percentages of noise, the L2-norms tend to be more accurate. This is most likely due to the finite element integration.

Figure 6. Example 4: Target for one ball corrupted with varying levels of noise μ. (A) μ=5%. (B) μ=10%. (C) μ=15%. (D) μ=20%. (E) μ=25%. (F) μ=30%. (G) μ=35%. (H) μ=40%. (I) μ=45%. (J) μ=50%.

Figure 6. Example 4: Target for one ball corrupted with varying levels of noise μ. (A) μ=5%. (B) μ=10%. (C) μ=15%. (D) μ=20%. (E) μ=25%. (F) μ=30%. (G) μ=35%. (H) μ=40%. (I) μ=45%. (J) μ=50%.

Figure 7. Example 4: Result for one ball, on-grid, with varying levels of noise.

Figure 7. Example 4: Result for one ball, on-grid, with varying levels of noise.

5.5. Example 5: One ball, off-grid, with varying levels of noise

This experiment is the same as Example 4, except the centre point of the ball is not within the set of grid points. From Figure , similar to Example 3, it is shown that the inverse problem solution tends to be more resistant to noise when the L2-norms are used as the distance functions. This difference seems to be more significant when the centre point is not contained within the set of grid points.

Figure 8. Example 5: Result for one ball, off-grid, with varying levels of noise.

Figure 8. Example 5: Result for one ball, off-grid, with varying levels of noise.

6. Conclusions

In this paper, we consider the inverse source problem from a partial boundary measurement of the associated potential. This inverse problem is nonlinear and ill-posed [Citation42]. The physical motivation of this problem comes from gravimetry such as the reconstruction of the mass density distribution of small regions of Earth, located close to its surface. Following the approach introduced in [Citation6], we have proposed a non-iterative reconstruction method to detect the salient features of the hidden anomalies, such as the location, the size, the shape and the number, but without using the Newtonian potential to complement the unavailable information about the hidden boundary. In this setting, the inverse problem becomes more difficult to be solved, so that non-ball shaped anomalies are hard to reconstruct. The proposed approach is based on the Kohn–Vogelius formulation and the topological derivative method. The inverse source problem has been reformulated as a topology optimization problem. A second-order topological sensitivity is derived for different error norms. In particular, four examples of the Kohn–Vogelius functional are considered, namely L2(ΓM)-norm, L2(Ω)-norm, H1(Ω)-seminorm and H1(Ω)-norm of the error function. The second-order topological sensitivity has been used to devise a fast Newton-type reconstruction algorithm based on a simple optimization step. Finally, we have presented an extensive set of numerical experiments. First, the validity of the method is demonstrated and then the robustness of four different cost functions are compared. It is shown that although in theory the cost functions are identical, due to the discretization technique the L2-norms tend to be more robust with respect to noise.

Acknowledgments

This research was partly supported by CNPq (Brazilian Research Council), CAPES (Brazilian Higher Education Staff Training Agency) and FAPERJ (Research Foundation of the State of Rio de Janeiro). The support is gratefully acknowledged.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

This research was partly supported by CNPq (Brazilian Research Council), CAPES (Brazilian Higher Education Staff Training Agency) and FAPERJ (Research Foundation of the State of Rio de Janeiro).

