538
Views
3
CrossRef citations to date
0
Altmetric
Articles

Identifying unknown source in degenerate parabolic equation from final observation

&
Pages 1012-1031 | Received 15 Nov 2019, Accepted 24 Aug 2020, Published online: 15 Sep 2020

Abstract

In this article, for a degenerate parabolic equation we study an inverse problem for restoration of source temperature from the information of final temperature profile. The uniqueness of this inverse problem is first established by taking an integral transform and using Liouville's theorem (complex analysis). With aids of an integral identity, a Lipschitz stability for the inverse problem is further constructed. Finally, several numerical experiments are presented to show the accuracy and efficiency of the algorithm.

2010 Mathematics Subject Classifications:

1. Introduction and main results

Throughout this paper, assuming T is a given positive number and ρ is known as a C1[0,T]-function, we study a one-dimensional parabolic equation degenerating at the boundary of the space domain, namely (1) tux(a(x)xu)=ρ(t)f(x),(x,t)(0,1)×(0,T)(1) with suitable boundary condition which will be given later. We suppose that the degenerate coefficient a() satisfies the following conditions: (2) aC[0,1]C1(0,1], a(x)>0 in (0,1]anda(0)=0.(2) The study of such degenerate parabolic equation was initially motivated by some physical and financial mathematics models. For example, in the heat transfer, the thermal conductivity coefficient a(x) is usually related to the structure of the material, density and other factors. The lower the value of a(x), the stronger its heat resistance. So if the value of a(x) on the boundary x = 0 is so small, then the model (Equation1) can be regarded as an approximation of this case, which indicates the ability to resist heat transfer. We refer to e.g. Buchot and Raymond [Citation1], Martinez et al. [Citation14], Oleinik and Samokhin [Citation15] for motivating examples of a Crocco-type equation coming from the study of the velocity field of a laminar flow on a flat plate. The well known Black–Scholes equation is such the case where the degenerate parabolic boundary degeneracy occurs at the boundary (see e.g. Egger and Engl [Citation8] and Jiang and Tao [Citation12]).

In Equation (Equation1), the term ρ(t)f(x) is called the source term and it is crucial to know or determine the coefficient f. However, usually this term cannot be directly measured due to the mixing of the effects of several factors, which requires one to use inverse problems to identify these quantities by involving additional information that can be observed or measured practically. In this paper, our main concern is:

Problem 1.1

Consider the degenerate parabolic equation (Equation1) with the following initial condition (3) u(x,0)=0,x(0,1)(3) and boundary condition (4) u(0,t)=0,if  a1L1(0,1),limx0+a(x)ux(x,t)=0,if  a12L1(0,1),u(1,t)=0,t(0,T).(4) Determine the unknown source f from the final state observation u(x,T), x(0,1).

Problems of this type have important applications in several fields of applied science and engineering. For example, f usually describes the medium properties of generating heat source or heat sink in thermology. For recovering the source term, sometimes we have to measure the final state of the solution u since it is difficult to obtain the information of the solution at the early stage of the diffusion processes.

As is known, inverse source problems for classical parabolic equations are well studied in the literature. Here we do not intend to give a complete list of references, and one can consult Choulli and Yamamoto [Citation5], Hasanov and Slodicˇka [Citation10], Isakov [Citation11] and Rundell and Colton [Citation16] for example. However, to the best of the authors' knowledge, the works concerned with inverse degenerate problems are quite few in contrast with the non-degenerate case. In Cannarsa et al. [Citation4], the Carleman estimate with singular weight function was established for (Equation1) with a(x)=xα (0<α<2), from which an inverse source problem with addition boundary data was discussed. Similarly, we refer to Tort [Citation18] where the Lipschitz stability results in inverse source problems for the degenerate parabolic equations was established by the global Carleman estimates. We refer to Deng et al. [Citation6] and Rao et al. [Citation20] for theoretical and numerical treatments on determining the source term in (Equation1). [Citation6] reconstructed the source by a numerical algorithm on the basis of the conjugate gradient method. In [Citation20], an iteration scheme of the Landweber type is applied to handle the numerical solution of the inverse problem. We also refer to Deng and Yang [Citation7] and Tort and Vancostenoble [Citation19] for the coefficient inverse problems, and refer to Yang and Deng [Citation21] for the backward problem for the degenerate parabolic equation. For other topics of degenerate parabolic equations, e.g. the null controllability, we may refer the reader to Cannarsa et al. [Citation2,Citation3] and the references therein.

In this paper, for the degenerate parabolic equation (Equation1), we show that in the case where ρ is only t-dependent and smooth enough, the spatial component can be uniquely determined from the final overdetermination. We have

Theorem 1.1

Assume ρC1[0,T] is positive for any t[0,T]. Let fL2(0,1) and suppose u solves Equation (Equation1) with initial-boundary conditions (Equation3) and (Equation4). Then u(,T)0 in (0,1) implies f0 in (0,1).

By the above theorem, we can further see that when the data have some perturbations, the source term must have corresponding changes.

Theorem 1.2

Under the same assumptions in Theorem 1.1, we suppose that (ui,fi), i = 1, 2 are two pairs of solutions of our inverse source problem correspondingly to data hi:=ui(x,T), i = 1, 2. Then f1f2Bh1h2L2(0,1).

Here the norm B will be given in Section 3.

For proving Theorem 1.1, several technical lemmas for this degenerate parabolic equation are needed, so we collect them in Sections 2.1 and 2.2. Preparing all necessities, say, Lemmas 2.2 and 2.3, by Liouville's theorem (complex analysis) we will finish the proof of Theorem 1.1 in Section 2. In the following Section 3, an integral identity is to be put forward with which the stability in Theorem 1.2 can be constructed via a suitable topology. In Section 4, an iteration thresholding method based on the Tikhonov regularization is designed to obtain the numerical solution for our inverse source problem, and some typical numerical experiments are tested to be verified the validity of the iteration scheme. Finally, concluding remarks are given in Section 5.

2. Proof of Theorem 1.1

In this section, we will set up notations and terminologies, review some of standard facts on the functional analysis and give the proof of Theorem 1.1.

2.1. Weighted Sobolev spaces and Hardy inequality

In this part, we introduce a weighted Sobolev spaces and a Hardy-type inequality which play an important role in the proof of our inverse source problem as well as the regularity estimates for the solution to Equation (Equation1) with the initial-boundary conditions (Equation3) and (Equation4).

In addition to (Equation2), we suppose that the degenerate coefficient a() satisfies the following conditions:

  • α(0,2) such that xa(x)αa(x) for every x(0,1].

  • If α[1,2), there exist m>0 and δ0>0 such that for every x[0,δ0], we have a(x)msup0yxa(y).

For example, a(x)=xα satisfies the above conditions. Under these assumptions on the degenerate coefficient a(), the boundary condition (Equation4) can be rephrased as follows: (5) u(0,t)=0,if  0<α<1,a(0)ux(0,t)=0,if  1α<2,u(1,t)=0,t(0,T).(5)

Remark 2.1

We point out that the functional framework in which the problem is well posed depends on whether 0<α<1 or 1α<2. We distinguish the two following cases: I. 0<α<1, the weakly degenerate case at 0; II. 1α<2, the strongly degenerate case at 0.

We introduce the following weighted Sobolev space related to the degenerate coefficient a(): Ha1(0,1)=uL2(0,1)Hloc1(0,1];01a(x)|ux(x)|2dx<+ which is a Hilbert space with the scalar product  u,vHa1(0,1),(u,v)=01uv+a(x)uxvxdx. We define the unbounded operator A : D(A)L2(0,1)L2(0,1) by  uD(A),Au:=x(a(x)xu), where D(A) will be given later.

Definition 2.1

Weak degeneracy

For α(0,1), we define (6) Ha,01(0,1):=uHa1(0,1);u(0)=u(1)=0,(6) and we let (7) D(A):=uHa,01(0,1)Hloc1(0,1];(aux)xL2(0,1).(7)

Definition 2.2

Strong degeneracy

For α[1,2), we let (8) Ha,01(0,1):=uHa1(0,1);u(1)=0.(8) We define D(A) as follows (9) D(A):=uHa,01(0,1)Hloc1(0,1];(aux)xL2(0,1),limx0+aux=0.(9)

Thus, in the case of α(0,1), if uD(A), then u satisfies the Dirichlet boundary condition u(0)=u(1)=0 and in the case α[1,2), every uD(A) satisfies the Neumann boundary condition limx0+(aux)(x)=0 and the Dirichlet boundary condition u(1)=0. Moreover, the operator A is the infinitesimal generator of a strongly continuous semigroup etA on L2(0,1). Consequently, we have the following well-posedness result (see, e.g. Futouhi and Salimi [Citation9, Theorem 14]).

Proposition 2.1

Let ρ be given in L2(0,T) and fL2(0,1). For all α[0,2), Equation (Equation1) with the initial-boundary conditions (Equation3) and (Equation5) has a unique solution uC([0,T];L2(0,1))L2(0,T;Ha1(0,1)).

Moreover, we have the following Hardy-type inequality of the solution in the framework of weighted Sobolev spaces Ha(0,1).

Lemma 2.1

Hardy-type inequality, e.g. [Citation9, Remark 20]

Let α(0,2), we have 01a(x)ux2dxC01u2dx, uHa,01(0,1), where the constant C>0 depending only on a(1) and α.