References

  • El Badia A, Ha-Duong T. An inverse source problem in potential analysis. Inverse Probl. 2000;16(3):651–663.
  • Hettlich F, Rundell W. Iterative methods for the reconstruction of an inverse potential problem. Problems¡/DIFdel¿Inverse Probl. 1996;12(3):251.
  • Isakov V. Inverse problems for partial differential equations. New York: Springer; 2006. (Applied Mathematical Sciences; 127).
  • Liu J-C. An inverse source problem of the poisson equation with cauchy data. Electron J Differ Eq. 2017;2017(119):1–19.
  • Canelas A, Laurain A, Novotny AA. A new reconstruction method for the inverse potential problem. J Comput Phys. 2014;268:417–431.
  • Canelas A, Laurain A, Novotny AA. A new reconstruction method for the inverse source problem from partial boundary measurements. Inverse Probl. 2015;31(7):075009.
  • Kohn R, Vogelius M. Relaxation of a variational method for impedance computed tomography. Commun Pure Appl Math. 1987;40(6):745–777.
  • Novotny AA, Sokołowski J. Topological derivatives in shape optimization. Berlin: Springer-Verlag; 2013. (Interaction of Mechanics and Mathematics).
  • Wexler A, Fry B, Neuman MR. Impedance-computed tomography algorithm and system. Appl Opt. 1985;24(23):3985–3992.
  • Ben Abda A, Hassine M, Jaoua M, et al. Topological sensitivity analysis for the location of small cavities in stokes flow. SIAM J Control Optim. 2009;48:2871–2900.
  • Hrizi M, Hassine M, Malek R. A new reconstruction method for a parabolic inverse source problem. Appl Anal. 2019;98(15):2723–2750.
  • Schumacher A. Topologieoptimierung von Bauteilstrukturen unter Verwendung von Lochpositionierungskriterien [PhD thesis]. Forschungszentrum für Multidisziplinäre Analysen und Angewandte Strukturoptimierung. Institut für Mechanik und Regelungstechnik; 1996.
  • Sokołowski J, Żochowski A. On the topological derivative in shape optimization. SIAM J Control Optim. 1999;37(4):1251–1272.
  • Céa J, Garreau S, Guillaume Ph, et al. The shape and topological optimizations connection. Comput Methods Appl Mech Eng. 2000;188(4):713–726.
  • Amstutz S, Horchani I, Masmoudi M. Crack detection by the topological gradient method. Control Cybernet. 2005;34(1):81–101.
  • Bonnet M. Higher-order topological sensitivity for 2-D potential problems. Int J Solids Struct. 2009;46(11–12):2275–2292.
  • Canelas A, Novotny AA, Roche JR. A new method for inverse electromagnetic casting problems based on the topological derivative. J Comput Phys. 2011;230:3570–3588.
  • Caubet F, Dambrine M. Localization of small obstacles in stokes flow. Inverse Probl. 2012;28(10):1–31.
  • Rocha de Faria J, Lesnic D. Topological derivative for the inverse conductivity problem: a Bayesian approach. J Sci Comput. 2015;63(1):256–278.
  • Feijóo GR. A new method in inverse scattering based on the topological derivative. Inverse Probl. 2004;20(6):1819–1840.
  • Allaire G, de Gournay F, Jouve F, et al. Structural optimization using topological and shape sensitivity via a level set method. Control Cybernet. 2005;34(1):59–80.
  • Amstutz S, Andrä H. A new algorithm for topology optimization using a level-set method. J Comput Phys. 2006;216(2):573–588.
  • Amstutz S, Novotny AA, de Souza Neto EA. Topological derivative-based topology optimization of structures subject to Drucker-Prager stress constraints. Comput Methods Appl Mech Eng. 2012;233–236:123–136.
  • Garreau S, Guillaume Ph, Masmoudi M. The topological asymptotic for PDE systems: the elasticity case. SIAM J Control Optim. 2001;39(6):1756–1778.
  • Auroux D, Masmoudi M, Belaid L. Image restoration and classification by topological asymptotic expansion. In: Taroco E, de Souza Neto EA, Novotny AA, editors. Variational formulations in mechanics: theory and applications. Barcelona: CIMNE; 2007. p. 23–42..
  • Belaid LJ, Jaoua M, Masmoudi M, et al. Application of the topological gradient to image restoration and edge detection. Eng Anal Bound Elem. 2008;32(11):891–899.
  • Hintermüller M. Fast level set based algorithms using shape and topological sensitivity. Control Cybernet. 2005;34(1):305–324.
  • Hintermüller M, Laurain A. Multiphase image segmentation and modulation recovery based on shape and topological sensitivity. J Math Imaging Vis. 2009;35:1–22.
  • Allaire G, Jouve F, Van Goethem N. Damage and fracture evolution in brittle materials by shape optimization methods. J Comput Phys. 2011;230(12):5010–5044.
  • Xavier M, Fancello EA, Farias JMC, et al. Topological derivative-based fracture modelling in brittle materials: a phenomenological approach. Eng Fract Mech. 2017;179:13–27.
  • Ammari H, Kang H, Lee H, et al. Boundary perturbations due to the presence of small linear cracks in an elastic body. J Elast. 2013;113:75–91.
  • Van Goethem N, Novotny AA. Crack nucleation sensitivity analysis. Math Methods Appl Sci. 2010;33(16):1978–1994.
  • Fernandez L, Novotny AA, Prakash R. Noniterative reconstruction method for an inverse potential problem modeled by a modified Helmholtz equation. Numer Funct Anal Optim. 2018;39(9):937–966. doi:10.1080/01630563.2018.1432645
  • Ferreira AD, Novotny AA. A new non-iterative reconstruction method for the electrical impedance tomography problem. Inverse Probl. 2017;33(3):035005.
  • Machado TJ, Angelo JS, Novotny AA. A new one-shot pointwise source reconstruction method. Math Methods Appl Sci. 2017;40(15):1367–1381.
  • Rocha SS, Novotny AA. Obstacles reconstruction from partial boundary measurements based on the topological derivative concept. Struct Multidiscipl Optim. 2017;55(6):2131–2141.
  • Baumeister J, Leitão A. Topics in inverse problems. Rio de Janeiro: IMPA Mathematical Publications; 2005.
  • Burger M. A level set method for inverse problems. Inverse Probl. 2001;17:1327–1356.
  • Hintermüller M, Laurain A. Electrical impedance tomography: from topology to shape. Control Cybernet. 2008;37(4):913–933.
  • Isakov V, Leung S, Qian J. A fast local level set method for inverse gravimetry. Commun Comput Phys. 2011;10(4):1044–1070.
  • Tricarico P. Global gravity inversion of bodies with arbitrary shape. Geophys J Int. 2013;195(1):260–275.
  • Isakov V. Inverse source problems. Providence (RI): American Mathematical Society; 1990.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.