2.2. Estimates under frequency domain

In this part, we will show several useful lemmas which are mainly concerned with the estimates of the solution of Equation (Equation1) with initial-boundary conditions (Equation3) and (Equation5) under frequency domain. For this, we multiply both sides of Equation in (Equation1) by est with sC, and integrate from 0 to T to derive 0Ttu(t)estdt0TAu(t)estdt=f(x)0Tρ(t)estdt. Noting that u(0)=0, from integration by parts, we find (10) Auˆ(s)+suˆ(s)=f(x)ρˆ(s)u(x,T)esT,sC,(10) where (11) uˆ(s):=0Tu(t)estdt,ρˆ(s):=0Tρ(t)estdt.(11)

Lemma 2.2

Let ε>0 and δ>0 be a sufficiently small and fixed constants. Assuming the function ρC1[0,T] is positive in [0,T]. Then there exists a positive constant C=C(ρ0:=inf[0,T]ρ,ε,δ,T) such that the following inequality |ρˆ(s)|=0Tρ(t)estdtC0Tetsdt is valid for any s{sε;|s|δ}.

Proof.

We will prove the above inequality holds true in either of the following two cases.

Case 1  s{sK;|s|δ}.

Case 2  s{Ksε;|s|δ}.

In Case 1, by integration by parts we represent ρˆ(s) as follows 0Tρ(t)estdt=ρ(0)ρ(T)esTs+s10Tρ(t)estdt=:I1(s)+I2(s). For I2(s), by a direct calculation, we find |I2(s)||s|10T|ρ(t)|etsdtρC1[0,T]|s|1eTss. The choice of s, say, sε implies that (12) 1eTsseT|s||s|,(12) which can be further used to derive that |I2(s)|ρC1[0,T]eT|s||s||s|. Let us turn to evaluating I1(s). For this, a direct calculation derives sI1(s)=ρ(0)ρ(T)eTscos(Ts)+iρ(T)eTssin(Ts), hence that |sI1(s)|2=ρ(T)2e2Ts2ρ(0)ρ(T)eTscos(Ts)+ρ(0)2, finally that |I1(s)|2=ρ(T)eTsρ(0)2|s|2+2ρ(0)ρ(T)eTs1cos(Ts)|s|2. Moreover, by the inequality |1cost|t2C, tR, we see that |1cos(Ts)||s|2=|1cos(Ts)||Ts|2|Ts|2|s|2CT2,sC. Combining all the above estimates, we find |I1(s)|2ρ(T)eTsρ(0)2|s|22CT2ρ(0)ρ(T)eTs. Now for sufficiently large |s|, then |s| is also sufficiently large in view of (Equation12). Consequently there exists a constant C=C(K,T,ρ) such the estimate |I1(s)|CeTs|s| provided that s<K with K>0 is a sufficiently large constant.

Finally, in Case 1, that is, s{sK} with sufficiently large K>0, we have 0Tρ(t)estdt|I1(s)||I2(s)|eT|s||s|CρC1[0,T]|s|CeT|s|2|s|. Moreover, noting that |s|δK implies |s|22|s|2, we further see that 0TetsdteT|s||s|2eT|s||s|, which derives that 0Tρ(t)estdtC0Tetsdtin Case 1. Next, we evaluate ρˆ(s) in Case 2, that is, the case when s lies in {sC;Ksε;|s|δ}. By taking δ small enough, we are led to |sin(ts)||ts|14,cos(ts)12. We first rewrite ρˆ(s) as follows ρˆ(s)=0Tρ(t)etscos(ts)dt+i0Tρ(t)etssin(ts)dt, hence that |ρˆ(s)|120Tρ(t)et|s|dt140Tρ(t)et|s|dtρ040Tet|s|dt=ρ0(eT|s|1)4|s|, where ρ0:=inft[0,T]ρ(t)>0. Finally, we obtain |ρˆ(s)|CeT|s|1|s|>C1>0,s{sC;Ksε;|s|δ}, where the constant C1>0 is only dependent on T,ρ,ε,δ. Moreover, for Ksε, one can easily check that 0TetsdtTeKT, therefore, we have 0Tρ(t)estdtC0Tetsdtin Case 2. Collecting all the above estimates we finish the proof of the lemma.

Lemma 2.3

Assume ρC1[0,T] is positive for any t[0,T]. Let fL2(0,1) and suppose u solves Equation (Equation1) with initial-boundary conditions (Equation3) and (Equation4). Then the function uˆ:CD(A) which is defined in (Equation11) can be estimated as follows (13) uˆ(s)L2(0,1)C|ρˆ(s)|fL2(0,1),sC.(13)

Proof.

We denote uˆ¯(s) as the conjugate of the complex valued function uˆ(s). Then multiplying uˆ¯(s) on both sides of Equation (Equation10), and taking integral on (0,1) lead to 01(Auˆ(s))uˆ¯(s)+suˆ(s)uˆ¯(s)dx=ρˆ(s)01uˆ¯(s)f(x)dxesT01u(T)uˆ¯(s)dx,sC. Here we omitted the x in uˆ(x,s) and u(x,T) when no confusion can arise. Integration by parts yields Bs[uˆ(s),uˆ(s)]=ρ(s)01fˆ(x)uˆ¯(s)dxesT01u(T)uˆ¯(s)dx, where Bs[uˆ(s),uˆ(s)]:=01a(x)uˆx(s)uˆx(s)¯+s|uˆ(s)|2dx. The real part of Bs[uˆ,uˆ] can be represented as follows: (14) Bs[uˆ,uˆ]=01a(x)|uˆx|2+s|uˆ(s)|2dx,(14) while the imaginary part is (15) Bs[uˆ,uˆ]=01s|uˆ(s)|2dx.(15) Now in the case of sε, where ε>0 will be chosen later, we find from (Equation14) that 01a(x)|uˆx(s)|2+s|uˆ(s)|2dx|Bs[uˆ,uˆ]|, which combined with Lemma 2.1 yields 01C|uˆ(s)|2+s|uˆ(s)|2dx|ρˆ(s)|01|f(x)| |uˆ(s)|dx+|esT|01|u(T)||uˆ(s)|dx. By the Hölder inequality, we have 01C|uˆ(s)|2+s|uˆ(s)|2dx|ρˆ(s)|01f2(x)dx1201|uˆ(s)|2dx12+|esT|01u2(T)dx1201|uˆ(s)|2dx12, therefore (s+C)01|uˆ(s)|2dx12|ρˆ(s)|01f2(x)dx12+|esT|01u2(T)dx12, that is, (s+C)uˆ(s)L2(0,1)|ρˆ(s)|fL2(0,1)+|esT|u(T)L2(0,1). Now we choose ϵ being small enough so that Cε>C2, then uˆ(s)L2(0,1)C|ρˆ(s)|fL2(0,1)+C|esT|u(T)L2(0,1). Let us turn to the case of s{sε;|s|δ}, from the definition of uˆ(s), it follows that uˆ(s)L2(0,1)0Tu(t)L2(0,1)etsdtCfL2(0,1)0Tetsdt. Then Lemma 2.2 derives uˆ(s)L2(0,1)CfL2(0,1)|ρˆ(s)|. It remains to consider the case of s{sε;|s|δ}, where δ>0 is sufficiently small. In view of (Equation15), we see that |s|01|uˆ(s)|2dx|ρˆ(s)|01f2(x)dx1201|uˆ(s)|2dx12+|esT|01u2(T)dx1201|uˆ(s)|2dx12. Then uˆ(s)L2(0,1)C|s||ρˆ(s)|fL2(0,1)+|esT|u(T)L2(0,1)C|ρˆ(s)|fL2(0,1)+|esT|u(T)L2(0,1).

2.3. Proof of Theorem 1.1

As a direct application of the estimates in the above subsection, we will give a proof of Theorem 1.1.

Proof

Proof of Theorem 1.1

Since uˆ(s) and ρˆ(s) are analytic in C, and hence Fϕ(s):=01uˆ(s)ϕ(x)dxρˆ(s) is a holomorphic function in C removing the zero points of ρˆ(s), where ϕL2(0,1) is arbitrarily fixed. However, from hyperthesis u(T)=0, Lemma 2.3 and Riemann's theorem (see, e.g. [Citation17]) guarantee that all the singularities of the function Fϕ(s) are removable, and then this function can be regarded as an analytic function in C and is bounded on C. Thus the Liouville theorem (see, e.g. [Citation17]) implies that the analytic function Fϕ(s) must be independent of s, that is, there exists a constant Cϕ depending on ϕ such that Fϕ(s)=Cϕ,  sC.

Now we take the parameter s be real number and we claim that Cϕ must be zero by letting s+ in Fϕ(s). Indeed, by integration by parts, we find that sρˆ(s)=ρ(0)ρ(T)esT+0Tρ(t)estdtρ(0), as s+. We estimate the part 01uˆ(x;s)ϕ(x)dx, s>0, as follows 01uˆ(x;s)ϕ(x)dx0δ01u(x,t)ϕ(x)dxestdt+δT01u(x,t)ϕ(x)dxestdt=I1+I2. Here 0<δ<T will be chosen in the following. From Proposition 2.1, we see that for any ε>0, there exists δ>0 such that |01u(x,t)ϕ(x)dx|<ε for any |x|<δ. Therefore, I1ε0δestdtεs(1esδ),s>0. It remains to evaluate I2. By noting uC([0,T];L2(0,1)), a direct calculation yields I2uC([0,T];L2(0,1))ϕL2(0,1)δTestdtCuC([0,T];L2(0,1))ϕL2(0,1)esδesTs. Collecting all the above estimates, we finally obtain 01suˆ(x;s)ϕ(x)dxε(1esδ)+CuC([0,T];L2(0,1))ϕL2(0,1)(esδesT), which implies lim¯s+01suˆ(x;s)ϕ(x)dxε. We must have lims+01suˆ(x;s)ϕ(x)dx=0 since ε>0 can be arbitrarily small.

Since Cϕ is independent of s, these two estimates for suˆ(s) and sρˆ(s) imply that the constant Cϕ is zero, which further implies uˆ(x;s)0, x(0,1), sC by noting ϕL2(0,1) can be arbitrarily chosen. Consequently 0u~(t)estdt=0,sC, where u~(t):=u(t) if t(0,T) and u~ vanishes outside of (0,T), which implies u(x,t)0 in (0,1)×(0,T) due to the uniqueness of the Laplace transform, and hence f0 in (0,1). We complete the proof of the theorem.

Remark 2.2

Here we should mention that this kind of inverse source problem in the non-degenerate cases has been well studied thanks to the eigensystem of the elliptic operator. We do not know if the Fourier expansion can also perform well in dealing with our case. In fact, the traditional eigenfunction expansion argument requires the symmetry of the equation, and also the nonsingular coefficients are needed. However, our method based on the integral transform has no special requirements for the structure of the equation, except that the coefficient must be time independent.

3. Proof of Theorem 1.2

In this section, following the arguments used in Li and Yamamoto [Citation13], a Lipschitz stability for determining the source magnitude will be established.

3.1. An integral identity

For proving the second main result, we will give an integral identity with aid of an adjoint problem, which reflects a corresponding relation of varied of the unknown source functions with changes of the initial-boundary values and additional observations.

Lemma 3.1

Consider uj, j=1,2, the solution of (Equation1) with initial and boundary conditions given by (Equation3) and (Equation4), and f=fj. Then it follows that (16) 010Tρ(t)(f1f2)ϕdtdx=01(u1u2)(x,T)v(x)dx,(16) where ϕ(x,t) denotes a solution of a suitable adjoint problem with input data ϕ(x,0)=v(x).

Proof.

Denote u=u1u2, and note that u1=u1(x,t;f1) and u2=u2(x,t;f2) both satisfying Equation (Equation1), initial-boundary value (Equation3) and (Equation4), we have (17) tux(a(x)xu)=ρ(t)(f1(x)f2(x)),(17) with initial and boundary conditions (Equation3) and (Equation4).

By smooth test function ϕ(x,t) multiplying two sides of Equation (Equation17), and integrating on (0,1)×(0,T), we obtain 010Ttux(a(x)xu)ϕ(x,t)dtdx=010tρ(t)(f1f2)(x)ϕ(x,t)dtdx. Integration by parts yields 010tρ(t)(f1f2)(x)ϕ(x,t)dtdx+010tutϕ+x(a(x)xϕ)dtdx=01ϕ(x,T)u(x,T)ϕ(x,0)u(x,0)dx+0Ta(1)u(1,t)xϕ(1,t)a(0)u(0,t)xϕ(0,t)dt0Ta(1)xu(1,t)ϕ(1,t)a(0)xu(0,t)ϕ(0,t)dt. Substituting into the boundary conditions (Equation3) and (Equation4), and choosing ϕ=ϕ(x,t) as a solution of the following adjoint problem: (18) tϕ+x(a(x)xϕ)=0in  (0,1)×(0,T)(18) with boundary value (Equation4) and controllable inputs ϕ(,T)=vL2(0,1), we can complete the proof of the lemma.

3.2. Construction of stability

By the above established identity (Equation16), we will construct a stability with a suitable topology. For this purpose, noting to the identity (Equation16), we first define a bilinear form Bρ(f,ϕ):L2(0,1)×L2((0,1)×(0,T))R in terms of ρ by (19) Bρ(f,ϕ):=010Tρ(t)f(x)ϕ(x,t)dtdx.(19)

We then define a functional B:L2(0,1)R+ via: (20) fB:=supvL2(0,1)=1|Bρ(f,ϕ[v])|,(20) where ϕ[v] is the solution to the adjoint system (Equation18) with (Equation4) and ϕ(x,T)=v(x). It is not difficult to check that the functional B is a semi-norm on L2(0,1). Indeed, from the bilinearity of Bρ(,), it follows that cfB=supvL2(0,1)=1|c||Bρ(f,ϕ[v])|=|c|fB and the triangle inequality f1+f2BsupvL2(0,1)=1|Bρ(f1,ϕ[v])|+|Bρ(f2,ϕ[v])|f1B+f2B. From Theorem 1.1 and the integral identity (Equation16), we conclude that fB=0 implies f = 0. We then see that B is a norm on L2(0,1). Then by the integral identity (Equation16) and applying Schwartz inequality, we can easily prove Theorem 1.2.

Proof

Proof of Theorem 1.2

By the integral identity (Equation16), applying the Schwartz inequality, we see that f1f2B=supvL2(0,1)=1|Bρ(f1f2,ϕ[v])|=supvL2(0,1)=101v(x)(u1(x,T)u2(x,T))dxu1(,T)u2(,T)L2(0,1). We finish the proof of the theorem.

4. Numerical simulation

In this section, we are devoted to developing an effective numerical method for the numerical reconstruction of the unknown source in the domain (0,1) from the addition data u in (0,1)×{T}.

4.1. Iterative thresholding algorithm

We discuss Equation (Equation1) with initial and boundary values (Equation3) and (Equation4) and we write its solution of problem (Equation1) as u[f] in order to emphasize the dependency on the unknown function f. Here and henceforth, we set ftrueL2(0,1) as the true solution to our inverse source problem (1.1), and by using noise contaminated observation data uδ(,T) in (0,1), we carry out numerical reconstruction. Here uδ satisfies uδ(,T)u[ftrue](,T)L2(0,1)δ with the noise level δ.

In the framework of the Tikhonov regularization technique, we propose the following output least squares functional related to our inverse source problem (21) minfL2(0,1)Φ(f),Φ(f):=u[f](,T)uδ(,T)L2(0,T)2+λfL2(0,1)2,(21) where λ>0 is the regularization parameter.

Now we intend to calculate the Fréchet derivative Φ(f) of the objective functional Φ(f) for finding a minimizer. For an arbitrarily fixed direction gL2(0,1), a direct calculation implies Φ(f)g=201(u[f](,T)uδ(,T))(u[f]g)(,T)dx+2λ01fgdx, where u[f]g denotes the Fréchet derivative of u[f] in the direction g, and the linearity of (Equation1) immediately yields u[f]g=limϵ0u(f+ϵg)u(f)ϵ=u[g], from which we further derive (22) Φ(f)g=201(u[f](,T)uδ(,T))u[g](,T)dx+2λ01fgdx.(22)

Remark 4.1

It is not applicable to find the minimizer of the functional Φ directly in terms of the above formula of the Fréchet derivative of Φ(f). Indeed, in the computation for Φ(f), one should solve system (Equation1) for u[f] with g varying in L2(0,1), which is undoubtedly quite hard and computationally expensive.

We introduce the adjoint system of (Equation1) to reduce the computational costs for the Fréchet derivatives, that is, the following system for a backward differential equation (23) tv+x(a(x)xv)=0,(x,t)(0,1)×(0,T),v(x,T)=u[f](,T)uδ(,T),x(0,1),v(0,t)=0,if  a1L1(0,1),a(0)vx(0,t)=0,if  a12L1(0,1),v(1,t)=0,t(0,T).(23) We write the solution of (Equation23) as v[f], and similar to the argument used in the above section, we further treat the first term on the right-hand side of (Equation22) as 01(u[f]uδ)u(g)dx=0T01ρ(t)v[f](x,t)g(x)dxdt, implying Φ(f)g=20T01ρ(t)v[f](x,t)+λf(x)g(x)dxdt, gL2(0,1). This suggests a characterization of the solution to the minimization problem (Equation21).

Lemma 4.1

The function fL2(0,1) is a minimizer of the functional Φ(f) in (Equation21) only if it satisfies the variational equation (24) 0Tρ(t)v[f](x,t)dt+λTf(x)=0,(24) where v[f] solves the backward problem (Equation23) with the control input u[f](,T)uδ(,T).

We can obtain the iterative thresholding algorithm by adding Mf(M>0) to both sides of (Equation24) and rearranging the equation (Equation24) as follows (25) fk+1=MM+λfk1T(M+λ)0Tρ(t)v[fk](x,t)dt,(25) where M>0 is a tuning parameter for the convergence, it suffices to choose (26) MAop2,(26) where op denotes the operator norm of an operator under consideration and the operator A is defined as follows. A:fL2(0,1)u[f](,T)L2(0,T). Based on the above discussion, now we propose the following iterative thresholding algorithm for the reconstruction of the unknown source term.

Remark 4.2

As can be seen from (Equation25), for computing v[fk] at each iteration step, one only needs to solve the forward problem (Equation1) once for u[fk] and the backward problem (Equation23) once. Therefore, the numerical implementation of Algorithm 4.1 is easy and computationally cheap.

4.2. Numerical experiments

In this part, we set T = 1 and ρ(t)=t+1, t(0,T), and apply the iterative thresholding algorithm established in the previous subsection to numerically recovery the unknown source term. We carry out several test numerical experiments to check the performance of the reconstruction method.

We divide the space-time region [0,1]×[0,1] into 40×1000 equidistant meshes. First we set the tolerance parameter ε<0.05, M = 1, λ=0.001, initial guess f0(x)=0 and test the performance of the algorithm with the following examples.

Example 4.1

In the first numerical experiment, we take

(A)

a(x)=x0.15, ftrue(x)=10sin(πx).

(B)

a(x)=x0.50, ftrue(x)=10sin(πx).

Figures  and  show the reconstruction results with diffusion coefficients a(x)=x0.15 and a(x)=x0.50. It can be easily seen that the source term can be recovered very well after 2000 iterations. The relative error between the reconstructed source and the true source is less than 2.20%.

Figure 1. Example 4.1 (A): numerical results for different iteration times, when a(x)=x0.15

Figure 1. Example 4.1 (A): numerical results for different iteration times, when a(x)=x0.15

Figure 2. Example 4.1 (B): numerical results for different iteration times, when a(x)=x0.50.

Figure 2. Example 4.1 (B): numerical results for different iteration times, when a(x)=x0.50.

In the following examples, we consider the noisy data generated in the form uδ(x,1)=(1+δrand(1,1))u[ftrue](x,1),x(0,1), where rand(1,1) denotes the uniformly distributed random number in [1,1] and the noisy levels are δ=0.5% and δ=1.0%.

Example 4.2

We consider numerical experiment with noise contaminated observation data.

(A)

a(x)=x0.15, ftrue(x)=10x(1x).

(B)

a(x)=log(x+1), ftrue(x)=10x(1x).

In Figure , the source term is obtained after k = 1073 iteration steps, and the relative error of the reconstructed solution of the inverse source problem is less than 3.99%. In Figure , the iteration steps k = 2000 and the relative error is less than 7.02%. Moreover, we can also see that the degeneracy on boundary may produce a relatively large impact on the reconstruction results. It is not difficult to find that the recovered curve for the case a(x)=x0.15 is better than that of the case a(x)=sinx, particularly near the boundaries. It is not hard to understand because the diffusion coefficient a(x)=sinx has much more degeneracy than a(x)=x0.15 at the boundary x = 0.

Figure 3. Example 4.2 (A): numerical results for different noise levels, when a(x)=x0.15.

Figure 3. Example 4.2 (A): numerical results for different noise levels, when a(x)=x0.15.

Figure 4. Example 4.2 (B): numerical results for different noise levels, when a(x)=sinx.

Figure 4. Example 4.2 (B): numerical results for different noise levels, when a(x)=sin⁡x.

Similarly, the reconstruction of ftrue=1|2x1| from the noisy data uδ(,t) is also performed.

Example 4.3

We consider numerical experiment with non-differentiable source.

(A)

a(x)=x0.15, ftrue(x)=1|2x1|.

(B)

a(x)=log(x+1), ftrue(x)=1|2x1|.

The results are shown in Figures  and , where the noisy levels δ=0.5% and δ=1.0%. In Figures  and , after the iteration steps k = 3000, the source is recovered with the relative error less than 7.12% and 10.11% respectively.

Figure 5. Example 4.3 (A): numerical results for different noise levels, when a(x)=x0.15.

Figure 5. Example 4.3 (A): numerical results for different noise levels, when a(x)=x0.15.

Figure 6. Example 4.3 (B): numerical results for different noise levels, when a(x)=sinx.

Figure 6. Example 4.3 (B): numerical results for different noise levels, when a(x)=sin⁡x.

Remark 4.3

Figures  and the relative errors indicate the efficiency and accuracy of the proposed Algorithm 4.1 for reconstructing the unknown source term. However, it should be mentioned here that owing to the poor regularity of the target function, the reconstruction results are not as well as those of the smooth case in the previous examples.

5. Concluding remarks

In this paper, we considered the inverse problem in reconstructing the source term for the degenerate parabolic equations from the final observation. We first introduced the Hardy type inequality in the framework of weighted Sobolev spaces. We transferred the degenerate equation into a degenerate elliptic one by using finite Laplace transform. As a direct application of the Hardy inequality, we showed that the source term can be uniquely determined from the final state of the solution by the Liouville theorem. By using the integral identity, we further verified the Lipschitz continuous dependency of the source with respect to the final data of the solution with given topology. We should mention that compared with classical parabolic equations, the main difficulty for degenerate equations lies in the degeneracy of the principle coefficients which may lead to the corresponding solution has no sufficient regularity, even if the initial value and the coefficients are sufficiently smooth functions. There will be a challenge if the degenerate equation has flux. Moreover, in the proofs of our results, we need the assumption that all the coefficients are only x-dependent. It will be more interesting and challenging to consider what happens with the properties of the solutions in the case where the coefficients are both t- and x -dependent. It will be also interesting to consider the stability of the inverse source problem if ρ>0 in [0,T] is not valid. For example, ρ0.

In the numerical aspect, we reformulated the inverse source problem as an optimization problem with Tikhonov regularization. After the derivation of the corresponding variational equation, we characterized the minimizer by employing the associated backward degenerate parabolic equation, which results in the iterative method. Then several numerical experiments for the reconstructions were implemented to show the efficiency and accuracy of the proposed Algorithm 4.1. Here we should mention that formula (Equation24) for finding the minimizer of problem (Equation21) is not suitable for f which is not vanished on the boundary. Indeed, for deriving Algorithm 4.1, the homogeneous boundary condition of the solution v to the backward problem was assumed. It will be interesting to derive the iteration scheme without assuming this homogeneous boundary condition on f. The algorithm for the general case remains open.

Acknowledgments

The second author thanks National Natural Science Foundation of China 11801326.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

This work was supported by National Natural Science Foundation of China [Grant Number 11801326].

References

  • Buchot JM, Raymond JP. A linearized model for boundary layer equations. Optimal control of complex structures (Oberwolfach, 2000). Basel: BirkhNauser; 2002; p. 3–42. (Internat. Ser. Numer. Math.; 139).
  • Cannarsa P, Martinez P, Vancostenoble J. Null controllability of degenerate heat equations. Adv Differ Equ. 2005;10:153–190.
  • Cannarsa P, Martinez P, Vancostenoble J. Carleman estimates for a class of degenerate parabolic operators. SIAM J Control Optim. 2008;47:1–19. doi: 10.1137/04062062X
  • Cannarsa P, Tort J, Yamamoto M. Determination of source terms in a degenerate parabolic equation. Inverse Probl. 2010;26:105003. (20pp) doi: 10.1088/0266-5611/26/10/105003
  • Choulli M, Yamamoto M. Generic well-posedness of a linear inverse parabolic problem with diffusion parameters. J Inverse and Ill-Posed Prob. 1999;7(3):241–254.
  • Deng ZC, Qian K, Rao XB, et al. An inverse problem of identifying the source coefficient in a degenerate heat equation. Inverse Probl Sci Eng. 2015;23(3):498–517. doi: 10.1080/17415977.2014.922079
  • Deng ZC, Yang L. An inverse problem of identifying the coefficient of first-order in a degenerate parabolic equation. J Comput Appl Math. 2011;235(15):4404–4417. doi: 10.1016/j.cam.2011.04.006
  • Egger H, Engl HW. Tikhonov regularization applied to the inverse problem of option pricing: convergence analysis and rates. Inverse Problems. 2005;21:1027–1045. doi: 10.1088/0266-5611/21/3/014
  • Fotouhi M, Salimi L. Null controllability of degenerate/singular parabolic equations. J Dyn Control Syst. 2012;18(4):573–602. doi: 10.1007/s10883-012-9160-5
  • Hasanov A, Slodička M. An analysis of inverse source problems with final time measured output data for the heat conduction equation: A semigroup approach. Appl Math Lett. 2013;26(2):207–214. doi: 10.1016/j.aml.2012.08.013
  • Isakov V. Inverse parabolic problems with the final overdetermination. Commun Pure Appl Math. 1991;44(2):185–209. doi: 10.1002/cpa.3160440203
  • Jiang LS, Tao YS. Identifying the volatility of underlying assets from option prices. Inverse Probl. 2001;17:137–155. doi: 10.1088/0266-5611/17/1/311
  • Li G, Yamamoto M. Stability analysis for determining a source term in a 1-D advection-dispersion equation. J. Inv. Ill-posed Problems. 200614(2):147–155. doi: 10.1515/156939406777571067
  • Martinez P, Raymond JP, Vancostenoble J. Regional null controllability of a linearized Crocco-type equation. SIAM J Control Optim. 2003;42:709–728. doi: 10.1137/S0363012902403547
  • Oleinik AO, Samokhin VN. Mathematical models in boundary layer theory. Chapman and Hall/CRC; 1999.
  • Rundell W, Colton DL. Determination of an unknown non-homogeneous term in a linear partial differential equation, from overspecified boundary data. Applicable Anal. 1980;10(3):231–242. doi: 10.1080/00036818008839304
  • Rudin W. Real and complex analysis. Singapore: Tata McGraw-Hill Education; 1987.
  • Tort J. Determination of source terms in a degenerate parabolic equation from a locally distributed observation. C R Acad Sci Paris, Ser I. 2010;348:1287–1291. doi: 10.1016/j.crma.2010.10.031
  • Tort J, Vancostenoble J. Determination of the insolation function in the nonlinear sellers climate model. Ann I H Poincare-AN. 2012;29:683–713. doi: 10.1016/j.anihpc.2012.03.003
  • Rao XB, Wang YX, Qian K. Numerical simulation for an inverse source problem in a degenerate parabolic equation. Appl Math Modelling. 2015;39:23–24. S0307904X15001687. doi: 10.1016/j.apm.2015.03.016
  • Yang L, Deng ZC. An inverse backward problem for degenerate parabolic equations. Numer Meth for Partial Differ Equ. 2017;33:1900–1923. doi: 10.1002/num.22165

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.